• Title/Summary/Keyword: User safety

Search Result 1,243, Processing Time 0.029 seconds

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment (스마트 홈 환경에서 디바이스 상호 인증 및 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.661-667
    • /
    • 2018
  • Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.

Development of Web Credibility Evaluation Model Using AHP (AHP를 이용한 웹 사이트 신뢰성 평가 모델 개발)

  • Kim, Young-Kee
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.4
    • /
    • pp.51-69
    • /
    • 2008
  • This study tired to develop the web credibility evaluation model by calculating weighted values and sensitivities of indicators which presented on preceding researches using Analytic Hierarchy Process. "Expert Choice 2000" was used as the tool for analysing AHP. 25 experts are answered for this questionnaire who are selected by judgement sampling method, one of the non-probability sampling method. Also, sensitivity analyses was performed to graphically see how the alternatives change with respect to the importance of the indicators or sub-indicators. The main results are summarized as followings; i) importance analysis in first level factors: trust-worthiness(0,606), expertness(0.222), safety(0.173), ii) importance analysis in second level factors: trustfulness (0.519), reputation(0.087), usefulness (0.102), timeliness(0,093), competency(0.027), security(0.115), reliability(0,058). iii) some of the importance analysis in third level factors: the site provides comprehensive information that is attributed to a specific source(0.252), the site has articles that list citations and references(0.153), the site contains user opinions and reviews(0.072), etc. iv) sensitivity analyses showed that the importance of the indicators or sub-indicators are slightly changed with respect to the alternatives change.

  • PDF

Korean Customer Attitudes Towards SNS Shopping

  • Cho, Young-Sang;Heo, Jeong-Yoon;Youn, Myoung-Kil
    • Journal of Distribution Science
    • /
    • v.10 no.8
    • /
    • pp.7-14
    • /
    • 2012
  • As a new format of retailing, social shopping on SNS has rapidly grown in recent. Although there is much literature associated with customer behaviours in the academic world, little attention has been paid to identifying the shopping patterns of SNS shoppers. This paper will, thus, identify how perceived value has an impact on the buying intention of SNS shoppers, after illustrating what kind of factor influences the formation process of perceived value in the Korean marketplace. Given that SNS shoppers are for the most part 20s as well as 30s, the authors handed out questionnaires to them. Furthermore, based on literature review results, the conceptualised research model was developed. Despite lack of literature, the authors developed five constructs like price reduction, quantity- and time-limited message, product ranges, information-sharing, and required number of shoppers. The researchers made a considerable effort to identify the relationship between research concepts and each variable, based on a few research analysis methods such as frequency analysis, the Varimax rotation technique used orthogonal rotation, Cronbach's Alpha, PCA (Principle Component Analysis), and the like. Amongst the 5 variables used to measure the degree of influences on the perceived value as a social shopping characteristic, it has been evident that price cut, required minimum shoppers, product variety, and information-sharing have a positive impact on the perceived value formation processes of SNS customers. Also, this research implies that SNS retailers can differentiate themselves from other retailers by differently using the above factors. From a practitioner's point of view, these factors should be strategically used to increase the social shopping opportunities of SNS users. It is, furthermore, evident that the perceived value formed by the above 4 factors have played an important role in the buying decision process of SNS customers. In a sense, whether customers are aware of higher price cut rates, information-sharing, required minimum shoppers, and product variety has a positive impact on making buying decisions. From a retailer's point of view, online shopping mall operators are able to use blog as well as twitter to improve the buying intention as a marketing tool of social network, because the business activities provided by social shopping retailers, like the rapid, accurate responses to customer requirements, the provision of a variety of information, and the communications between customers are closely related to buying intentions. There are a few research limitations to conduct this empirical research. It was not easy to review prior papers, due to its lack. In spite of the increasing number of SNS shoppers in Korea, little research attention has been paid to this kind of research topic by academicians, because buying products or services through SNS is in its infancy. With regard to research populations, it would be difficult to generalise the research findings in Korea, owing to unbalanced respondent distribution. Considering the above research limitations as well as the growth of social shopping, many authors should pay considerable attention to SNS-related issues in the future, and develop the more sophisticated criteria to measure the characteristics of SNS shoppers.

  • PDF

Study On Generating Compact Network RTK Corrections Considering Ambiguity Level Adjustment Among Reference Station Networks for Constructing Infrastructure of Land Vehicle (육상교통 인프라 구축을 위한 다중 네트워크 간 미지정수 수준 조정이 고려된 Compact Network PTK 보정정보 생성기법 연구)

  • Song, June-Sol;Park, Byung-Woon;Kee, Chang-Don
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.404-412
    • /
    • 2013
  • Network RTK is widely used especially for static applications so far, however, the demand for high accuracy positioning for kinetic users such as land vehicles is growing for safety and convenience reasons. Kinematic users move along the roads and the network where they receive corrections can be changed. Compact Network RTK corrections should keep consistency while network change. In this paper, we introduced a method of generating Compact Network RTK corrections considering network ambiguity level adjustment by formulation of corrections. We verified the proposed method for reference station networks across whole country. We also generated Compact Network RTK corrections using simulation and real GPS data from reference stations in South Korea and evaluated performance of users. As a result, the discontinuity between corrections from two networks reduced to 0.25 cycle from several cycles. And user could achieve less than 8 cm (2DRMS) horizontal position accuracy continuously regardless of network change.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

A study on the Compressive Strength of the Improved Skin-timber (개량 스킨팀버의 압축 강도에 관한 연구)

  • Kim, Gwang-Chul
    • Journal of the Korean Wood Science and Technology
    • /
    • v.38 no.4
    • /
    • pp.282-291
    • /
    • 2010
  • As compared with existing center-boring timber, skin timber which be hollowed out of its considerable inner parts has some merits as like short drying time, less developed checks during drying, a advantage of lower MC (8~%), more easy injection of chemicals, a possibility of using as a lighter structural heavy timber including Hanok and heavy timber construction, a possibility for the various living necessaries and furniture materials. However, development of hybrid skin timber is required for using as a value-added materials and giving a confidence for the structural safety of skin timber to general user. Thus, improved pine skin timber (IPST) and improved larch skin timber (ILST) were manufactured using the lighter steel plate possible. And compressive capacity of improved skin timber was analyzed. From the results of this study, the following conclusions have been made: 1. Both of IPST and ILST can give a uniformity of material capacity compared with non-treated skin timber. 2. Both IPST and ILST, there was not statistical significancy among the thickness of steel plate. Therefore, it concluded that it was not necessary to use thicker steel plate. 3. There was also not statistical significancy between IPSR and ILST, so it need not to be selective about the species of improved skin timber. 4. IPST showed various failure types, but most failure types of ILST is a splitting type.

Comparison of Deterministic and Probabilistic Approaches through Cases of Exposure Assessment of Child Products (어린이용품 노출평가 연구에서의 결정론적 및 확률론적 방법론 사용실태 분석 및 고찰)

  • Jang, Bo Youn;Jeong, Da-In;Lee, Hunjoo
    • Journal of Environmental Health Sciences
    • /
    • v.43 no.3
    • /
    • pp.223-232
    • /
    • 2017
  • Objectives: In response to increased interest in the safety of children's products, a risk management system is being prepared through exposure assessment of hazardous chemicals. To estimate exposure levels, risk assessors are using deterministic and probabilistic approaches to statistical methodology and a commercialized Monte Carlo simulation based on tools (MCTool) to efficiently support calculation of the probability density functions. This study was conducted to analyze and discuss the usage patterns and problems associated with the results of these two approaches and MCTools used in the case of probabilistic approaches by reviewing research reports related to exposure assessment for children's products. Methods: We collected six research reports on exposure and risk assessment of children's products and summarized the deterministic results and corresponding underlying distributions for exposure dose and concentration results estimated through deterministic and probabilistic approaches. We focused on mechanisms and differences in the MCTools used for decision making with probabilistic distributions to validate the simulation adequacy in detail. Results: The estimation results of exposure dose and concentration from the deterministic approaches were 0.19-3.98 times higher than the results from the probabilistic approach. For the probabilistic approach, the use of lognormal, Student's T, and Weibull distributions had the highest frequency as underlying distributions of the input parameters. However, we could not examine the reasons for the selection of each distribution because of the absence of test-statistics. In addition, there were some cases estimating the discrete probability distribution model as the underlying distribution for continuous variables, such as weight. To find the cause of abnormal simulations, we applied two MCTools used for all reports and described the improper usage routes of MCTools. Conclusions: For transparent and realistic exposure assessment, it is necessary to 1) establish standardized guidelines for the proper use of the two statistical approaches, including notes by MCTool and 2) consider the development of a new software tool with proper configurations and features specialized for risk assessment. Such guidelines and software will make exposure assessment more user-friendly, consistent, and rapid in the future.

Whole-body Management System using Ultra-Low Temperature Cyclical Cooling Method Combined with IT Technology (IT 기술을 접목한 초저온 순환 냉각 방식의 전신 관리 시스템)

  • Kim, Joo-Ho;Lee, Joo-Hyun;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.673-676
    • /
    • 2020
  • In this paper, we propose a whole-body management system using ultra-low temperature cyclical cooling method combined with IT technology. The proposed system has the following characteristics. First, it minimizes maintenance costs by circulating nitrogen gas cooled by ultra-low temperature inside the controller. Secondly, based on the information measured by the temperature sensor and oxygen concentration sensor, nitrogen gas is supplied to provide safe ultra-low temperature whole-body management. Thirdly, after entering the user's height, it provides convenient, ultra-low temperature whole-body care that can be controlled using an automatic lift. Fourth, it provides an easy-to-access, easy-to-manage GUI and a manager-only web program for whole-body management system operation. The results tested by the authorized testing agency to assess the performance of the proposed system were measured in the range of ±5%, the world's highest temperature sensor accuracy, and a range of -110℃ to -150℃ greater than the world's highest whole-body management temperature range(-110℃ ~ -140℃). In addition, humidity was measured at less than 40%, the world's highest, and oxygen concentration was more than 18%, the world's highest. Therefore, the effectiveness of the methods proposed in this paper was demonstrated because they produced the same results as the world's highest levels.

Active Disaster Alerting Service System based on App of Smart Moving Object (스마트 이동객체의 App 기반 능동형 재해경보서비스 시스템)

  • Han, Gi-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.131-143
    • /
    • 2011
  • Previous alerting service based on LBS was caused severe overload problem of server by using the method to confirm the location of each moving object on server. In this paper, by loading an App on smart moving object, we proposed a novel algorithm named ADAS(Active Disaster Alert Service) for accessing to the server site with oneself location information as needed and implemented the disaster alerting service system with visualization for user. In the proposed method, running App access to the server periodically with the present location coordinate gained from GPS module or network module and the ID of moving object. Then, the server compare the present location coordinate of moving object and the coordinates of disasters registered in DIDB and transmit the n NDIs existed in near distance orderly from the coordinate of present moving object to the client. The App compares the coordinate of present location for moving object and the coordinates of NDI is transmitted from server by real time and executes the service with classifying levels of alert into three steps such as danger, carefulness and safety. And new NDIs are gained by accessing DIDB on Server periodically during running App. Therefore, this will be become a novel method for reducing fundamentally the server overload problem in comparison with previous alerting service that the career of moving object is managed on server.

Analysis of Eye-safe LIDAR Signal under Various Measurement Environments and Reflection Conditions (다양한 측정 환경 및 반사 조건에 대한 시각안전 LIDAR 신호 분석)

  • Han, Mun Hyun;Choi, Gyu Dong;Seo, Hong Seok;Mheen, Bong Ki
    • Korean Journal of Optics and Photonics
    • /
    • v.29 no.5
    • /
    • pp.204-214
    • /
    • 2018
  • Since LIDAR is advantageous for accurate information acquisition and realization of a high-resolution 3D image based on characteristics that can be precisely measured, it is essential to autonomous navigation systems that require acquisition and judgment of accurate peripheral information without user intervention. Recently, as an autonomous navigation system applying LIDAR has been utilized in human living space, it is necessary to solve the eye-safety problem, and to make reliable judgment through accurate obstacle recognition in various environments. In this paper, we construct a single-shot LIDAR system (SSLs) using a 1550-nm eye-safe light source, and report the analysis method and results of LIDAR signals for various measurement environments, reflective materials, and material angles. We analyze the signals of materials with different reflectance in each measurement environment by using a 5% Al reflector and a building wall located at a distance of 25 m, under indoor, daytime, and nighttime conditions. In addition, signal analysis of the angle change of the material is carried out, considering actual obstacles at various angles. This signal analysis has the merit of possibly confirming the correlation between measurement environment, reflection conditions, and LIDAR signal, by using the SNR to determine the reliability of the received information, and the timing jitter, which is an index of the accuracy of the distance information.