• 제목/요약/키워드: User-scenario

검색결과 476건 처리시간 0.025초

블루투스 Passkey Entry 인증 모드에 대한 MITM 공격과 대응방법 (MITM Attack on Bluetooth Pairing in Passkey Entry Mode and Its Countermeasure)

  • 이재령;최원석;이동훈
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제5권12호
    • /
    • pp.481-490
    • /
    • 2016
  • 블루투스는 대칭키를 사용하여 암호화 채널을 형성하며 대칭키는 최초 연결 이전에 수행하는 페어링 단계에서 교환된다. 페어링 단계에서 기기인증을 위한 인증 모드는 크게 Just work, Passkey Entry, Out of Band, 그리고 Numeric Comparison 방식으로 구분된다. 지금까지 블루투스 페어링 방식의 중간자 공격(MITM)은 Just work 모드를 대상으로 하거나 인증 모드를 강제로 Just work 모드로 변환한 상태에서 MITM 공격을 수행하였고, 이때에는 인증모드가 변환되었다는 것을 인지하지 못하는 사용자의 부주의가 가정되어야 했다. 본 논문에서는 Secure Simple Pairing, Le Legacy Pairing, 그리고 LE Secure Connection Pairing 방식의 규격을 분석하였고, 각 방식에서 Passkey Entry 모드를 사용하였을 때, MITM 공격이 발생 가능함을 보인다. 또한 제안하는 Passkey Entry MITM 공격 방법은 기존 공격방법과 달리 인증 모드의 사용자 확인 절차를 바꾸지 않기 때문에 사용자의 부주의에 대한 가정 사항을 요구하지 않는다. 우리는 제안하는 Passkey Entry MITM 공격을 구현하고 이것이 악용될 수 있는 시나리오와 이를 방어할 수 있는 대응방법을 제시한다.

Analysis of a Third-Party Application for Mobile Forensic Investigation

  • Ryu, Jung Hyun;Kim, Nam Yong;Kwon, Byoung Wook;Suk, Sang Ki;Park, Jin Ho;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • 제14권3호
    • /
    • pp.680-693
    • /
    • 2018
  • Nowadays, third-party applications form an important part of the mobile environment, and social networking applications in particular can leave a variety of user footprints compared to other applications. Digital forensics of mobile third-party applications can provide important evidence to forensics investigators. However, most mobile operating systems are now updated on a frequent basis, and developers are constantly releasing new versions of them. For these reasons, forensic investigators experience difficulties in finding the locations and meanings of data during digital investigations. Therefore, this paper presents scenario-based methods of forensic analysis for a specific third-party social networking service application on a specific mobile device. When applied to certain third-party applications, digital forensics can provide forensic investigators with useful data for the investigation process. The main purpose of the forensic analysis proposed in the present paper is to determine whether the general use of third-party applications leaves data in the mobile internal storage of mobile devices and whether such data are meaningful for forensic purposes.

유비쿼터스 환경에서 콘텐츠 적응화를 위한 CC/PP 기반의 유비쿼터스 프로파일 및 운영 아키텍쳐 설계 (A Design of Management Architecture and Ubiquitous Profile Based on CC/PP for Content Adaptation in Ubiquitous Environment)

  • 김경식;이재동
    • 정보처리학회논문지C
    • /
    • 제13C권4호
    • /
    • pp.491-500
    • /
    • 2006
  • 본 논문에서는 유비쿼터스 환경에서 콘텐츠 적응화를 위한 CC/PP 기반의 유비쿼터스 프로파일 및 운영 아키텍쳐를 설계한다. 유비쿼터스 프로파일의 컴포넌트와 속성들은 유비쿼터스 환경에서 콘텐츠 적응화 서비스 시나리오를 기반으로 정의하였다. 유비쿼터스 프로파일 설계 시 유비쿼터스 환경에서 효율적으로 사용하기 위해서 RDF, RDF Schema, CC/PP Structure, 표준 어휘 등의 기법들을 적용하였다. 또한, 유비쿼터스 프로파일의 효율적인 운영을 위해 게이트웨이 중심의 운영 방법, 저장소를 이용한 메타데이터 구성 방법, 동적 구성 방법 등의 아이디어들을 기반으로 운영 아키텍쳐를 제안하고 설계하였다. 제안한 운영 아키텍쳐에 대한 성능 평가 결과 기존의 프로파일 운영 방법 보다 더 효율적이었다. 제안된 유비쿼터스 프로파일 및 운영 아키텍쳐는 유비쿼터스 환경에서 사용자에게 적응화된 콘텐츠를 서비스를 위한 연구의 기반을 마련해 주었다.

Price-based Resource Allocation for Virtualized Cognitive Radio Networks

  • Li, Qun;Xu, Ding
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권10호
    • /
    • pp.4748-4765
    • /
    • 2016
  • We consider a virtualized cognitive radio (CR) network, where multiple virtual network operators (VNOs) who own different virtual cognitive base stations (VCBSs) share the same physical CBS (PCBS) which is owned by an infrastructure provider (InP), sharing the spectrum with the primary user (PU). The uplink scenario is considered where the secondary users (SUs) transmit to the VCBSs. The PU is protected by constraining the interference power from the SUs. Such constraint is applied by the InP through pricing the interference. A Stackelberg game is formulated to jointly maximize the revenue of the InP and the individual utilities of the VNOs, and then the Stackelberg equilibrium is investigated. Specifically, the optimal interference price and channel allocation for the VNOs to maximize the revenue of the InP and the optimal power allocation for the SUs to maximize the individual utilities of the VNOs are derived. In addition, a low‐complexity ±‐optimal solution is also proposed for obtaining the interference price and channel allocation for the VNOs. Simulations are provided to verify the proposed strategies. It is shown that the proposed strategies are effective in resource allocation and the ±‐optimal strategy achieves practically the same performance as the optimal strategy can achieve. It is also shown that the InP will not benefit from a large interference power limit, and selecting VNOs with higher unit rate utility gain to share the resources of the InP is beneficial to both the InP and the VNOs.

블록의 리프팅 동적 구조해석을 위한 다물체 동역학 프로그램의 내장형 자동화 라이브러리 개발 (Development of an Automation Library in Multi-Body Dynamics Program for Dynamic Structural Analysis of Block Lifting Process)

  • 정다운;차주환;송창용;이충형
    • 대한조선학회논문집
    • /
    • 제53권2호
    • /
    • pp.135-143
    • /
    • 2016
  • In this study, an embedded system composed of equipment setting, block importing, scenario setting and output reporting is developed in multi-body dynamics program, ADAMS, for conducting dynamic structural analysis of block lifting process. First, equipment used for block lifting process is set in the simulation environment and the shapes and functions of two lifting beams, and six block loaders are provided as the equipment. Second, the modal analysis result of the lifting block is imported from the static structural analysis system, NASTRAN. Third, the lifting scenarios, such as hoisting, waiting, trolley moving, and wire connecting, are set in the system. Finally, output results in the forms of plots, texts and tables, are reported after the dynamic structural analysis. The test examples conducted in a shipyard are applied into the developed system in various condition and scenarios. The loads at the lug points, the stress contours, and the hot spot tables of the developed system are compared with the result of the static analysis system.

ID 광고의 부가정보를 제공하는 데이터서비스 설계 (A Design of a Data Service providing Additional Information of ID Advertising)

  • 고광일
    • 융합보안논문지
    • /
    • 제18권3호
    • /
    • pp.61-68
    • /
    • 2018
  • 디지털방송 시대가 정착되면서 방송프로그램 시청에만 활용되던 TV가 다양한 데이터서비스를 운영할 수 있는 매체로 발전하였다. 이는 시청자의 TV이용 행태도 수동적인 태도에서 능동적으로 미디어를 소비하는 태도로 변화할 수 있는 환경이 마련되었음을 의미한다. 광고 시장은 매체의 변화에 따라 영향을 많이 받는 산업분야이기 때문에 이러한 변화는 광고의 제공 형태와 시청자의 광고 소비행태에 변화를 유발하게 되며, 방송 산업은 데이터서비스의 가능성을 광고시장과 연계한 새로운 성장전략을 고민할 필요가 있다. 이 에, 본 연구는 짧은 노출 시간과 정보 표현 공간 부족의 한계를 안고 있는 ID 광고를 대상으로 광고와 관련된 부가정보를 제공하는 데이터서비스를 설계하였다. 구체적으로 데이터서비스의 사용 시나리오와 사용자인터페이스를 설계하고, ID 광고의 유형별로 정의된 부가정보를 데이터서비스에 공급하는 국제 디지털방송 표준 DVB 기반의 방법을 개발하였다.

  • PDF

Developing Experiential Exhibitions Based on Conservation Science Content of Bronze Mirror

  • Jo, Young Hoon;Kim, Jikio;Yun, Yong Hyun;Cho, Nam Chul;Lee, Chan Hee
    • 보존과학회지
    • /
    • 제37권4호
    • /
    • pp.362-369
    • /
    • 2021
  • In museums, exhibition content focuses mostly on cultural heritage's historical values and functions, but doing so tends to limit visitors' interest and immersion. To counter this limitation, the study developed an experiential media art exhibition fusing bronze mirrors' traditional production technology and modern conservation science. First, for the exhibition system, scientific cultural heritage contents were projected on the three-dimensional (3D) printed bronze mirror through interactions between motion recognition digital information display (DID) and the projector. Then, a scenario of 17 missions in four stages (production process, corrosion mechanism, scientific analysis and diagnosis, and conservation treatment and restoration) was prepared according to the temporal spectrum. Additionally, various media art effects and interaction technologies were developed, so visitors could understand and become immersed in bronze mirrors' scientific content. A user test was evaluated through the living lab, reflecting generally high levels of satisfaction (90.2 points). Qualitative evaluation was generally positive, with comments such as "easy to understand and useful as the esoteric science exhibition was combined with media art" (16.7%), "wonderful and interesting" (11.7%), and "firsthand experience was good" (9.2%). By combining an esoteric science exhibition centered on principles and theories with visual media art and by developing an immersive directing method to provide high-level exhibition technology, the exhibition induced visitors' active participation. This exhibition's content can become an important platform for expanding universal museum exhibitions on archaeology, history, and art into conservation science.

차세대 IPTV 서비스를 위한 보안 프레임워크 설계 (Design of Security Framework for Next Generation IPTV Services)

  • 이승민;나재훈;서동일
    • 정보보호학회논문지
    • /
    • 제20권6호
    • /
    • pp.33-42
    • /
    • 2010
  • 최근 디지털 컨버전스가 가속화되면서 급부상하고 있는 차세대 IPTV 서비스는 디바이스에 구애받지 않고 자유롭게 콘텐츠의 생성과 소비가 가능하여, 전송환경과 디바이스의 특성에 맞는 실시간 서비스와 콘텐츠의 재사용 서비스를 확장성 있게 제공함을 특정으로 한다. 본 논문에서는 이러한 차세대 IPTV 서비스를 제공함에 있어서 요구되는 보안 요구조건과 이를 해결하기 위한 보안 프레임워크를 제안한다. 제안 방법은 기본적으로 SVC (Scalable Video Coding)를 사용하는 단일 메커니즘으로써, 서비스가 제공되는 모든 구간에 대하여 높은 보안성을 보장하며, 동시에 안전한 미디어 적응변환과 동적인 보안 강도 조절이 가능하다는 장점이 있다. 본 논문에서는 현실적인 서비스 시나리오를 바탕으로 제안 방법의 타당성을 입증하였고, 보안 기술 자체만으로도 새로운 비즈니스 기회를 창출 할 수 있는 가능성을 제시하고 있다는 점에서 의의가 있다.

Hakeem: An Arabic Application Aimed to Teaching Children First Aid using Augmented Reality

  • Al-ajlan, Monirah;Altukhays, Wujud;Alyousef, Deema;Almansour, Aljawharah;Alsukayt, Layan;Alajlan, Halah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.368-374
    • /
    • 2022
  • Children are by nature curious and enthusiastic about learning and love to explore and search for everything they see around them, but as a result of this exploration they may sometimes be exposed to dangerous situations ranging from falls to poisoning and suffocation. That is why when supporting a child's natural desire to explore the world and supporting his awareness of dangerous situations and good handling of them, helps him build a conscious scientific mind and enhance his curiosity in the natural world. It is not easy to imagine a difficult situation in which we or one of our family is in danger, unable to help ourselves or to help them in time, due to our complete ignorance of the rules of first aid. Hence the importance of learning first aid not only for the child but for the community and the world at large. "Hakeem" is an Arabic E-health educational application that aims to teach children from the age of six to eleven years first aid, in our belief that the seed of renaissance lies in the care and education of children, and the lack of Arabic content that aims to teach children first aid skills. The idea is to create a scenario in which the child is responsible for saving the person who will be in a dangerous situation using Augmented Reality (AR) technology, to increase engagement and interaction and provides a rich user experience, and according to the child's performance, he will get reward points. The game will have several levels: Beginner, Intermediate, and Hakeem, and based on the player's points he will get a title and move to the next level, and when he reaches the end, he will get the certificate.

SUMRAY: R and Python Codes for Calculating Cancer Risk Due to Radiation Exposure of a Population

  • Michiya Sasaki;Kyoji Furukawa;Daiki Satoh;Kazumasa Shimada;Shin'ichi Kudo;Shunji Takagi;Shogo Takahara;Michiaki Kai
    • Journal of Radiation Protection and Research
    • /
    • 제48권2호
    • /
    • pp.90-99
    • /
    • 2023
  • Background: Quantitative risk assessments should be accompanied by uncertainty analyses of the risk models employed in the calculations. In this study, we aim to develop a computational code named SUMRAY for use in cancer risk projections from radiation exposure taking into account uncertainties. We also aim to make SUMRAY publicly available as a resource for further improvement of risk projection. Materials and Methods: SUMRAY has two versions of code written in R and Python. The risk models used in SUMRAY for all-solid-cancer mortality and incidence were those published in the Life Span Study of a cohort of the atomic bomb survivors in Hiroshima and Nagasaki. The confidence intervals associated with the evaluated risks were derived by propagating the statistical uncertainties in the risk model parameter estimates by the Monte Carlo method. Results and Discussion: SUMRAY was used to calculate the lifetime or time-integrated attributable risks of cancer under an exposure scenario (baseline rates, dose[s], age[s] at exposure, age at the end of follow-up, sex) specified by the user. The results were compared with those calculated using another well-known web-based tool, Radiation Risk Assessment Tool (RadRAT; National Institutes of Health), and showed a reasonable agreement within the estimated confidential interval. Compared with RadRAT, SUMRAY can be used for a wide range of applications, as it allows the risk projection with arbitrarily specified risk models and/or population reference data. Conclusion: The reliabilities of SUMRAY with the present risk-model parameters and their variance-covariance matrices were verified by comparing them with those of the other codes. The SUMRAY code is distributed to the public as an open-source code under the Massachusetts Institute of Technology license.