• Title/Summary/Keyword: Wi-Fi Fingerprint

Search Result 58, Processing Time 0.035 seconds

Hybrid Algorithmic Framework Using IMU and WPS for Smart Phone Positioning Systems (스마트폰 IMU와 WPS를 결합한 복합 측위 방법론)

  • Kim, Jae-Hoon;Kang, Suk-Yon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.8
    • /
    • pp.663-673
    • /
    • 2013
  • The drastic growth of mobile communication and spreading of smart phone make the significant attention on Location Based Service. The one of most important things for vitalization of LBS is the accurate estimating position for mobile object. Focusing on IMU deployed in smart phone, we develop a hybrid positioning estimation framework with a combination of WPS. The developed approaches can strengthen the advantages of independent indoor applicability of IMU. The estimation of IMU is efficiently compensated by radio fingerprint based Wi-Fi Positioning System. We put a focus especially on the hybrid algorithmic framework. Compared on the existing approaches of WPS or IMU, we achieve the comparable higher performance on both of average error of estimation and deviation of errors. Furthermore test-bed based on smart phone platform is practically developed and all data have been harvested from the actual measurement of test indoor area. This can approve the practical usefulness of proposed framework.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A Comparative Study on WPS_WS and Traditional Wireless Positioning Systems (WPS_WS기법과 전통적 무선 측위 시스템과의 비교 연구)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.239-241
    • /
    • 2011
  • Recently, studies on the indoor positioning system in application of wireless AP have been actively going on. The indoor wireless positioning system can be classified into several types according to the positioning techniques. Among them, the fingerprint technique is a technique that establishes the radio map by collecting MAC information of AP and RSSI (Received Signal Strength Indication) before executing positioning and then determines the position in comparison with the information of AP collected during the course of positioning. In the traditional fingerprint techniques, they control and manage by installing APs that are utilized for positioning. However, in case of specific indoors, the management can be done by installing a small number of APs but, in case of wide outdoors, it's practically impossible to install and manage equipments for positioning. In order to solve such problem, there is an improved fingerprint technique that utilizes the APs that are already scattered around. This technique will allow positioning without additional cost, but even the improved fingerprint positioning technique may incur dropped accuracy as well due to wide fluctuation of the AP information. In this paper, the traditional fingerprint technique and the improved fingerprint technique are explained in comparison, and we will compares difference in performance with the proposed WPS_WS (Wi-Fi Positioning System_Weak Signal) technique.

  • PDF

Wireless LAN-based Vehicle Location Estimation in GPS Shading Environment (GPS 음영 환경에서 무선랜 기반 차량 위치 추정 연구)

  • Lee, Donghun;Min, Kyungin;Kim, Jungha
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.1
    • /
    • pp.94-106
    • /
    • 2020
  • Recently, the radio navigation method utilizing the GPS(Global Positioning System) satellite information is widely used as the method to measure the position of objects. As GPS applications become wider and fields based on various positioning information emerge, new methods for achieving higher accuracy are required. In the case of autonomous vehicles, the INS(Inertial Navigation System) using the IMU(Inertial Measurement Unit), and the DR(Dead Reckoning) algorithm using the in-vehicle sensor, are used for the purpose of preventing degradation of accuracy of the GPS and to measure the position in the shadow area. However, these positioning methods have many elements of problems due not only to the existence of various shaded areas such as building areas that are continually enlarged, tunnels, underground parking lots and but also to the limitations of accumulation-based location estimation methods that increase in error over time. In this paper, an efficient positioning method in a large underground parking space using Fingerprint method is proposed by placing the AP(Access Points) and directional antennas in the form of four anchors using WLAN, a popular means of wireless communication, for positioning the vehicle in the GPS shadow area. The proposed method is proved to be able to produce unchanged positioning results even in an environment where parked vehicles are moved as time passes.

Design and Implementation of Outdoor Positioning System Using MSS Mechanism & Wireless AP characteristic (MSS 기법과 무선 AP 특징을 활용 실외 측위 시스템 설계 및 구현)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.433-439
    • /
    • 2011
  • The positioning system based on wireless AP collects AP information distributed in the real world, stores it into database, and measures the position objects by comparing with searched AP information. The existing fingerprinting method is a probabilistic modeling method that acquires much of the data collected from one location upon database composition, and stores the average of the data for the sake of use it in positioning objects. Using the average value, however, may cause the probability of errors Such errors are fatal weaknesses for services based on the accurate position. This paper described the characteristics and problems of the previously used wireless AP positioning system, and proposed a method of using the AP DB and an MSS mechanism for outdoor positioning in order to solve the aforementioned problems. And the results obtained from experimental tests showed that the proposed method achieved very low error rate(27%) compared with the existing method.

Attendance Check System based on Smartphone using QR code (QR코드를 활용한 스마트폰 기반 출석체크 시스템)

  • Park, Sunju
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.2
    • /
    • pp.325-334
    • /
    • 2014
  • There are management and price problems that have been caused by requirement of RFID reader, Fingerprint Identification System and Clicker for the construct of automatic attendance system to check the students' attendance accurately and quickly. Therefore, in the thesis, we developed smartphone based attendance check system by utilizing Wi-Fi and the smartphones that has been already built without using additional equipments and establishing construction of system additionally. It recognizes date, time, location and the seat number in classroom if a student logs the attendance chocking application in and it also allows students to get lecture feedback and check attendance by taking quizzes and questionnaires that are related to the lecture. As a result, by applying the attendance check system, instructors state that it is convenient since the app allows instructors to communicate with students though the quizzes and questionnaires. Especially, the instructors state that it is convenient because the results of the quizzes, questionnaires and attendance can be downloaded it the from of Excel files.

Gradual Certification Correspond with Sensual Confidence by Network Paths (본인인증의 네트워크 경로와 감성신뢰도에 연동한 점진적 인증방법)

  • Suh, Hyo-Joong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.955-963
    • /
    • 2017
  • Nowadays, fintech becomes the key technology of the mobile banking and payments. Financial market is moved to fintech-based non-face-to-face trade/payment from traditional face-to-face process in Korea. Core of this transition is the smartphones, which have several sensitive sensors for personal identifications such as fingerprint and iris recognition sensors. But it has some originated security risks by data path attacks, for instance, hacking and pharming. Multi-level certification and security systems are applied to avoid these threats effectively, while these protections can be cause of some inconvenience for non-face-to-face certifications and financing processes. In this paper, I confirmed that it have sensible differences correspond with the data connection paths such as WiFi networks and mobile communication networks of the smartphones, and I propose a gradual certification method which alleviates the inconvenience by risk-level definitions of the data-paths.

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.