• Title/Summary/Keyword: home security

Search Result 733, Processing Time 0.04 seconds

Design and Implementation of Access Control System Based on XACML in Home Networks (XACML 기반 홈 네트워크 접근제어 시스템의 설계 및 구현)

  • Lee, Jun-Ho;Lim, Kyung-Shik;Won, Yoo-Jae
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.549-558
    • /
    • 2006
  • For activating home network, the security service is positively necessary and especially the access control supports secure home network services and differentiated services. But, the existing security technology for home network seldom consider access control or has a architecture to be dependent on specific middleware. Therefore, in this paper we propose a scheme to support integrated access control in home network to use XACML, access control standard of next generation, to have compatability and extensibility and we design and implement XACML access control system based on this. we also had m access control experiment about various policy to connect developed XACML access control system with the UPnP proxy based on OSGi in order to verify compatability with existing home network system.

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

Blockchain-Based Smart Home System for Access Latency and Security (지연시간 및 보안을 위한 블록체인 기반 스마트홈 시스템 설계)

  • Chang-Yu Ao;Kang-Chul Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.157-164
    • /
    • 2023
  • In modern society, smart home has become a part of people's daily life. But traditional smart home systems often have problems such as security, data centralization and easy tampering, so a blockchain is an emerging technology that solves the problems. This paper proposes a blockchain-based smart home system which consists in a home and a blockchain network part. The blockchain network with 8 nodes is implemented by HyperLeger Fabric platform on Docker. ECC(Elliptic Curve Cryptography) technology is used for data transmission security and RBAC(role-based access control) manages the certificates of network members. Raft consensus algorithm maintains data consistency across all nodes in a distributed system and reduces block generation time. The query and data submission are controlled by the smart contract which allows nodes to safely and efficiently access smart home data. The experimental results show that the proposed system maintains a stable average query and submit time of 84.5 [ms] and 93.67 [ms] under high concurrent accesses, respectively and the transmission data is secured through simulated packet capture attacks.

Design of User Certification Module of Home Gateway System based on OSGi (OSGi 기반 홈게이트웨이 시스템의 사용자 인증 모듈 설계)

  • Myung, Sun-Kyu;Kim, Gwang-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.27-35
    • /
    • 2010
  • We implemented an application system which is able to verify visitor identification for remote bundle control based on OSGi and web camera control using embedded linux system. This system are designed open Oscar framework by porting java on the embedded linux system and implemented web camera system in local area networks. Also This system can verify information of visitor from receiving the data of RFID reader and designed the wireless internet system in home. Basically, in this paper we expect that home network system development and the period of application service development are reduced with integrated service provision based on OSGi.

A Study on Hospitalized Patients' Intent to Use Home Care Nursing According to the Types of Medical Security (입원환자의 의료보장형태에 따른 가정간호 이용의사에 대한 연구)

  • Kim, Myung-Hee;Cho, Eun-Ji;Park, Hyoung-Sook;Kang, In-Soon
    • Journal of Home Health Care Nursing
    • /
    • v.12 no.2
    • /
    • pp.63-86
    • /
    • 2005
  • Purpose: This study is a descriptive research which is designed to investigate hospitalized patients' intent to use home care nursing according to the types of medical security. Method: This researcher surveyed 236 patients who were hospitalized at B medical center located in Busan,. Data were collected from Sep. 1 to Nov. 30, 2005 using a questionnaire survey, medical records, face-to-face interviews and observations. Collected data were analyzed in terms of frequency, percentage, mean and standard deviation through $x^2$-test and t-test under SPSS WIN 10.0 Program. Result: Out of the total subjects, 59.3% were medical aid clients and the remaining 40.7%, health insurance ones. The hospitalized period and frequency of the former group were 38.0 days and 4.0 times, respectively, while those of the latter, 37.7 and 3.4. When home care nursing clients were examined using a given classification device, it was found that out of the total 236 subjects, 205(86.9%) were needed to receive home care nursing, 121, medical aid and the other 84, health insurance. 24.0% of medical aid clients heard about home care nursing ever before, lower than 39.3% of health insurance clients. 43.8% of the former clients said cost for home care nursing was high while, 47.6% of the latter group responded expense for the nursing intervention was low. 30.6% of medical aid clients had intent to use home care nursing, lower than 47.6% of health insurance clients. 71.7% of those patients whose monthly income was 99 million won or below had no intent to use home care nursing, higher than 62.5% of those who were 100 million or over in monthly income(p<.05). 76.4% of those clients who had no nursing provider intented to use home care nursing, higher than those who had nursing provider(p<.05). Concerning contents of home care nursing, 85.1% of medical aid clients needed education, training and counseling while, 77.4% of health insurance aids wanted medication and injection. Conclusion: In conclusion, the use of home care nursing by medical aid clients should be promoted through improving conditions for home care nursing in terms of expense, family and residence and making public relations about activities and contents of the home care nursing.

  • PDF

The technical requirements and configuration of Home Automation System (주택 자동화 시스템의 기능과 구성)

  • 송언빈
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 1992.11a
    • /
    • pp.64-68
    • /
    • 1992
  • The demand for home automation system has increased in high-rise apartment houses. Home automation system is realized a more comfortable, more secure, more economical, more convenient, and more satisfying home life. The proposed system functions are meter reading, home security, energy saving, and house control. The technical requirements and configuration of home automation system are provided.

  • PDF

The Methods of applying IPsec between MN and HA based on Mobile IPv6 (Mobile IPv6환경에서 MN과 HA간의 IPsec 적용 방안에 관한 연구)

  • 박원주;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.241-244
    • /
    • 2003
  • Recently, IETF Mobile IP WG focus on security problem issues in Mobile IPv6 and provide appropriate protocol to solve them. These include the protections of Binding Updates both to home agents and correspondent nodes, prefix discovery messages and transporting data packets. In Mobile IPv6, control traffics between home agents and mobile nodes uses IPsec to avoid that mobile nodes and correspondent nodes may be vulnerable to attacks. It is used, however, Return Routability procedure for correspondent node to assure that the right mobile node is sending the messages. In this paper, we propose method of IPser processing to protect messages between home agents and mobile nodes.

  • PDF

A Study on Performance Evaluation and Security Methods of u-IT Electrical Safety Integrated Management System's Module (u-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dae-Woo;Kim, Eung-Sik;Choi, Choung-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1447-1452
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. u-City in order to prevent the disaster of u-IT Power Equipment Performance Module and the security for the safety of the u-City is necessary. In this paper, the power unit of u-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation methods and security methods will be studied. u-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as u-IT integrated management system for electrical safety and strengthen the security, safety and security with a u-City will contribute to the construction and operation.

Study on the Security Threats Factors of A Bluetooth Low Energy (저전력 블루투스의 보안 위협 요인들에 관한 연구)

  • Jeon, Jeong Hoo
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.3-9
    • /
    • 2017
  • Recently, Wireless communication has been widely used as a short distance communication medium in various industrial fields as well as communication connection between home appliances due to the appearance of the Internet of Things. And Most commonly used wireless communication media include WiFi, Bluetooth, and NFC. Among them, Bluetooth is widely used for communication between smart devices as well as computer peripheral devices. And Bluetooth in the home network fields is being used to control electronic products. However, since Bluetooth security vulnerabilities are known, more and more attacks are being exploited. As the application range of Bluetooth is expanding, it is necessary to prepare countermeasures accordingly. Therefore, this study investigates the security threat factors of through Bluetooth'attack case and attack technology. And By proposing countermeasures against this problem, we intend to utilize it as data for improving the security of wireless network service in the future.

Appplication of Role-based access control in Embedded OS (임베디드 OS에서의 역할기반 접근제어 적용)

  • Lim, Jae-Deok;Un, Sung-Kyong;Kim, Ki-Young;Kim, Jeong-Nyeo;Lee, Choel-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.163-165
    • /
    • 2007
  • Recently, the security requirements of the embedded system which were not considered when the embedded system is independently deployed are being increased because the embedded system is connected to an internet. The connection to the internet of embedded system is the meaning that it is exposed to the various kinds of external attack and can be a victim to these attacks in anytime. Particularly, it is trend that the user-related information is stored into the personal terminals and/or electrical appliances such as PDA, home gateway for home network, settop boxes and so on. So it is needed the security mechanism which protects the user information from the malicious accesses. Accordingly, the coverage of the system security is being expanded from the general server to the embedded system. And it is not enough that the embedded system supports only its inherent functions and it becomes the essential element to provide the security function to the embedded system. This paper applies the RBAC(role-based access control) function to the embedded linux OS and tries to strengthen the security of the embedded linux OS. RBAC is implemented as a loadable kernel module with LSM(Linux Security Module) security framework for user's flexibility.

  • PDF