• Title/Summary/Keyword: home security

Search Result 730, Processing Time 0.028 seconds

Embedded Home Network System Security using VPN (VPN을 이용한 Embedded 홈 네트워크 시스템 보안)

  • Jin, Seon-Il;Jeong, Jin-Gyu;An, Gwang-Hyeok;Yu, Yeong-Dong;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.701-704
    • /
    • 2003
  • The home network system of ubiquitous computing concept is changing present our home life as more comfortable and safe. Also, it permits that we can connect the home network system and control the appliance which is linked to the home network system without limitation in time and place. But, as other systems that use the public network like the Internet, remote control/monitoring of the home network system that use the Internet includes problems such as user's access which is not admitted and information changing. This paper presents the efficient solution about the security problem that is recognized to important problem of the home network system. Also this paper implements the security of the home network system based on the UPnP (Universal Plug and Play), adding VPN (Virtual Private Network) router that uses the IPsec to the home network system which is consisted of the ARM9 and the Embedded Linux.

  • PDF

Design and Embodiment in Home Network at Gateway is Stabilization MSAC (Home Network 게이트웨이에서 효율적인 MSAC 설계 및 구현)

  • Yoon, Woon-Kwan;Choi, Kyong-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.105-110
    • /
    • 2006
  • Home Gateway which composes Home network in Ubiquitous Computing environment is an equipment to provide the connection with the external Internet Physically, and it carry out the role which communication, control and monitor is important. But Home gateway has potential threats because it connected on external Internet as spillage user's information from outside wrongdoers. Consequently, Home gateway has to have security module and structure for the communication which is sate. In this research paper, We designed Home gateway security structure for the communication which is protected when computer user use the computer from the outside to home to send information or important data.

  • PDF

Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone (홈트레이딩 시스템의 취약점 분석과 휴대전화 인증을 이용한 대응방안 제시)

  • Choi, Min Keun;Cho, Kwan Tae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.19-32
    • /
    • 2013
  • As cyber stock trading grows rapidly, stock trading using Home Trading System have been brisk recently. Home Trading System is a heavy-weight in the stock market, and the system has shown 75% and 40% market shares for KOSPI and KOSDAQ, respectively. However, since Home Trading System focuses on the convenience and the availability, it has some security problems. In this paper, we found that the authentication information in memory remains during the stock trading and we proposed its countermeasure through two-channel authentication using a mobile device such as a cell phone.

Home Network Security Description Language

  • Kim Geon-Woo;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.741-744
    • /
    • 2006
  • There are a lot of on-going researches on various security technologies for guaranteeing the safety of home network systems. Until now, a few security technologies such as device authentication mechanism, user authentication mechanism, access control mechanism and firewall are generally deployed, and they are just simple. However, we need some representation skills in order to efficiently define the home network and describe the security for managing and performing these security mechanisms. So, in this paper, we define the xHDL language to define and describe the security components of home network and analyze the semantics of each components.

  • PDF

Research about Intelligence Home Automation Security Design (지능형 홈오토메이션 보안설계에 관한 연구)

  • Oh, Ju-Young;Kang, Soon-dUk
    • The Journal of Information Technology
    • /
    • v.8 no.2
    • /
    • pp.43-52
    • /
    • 2005
  • Home-Automation which it automates as connection home by network gives human beings to many conveniences but there is problem must solve. Rightly it is an illegal infiltration against the information transmission and a joint ownership of information home appliance machinery and tools. Especially design of Home Automation is necessary for Information Security because the vulnerability is exposed when it is connecting on the mobile communication terminal and the home appliance machinery and tools. In this research, we're going to help to function and efficiency improvement of Korean Home-Automation by Security Design and proposal for a research and development of Korean Home-Automation.

  • PDF

Small size IoT Device Monitoring System Modeling applying DEVS methodology

  • Lee, Se-Han;Seo, Hee-Suk;Choi, Yo-Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.2
    • /
    • pp.45-51
    • /
    • 2018
  • In this paper, we propose a Designed and Developed home router management system. Through the fourth industrial revolution and development of IoT technology, now people can experience a wide range of IoT related services at their workplace or daily lives. At the industrial site, IoT devices are used to improve productivity such as factory automation, and at home, IoT technology is used to control home appliances from a remote distance. Usually IoT device is integrated and controlled by the router. Home router connects different IoT devices together at home, however when security issues arise, it can invade personal privacy. Even though these threats exist, the perception for home router security is still insufficient. In this paper, we have designed and developed home router management system using DEVS methodology to promote the safe use of home router. Through the DEVS methodology, we have designed the system and developed the mobile application. This management system enables users to set up security options for home router easily.

A Study on Security Framework in Digital Home Environments (디지털홈 환경에서의 보안 프레임워크 연구)

  • 김도우;한종욱;주홍일;이윤경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.724-727
    • /
    • 2004
  • With the development of modem communication and networking technology, more and more computing and communication facilities, automation equipments, hone information appliances and different type of networking terminals come into home all over the world. The user can control information appliances in home environments. The home environment can communicate with the external network via phone line, wired LAN, wireless LAN, or mixed. However, home information appliances that are connected to the external network are under attack and need to be secured. So specifying suitable security requirements and policies for digital home environment is critical in hone networking environments. This paper analyzes the possible vulnerability to home network, and specifies the security requirements derived from the vulnerability analysis for digital home environment

  • PDF

Development of an Intelligent Security Robot System for Home Surveillance (가정용 지능형 경비 로봇 시스템 개발)

  • Park, Jeong-Ho;Shin, Dong-Gwan;Woo, Chun-Kyu;Kim, Hyung-Chul;Kwon, Yong-Kwan;Choi, Byoung-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.8
    • /
    • pp.810-816
    • /
    • 2007
  • A security robot system named EGIS-SR is a mobile security robot through one of the new growth engine project in robotic industries. It allows home surveillance through an autonomous mobile platform using onboard cameras and wireless security sensors. EGIS-SR has many sensors to allow autonomous navigation, hierarchical control architecture to handle lots of situations in monitoring home surveillance and mighty networks to achieve unmanned security services. EGIS-SR is tightly coupled with a networked security environment, where the information of the robot is remotely connected with the remote cockpit and patrol man. It achieved an intelligent unmanned security service. The robot is a two-wheeled mobile robot and has casters and suspension to overcome a doorsill. The dynamic motion is verified through $ADAMS^{TM}$ simulation. For the main controller, PXA270 based hardware platform based on linux kernel 2.6 is developed. In the linux platform, data handling for various sensors and the localization algorithm are performed. Also, a local path planning algorithm for object avoidance with ultrasonic sensors and localization using $StarGazer^{TM}$ is developed. Finally, for the automatic charging, a docking algorithm with infrared ray system is implemented.

Security Framework for RFID-based Applications in Smart Home Environment

  • Konidala, Divyan M.;Kim, Dae-Young;Yeun, Chan-Yeob;Lee, Byoung-Cheon
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.111-120
    • /
    • 2011
  • The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.

Study of Security Requirement of Smart Home Hub through Threat Modeling Analysis and Common Criteria (위협 모델링 분석 및 국제공통평가기준을 통한 스마트홈 허브의 보안요구사항에 관한 연구)

  • Park, Jae-Hyeon;Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.513-528
    • /
    • 2018
  • In a smart home environment that integrates IoT technology into a residential environment, the smart home hub provides convenience functions to users by connecting various IoT devices to the network. The smart home hub plays a role as a gateway to and from various data in the process of connecting and using IoT devices. This data can be abused as personal information because it is closely related to the living environment of the user. Such abuse of personal information may cause damage such as exposure of the user's identity. Therefore, this thesis analyzed the threat by using LINDDUN, which is a threat modeling technique for personal information protection which was not used in domestic for Smart Home Hub. We present evaluation criteria for smart home hubs using the Common Criteria, which is an international standard, against threats analyzed and corresponding security requirements.