• 제목/요약/키워드: home security

검색결과 733건 처리시간 0.028초

사회적 관계에 따른 소형주택 선호에 관한 연구 - 대학생을 중심으로- (A Study on the Preference of the Small House according to Social Relationship)

  • 신화경;조인숙
    • 한국주거학회논문집
    • /
    • 제25권4호
    • /
    • pp.47-57
    • /
    • 2014
  • The purpose of the study was to find out the preference of small house as the social relations of university students. The data for the analysis were collected through questionnaire survey method from September 24 to October 12, 2012, and the sample consisted of 283 students of the university in Seoul. The social relationship has been surveyed using modified life-style indicators. The community spaces and equipment in the small house has been divided into 21 community spaces and 3 equipments. The characteristics of small house preference were consisted of the residential comments, residence time, resident partner, house size, considered factors of the residence and small house ownership. The finding of this study were as following: 1) The social relationship of respondents were typed as the type of relationship oriented (oriented family, oriented friends and neighbors) and type of non-relationship oriented. The social relationship of respondents were the type of relationship oriented. 2) The respondents are willing to live in small houses, to live with 1-2 people and after work. When living in small house, they consider public transport accessibility and ease of use amenities. But neighbor relationship is not considered. 3) They are preferred security office, administrative office, home storage, parks and green space.

IoT 기반 스마트 게이트웨이 VPN 터널링 제어 시스템 (Smart Gateway VPN Tunneling Control System based on IoT)

  • 양승의;김창수;이종원;정회경
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 춘계학술대회
    • /
    • pp.575-576
    • /
    • 2017
  • 최근 스마트게이트웨이가 연구됨에 따라 빅 데이터와 IoT(Internet of Things)를 통해 부가적인 서비스를 제공할 수 있다. 그러나 기존 시스템은 연결되는 기기의 수가 증가함에 따라 네트워크의 안정성이 저하되며 데이터 보안이 취약한 문제점이 있었다. 본 논문에서는 이러한 문제점을 해결하기 위해 IoT 기반 스마트 게이트웨이 VPN 터널링 제어 시스템을 설계한다. 공유기 수준의 저사양의 타겟에 효율적인 VPN 터널링 기술과 인터넷 회선품질의 변화가 심한 환경에서 실시간에 효율적으로 트래픽을 제어하는 방법을 제시하여 원격지에서 VPN을 통해 안전하게 댁내의 센서 제어가 가능하도록 한다.

  • PDF

′가사노동 전담자′인 전업주부에게 취업은 대안인가 아닌가\ulcorner (A Qualitative Study on the Full-Time Housewife′s Employment)

  • 김선미
    • 가정과삶의질연구
    • /
    • 제22권5호
    • /
    • pp.29-45
    • /
    • 2004
  • This ethnographic case-study explores the interpretation and behavior in job considering among full-time housewives. The participants of this study are eleven middle class full-time housewives in their thirties and forties. In-depth interviews based on an unstructured Questionnaire were conducted for this study. Findings are as follows: Six full-time housewives tend to think their full-time housewife-lives more convenient, something unable to substitute and more profitable compared to the counter partner's lives. But they are classified into two groups according to the satisfaction for full-time housewife life. One group has found out more positive meaning in their life but the other group has not yet and they are doubtful about real life and other opportunity. In Contrast, other five full-time housewives tend to interpret employment as a more productive source to secure family resource for their children's education and repay the loan used to buy larger apartment. And the job is considered to confirm her own individuality and the feeling for the social entity as a competent social entity. But two of them who have never been employed do not try to get a job as a new identity alternative. And the various elements like household income, job experience, health, children's age and husband's attitude to his wife's employment etc. are defined to influence the interpretation and the job considering behavior among full-time housewives.

전력선을 이용한 ASK통신 모뎀에 관한 연구 (A Study on the ASK Communication Modem over Electrical Power Lines)

  • 사공석진;송문규
    • 한국통신학회논문지
    • /
    • 제17권9호
    • /
    • pp.951-962
    • /
    • 1992
  • 전력선은 동축선이나 광섬유 링크와는 대조적으로 제한된 전송전력, 높은 부하 간섭과 잡음, 가변하는 감쇠 및 임피던스 레벨 등의 문제를 안고 있으나, 별도의 통신선로가 필요없이 신호와 전원을 동시에 제공 할수 있는 잇점이 있으므로 가정 자동화 및 근거리 통신 목적으로 가치 있는 채널을 제공한다. 본 논문에서는 이러한 220V의 AC전력선을 이용하여 1200bps의 디지털 신호를 송수신할 수 있는 OOK BASK모뎀을 구현하였다. 수신 신호의 복조를 위해 비동기 검파 방식을 택하였으며, 연성판정(soft decision)을 수행하였다. 대부분의 과정을 단일 칩 마이크로 프로세서를 이용하여 하드웨어를 대폭 간소화하였다. 또한 유럽의 표준인 CENELEC의 규격에 적합하도록 설계되었으며, 가정 자동화 시스템으로 적절히 응용될 수 있음을 확인하였다.

  • PDF

유해 전자파의 인체적 영향과 유.무기 복합 전도성 코팅제에 의한 전자파 차단 특성에 관한 연구 (Related to research some pollutants electromagnetic wave's impact of the human body and electromagnetic wave's a specific interception by the conductibility coating with organic.inorganic composition matter)

  • 유희옥;윤정필;강병복;임중열;차인수
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 추계학술대회 논문집 전기기기 및 에너지변환시스템부문
    • /
    • pp.254-257
    • /
    • 2001
  • This paper is managing about problem and EMI by electromagnetic waves occurrence of electrical appliances and harmfulness of EMS and standard. Specially, because this paper certifies a mouse and electromagnetic waves interception effect of electricity market place which possess electromagnetic waves interception facility, there is effect that contribute in health life that do to secure safe going to sleep condition from electromagnetic waves of electricity market place that is security of computer working environment of safe state through electromagnetic waves interception and essential electric appliance of home life.

  • PDF

사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크 (Risk Analysis for Protecting Personal Information in IoT Environments)

  • 이애리;김범수;장재영
    • 한국IT서비스학회지
    • /
    • 제15권4호
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

사물통신(M2M) 기반 응용 서비스의 사업성에 관한 탐색적 연구 (An Exploratory Study on the Feasibility of M2M Services)

  • 이지은;신민수
    • 한국IT서비스학회지
    • /
    • 제11권1호
    • /
    • pp.125-139
    • /
    • 2012
  • Machine-to-Machine(M2M) refers to technologies allowing both wireless and wired systems to communicate with other devices. The enhancement of wireless technologies and the reduced cost of wireless connection have contributed toward the development of M2M market. M2M market currently focuses on public sector services, As M2M can offer scalable and flexible services, M2M services are expected to be applied in various fields. However there are still some doubts on whether the demand for M2M services will be increased. This study investigates the feasibility of M2M services from the perspective of operators. Operators evaluate that M2M services will show high marketability but low profitability in general. In addition, operators predict that M2M services will show both marketability and profitability in the area of car maintenance, insurance, telematics, home and office security, shop floor maintenance, and real-time locating services for children protection. This study may offer some ideas of M2M business models based on empirical feasibility studies.

Towards Designing Efficient Lightweight Ciphers for Internet of Things

  • Tausif, Muhammad;Ferzund, Javed;Jabbar, Sohail;Shahzadi, Raheela
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권8호
    • /
    • pp.4006-4024
    • /
    • 2017
  • Internet of Things (IoT) will transform our daily life by making different aspects of life smart like smart home, smart workplace, smart health and smart city etc. IoT is based on network of physical objects equipped with sensors and actuators that can gather and share data with other objects or humans. Secure communication is required for successful working of IoT. In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined for resource-constrained scenarios like IoT. These algorithms are analysed by dissecting them into their logical and structural elements. This paper tries to investigate the relationships between the structural elements of an algorithm and its performance. Association rule mining is used to find association patterns among the constituent elements of the selected ciphers and their performance. Interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time. This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.

스마트 홈 IoT 보안 기술 연구 동향 및 고찰 (Research Trends and Considerations of Security Technology of Smart Home IoT)

  • 이영헌;조정훈;박종혁
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2019년도 춘계학술발표대회
    • /
    • pp.174-177
    • /
    • 2019
  • 최근 ICT(Information Communications Technologies)의 발전과 센서 제조 공정의 발전을 통해 저용량, 경량 디바이스를 이용한 스마트 홈 시장이 성장하고 있다. 특히 스마트 홈 IoT의 환경은 모든 사물을 인터넷으로 연결하고 상호 통신을 통해 다양하고 많은 양의 정보를 수집하여 일상생활을 편리하게 해주는 IoT(Internet of Things)가 계속 증가하고 있다. 하지만, 이러한 증가량과 함께, 스마트 홈 환경에서 대한 기술표준화가 이루어지지 않았으며 원활한 서비스 제공 뿐만 아니라 보안 문제가 발생하고 있다. 특히, 이기종 네트워크, 디바이스를 사용하는 스마트 홈 IoT의 경우 다양한 인증 방법이 존재하며, 이에 따른 취약점이 발생하게 된다. 보안 취약점을 이용한 공격으로 개인정보 유출이나 경제적 손실 등 피해를 발생시키고 있으며, 추후 인명피해까지 발생할 수 있다. 따라서, 본 논문에서는 스마트홈 환경의 IoT 보안 방안에 대해 알아보고, 관련 보안사고의 사례 및 인증 기술을 살펴봄으로써 미래 스마트 홈 IoT 보안 기술의 발전과 적합한 보안 대책과 보안 취약점에 대한 보안 체계를 마련하는 것에 도움이 될 것이다.

무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계 (A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment)

  • 박중오
    • 디지털산업정보학회논문지
    • /
    • 제15권2호
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.