• Title/Summary/Keyword: home security

Search Result 730, Processing Time 0.026 seconds

Detection of Delay Attack in IoT Automation System (IoT 자동화 시스템의 지연 공격 탐지)

  • Youngduk Kim;Wonsuk Choi;Dong hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.787-799
    • /
    • 2023
  • As IoT devices are widely used at home, IoT automation system that is integrate IoT devices for users' demand are gaining populrity. There is automation rule in IoT automation system that is collecting event and command action. But attacker delay the packet and make time that real state is inconsistent with state recongnized by the system. During the time, the system does not work correctly by predefined automation rule. There is proposed some detection method for delay attack, they have limitations for application to IoT systems that are sensitive to traffic volume and battery consumption. This paper proposes a practical packet delay attack detection technique that can be applied to IoT systems. The proposal scheme in this paper can recognize that, for example, when a sensor transmits an message, an broadcast packet notifying the transmission of a message is sent to the Server recognized that event has occurred. For evaluation purposes, an IoT system implemented using Raspberry Pi was configured, and it was demonstrated that the system can detect packet delay attacks within an average of 2.2 sec. The experimental results showed a power consumption Overhead of an average of 2.5 mA per second and a traffic Overhead of 15%. We demonstrate that our method can detect delay attack efficiently compared to preciously proposed method.

A Research Survey on the Characteristics of Burglaries: Focused on How to Utilize Private Security (침입절도 특성에 관한 조사연구: 민간경비 활용방안을 중심으로)

  • Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.15-35
    • /
    • 2010
  • A larceny means stealing others' properties, as one of crime types most closely connected with common people. Along with fraud, it is the mostly common property crime; in particular, the largest number of people are exposed to a burglary. This study aims to find the schemes to utilize private guards according to the characteristics of burglary. To do so, a questionnaire survey was conducted into an actual condition of official statistics of burglary and into the criminals of burglary, with a view to understanding the behavioral characteristics of burglary and suggesting defense mechanisms to prevent the crime. Burglary is not just a major crime to be dealt with by public guards like the police but also one to be handled increasingly more by private guards. It is why this study intends to identify how to utilize private guards in preventing the crime. Investigations were made into 208 burglars, who were inmates of 10 correctional institutions (prisons or detention houses) across the country. It is found that only about 24% of burglars committed the crime through rational choice, about 60.7% were feared of their arrest at the time of their crime, and a very high percentage (69.9%) of them were assured of their successful crime. Burglaries usually happened at night, mostly in a summer day when everybody goes away from home for vacation. Primarily, the crimes took place in a private house of urban residential quarters. What burglars considered mostly for target selection includes 'profitability,' followed by 'surveillance' and 'risk.' Most (42%) of them committed the crime for the first time ever. Generally, they were not inclined to commit the crime while under the influence of alcohol or drug, which might prevent them from making reasonable decisions. 73.9% of the criminals said that they committed the crime singly without any accomplices.

  • PDF

Household food insecurity and coping strategies in a poor rural community in Malaysia

  • Shariff, Zalilah Mohd.;Khor, Geok Lin
    • Nutrition Research and Practice
    • /
    • v.2 no.1
    • /
    • pp.26-34
    • /
    • 2008
  • This cross-sectional study assessed household food insecurity among low-income rural communities and examined its association with demographic and socioeconomic factors as well as coping strategies to minimize food insecurity. Demographic, socioeconomic, expenditure and coping strategy data were collected from 200 women of poor households in a rural community in Malaysia. Households were categorized as either food secure (n=84) or food insecure (n=116) using the Radimer/Cornell Hunger and Food Insecurity instrument. T-test, Chi-square and logistic regression were utilized for comparison of factors between food secure and food insecure households and determination of factors associated with household food insecurity, respectively. More of the food insecure households were living below the poverty line, had a larger household size, more children and school-going children and mothers as housewives. As food insecure households had more school-going children, reducing expenditures on the children's education is an important strategy to reduce household expenditures. Borrowing money to buy foods, receiving foods from family members, relatives and neighbors and reducing the number of meals seemed to cushion the food insecure households from experiencing food insufficiency. Most of the food insecure households adopted the strategy on cooking whatever is available at home for their meals. The logistic regression model indicates that food insecure households were likely to have more children (OR=1.71; p<0.05) and non-working mothers (OR=6.15; p<0.05), did not own any land (OR=3.18; p<0.05) and adopted the strategy of food preparation based on whatever is available at their homes (OR=4.33; p<0.05). However, mothers who reported to borrow money to purchase food (OR=O.84; p<0.05) and households with higher incomes of fathers (OR=O.99; p<0.05) were more likely to be food secure. Understanding the factors that contribute to household food insecurity is imperative so that effective strategies could be developed and implemented.

VPN Traversal Scheme in Hierarchical MIPv4 environment (계층적 이동 IPv4 환경에서 VPN 운영 방안)

  • Sung, Su-Lyun;Kang, Jung-Ho;Shin, Young-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.519-526
    • /
    • 2004
  • This paper presents an efficient interoperation scheme of a VPN(Virtual Private Network) and Mobile IP using a hierarchical structure of a FA(Foreign Agent). In the proposed scheme, the GFA(Gateway Foreign Agent) plays a role of VPN gateway on behalf of the MN(Mobile Node). When the MN moves in the same GFA domain, because the GFA has already an IPsec security association with a VPN gateway in the home network of the MN, the MN does not need an IPsec re-negotiaion. In this way, our mechanism reduces a message overhead and a delay resulted from an IPsec negotiation. And a MN can send a data to a correspondent node without a packet leakage. We show a performance of our scheme by using a discrete analytical model. Analytical results demonstrated that the total processing cost calculated by a registration update cost and a packet delivery cost is significantly reduced through our proposed scheme.

Attitudes and Acceptability of Smart Wear Technology: Qualitative Analysis from the Perspective of Caregivers

  • Park, Soonjee;Harden, Amy J.;Nam, Jinhee;Saiki, Diana;Hall, Scott S.;Kandiah, Jay
    • International Journal of Human Ecology
    • /
    • v.13 no.2
    • /
    • pp.87-100
    • /
    • 2012
  • Smart wear integrates computing technology into fabric or a garment for additional functionality. This research explored the attitudes and opinions of the use of smart wear from the viewpoint of caregivers. Thirty two individuals including care providers of children and adult family members with health problems participated in focus group interviews. Participants reported being interested in smart wear because of the potential to detect the location (GPS) of a dependent (e.g., child, elderly) and to monitor vital signs. Participants indicated perceived advantages of smart wear such as identifying geographical location and effectiveness. Perceived concerns mentioned were privacy/security issues and accuracy of data. Participants taking care of dependents without a specific disease were hesitant to adopt and pay for smart wear. However, caregivers of elderly individuals expressed positive adoption intentions and willingness to reasonably pay for smart wear. They indicated expectations that potential insurance would provide coverage for cost savings. Caregivers expressed the need of specific requirements for future adoption such as customizability, and comfort/safety. Specific to smart wear clothing, most respondents preferred it be an undershirt or a jacket with a sensor located in the shoulder area. The findings from this study can be used in product development, promotion and marketing of smart wear.

Implementation of N-screen based solar power monitoring system (태양광 발전 모니터링 시스템의 N 스크린 기반 구현)

  • Lee, Kyong-Ho;Park, Hee-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.151-158
    • /
    • 2014
  • In this paper, we have designed and implemented the 'N-screen based solar power monitoring system' using N-screen technology by improving the existing monitoring system that can only be accessed or controlled by PC. The HW of the system is consists of solar power modules, inverter, and relay server. And SW is implemented in consideration of the following three points. First, we applied the N-screen technology in order to support various devices. Second, we applied 1:N communication technology that multiple devices can be connected simultaneously to the relay server. Third, we also considered the security problems between server and devices. The final system has been evaluated through the operational test and received good reviews from the technical and economic point. In the future, we are expecting that this technology will replace the existing monitoring systems in various fields, like smart home, smart building, smart city, smart industry, and smart agriculture, etc.

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Global Roaming Environment (글로벌 로밍 환경에서 시간 동기화 OTP를 포함한 티켓 기반 AAA 메커니즘에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.129-138
    • /
    • 2007
  • AAA(Aluthentieation, Authorization, Accounting) protocol is an information securitv technology that offer secure and reliable user Authentication, Authorization, Accounting function systematically in various services. protocol and wireless network work as well as win network. Currently IETF(Internet Engineering Task Force) AAA Working Group deal with about AAA protocol and studying with activity, But, recently it exposing much problems side to user's anonymity and privacv violation. Therefore, in this paper, AAAH(Home Authentication Server) authenticaters Mobile device, after that, use ticket that is issued from AAAH even if move to outside network and can be serviced offering authentication in outside network without approaching by AAAH, Also, we study mechanism that can offer user's privacy and anonymousness to when use service. Our mechanism is using Time Synchronization OTP and focusing authentication and authorization. Therefore, our mechanism is secure from third party attack and offer secure and effective authentication scheme. Also only right user can offer services by using ticket. can reduce signal and reduce delay of message exchanged, can offer persistent service and beighten security and efficiency.

A STUDY ON DEVELOPING A DESIGN OF SUPERSONIC HUMIDIFIER FOR HOME USE. - With a focus on 3 domestic companys Household electric appliances - (가정용 초음파 가습기 디자인개발에 관한 연구 - 국내가전 3사를 중심으로 -)

  • 오성진
    • Archives of design research
    • /
    • v.6 no.1
    • /
    • pp.23-46
    • /
    • 1993
  • The development of technology in modern industrial world which grows and changes every day is shortening the cycle of life span of products, so there is a flood of products around us. It is enough to say that this phenomenon leads to further emphasis on the aspect of design for human being. It is not a new fact that to design for the rational function and the modeling from to make a combination and to satisfy consumers' desire is a short cut to gain competitive superiority in developing new products for MIS security. Therefore the design which plays a leading role in the activity of creating more convenient, more aesthetic, and more econemical products is called 'NEW CORPORATE WEAPON'. The amount of effort made for developing products is different in each company, but recently the plan to develope new products and its process arouse more interest. This thesis purports to improve objective understanding about the development of design by investigating products development research and the process of analysis and designing as a case study on developing a domestic supersonic humidifier. This thesis consists of five chapters in all. In chapter one as a preface, the purpose the method and the scope of the study is described. Chapter two contains my effort to grasp the background of study on the design and the basic structure of supersonic humidifier. Chapter three is an examination into the present conditions of supersonic humidifier used in domestic and foreign area, and the shape of design. In chapter four, a guide for the development of design is established. The idea sketch based on a fundamental shape and the drawing are added to this. In chapter five on the basis of the result of analysis in the preceding research I describe the development of design of products on the premise that marketing gives proof for them but the products oriented by manufacturer are not included in this case. In this thesis, I try to recognize the process of the develpment of design and the importance of the plan for design in developing products by examining an investigative and analytic study on the design of products.

  • PDF