• Title/Summary/Keyword: security architecture

Search Result 1,093, Processing Time 0.031 seconds

Indoor Passive Location Tracking and Activity Monitoring using WSN for Ubiquitous Healthcare

  • Singh, Vinay Kumar;Lee, Seung-Chul;Lim, Hyo-Taek;Myllyla, Risto;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.382-388
    • /
    • 2007
  • Indoor location system using wireless sensor network technology was applied for the status evaluation and activity monitoring of elderly person or chronic invalid at home. Location awareness application is transparent to the daily activities, while providing the embedded computing infrastructure with an awareness of what is happening in this space. To locate an object, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. By using only the sensor nodes without any external network infrastructure the cost of the system was reduced while the accuracy in our experiments. was fairly good and fine grained between 7 and 15 cm for location awareness in indoor environments. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object and several applications are enabled for context awareness.

Analysis of Shared Life between the Elderly and the Young at Homeshare in Seoul based on Case Studies

  • Suh, Kuee-Sook
    • Architectural research
    • /
    • v.22 no.3
    • /
    • pp.97-104
    • /
    • 2020
  • The Homeshare Program was promoted to solve the housing problems of the elderly and the young by the Seoul City in 2012. The elderly can provide spare rooms in their homes for the young at low rental fees, and the young can provide daily services to the elderly, cooperating with each other for better housing and life. The aim of this research is to find out how the participants use the shared space and what kinds of activities are shared in homeshare. This research uses case studies, which interviews 10 cases of homeshare in Seoul. The contents of the research are investigated shared spaces of the elderly, and analyzed contents of interaction lives in shared spaces. The elderly experience loneliness while living alone, and having someone to live with gives them comfort and a sense of security, and this is one motive for participating in homeshare. The elderly and the young share many equipment and shared activities and interactions in shared space. The homeshare program makes it possible for the elderly to aging in place and have interactive relationships with different generations. Therefore, homeshare may the formation of a new family, and new dwelling utilizing the elderly's house.

Enforcement of opacity security properties for ship information system

  • Xing, Bowen;Dai, Jin;Liu, Sheng
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.8 no.5
    • /
    • pp.423-433
    • /
    • 2016
  • In this paper, we consider the cybersecurity issue of ship information system (SIS) from a new perspective which is called opacity. For a SIS, its confidential information (named as "secret") may be leaked through the working behaviors of each Distributed Control Unit (DCU) from an outside observer called an "intruder" which is able to determine ship's mission state by detecting the source of each data flow from the corresponding DCUs in SIS. Therefore we proposed a dual layer mechanism to enforce opacity by activating non-essential DCU during secret mission. This mechanism is calculated by two types of insertion functions: Safety-assured insertion function ($f_{IS}$) and Admissibility-assured insertion function ($f_{IA}$). Due to different objectives, $f_{IS}$ is designed to confuse intruder by constructing a non-secret behaviors from a unsafe one, and the division of $f_{IA}$ is to polish the modified output behaviors back to normal. We define the property of "$I_2$-Enforceability" that dual layer insertion functions has the ability to enforce opacity. By a given mission map of SIS and the marked secret missions, we propose an algorithm to select $f_{IS}$ and compute its matchable $f_{IA}$ and then the DCUs which should be activated to release non-essential data flow in each step is calculable.

A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

A Study on the Floating House for New Resilient Living (새로운 탄력적인 생활을 위한 플로팅 주택에 대한 연구)

  • Moon, Changho
    • Journal of the Korean housing association
    • /
    • v.26 no.5
    • /
    • pp.97-104
    • /
    • 2015
  • This paper aims to discuss the concept of resilience in floating housing, to investigate the resilient features of floating houses & to review the possibility of floating housing as a new form of resilient living, and to suggest some reference ideas for the planning and design of floating housing projects. Resilient features of the floating house can be summarized as the buoyant characteristics for natural disasters, the easy employment & potential use of renewable and nearly self-sufficient energy systems in locations subject to limited energy sources, the movability, mobility, long life, water recycle system, prefabrication and modular construction with the potential for reduced environmental impact. Additional benefits include the potential for a peaceful and comfortable atmosphere due to direct connections with nature, good relationship with neighbors, a solid social spirit of unity, and sense of security. Considering the resilient features of floating house at a time of serious climate change requires a new paradigm, and floating/amphibious/floatable housing has great possibility as a new form of resilient living.

Multimedia Presentation Authoring and Virtual Collaboration in Medicine

  • Hong, Chul-Eui
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.6
    • /
    • pp.690-696
    • /
    • 2010
  • Web-based virtual collaboration is increasingly gaining popularity in almost every area in our society due to the fact that it can bridge the gap imposed by time and geographical constraints. However, in medical field, such collaboration has been less popular than other fields. Some of the reasons were timeliness, security, and preciseness of the information they are dealing with. In this paper, we are proposing a web-based distributed medical collaboration system called Virtual Collaboration System for Medicine (VCSM) for medical doctors that meet the needs. The proposed system consists of two parts - multimedia presentation and recordable virtual collaboration. The former supports synchronized multimedia presentation using Synchronous Multimedia Integration Language (SMIL.) It allows synchronization of the contents of a PowerPoint presentation file and a video file. The presentation may be provided to the participants before the discussion begins. Next, in the virtual collaboration stage, participants can use text along with associated symbols during the discussion over the presented medical images. The symbols such as arrows or polygons can be set or removed dynamically to represent areas of interest in digital images using so called layered architecture that separates image layer from annotation layer. XML files are used to record participants' opinions along with the symbols over some particular images

Privacy Authorization for Internet Identity Management System (인터넷 Identity 관리 시스템을 위한 프라이버시 인가)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.648-659
    • /
    • 2005
  • One's identity on the Internet has been disclosed and abused without his consent. Personal information must be protected by appropriate security safeguard. An Individual should have the right to know whether his personal details have been collected and stored. This paper proposes various conceptual models for designing privacy enabling service architecture in the Internet identity management system. For the restriction of access to personal information, we introduce the owner's policy and the management policy The owner's policy should provide the user with enough information to manage easily and securely his data. To control precisely and effectively all personal information in the Identity provider, we propose the privacy management policy and the privacy authorization model.

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.

A Hybrid Security Architecture Design for Power Line Communication Network (전력선 통신 네트워크를 위한 혼합형 보안구조 설계)

  • Yoon, Young-Jig;Heo, Joon;Hong, Choong-Seon;Ju, Sung-Ho;Lim, Yong-Hun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.127-131
    • /
    • 2007
  • 전력선을 이용한 통신 기술(Power Line Communication, PLC)은 현재 국내외에서 큰 관심을 받는 연구 분야로 국내에서도 이에 대한 연구와 개발이 활발히 진행되고 있다. 이 기술은 전력선을 이용하여 음성 데이터 인터넷 등을 고속으로 이용할 수 있는 서비스를 제공하여 나아가 가정의 모든 가정기기들을 연결하는 홈 네트워크를 구성할 수도 있다. 하지만 전력선 통신 기술에는 보안상 많은 문제가 존재한다. 그 이유는 전력선 통신 네트워크가 전력선과 IP망을 둘 다 사용하는 혼합형 네트워크로 구성되어 있기 때문이다. 이로 인해 기존 IP망에서 사용하던 보안 기술들을 그대로 전력선 통신 네트워크에 적용하기에는 많은 어려움이 따르며 새로운 기술을 개발하고 그것을 기존 인프라에 적용하는 것 또한 많은 어려움이 따른다. 이에 본 논문에서는 기존 IP망에서 사용하던 공개키와 대칭키 방식을 이용하여 서로 다른 네트워크로 구성되어 있는 전력선 통신 네트워크의 보안을 위한 혼합형 보안구조를 제안한다.

  • PDF

An efficient and anonymous Chaotic Map based authenticated key agreement for multi-server architecture

  • Irshad, Azeem;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Sher, Muhammad;Chaudhry, Shehzad Ashraf
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5572-5595
    • /
    • 2016
  • Multi-server authentication enables the subscribers to enjoy an assortment of services from various service providers based on a single registration from any registration centre. Previously, a subscriber had to register from each service provider individually to avail respective services relying on single server authentication. In the past, a number of multi-server authentication techniques can be witnessed that employed lightweight and even computationally intensive cryptographic operations. In line with this, Zhu has presented a chaotic map based multi-server authentication scheme recently, which is not only vulnerable to denial-of-service attack, stolen-verifier attack, but also lacks anonymity. This research aims at improving the Zhu's protocol in terms of cost and efficiency. Moreover, the comparative study is presented for the performance of improved model against the existing scheme, and the security of proposed model is formally proved using BAN Logic.