• Title/Summary/Keyword: ubiquitous security

Search Result 522, Processing Time 0.025 seconds

Efficient Method of Detecting Blurry Images

  • Tsomko, Elena;Kim, Hyoung-Joong;Paik, Joon-Ki;Yeo, In-Kwon
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.27-39
    • /
    • 2008
  • In this paper we present a simple, efficient method for detecting the blurry photographs. Recently many digital cameras are equipped with various auto-focusing functions to help users take well-focused pictures as easily as possible. In addition, motion compensation devices are able to compensate motion causing blurriness in the images. However, digital pictures can be degraded by limited contrast, inappropriate exposure, imperfection of auto-focusing or motion compensating devices, unskillfulness of the photographers, and so on. In order to decide whether to process the images or not, or whether to delete them or not, reliable measure of image degradation to detect blurry images from sharp ones is needed. This paper presents a blurriness/sharpness measure, and demonstrates its feasibility by using extensive experiments. This method is fast, easy to implement and accurate. Regardless of the detection accuracy, the proposed measure in this paper is not demanding in computation time. Needless to say, this measure can be used for various imaging applications including auto-focusing and astigmatism correction.

  • PDF

A Study on the Efficient RFID Tag Identification considering Performance Information of Individual Nodes in a Grid Environment (그리드 환경에서 노드별 성능정보를 고려한 효율적인 RFID 태그 판별에 관한 연구)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.797-802
    • /
    • 2011
  • RFID is recognized to technically occupy important position in ubiquitous computing environment and expected to create new markets in a variety of fields from now on. In order to generalize RFID system, it is required to solve the problem of privacy invasion and expedite lots of tags We suggest efficient RFID Tag Identification to identify tags quickly on the satisfaction with 3 security requirements of privacy protection in this paper. This methods are transferred to Grid environment through parallel analysis of Hash-Chain, and we measure performance of each nodes under the Grid environment. Then, We'll suggest SP-Division Algorithm to identify tags with each nodes and implement it in a Grid environment.

Trends for Secure Authentication of Risk-related Remote Metering System (위험 관련 원격 검침 시스템의 보안 인증 기술 동향)

  • Kim, Hyo-Jin;Kim, Hyun-Ho;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.752-754
    • /
    • 2016
  • Power is compared to the overall share of energy continues to increase, so as a way for efficient demand management and value added according to the AMR system was introduced. But there is a risk in a variety of external attack, such as when you use the remote meter reading system, cyber attacks and hacking. It is considered that the measures sought, which can be used to prevent or pre safer urgent. In this paper, I want to point out the current research trends and issues of security authentication technology of remote meter reading system.

  • PDF

Experiment and Analysis of Session-key Authentication Mechanism based on MANET (MANET 기반 세션키 인증기법의 실험 및 분석)

  • Lee, Cheol-Seung;Jung, Sung-Ok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1355-1360
    • /
    • 2015
  • Recently MANET application is diversified studies on the MANET routing security and the reliable authentication mechanism is actively in progress. Stand-alone network structure of a MANET is an important field of ubiquitous computing environment of interest, Authentication techniques are already provided safety when applied to MANET reliability and efficiency in a secure authentication mechanism using the session key. However, most of the MANET environment, the model has been based on the assumption that the safety is guaranteed, When applied to an actual network situation, we can not rule out a variety of threats. This study is the testing and analysis to add the malicious node extracted at random to demonstrate the safety and efficacy of the session key certification techniques of the MANET environment.

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

Research of UT utilized the services for a disaster response system as role of u-Government (전자정부 역할로서 재난재해 대응체계를 위한 UT 활용서비스 연구)

  • Choung, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.251-257
    • /
    • 2015
  • Rationality only based on human experience and visuals takes huge toll on nation at the time of disasters. Accordingly, it is required to convert its system into national disaster-managing system based on governmental departments effective cooperation against catastrophic emergencies. Thus, this manuscript rejects empirical model of calamity measures and provides substituting prototype based on u-Gov which utilizes UT service from the developed countries' cases. Moreover, in order to provide nation's administrative services, the paper suggests alternative for politic issues which realizes a new incorporated control towel reflecting policies.

On a PS-WFSR and a Parallel-Structured Word-Based Stream Cipher (PS-WFSR 및 워드기반 스트림암호의 병렬구조 제안)

  • Sung, SangMin;Lee, HoonJae;Lee, SangGon;Lim, HyoTaek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.383-386
    • /
    • 2009
  • In this paper, we propose some parallel structures of the word-based nonlinear combine functions in word-based stream cipher, high-speed versions of general (bit-based) nonlinear combine functions. Especially, we propose the high-speed structures of popular three kinds in word-based nonlinear combiners using by PS-WFSR (Parallel-Shifting or Parallel-Structured Word-based FSR): m-parallel word-based nonlinear combiner without memory, m-parallel word-based nonlinear combiner with memories, and m-parallel word-based nonlinear filter function. Finally, we analyze its cryptographic security and performance.

  • PDF

Key Update Protocols in Hierarchical Sensor Networks (계층적 센서 네트워크에서 안전한 통신을 위한 키 갱신 프로토콜)

  • Lee, Joo-Young;Park, So-Young;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.5 s.108
    • /
    • pp.541-548
    • /
    • 2006
  • Sensor network is a network for realizing the ubiquitous computing circumstances, which aggregates data by means of observation or detection deployed at the inaccessible places with the capacities of sensing and communication. To realize this circumstance, data which sensor nodes gathered from sensor networks are delivered to users, in which it is required to encrypt the data for the guarantee of secure communications. Therefore, it is needed to design key management scheme for encoding appropriate to the sensor nodes which feature continual data transfer, limited capacity of computation and storage and battery usage. We propose a key management scheme which is appropriate to sensor networks organizing hierarchical architecture. Because sensor nodes send data to their parent node, we can reduce routing energy. We assume that sensor nodes have different security levels by their levels in hierarchy. Our key management scheme provides different key establishment protocols according to the security levels of the sensor nodes. We reduce the number of sensor nodes which share the same key for encryption so that we reduce the damage by key exposure. Also, we propose key update protocols which take different terms for each level to update established keys efficiently for secure data encoding.

Development Plan of Guard Service According to the LBS Introduction (경호경비 발전전략에 따른 위치기반서비스(LBS) 도입)

  • Kim, Chang-Ho;Chang, Ye-Chin
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.145-168
    • /
    • 2007
  • Like to change to the information-oriented society, the guard service needs to be changed. The communication and hardware technology develop rapidly and according to the internet environment change from cable to wireless, modern person can approach every kinds of information service using wireless communication machinery which can be moved such as laptop, computer, PDA, mobile phone and so on, LBS field which presents the needing information and service at anytime, anywhere, and which kinds of device expands it's territory all the more together with the appearance of ubiquitous concept. LBS use the chip in the mobile phone and make to confirm the position of the joining member anytime within several tens centimeters to hundreds meters. LBS can be divided by the service method which use mobile communication base station and apply satellite. Also each service type can be divided by location chase service, public safe service, location based information service and so on, and it is the part which will plan with guard service development. It will be prospected 8.460 hundred million in 2005 years and 16.561 hundred million in 2007 years scale of market. Like this situation, it can be guessed that the guard service has to change rapidly according to the LBS application. Study method chooses documentary review basically, and at first theory method mainly uses the second documentary examination which depends on learned journal and independent volume which published in the inside and the outside of the country, internet searching, other kinds of all study report, statute book, thesis which published at public order research institute of the Regional Police Headquarter, police operation data, data which related with statute, documents and statistical data which depend on private guard company and so on. So the purpose of the study gropes in accordance with the LBS application, and present the problems and improvement method to analyze indirect of manager side of operate guard adaptation service of LBS, government side which has to activate LBS, systematical, operation management, manpower management and education training which related with guard course side which has to study and educate in accordance with application of the new guard service, as well as intents to excellent quality service of guard.

  • PDF

The Study for Damage Effect Factors of Heavy Snowfall Disasters : Focused on Heavy Snowfall Disasters during the Period of 2005 to 2014 (대설 재난의 피해액 결정요인에 관한 연구: 2005~2014년 대설재난을 중심으로)

  • Kim, Geunyoung;Joo, Hyuntae;Kim, HeeJae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.125-136
    • /
    • 2018
  • Heavy snowfall disasters are the third most serious natural disasters, after typhoon and heavy rainfall disasters, in terms of economic disaster damage in South Korea. The average annual economic damage of heavy snowfall disasters was approximately eighty-eight billion won during the period of 2005-2014. In spite of significant economic damage, there have been few economic studies regarding heavy snowfall disasters in South Korea. The objective of this research is to identify the association between economic damage of heavy snowfall disasters and damage effect factors of snowfall amounts, snowfall days, population densities, and non-urban area ratios using a regression analysis model. Economic damage data sets of heavy snowfall disasters during the period of 2005-2014 were obtained from the Natural Disaster Yearbook published by the Ministry of Public Safety and Security. Weather-related data sets, such as snowfall amounts and snowfall days were collected from the Korea Meteorological Administration. Demographic and urban data sets, including population densities and non-urban area ratios, were provided by the Local Government Yearbook. Outcomes of this study can assist with heavy snowfall disaster management policies of South Korea.