• Title/Summary/Keyword: ubiquitous security

Search Result 521, Processing Time 0.029 seconds

Development of Mobile Monitoring System for Home Security (홈 시큐리티를 위한 모바일 모니터링 시스템 개발)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.43-49
    • /
    • 2009
  • Network industry is complex combined with various fields of industry, such as communication, broadcast, construction, and home appliances. Moreover, it's fairly lucrative since the growth industry makes lots of added values, interacting with the others. The network industry, usually called 'Ubiquitous', connects some home appliances and makes an integrated system that you can use them with whenever and wherever. A demand for network security, however, has skyrocketed due to the relatively low safety. It's been expected that the market of home security is going to be grown up nearly 30 percent every year. Recently, analog surveilance cameras have been replaced with digital ones, and they will be providing stronger security services taking advantage of mutual interaction with related industies. In this paper, a mobile monitoring system for home security is proposed, which makes it possible to supervise all home appliances wherever you're, using the conventional wired/wireless network infra.

Security control system modelling utilizing RFID infra (RFID 인프라를 활용한 보안통제 시스템 모델링)

  • Kim, Kyoung-Woo;Kim, Young-Ho;Kim, Tae-Ho;Hwang, Shin-Woo;Cho, Sung-Mok
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.05a
    • /
    • pp.676-679
    • /
    • 2009
  • Ubiquitous 시대의 도래와 함께 RFID는 Ubiquitous 기술의 핵심적인 역할을 담당하고 있으며, RFID를 읽고 판독하는 단말기의 개발 역시 매우 중요한 기술개발 분야이다. 본 논문에서는 RFID중 현재 교통카드 등에서 많이 사용되고 있는 RFID 13.56Mhz와 보안회사에서 사용하고 있는 125Khz의 인프라를 그대로 사용할 수 있고, TCP/IP 통신을 통해 위치파악, 출입통제, 보안통제 등의 응용이 가능한 시스템을 모델링하고자 한다. 기존의 로컬 RFID 방식은 기업체 내에 별도의 서버를 두어 운영하기 때문에 관리문제, 기술문제 등의 애로사항이 빈번하게 발생하는 문제점이 있다. 따라서 본 논문에서는 이러한 문제점을 해소할 수 있도록 TCP/IP로 연결된 중앙관리 서버를 사용하여 보안통제가 가능하도록 시스템을 모델링함으로써 RFID 인프라의 설치, 이전 및 관리 등이 용이하도록 보안통제 시스템을 구성하였다.

  • PDF

A Study for Security and Efficient Broadcasting of Sensor Network

  • Cho, Nam-Pil;Han, Young-Ju;Chung, Tai-Myung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.315-318
    • /
    • 2005
  • Lots of researches have been focusing on ubiquitous computing which means wherever, whenever, whatever the required information must be accessible. In ubiquitous computing environment, ubiquitous sensor network (USN) is the basis technology for gathering and transferring the required information. However sensor network characteristically has more severe vulnerability than the existing networks do. The paper presents operation of secure protocols for delivering information in secure in ubiquitous computing environment and show improvement of the secure transferring protocol.

  • PDF

Analysis on Ubiquitous Home Services in Domestic Future Housing - Comparison with Research Results on Demand of Ubiquitous Home Services - (국내 미래주택관에서 구현하는 유비쿼터스 홈 서비스 현황 분석 - 유비쿼터스 홈 서비스 요구도 관련 연구 결과와 비교를 중심으로 -)

  • Lee, Yong-Min;Kwon, Oh-Jung
    • Korean Institute of Interior Design Journal
    • /
    • v.19 no.2
    • /
    • pp.252-262
    • /
    • 2010
  • With the introduction of the ubiquitous technology, the housing culture centers have demonstrated future housing image or technology. But Ubiquitous Home Services in the future housing were more focused on implementation of environment for the future than exhibition that consumers can experience. The purpose of this study was to identify ubiquitous home services which were realized in domestic future housing and to compare those with results of previous researches on demand for u-services. For this study, field study was conducted with 3 domestic future housings and 14 previous studies on demand of u-services were analyzed by the standard of residents demand. The results of the study showed that u-services for housework and leisure life more than those for security and health, were applied in the future housing. However, residents prefered u-services for security and control of indoor environment to those for housework and leisure life. As a result, it was found thatu-services which residents needed mainly were discordant with those that were displayed frequently in future housing. Also developing u-services reflected the needs of residents, a test bed has to be established in the future housing and then pre-evaluaiton can be conducted.

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 익명성을 보장하는 사용자 인증 및 키 동의 프로토콜 설계)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.3-12
    • /
    • 2006
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'smart space' augmented with intelligence and enhanced with services. However, unless privacy concerns are taken into account early in the design process of various ubiquitous devices(e.g. mobile devices, PDAs, sensors, etc.). we will end up crating ubiquitous surveillance infrastructure. Also, it may inappropriate to use public key techniques for computational constrained devices in ubiquitous computing environment. In this paper, we propose efficient user authentication and ky agreement protocol not only to preserve anonymity for protecting personal privacy but also to be suitable for computational constrained devices in ubiquitous computing environments.

Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service (융합형 u-헬스케어 서비스에서 헬스 정보 교환을 위한 키 트리 기반 관리 체계 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.81-86
    • /
    • 2015
  • The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.

Reliable Group Handover Scheme based on IEEE802.11 (신뢰성을 보장하는 IEEE802.11 기반의 그룹핸드오버 기법)

  • Kim, Ki Young;Ko, Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.33-41
    • /
    • 2009
  • Network industry is complex combined with various fields of industry, such as communication, broadcast, construction, and home appliances. Moreover, it's fairly lucrative since the growth industry makes lots of added values, interacting with the others.The network industry, usually called 'Ubiquitous', connects some home appliances and makes an integrated system that you can use them with whenever and wherever. A demand for network security, however, has skyrocketed due to the relatively low safety. It's been expected that the market of home security is going to be grown up nearly 30 percent every year. Recently, analog surveilance cameras have been replaced with digital ones, and they will be providing stronger security services taking advantage of mutual interaction with related industies. In this paper, a mobile monitoring system for home security is proposed, which makes it possible to supervise all home appliances wherever you're, using the conventional wired/wireless network infra.

Implementation of the Intelligent MUX System for Green USN (녹색 유비쿼터스 지능형 다중화장비의 구현)

  • Kang, Jeong-Jin;Chang, Hark-Sin;Lee, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently emphasizing the importance of security such as national major institutions' facilities or major industrial facilities for the maintenance of security/crime prevention due to specialization of the Green Information Technology(G-IT) and Green Ubiquitous Technology(G-UT) industry fields, The Security System Building linked high technology within the government-related organization, enterprise and army the military is urgently required. This paper is about the green USN intelligent an unmanned guard MUX system that receive the signals, from alarm device within surveillance area, with various ways of communication techniques and then transmit to local control center and remote control server trough TCP/IP network. This study enables the mutual senergy effect by realizing a total solution of an unmanned guard system and also significantly contributes to the global/domestic market expansion. That can be applied to the crime prevention/security fields in the Green Ubiquitous Environment Implemented Business(survalance-Home, Gu-City, Gu-Health, etc.), and will contribute to expand companies with international competitiveness that can provide the Green Ubiquitous Vision(Gu-Vision).

An RFID Multi-Reader System Development for TCP/IP Based Security Control (TCP/IP 기반 보안통제 RFID 멀티리더 시스템 개발)

  • Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1587-1592
    • /
    • 2009
  • RFID is Playing a central role in ubiquitous technology according with the advent of the ubiquitous era, and the development of an RFID reader is also emerging as an important technical development field. In this paper, we developed a hardware system which is able to make use of the 13.56MHz RFID infrastructure being used as a transportation card, a credit card, and so on as well as the 125KHz RFID infrastructure being used in security company, and which is applicable to a location identification, an entrance and exit control, and security control over the TCP/IP communication. The existing local RFID methods have some problems which bottlenecks such as administrative problems, technical problems, and so force frequently occur because a casual server is placed and operated in a company. Hence, in this paper we developed an RFID multi reader which is connected to a central administrable server over the TCP/IP in order to solve these problems, and we make it be possible to keep an security control and be easy to install, transfer and administrate RFID infrastructures.

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.