http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Implementing Onetime Password based Access Control System for Secure Sharing Service
Kang, Namhi The Institute of Internet 2021 International Journal of Internet, Broadcasting an Vol.13 No.3
Development of ICT technologies leads exponential growth of various sharing economy over the last couple of years. The intuitive advantage of the sharing economy is efficient utilization of idle goods and services, but there are safety and security concerns. In this paper, we propose a onetime password based access control system to support secure accommodation sharing service and show the implementation results. To provide a secure service to both the provider and the user, the proposed system issues a onetime access password that is valid only during the sharing period reserved by the user, thereafter access returns to the accommodation owner. Especially, our system provides secure user access by merging the two elements of speaker recognition using voice and a one-time password to open and close the door lock. In this paper, we propose a secure system for accommodation sharing services as a use-case, but the proposed system can be applicable to various sharing services utilizing security-sensitive facilities.
A First Step Towards Security for Internet of Small Things
Namhi Kang 보안공학연구지원센터 2016 International Journal of Security and Its Applicat Vol.10 No.6
Industrial and research organizations expect that tens of billions of daily life objects can communicate with each other in the near future for realizing a hyper connected society that is called Internet of Things (IoT). They also agree that security is one of the most important concerns to provide smart and intelligent services successfully in the IoT. The author notes in this paper that the first step towards a secure IoT is the initial configuration of connected objects and networks in a secure fashion. As a solution, this paper proposes a secure configuration (i.e., bootstrapping) scheme for resource constrained devices such as sensors or actuators. The scheme is activated when a new object (or node) initially installs and re-installs to a network that is currently in operation. The method is suitable for a scenario, where resource constrained small things are interconnected with each other and thus formed Internet of Things.
온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발
강남희,Kang, Namhi 한국인터넷방송통신학회 2022 한국인터넷방송통신학회 논문지 Vol.22 No.5
In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.
Enhanced Predictive Handover for Fast Proxy Mobile IPv6
JEON, Seil,KANG, Namhi,KIM, Younghan The Institute of Electronics, Information and Comm 2009 IEICE TRANSACTIONS ON COMMUNICATIONS - Vol.92 No.11
<P>Proxy Mobile IPv6 (PMIPv6) has been proposed in order to overcome the limitations of host-based mobility management in IPv6 networks. However, packet losses during doing handover are still a problem. To solve this issue, several schemes have been developed, and can be classified into two approaches: predictive and reactive handover. Both approaches commonly use bi-directional tunnel between mobile access gateways (MAGs). In predictive schemes especially, mobility support for a mobile node (MN) is triggered by simplified link signal strength. Thereafter, the MN sends handover notification to its serving MAG, and is then able to initiate packet forwarding. Therefore, if the MN moves toward an unexpected MAG that does not have any pre-established tunnel with the serving MAG, it may lead to packet losses. In this paper, we define this problem as Early Packet Forwarding (EPF). As a solution, we propose an enhanced PMIPv6 scheme using two-phase tunnel control based on the IEEE 802.21 Media Independent Handover (MIH).</P>