Earticle

현재 위치 Home

International Journal of Smart Home

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSH) [Science & Engineering Research Support Center, Republic of Korea(IJSH)]
  • pISSN
    1975-4094
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.4 No.1 (4건)
No
1

Review: Context Aware Tools for Smart Home Development

Rosslin John Robles, Tai-hoon Kim1

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.4 No.1 2010.01 pp.1-12

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Context-aware computing is the concept of leveraging information about the end user to improve the quality of the interaction. Emerging context-enriched services will use location, presence, social attributes, and other environmental information to anticipate an end user's immediate needs, offering more-sophisticated, situation-aware and usable functions. Smart homes connect all the devices and appliances in your home so they can communicate with each other and with you. Context-awareness can be applied to Smart Home technology. In this paper, we review the context-aware tools for Smart Home System Development.

2

Review: Distributed System Network Architecture for Securing SCADA system

Randy S. Tolentino1, Tai-hoon Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.4 No.1 2010.01 pp.13-22

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Intentional and unintentional cyber threats are an ever-present risk for such critical infrastructures and for businesses that rely on 100 percent uptime of their operational facilities. The need for remote monitoring, control, maintenance, and data access have resulted in many Supervisory Control and Data Acquisition (SCADA) systems and Distributed Control Systems (DCS) to be accessible either directly from the Internet or through corporate networks. This paper proposed a Distributed Control System Network Architecture for Securing SCADA system. It is consists of a layered defense-in-depth approach that will enable administrator to watch their networks at every level. The primary concerns for the control system network includes securing remote access, validating and authenticating every device and user on the control system network, and assuring the integrity of the data.

3

Review: Security Threats for RFID-Sensor Network Anti-Collision Protocol

Maricel O. Balitanas, Taihoon Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.4 No.1 2010.01 pp.23-37

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The limitless possibilities and low cost are the reasons Radio Frequency Identification (RFID) systems are used in a variety of applications to uniquely identify physical objects. The operation of RFID systems often involves a situation in which numerous tags are present in the interrogation zone of a single reader at the same time. And in such and numerous more situations presented RFID is prone to security threat as well, which is the main focus of this paper. This paper presents an anti-collision protocol existing, sited vulnerabilities and suggested general security solutions.

4

Advisory for Securing Different Assets of an Organization

Uttam Kumar Dash, Debnath Bhattacharyya, Tai-hoon Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.4 No.1 2010.01 pp.37-56

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The organization trying to manage information security manually or automatically. The preliminary task is to first understand and identifying the security requirements, which generally includes everything starting from hardware, software and information assets, threats and vulnerabilities associated with them, different network connections and topologies used for transferring information to and from the enterprise. Security infrastructure advisory is a specified set of entities, both physical as well as software, in order to implement the set of identified controls. It tells an individual/organization the details regarding the security tools and the exact location of security tools, required to mitigate the security risks of the organization. In this phase, the security infrastructure advisories for different assets and platforms are generated. After getting the security infrastructure specification, the organization decides on the particular infrastructure that it would like to implement..

 
페이지 저장