Cited 0 time in
Security Vulnerability Analysis of Beep Sound Pattern in Digital Door Lock
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jung, Jin-Woo | - |
| dc.contributor.author | Jung, Cho Rok | - |
| dc.contributor.author | Lim, Yun-Mi | - |
| dc.contributor.author | Kim, Seobin | - |
| dc.contributor.author | Cho, Young-One | - |
| dc.date.accessioned | 2024-08-08T01:01:55Z | - |
| dc.date.available | 2024-08-08T01:01:55Z | - |
| dc.date.issued | 2017-10 | - |
| dc.identifier.issn | 1936-6612 | - |
| dc.identifier.issn | 1936-7317 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/14798 | - |
| dc.description.abstract | Nowadays, digital door look is very popular way for the security of home and office environment since it is easy-to-use and is believed to be safe. Since the sequential numeric input pattern is used as the key in digital door lock, users should remember it and be careful to keep it secure. On the other hand, many digital door locks make beep sound whenever touching a button to give an interactive feedback to the user and to reduce input error. In this paper, security vulnerability of digital door lock with beep sound is analyzed with 14 different test cases based on the assumption that users are enough skilled to their own sequential input pattern so that the speed of user's fingertip movement is almost constant as the individual maximum speed during touching. The conclusion says that some cases may have relatively weak security level even though it has enough long length passcode. Therefore, the length of input pattern is not proportional to the security level, locally. But, the range of possible number of cases is exponentially proportional to the length of input pattern, globally. | - |
| dc.format.extent | 3 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | AMER SCIENTIFIC PUBLISHERS | - |
| dc.title | Security Vulnerability Analysis of Beep Sound Pattern in Digital Door Lock | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1166/asl.2017.9779 | - |
| dc.identifier.scopusid | 2-s2.0-85039455853 | - |
| dc.identifier.wosid | 000431743400076 | - |
| dc.identifier.bibliographicCitation | ADVANCED SCIENCE LETTERS, v.23, no.10, pp 9706 - 9708 | - |
| dc.citation.title | ADVANCED SCIENCE LETTERS | - |
| dc.citation.volume | 23 | - |
| dc.citation.number | 10 | - |
| dc.citation.startPage | 9706 | - |
| dc.citation.endPage | 9708 | - |
| dc.type.docType | Proceedings Paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
| dc.relation.journalWebOfScienceCategory | Multidisciplinary Sciences | - |
| dc.subject.keywordAuthor | Security Vulnerability Analysis | - |
| dc.subject.keywordAuthor | Beep Sound Pattern | - |
| dc.subject.keywordAuthor | Digital Door Lock | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
