DOI QR코드

DOI QR Code

IoT 네트워크 환경에서 클라우드 기반의 사용자 인증을 통한 건물 내의 LED에너지 효율화 연구

A Study on LED Energy Efficiency in Buildings through Cloud-based User Authentication in IoT Network Environment

  • 안예찬 (백석대학교 정보통신학부) ;
  • 이근호 (백석대학교 정보통신학부)
  • Ahn, Ye-Chan (Dept. of Information and Communication, Baekseok University) ;
  • Lee, Keun-Ho (Dept. of Information and Communication, Baekseok University)
  • 투고 : 2017.04.10
  • 심사 : 2017.05.20
  • 발행 : 2017.05.28

초록

최근 사물인터넷 기기들이 다양한 분야에 적용되어 우리의 일상생활 속까지 다가오며 보편화되고 있다. 우리의 일상에서의 모든 사물들이 네트워크로 연결되어 서로 상호작용을 하며 우리들에게 좀 더 유용한 효과를 주곤 한다. 본 논문에서는 사용자 인증 한번 만으로 인증장치와 연결된 네트워크 환경에서 LED조명이 그 상호 연결되어 인증한 사람의 장소까지 조명이 효율적으로 켜질 수 있는 알고리즘을 구현하였다. 한 건물 내에서 사용자 인증 한번을 통해 사용자 인증을 통해 인증된 정보를 이용하여 데이터베이스에 저장된 그 사람의 연구실위치를 탐색하여 최적의 알고리즘을 이용하여 그 사람이 일하는 연구실까지 조명이 켜지는 LED 에너지 효율화 알고리즘을 제안한다. 이를 통해 사람이 자주 다니지 않아 불필요한 에너지가 발생하는데 이를 효율적으로 이용하기 본 방법을 제안한다.

Recently, Internet of things have been applied to various fields and are becoming common in our everyday life. Everything in our daily lives is networked, interacting with each other and giving us more useful effects. In this paper, we implemented an algorithm that can illuminate the LED lighting to the authorized person 's place in the network environment connected with the authentication device only once with the user authentication. User authentication in one building User authenticated through a single user search for the location of the user's lab stored in the database using the certified information and LED lights up to the lab where the user works. Through this, unnecessary energy is generated because people do not pass frequently.

키워드

참고문헌

  1. Gartner, "Gartner identifies the top 10 strategic technologies for 2011," http://www.gartner.com, 2010.
  2. J. J. Lee, K. T. Kim, H. Y. Yun, “Design and Implementation of Context-aware Inference Framework for IoT Smart Home Environment ,” Korea Computer Information Society, Vol. 23, No. 1, pp. 247-250, 2015.
  3. Li-Hua Li, Juon-Chang Lin, Min-Shiang Hwang, "A Remote Password Authentication Scheme for Multiserver Architecture Using Neural Networks," IEEE TRANSACTIONS ON NEURAL NETWORKS, Vol. 12, No. 6, pp. 1498-1504. 2001. https://doi.org/10.1109/72.963786
  4. Leslie Lamport, "Password Authentication with Insecure Communication," Communication of the ACM, Vol. 24, No. 11, pp. 770-720. 1981. https://doi.org/10.1145/358790.358797
  5. Min-Shiang Hwang, Li-Hua Li, "A New Remote User Authentication Scheme Using Smart Cards".
  6. Anul K. Jain, Lin Hong, Sharath Pankanti, Ruud Bolle, "An Identity-Authentication System Using Fingerprints," PROCEEDINGS OF THE IEEE, Vol. 85, No. 9, pp 1365-1388. 1997. https://doi.org/10.1109/5.628674
  7. "Communication technology for wireless sensor network-based IoT," Korea Communication Agency, Broadcasting Technology Issue & Outlook, Vol. 37, 2014.
  8. Y. C. Park, Thang Le Duc, S. G. Jung, S. G. Yeoum, M. H. Son, H. S. Choo, "Gateway and application for connection of IoT and WSNs," Korea Information Science Society, pp. 531-532, 2015.
  9. J. H. Kim, D. B. Park, H. Y. Song, “Network Coding-Based Information Sharing Strategy for Reducing Energy Consumption in IoT Environments,” The Journal of Korean Institute of Communications and Information Sciences, Vol. 41, No. 4, pp. 433-440, 2016. https://doi.org/10.7840/kics.2016.41.4.433
  10. Robison S., A Bright "Future in the Cloud" Financial Times, March 4, 2008.
  11. Fu-yi group to talk about cloud computing pan development path, in November, 2008.
  12. J. S. Park, Y. M. Bae, S. J. Jung, “Technical analysis of Cloud Storage for Cloud Computing,” Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 5, pp. 1129-1137, 2013. https://doi.org/10.6109/jkiice.2013.17.5.1129
  13. Y. G. Bae, “A study on the Smart Home focused on the change of Housing Space,” Korea International Society for Space Design, Vol. 3, No. 2, pp. 49-59, 2008.
  14. Y. J. Jang, "Technology trend of Smart-home Security System ," Vol. 30, No. 30, pp. 117-138, 2012.
  15. P. Viola, M. Jones, "Rapid Object Detection using a Boosted Cascade of Simple Feature," Proceedings of the IEEE Conf. Computer Vsion and Pattern Recognition,, Kauai, HI, pp. 511-518, 2001.