• Title/Summary/Keyword: 네트워크 디바이스

Search Result 907, Processing Time 0.031 seconds

A Design of Smart Home IoT Device Remote Control Policy Management System based on CEP (CEP 기반의 스마트 홈 IoT 디바이스 원격 제어 정책 관리 시스템 설계)

  • Kim, KyeYoung;Moon, Daejin;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.576-578
    • /
    • 2016
  • Various smart home IoT devices and services while the Internet of things is the development has been provided. The core of the smart home IoT service is that user control the device via the Internet communication. Communication of IoT devices, because most with an IP address within the private network, there is a difficulty in the remote control to control access from outside the network. Any of the methods for remote control, to determine the IP address of each other, there is a UDP hole punching for communication. To ensure the data communication success rate closed to 100%, the UDP hole punching must undergo a process of three stages in some cases. In this paper, to provide a system for managing the remote control policy based on the CEP in order to omit the unnecessary steps on the remote control of IoT devices using UDP hole punching.

  • PDF

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

Device Discovery in P2P Environment using Feed Forward Neural Network (FFNN을 사용한 P2P 디바이스 디스커버리)

  • Balayar Chakra B.;Kwon Ki-Hyeon;Kim Sang-Choon;Byun Hyung-Gi;Kim Nam-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1223-1226
    • /
    • 2006
  • P2P(Peer to Peer) 기술은 1990년대 후반기부터 산업계 및 학계에 주목을 받고 있는 기술 분야중의 하나로 이 기술의 장점은 인터넷 환경에 산재하여 있는 컴퓨팅 파워, 공간, 네트워크 대역을 인터넷 기반으로 효과적으로 활용하여 협력작업을 가능하게 한다는데 있다. 최근에는 모바일 환경 응용을 위한 P2P 디바이스 탐색 분야에 관심사가 증대되고 있으며, P2P 시스템은 중앙통제 장치가 결여 되어 있기 때문에 중앙통제 장치 개입을 최소로 하면서 P2P를 운영하기 위한 효율적인 기법 및 체계가 요구되고 있다. 본 논문에서는 기존의 접근방법을 검토하여 FFNN(feed forward neural network)을 이용한 디바이스 탐색 기법을 제시한다. 제시한 FFNN은 BP(back propagation) 알고리즘을 통해 훈련하고 디바이스를 탐색한다. 제시한 시스템의 성능을 보이기 위해 일정한 계산량을 가지는 작업을 에이전트를 활용, 탐색된 디바이스간에 분배하여 처리한다. 본 논문에서는 제한된 자원을 가지는 디바이스 간에 P2P를 사용하는 기법에 대해 제시하였다.

  • PDF

Resource Integration Management for High Availability of Mobile Cloud Computing (모바일 클라우드 컴퓨팅의 고가용성을 위한 자원 통합 관리기법)

  • Han, Seok-Hyeon;Park, Boo-Kwang;Heo, Yoon-A;Kim, Hyun-Woo;Song, Eun-Ha;Yi, Gangman;Jeong, Young-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.149-150
    • /
    • 2016
  • 모바일 컴퓨팅의 발전은 모바일 디바이스에게 클라우드 컴퓨팅 기술 도입을 가져왔다. 모바일 클라우드 컴퓨팅은 워크스테이션 및 클러스터로 구축된 클라우드 컴퓨팅과 다르게 모바일 디바이스만을 가지고 자원 서비스를 제공한다. 모바일 클라우드는 모바일 디바이스의 저조한 하드웨어 성능과 산발적인 네트워크 연결을 가진다. 모바일 클라우드의 인프라 구성을 위해서는 모바일 디바이스의 연결 및 자원 통합이 매우 중요시 된다. 본 논문에서는 모바일 클라우드 컴퓨팅의 인프라 구축을 위해 연결된 모바일 디바이스의 자원 통합 및 지속적인 자원 서비스 관리를 제공하는 M-RIM(Mobile device - Resource Integration Management)을 제안한다. M-RIM은 모바일 디바이스의 성능 정보 메타데이터 기반 분산 자원을 통합하고 사용자에게 자원 서비스를 제공한다.

A Case Study of Virtual Reality Contents Development Using Experience Device (가상현실 체험형 디바이스를 활용한 콘텐츠 개발 사례)

  • Yoo, Myoung-Eun;Lee, Seok-Hee;Song, Eun-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.208-210
    • /
    • 2019
  • Creating a virtual reality ecosystem is more important than anything else for virtual reality, which has recently been drawing attention as a sector of the fourth industrial revolution. Virtual reality ecosystem consists of content (C), device (D), platform (P), and network (N). While content is key among these, virtual reality depends on input and output devices, so device utilization is very important. Recently, hands-on devices are being developed for realistic experiences. This study presents examples of contents development using VirZOOM, an experienced device, to reduce immersion and motion sickness of VR contents. We look forward to further promoting the development of virtual reality content in the future through this study.

  • PDF

Independent Firmware Design to Reduce Device Heterogeneity in LAN WAS for IoT Environment (IoT 환경을 위한 Local WAS에서 디바이스 이질성을 줄이는 독립적인 Firmware 설계)

  • Kyung-Ho Lee;Eun-Ah Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.803-808
    • /
    • 2023
  • The IoT industry is growing at a record growth rate every year, but developers face practical problems such as security, data storage, and heterogeneity between devices before developing an IoT platform. In particular, heterogeneity between devices occurs due to network type and protocol, and device firmware must be changed or multiple IoT platforms must be used in some cases. In addition, data is wasted due to redundant sensing due to the overflow of indiscriminate IoT devices. In this paper, we propose a device-independent firmware design to solve the heterogeneity between devices in the IoT platform environment where Local WAS uses the MQTT protocol.

C-P-N-D Ecosystem-based Broadcasting/Media Virtual Reality (VR) Prospects (C-P-N-D 생태계 차원에서의 방송/미디어 분야 가상현실(VR) 발전 전망)

  • Lee, Jongseok;Suh, Kyoowon;Nam, Sanghun
    • Journal of Broadcast Engineering
    • /
    • v.23 no.1
    • /
    • pp.19-25
    • /
    • 2018
  • The growth of virtual reality(VR), which is regarded as a part of the 4th industrial revolution, is being delayed differently from the prediction. In this study, we briefly analyze these reasons from the point of view of CPND ecosystem. Virtual reality is a technology in which a user wears a device and accesses a platform through a network to use various contents. Therefore, balanced development of C-P-N-D ecosystem fields is important for successful popularization of virtual reality. In Korea, content, platforms, and devices, except for the network, are evaluated as having low competitiveness. While efforts to secure competitiveness in individual fields are important, it is also necessary to nurture network-based platforms that can utilize killer content. It should be kept in mind that simple breeding of killer content alone can not build an entire virtual reality C-P-N-D ecosystem, and the broadcast / media sector also needs to take this approach.

Resource Management Scheme for Improvement of Reliability and Connectivity in wireless USB System (무선 USB 시스템에서 신뢰성과 연결성 향상을 위한 자원 관리 기법)

  • Kim, Jin-Woo;Jeong, Min-A;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1159-1166
    • /
    • 2014
  • In this paper, a resource management scheme for enhancing the network connectivity and reliability in wireless USB system is proposed. Wireless USB protocol is suitable for the application that supports the real-time multimedia service in Ship Area Network since it supports high speed data transfer. However, the device's mobility is caused the dramatic change of link state and network topology, and is occurred the degradation of network performance. Therefore, a resource management scheme for wireless USB system is proposed in this paper. The proposed technique can intelligently treat the change of link state, and solve the degradation of network performance. The simulation results show that proposed protocol can enhance the throughput and delay performance by selecting relay device with better link state.

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

User Adaptive Restaurant Recommendation Service in Mobile Environment based on Bayesian Network Learning (베이지안 네트워크의 학습에 기반한 모바일 환경에서의 사용자 적응형 음식점 추천 서비스)

  • Kim, Hee-Taek;Cho, Sung-Bae
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.6-10
    • /
    • 2009
  • In these days, recommendation service in mobile environments is in the limelight due to the spread of mobile devices and an increase of information owing to advancement of computer network. The restaurant recommendation system reflecting user preference was proposed. This system uses Bayesian network to model user preference and analytical hierarchical process to recommend restaurants, but static inference model for user preference used in the system has some limitations that cannot manage changing user preference and enormous user survey must be preceded. This paper proposes a learning method for Bayesian network based on user requests. The proposed method is implemented on mobile devices and desktop, and we show the possibility of the proposed method through experiments.

  • PDF