• Title/Summary/Keyword: 네트워크 디바이스

Search Result 907, Processing Time 0.026 seconds

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

Efficient Video Service Providing Methods for Mobile of Indoor AP Terminals (실내 AP간 단말 이동에 따른 효율적인 동영상 서비스 제공 방안)

  • Hong, Sung-Hwa;Kim, Byoung-Kug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.585-587
    • /
    • 2022
  • The visual motivation between AP devices is NTP-based visual motivation through the access of the Internet through the internal wired LAN, but this has several seconds of visual difference in hundreds of milliseconds (msec) depending on the network. The frame for the output of the video will vary depending on the application, but usually 24 (image) frames are output to the screen in one second. Therefore, the visual synchronization between peripheral devices can be performed through the adjacent moving camera device, not the wired method. The programming method of generating API for synchronization command when creating an application for visual synchronization and delivering it to AP through MAC may differ from the time in synchronization command according to the environment of the operating system at the transmission side and the situation of the buffer queue of the MAC. Therefore, as a method to solve this problem, the renewal of visual information in the device driver terminal controlling MAC can be much more effective.

  • PDF

Evaluation of Edge-Based Data Collection System through Time Series Data Optimization Techniques and Universal Benchmark Development (수집 데이터 기반 경량 이상 데이터 감지 알림 시스템 개발)

  • Woojin Cho;Jae-hoi Gu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.453-458
    • /
    • 2024
  • Due to global issues such as climate crisis and rising energy costs, there is an increasing focus on energy conservation and management. In the case of South Korea, approximately 53.5% of the total energy consumption comes from industrial complexes. In order to address this, we aimed to improve issues through the 'Shared Network Utility Plant' among companies using similar energy utilities to find energy-saving points. For effective energy conservation, various techniques are utilized, and stable data supply is crucial for the reliable operation of factories. Many anomaly detection and alert systems for checking the stability of data supply were dependent on Energy Management Systems (EMS), which had limitations. The construction of an EMS involves large-scale systems, making it difficult to implement in small factories with spatial and energy constraints. In this paper, we aim to overcome these challenges by constructing a data collection system and anomaly detection alert system on embedded devices that consume minimal space and power. We explore the possibilities of utilizing anomaly detection alert systems in typical institutions for data collection and study the construction process.

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

HTTP Adaptive Streaming Method for Service-compatible 3D Contents Based on MPEG DASH (MPEG DASH 기반 service-compatible 3D 콘텐츠 대상 HTTP adaptive streaming 적용방안)

  • Park, Gi-Jun;Lee, Gil-Bok;Lee, Jang-Won;Kim, Kyu-Heon
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.207-222
    • /
    • 2012
  • Recently, many consumer electronics manufacturers have produced 3D devices such as 3DTVs and 3D monitors as interests in a stereoscopic video service are getting increased. However, most of 3D services are focused on local storage or bandwidth guaranteed service since 3D stereoscopic video service require bandwidth more stable and larger. This property causes difficulties in seamless stereoscopic video streaming services under IP based open network environment that cannot guarantee quality of services. In order to achieve a seamless video streaming service the international standard organization MPEG (Moving Pictures Experts Group) has developed the adaptive HTTP streaming technology called as DASH (Dynamic Adaptive Streaming over HTTP). However, the DASH doesn't have obvious scheme which can express the two elementary video streams based service-compatible stereoscopic contents in one segment. Therefore, this paper proposes a scheme of efficient 3D adaptive streaming service based on the DASH, which covers not only frame-packing stereoscopic contents but also service-compatible ones. The 3D adaptive HTTP streaming scheme introduced in this paper is able to provide 3D contents with various qualities to user and also has benefit that single 3D content can be applied to a variety of devices.

Internet-of-Things Based Approach for Monitoring Pharmaceutical Cold Chain (사물인터넷을 이용한 의약품 콜드체인 관리 시스템)

  • Chandra, Abel Avitesh;Back, Jong Sang;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.9
    • /
    • pp.828-840
    • /
    • 2014
  • There is a new evolution in technological advancement taking place called the Internet of Things (IoT). The IoT enables physical world objects in our surroundings to be connected to the Internet. For this idea to come to life, two architectures are required: the Sensing Entity in the environment which collects data and connects to the cloud and the Cloud Service that hosts the data. In particular, the combination of wireless sensor network for sensing and cloud computing for managing sensor data is becoming a popular intervention for the IoT era. The pharmaceutical cold chain requires controlled environmental conditions for the sensitive products in order for them to maintain their potency and fit for consumption. The monitoring of distribution process is the only assurance that a process has been successfully validated. The distribution process is so critical that anomaly at any point will result in the process being no longer valid. Taking the cold chain monitoring to IoT and using its benefits and power will result in better management and product handling in the cold chain. In this paper, Arduino based wireless sensor network for storage and logistics (land and sea) is presented and integrated with Xively cloud service to offer a real-time and innovative solution for pharmaceutical cold chain monitoring.

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.

Design and Implementation of Mobile Medical Information System Based Radio Frequency IDentification (RFID 기반의 모바일 의료정보시스템의 설계 및 구현)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.317-325
    • /
    • 2005
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. That is, with the new guidelines and technology, hospital business escapes simple fee calculation and insurance claim center. Moreover, MIS(Medical Information System), PACS(Picture Archiving and Communications System), OCS(Order Communicating System), EMR(Electronic Medical Record), DSS(Decision Support System) are also developing. Medical Information System is evolved toward integration of medical IT and situation si changing with increasing high speed in the ICT convergence. These changes and development of ubiquitous environment require fundamental change of medical information system. Mobile medical information system refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to Internet whenever and wherever. RFID is one of the technologies for Automatic Identification and Data Capture(AIDC). It is the core technology to implement Automatic processing system. This paper provides a comprehensive basic review of RFID model in Korea and suggests the evolution direction for further advanced RFID application services. In addition, designed and implemented DB server's agent program and Client program of Mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented medical information system that performed patient data based EMR, HIS, PACS DB environments, and so reduced delay time of requisition, medical treatment, lab.

  • PDF

Metaverse Augmented Reality Research Trends Using Topic Modeling Methodology (토픽 모델링 기법을 활용한 메타버스 증강현실 연구 동향 분석)

  • An, Jaeyoung;Shim, Soyun;Yun, Haejung
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.123-142
    • /
    • 2022
  • The non-face-to-face environment accelerated by COVID-19 has speeded up the dissemination of digital virtual ecosystems and metaverse. In order for the metaverse to be sustainable, digital twins that are compatible with the real world are key, and critical technology for that is AR (Augmented Reality). In this study, we examined research trends about AR, and will propose the directions for future AR research. We conducted LDA based topic modeling on 11,049 abstracts of published domestic and foreign AR related papers from 2009 to Mar 2022, and then looked into AR that was comprehensive research trends, comparison of domestic and foreign research trends, and research trends before and after the popularity of metaverse concepts. As a result, the topics of AR related research were deduced from 11 topics such as device, network communication, surgery, digital twin, education, serious game, camera/vision, color application, therapy, location accuracy, and interface design. After popularity of metaverse, 6 topics were deduced such as camera/vision, training, digital twin, surgical/surgical, interaction performance, and network communication. We will expect, through this study, to encourage active research on metaverse AR with convergent characteristics in multidisciplinary fields and contribute to giving useful implications to practitioners.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.