• Title/Summary/Keyword: 무선 정보 서비스

Search Result 3,149, Processing Time 0.032 seconds

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

A Study on Adaptive Pilot Beacon for Hard Handoff at CDMA Communication Network (CDMA 통신망의 하드핸드오프 지원을 위한 적응형 파일럿 비콘에 관한 연구)

  • Jeong Ki Hyeok;Hong Dong Ho;Hong Wan Pyo;Ra Keuk Hwawn
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10A
    • /
    • pp.922-929
    • /
    • 2005
  • This paper proposes an adaptive pilot beacon equipment for mobile communication systems based on direct spread spectrum technology which generates the pilot channel for handoff between base stations by using the information acquired from the downstream wireless signal regarding the overhead channel information. Such an adaptive pilot beacon equipment will enable low power operation since among the wireless signals, only the pilot channel will be generated and transmitted. The pilot channel in the downstream link of the CDMA receiver is used to acquire time and frequency synchronization and this is used to calibrate the offset for the beacon, which implies that time synchronization using GPS is not required and any location where forward receive signal can be received can be used as the installation site. The downstream link pilot signal searching within the CDMA receiver is performed by FPGA and DSP. The FPGA is used to perform the initial synchronization for the pilot searcher and DSP is used to perform the offset correction between beacon clock and base station clock. The CDMA transmitter the adaptive pilot beacon equipment will use the timing offset information in the pilot channel acquired from the CDMA receiver and generate the downstream link pilot signal synchronized to the base station. The intermediate frequency signal is passed through the FIR filter and subsequently upconverted and amplified before being radiated through the antenna.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

6G Technology Competitiveness and Network Analysis: Focusing on GaN Integrated Circuit Patent Data (6G의 기술경쟁력 및 네트워크 분석: GaN 집적회로 특허 데이터 중심)

  • Woo-Seok Choi;Jin-Yong Kim;Jung-Hwan Lee;Sang-Hyun Choi
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.1-15
    • /
    • 2023
  • Expectations for wireless communication technology are rising as a base technology that promotes innovation in various industries in line with the paradigm of digital transformation in the 21st century beyond the stage of being used only for communication service itself. In this study, in order to compare 6G technological competitiveness between Korea and leading countries, technological competitiveness was confirmed through PFS, CPP, and network analysis based on GaN Integrated Circuit patent data. Korea's 6G technological competitiveness was 0.62 in PFS and 3.93 in CPP, which were 32.8% and 19.9%, respectively, compared to leading countries. In addition, as a result of network analysis, the collaboration rate in the 6G field was 7.2%, and the collaboration ecosystem was very insufficient in most countries. In contrast, it was confirmed that Korea, unlike leading countries, has established a small-scale collaboration ecosystem linked by industry and academia. Thus, it is necessary to establish a strategy for 6G communication technology at the national level so that communication technology can be advanced based on a relatively well-established collaborative ecosystem.

Chronic Disease Management using Smart Mobile Device (스마트 모바일 기기를 이용한 만성질환 관리)

  • Kim, Gui-Jung;Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.335-342
    • /
    • 2014
  • According to the recent trends in the growing elderly population, the chronically ill have increased. Thus the importance of the health care issues for them has emerged. In this paper, we want to implement a chronic disease management system using smart mobile devices. Proposed chronic disease management system is consisted of the biometric sensor, smart mobile devices, the patient management server, patient management DB, and patient symptoms analysis agent. The biometric sensor detects a biological information. Smart mobile devices receive the patient information from the sensor and transmit the information to the patient management server. The patient management server, patient management DB, and patient symptoms agent analysis agent analyze to process data delivered through a wireless communication network. Bio-signals includes modules of ECG, blood pressure, blood sugar and PPG. We are able to determine the current health status by monitoring measured biometric data through chronically ill health management system. We will focus on the individual service to be appropriate for a patient group in a mobile environment.

A Study on the Mid-term Man Power Demand Forecasting for the Telematics Industry in Korea (텔레매틱스 중기 인력 수요 예측 연구)

  • Yang, Young-Kyu;WhangBo, Tae-Kn;Kim, Dong-Sun
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.1 s.13
    • /
    • pp.3-11
    • /
    • 2005
  • This paper proposes the method for the man power forecasting and performs mid-term(1994-1998) forecasting of telematics man power demands in Korea. Telematics technology has been selected as '839 New IT Growth Engine' by Ministry of Information and Communication (MIC) of Korean Government to boost Korean IT industry for the next 10 years. In order to meet the man power requirement in this telematics industry, accurate forecasting of the man power demand is necessary. The procedures for the forecasting includes study of man power forecasting models, deriving market size of the telematics industry, perform labor productivity analysis, derive the man power structure by the types of the work forces by the types of telematics industry, and finally derive annual man power demands by the worker types and the telematics industry types.

  • PDF

The Study on Empirical Propagation Path Loss in the Airport Cargo Terminal Environment (공항 화물터미널 환경에서 실험적인 패스 로스에 관한 연구)

  • Kim, Kyung-Tae;Park, Hyo-Dal
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.12
    • /
    • pp.1140-1147
    • /
    • 2013
  • In this paper, The path loss model of Air Traffic Control(ATC) telecommunication radio channel has been studied at the Incheon International Airport(IIA) Cargo Terminal. We measured one frequency among VHF channel bands. The transmitting site was located at different locations with different heights. The transmitting site radiated the Continuous Wave(CW). The propagation measurement was taken using the moving vehicle equipped with receiver and antenna. The transmitting power, frequency and antenna height are the same as the current operating condition. The path loss exponent and intercept parameters were extracted by the basic path loss model and hata model. The path loss exponent at IIA Cargo terminal area were 3.67 and 3.39 respectively in first and second transmitting sites. The deviation of prediction error is 14.42 and 10.38. The new path loss equation at the IIA Cargo terminal area was also developed using the derived path loss parameters. The new path loss was compared with other models. This result will be helpful for the ATC site selection and service quality evaluation.

Optimized implementation of HIGHT algorithm for sensor network (센서네트워크에 적용가능한 HIGHT 알고리즘의 최적화 구현 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1510-1516
    • /
    • 2011
  • As emergence of the ubiquitous society, it is possible to access the network for services needed to us in anytime and anywhere. The phenomena has been accelerated by revitalization of the sensor network offering the sensing information and data. Currently, sensor network contributes the convenience for various services such as environment monitoring, health care and home automation. However, sensor network has a weak point compared to traditional network, which is easily exposed to attacker. For this reason, messages communicated over the sensor network, are encrypted with symmetric key and transmitted. A number of symmetric cryptography algorithms have been researched. Among of them HIGHT algorithm in hardware and software implementation are more efficient than tradition AES in terms of speed and chip size. Therefore, it is suitable to resource constrained devices including RFID tag, Sensor node and Smart card. In the paper, we present the optimized software implementation on the ultra-light symmetric cryptography algorithm, HIGHT.

Performance Improvement of PFMIPv6 Using Signal Strength Prediction in Mobile Internet Environment (모바일 인터넷 환경에서 신호세기 예측을 이용한 PFMIPv6의 성능 개선)

  • Lee, Jun-Hui;Kim, Hyun-Woo;Choi, Yong-Hoon;Park, Su-Won;Rhee, Seung-Hyong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.284-293
    • /
    • 2010
  • For the successful deployment of Mobile Internet, fast handover technologies are essential. For the past few years several handover mechanisms are suggested, and Fast Handover for Proxy Mobile IPv6 (PFMIPv6) is one of the promising schemes for this purpose. In this paper, we propose a novel L2/L3 cross layer handover scheme based on ARIMA prediction model to apply PFMIPv6 to Mobile Internet environment effectively. Performance gains are evaluated in terms of probabilities of predictive-mode operation, handover latencies, packet loss probabilities, and signaling costs. Three mobilities models are used for our simulation: Manhattan Model, Open Area Model, and Freeway Model. Simulation results show that the proposed scheme can increase probabilities of predictive-mode operation and reduce handover latency, packet loss probabilities, and signaling cost.

Mutual Authentication and Route Optimization between MN and CN using AAA in Mobile IPv6 (Mobile IPv6에서 AAA를 이용한 MN과 CN간의 상호 인증 및 경로 최적화)

  • 김미영;문영성
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.429-437
    • /
    • 2004
  • The mobileip working group is equipped with the RR(Return Routabilit) taking the simple procedures and small amount of cryptographic operations by considering the processing capability of the mobile node however it dose not provide security features enough. To replace with enhanced methods, mobileip WG is making an effort to find the approved solutions include CGA(Craptographically Generated Address), IPsec(Internet Protocol Security) as well as the existing infrastructure such as AAA(Authentication, Authorization and Account) and PKI(Public Key Infrastructure). In this paper, we propose the authentication and route optimization based on AAA suitable for the requested security service for its successful story in wireless network such as 802.11 and 3GPP(3rd Generation Partnership Project) as well as wired one. We analyze the effectiveness of our scheme according to the traffic and mobility properties. The result shows the cost reduction up to 20 percent comparing with RR.