• Title/Summary/Keyword: 무선 정보 서비스

Search Result 3,149, Processing Time 0.026 seconds

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

Modeling and Analysis of Link Initialization Access of RE-DSRC (RF-DSRC 링크초기접속 모델링 및 분석)

  • Lee Min-Heui;Kwag Su-Jin;Jung Jong-In;Lee Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.4 no.2 s.7
    • /
    • pp.23-31
    • /
    • 2005
  • ITS(Intelligent Transportation System) implementing information collection services and information support services for cars of moving fast needs a communication system of special aim such as RF-DSRC(Radio Frequency Dedicated Short Range Communication). Before RSE(Road Side Equipment) and OBE(On-Board Equipment) will be able to communicate RF-DSRC, OBE first have to request Link Initialization Access using ACTC(Activation Channel) in allocated ACTS(Activation Slot) by Slotted ALOHA. Even though Link Initialization Access is a important element to decide performance of communication system, optimal mathematic modeling study of Link Initialization Access which is adapted RF-DSRC characteristics is not enoush. So, in this paper, we propose mathematical modeling about Link Initialization Access of RF-DSRC. And then we computed Link Initialization Access probability defining offer load(G) which is adapted RF-DSRC characteristics for analyzing performance of modeling.

  • PDF

Implementation of Home Monitoring System Using a Vacuum Robot with Wireless Router (유무선공유기와 청소로봇을 이용한 홈 모니터링 시스템의 구현)

  • Jeon, Byung-Chan;Choi, Gyoo-Seok;Kang, Jeong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.73-80
    • /
    • 2008
  • The recent trend in home network system includes intelligent home environments that remote monitoring and control service is achieved without restrictions by device types, time, and place. Also the use of a vacuum robot in homes is gradually generalized on account of the convenience of the use. In this paper, we proposed and realized new home-monitoring system with the employment of an self-movement robot as one trial for realizing an intelligent home under home network environment. The proposed system can freely monitor every where in home, because the system effectively overcame the surveillance limitations of the existing monitoring system by attaching a Wireless Router and WebCam to a commercial vacuum robot. The outdoor users of this system can readily monitor any place which they want to supervise by controlling a vacuum robot with mobile telecommunication devices such as PDA. The wireless router installed with Linux operation system "OpenWrt" made it possible for the system users to transmit images and to control a vacuum robot with RS-232 communication.

  • PDF

Dynamically Adjusted Probabilistic Broadcasting Mechanism based on Distance Ratio and Node Density for MANETs (MANET에서 이격 비율과 노드 밀집도에 기반한 동적 확률을 적용한 브로드캐스팅 기법)

  • Kim, Jae Soo
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.9
    • /
    • pp.1077-1088
    • /
    • 2013
  • As broadcasting is the process that a node sends a packet to all nodes in the network. it is basic process used for discovering of a routes to a node and disseminating of control information message in Mobile Ad hoc NETwork (MANET). In this paper, we propose dynamically adjusted probabilistic mechanism based on distance ratio and node density for broadcasting in MANETs. The distance ratio can be calculated as the ratio of the radio strength length to the distance from sender of a node, and node density can be get from 1-hop nodes of neighbours. A mobile node receiving broadcast packets determines the probability of rebroadcasting considering distance ratio and node density of itself. Rebroadcast probability will be set as low value to a node which is located in nearby area of sender and has high 1-hop node density, So it reduces packets transmission caused by the early die-out of rebroadcast packets. Compared with the simple flooding and fixed probabilistic flooding by simulation, our approach shows better performances results. Proposed algorithm can reduce the rebroadcast packet delivery more than 30% without scanting reachability, where as it shows up to 96% reachability compared with flooding.

A Study on the Drive-less Operating Technology using Communication Based Train Control (무선통신기반 열차제어에 의한 무인운전기술에 대한 연구)

  • Jeong, Rag-Gyo;Kim, Baek-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.67-72
    • /
    • 2010
  • In this paper, we verify the driverless operation possibility of MBS, which could overcome the defects of conventional track-circuit-based FBS, such as additional needs of maintenance and others problems according to short-circuit sensibility and, and which could allow the minimal interval between trains. With MBS, we can expect the reduction of headway, then the increase of transportation demand, and the protection of unnecessary speed variation because it allows the real time detection of train position from central office, and direct transmission of data between preceding trains and the following ones. In addition, it is possible to reduce the number of wayside-equipment substantially, to improve the passenger service, and to the achieve the positive economic effects by comfortable ride.

A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 헤더 선출 기법)

  • Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.107-118
    • /
    • 2007
  • Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network. In this paper, first each node transmit residual electric power and authentication message to BS (Base-Station). BS reflects "Validity Authentication Rate" and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates "Validity Authentication Rate" of former round. Finally, BS can select more secure cluster header.

  • PDF

A Study about problem and a correspondence strategy along a beauty culture-Ubiquitous implementation (미용 부분의 유비쿼터스 구현에 따른 문제점과 대응전략에 관한 연구)

  • Lim Jin-Sook;Kang Jang-Mook
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.163-170
    • /
    • 2004
  • Ubiquitous is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the informatization revolution that Cyber Space saw a prime while world wide web service was expended was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous technology. Also, I presented the plan that derivation tried a problem about Ubiquitous, and can solve an each problem. Specially, infringement about personal privacy very has a lot of possession to occur in the world that radio communication between all appliances is possible. It is Ubiquitous by becoming the data which is useful to thorough preparation about the Ubiquitous world to come with presenting policy a little technical solution plan about this to the future Republic of Korea. many company has been cracked by crackers information security and everyday new computer virus come out.

  • PDF

Study on the K-scale reflecting the confidence of survey responses (설문 응답에 대한 신뢰도를 반영한 K-척도에 관한 연구)

  • Park, Hye Jung;Pi, Su Young
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.1
    • /
    • pp.41-51
    • /
    • 2013
  • In the Information age, internet addiction has been a big issue in a modern society. The adverse effects of the internet addiction have been increasing at an exponential speed. Along with a great variety of internet-connected device supplies, K-scale diagnostic criteria have been used for the internet addiction self-diagnose tests in the high-speed wireless Internet service, netbooks, and smart phones, etc. The K-scale diagnostic criteria needed to be changed to meet the changing times, and the diagnostic criteria of K-scale was changed in March, 2012. In this paper, we analyze the internet addiction and K-scale features on the actual condition of Gyeongbuk collegiate areas using the revised K-scale diagnostic criteria in 2012. The diagnostic method on internet addiction is measured by the respondents' subjective estimation. Willful error of the respondents can be occurred to hide their truth. In this paper, we add the survey response to the trusted reliability values to reduce response errors on the K-scale on the K-scale, and enhance the reliability of the analysis.

Protection Algorithm of the Multimedia Contents in the Mobile Environment (모바일 환경하에서 멀티미디어 컨텐츠 보호 알고리즘)

  • Kim Hang-Rae;Park Young;Choi Nam-Hyung
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.87-94
    • /
    • 2004
  • In this paper, the digital watermarking algorithm is proposed using CDMA technique for protection of the mobile contents in the mobile environment. The digital watermarking was designed to robust the errors in the mobile environment where pathloss, multipath fading, interference, and noise exist. In case of the multimedia content service in the mobile environment, the construction method of the watermark, the algorithm of insertion and detection are also proposed. The watermark consists of the information of the mobile user. Invisibility and robustness required in watermarking are etimated. It is observed that PSNR of the mobile content inserted the watermark is 90.31 dB, and the signal processing and noise attack are also robust. Especially, because random noise occurs in wireless transmission can overcome, the proposed watermarking algorithm is adequate for protection of the multimedia contents in the mobile environment.

  • PDF

A Study on Concept of the Mobile Access Part based on the ITU's Access Network Functional Model (ITU Access Network의 기능적 모형에 근거한 이동망의 가입자 접속 부문 정립에 관한 연구)

  • Kim, Moon-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1A
    • /
    • pp.17-24
    • /
    • 2003
  • Access network is one of the most critical components of telecommunication networks. Essentially it provides the final connection through to the subscriber and at the same it is usually the most expensive component in terms of capital investment and ongoing cost of maintenance and repair In recent, various access technologies with broadband have been developed and also are emerging newly Comparing fixed access networks, the concrete concept as well as the scope of mobile access networks or parts has not been defined yet although it is caused by peculiarities of mobile network with mobility-guarantee technology, use of RF resource, fixed-exchange and transport networks This article examines the characteristics and detailed functions of BTS, BSC, MSC and other components in CDMA mobile network under the IS-95 A/B and cdma 2000-1x standards comparing the ITU's access network functional model From the systematic and functional perspectives, futhermore, an alternative definition for access parts of mobile network is proposed.