• Title/Summary/Keyword: 무선 컴퓨팅

Search Result 762, Processing Time 0.027 seconds

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.

A Cell-based Compression Technique of the Spatial Data for the Mobile GIS (모바일 GIS를 위한 셀 기반의 공간 데이터 압축 기법)

  • Lee, Ki-Young;Lim, Keun;Choi, Gyoo-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.49-54
    • /
    • 2008
  • Recently, with the development of wireless communications and GIS, interest about mobile computing is rising. In this case, the GIS needs to be placed in a constricted environment than the environment of server computing. For this reason large amounts of spatial data must be compressed into the mobile device. The compression technique of the spatial data is difficult and must be processed in the correct order because the size of the data is unpredictable. Therefore, in this paper, the cell-based compression technique of the spatial data for mobile GIS is presented. This paper includes the process of transformation of spatial data from a certain server to a mobile device by cell-based compression technique. In this paper, the cell-based compression technique of the spatial data has been proven practically efficient.

  • PDF

Life Weather Index Monitoring System using Wearable based Smart Cap (웨어러블 기반의 스마트 모자를 이용한 생활기상지수 모니터링 시스템)

  • Jun, In-Ja;Chung, Kyung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.477-484
    • /
    • 2009
  • It is important for the strategy of service to provide the weather information in the environment that the smart clothing has been changed focusing on the consumer center. Recently, the various applications of smart clothing concept have been presented by researchers and developers. Among them, the smart clothing based on the sensors is most likely to gain the highest demand rate in the market. In this paper, we proposed the life weather index monitoring system using the wearable based smart cap. By wearing the proposed smart cap, the weather status is gathered and its signals are transmitted to the connected UMPC. It can be easily monitored in real time. To provide the life weather index according to the sensors, the weather index was analyzed in terms of 6 factors, such as, the heat index, the food poisoning index, the discomfort index, the ultraviolet index, the water pipe freeze possibility index, and the windchill temperature index. Ultimately, this paper suggests empirical application to verify the adequacy and the validity with the life weather index monitoring system. Accordingly, the satisfaction and the quality of services will be improved the smart clothing.

Efficient Energy Management for a Solar Energy Harvesting Sensor System (태양 에너지 기반 센서 시스템을 위한 효율적인 에너지 관리 기법)

  • Noh, Dong-Kun;Yoon, Ik-Joon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.7
    • /
    • pp.478-488
    • /
    • 2009
  • Using solar power in wireless sensor networks (WSNs) requires adaptation to a highly varying energy supply and to a battery constraint. From an application's perspective, however, it is often preferred to operate at a constant quality level as opposed to changing application behavior frequently. Reconciling the varying supply with the fixed demand requires good tools for allocating energy such that average of energy supply is computed and demand is fixed accordingly. In this paper, we propose a probabilistic observation-based model for harvested solar energy. Based on this model, we develop a time-slot-based energy allocation scheme to use the periodically harvested solar energy optimally, while minimizing the variance in energy allocation. We also implement the testbed and demonstrate the efficiency of the approach by using it.

Cluster-based Energy-Efficient Routing Protocol using Message Reception Success Rate (메시지 수신 성공률을 이용한 클러스터 기반의 에너지 효율적인 라우팅 프로토콜)

  • Jang, You-Jin;Choi, Young-Ho;Jang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1224-1228
    • /
    • 2010
  • The existing cluster-based routing protocols have some problems. Firstly, because of selecting cluster head at random, they occur a node concentration problem. Secondly, they have a low reliability for data communication due to the less consideration of node communication range. Finally, data communication overhead is greatly increased because of sending all sensor node information to sink node for constructing clusters. To solve these problems, we in this paper, propose a cluster-based routing protocol using message reception success rate. Firstly, to solve the node concentration problem, we design a cluster head selection algorithm based on node connectivity and devise cluster spliting/merging algorithms. Secondly, to guarantee data communication reliability, we use message reception success rate. Finally, to reduce data communication overhead, we use only neighbor nodes information at both cluster construction and cluster head selection.

Mobile Phone Guide for Cultural Heritage (문화유적지 투어를 위한 모바일 폰 가이드 시스템)

  • Suh, Young-Jung;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.116-121
    • /
    • 2009
  • In the design of mobile entertainment systems for historical heritage sites, it is important to not only overcome technical challenges imposed by power requirements, computation limits, and connectivity, but to support group experiences and consider users preferences for situated media consumption. Cultural heritage sites provide an opportunity to entertain and educate the public through the use of mobile media. The proposed system implemented on a Java-enabled mobile phone provides both audio and visual content that is tailored by tracking user movement with GPS, collecting various user inputs and demographics, and allowing for socially acceptable eavesdropping via wireless networking. By designing for the spatial, personal, and social considerations of the environment, we aim to help users navigate the diverse topology of the space and consume the vast quantities of historical media.

  • PDF

Design and Implementation of a Session Handler Module for SyncML Data Synchronization Clients (SyncML 자료 동기화 클라이언트를 위한 세션 핸들러 모듈의 설계 및 구현)

  • Ha Byoung-Hoon;Park KeeHyun;Ju HongTaek;Woo Jongjung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.741-748
    • /
    • 2005
  • SyncML is an open standard data synchronization protocol proposed by OMA(Open Mobile Alliance). In this paper, a Session Handler module, one of major modules for developing SyncML data synchronization clients, and a client User Setup program are designed and implemented. The Session Handier Module controls communication sessions, generates header parts of messages exchanged, and determines the legitimacy of incoming messages. In order to justify normal operations of the Session Handler module and the client User Setup program implemented In this paper, they are ported to a Zaurus PDA, which runs on LINUX operating system. In addition, data synchronization operations are performed between the PDA and a Synthesis sever, whose SyncML data synchronization operation is certificated by OMA, Wireless Internet International Standard Forum.

Reader Emulation System for Accessing Sensor Device Through EPCglobal Reader Protocol (EPCglobal 리더 프로토콜을 통한 센서장치 접근을 위한 리더 에뮬레이션 시스템)

  • Choi, Seung-Hyuk;Kim, Tae-Yong;Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.842-852
    • /
    • 2010
  • RFID applications use tags to identify objects, but recent applications tend to include diverse sensor devices such as light, temperature, and humidity sensors as well. RFID tag information is usually processed via the event driven model. However sensor devices are usually accessed via the functional call model. Therefore application developers have to deal with mixed data access models and device dependent interface functions. In this paper, we propose a sensor reader emulator that provides a consistent access interface to sensor devices regardless of the types of devices. SRE provides a more efficient way of developing RFID applications by providing a single application programmer's view to RFID tags and sensor devices. In applications where tags are fixed to a place, SRE can replace expensive sensor tags and sensor readers with inexpensive sensor devices reducing the total cost while providing the same functionality.

Design and Implementation of a Location Privacy System supporting Privacy Self Controls (프라이버시 자기제어를 지원하는 위치정보 프라이버시 시스템의 설계 및 구현)

  • Lee, Eung-Jae;Ju, Yong-Wan;Nam, Kwang-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.853-862
    • /
    • 2010
  • As the mobile device and broadband wireless internet such as WiBro, HSDPA is widely spreading, various types of advertisement and services based on personal location information can be provided. However, with convenience supported by these services, it is possible to be increased an invasion of privacy such as personal location and moving pattern. In this paper, we analysis an essential element for protection of privacy related on location information in mobile environment and propose location privacy protocol for managing location privacy self-control. And we design and implementation prototype of location privacy self-control system which is able to manage user's location privacy condition oneself using the proposed location privacy protocol.

Modeling and Analysis of Vehicle Detection Using Roadside Ultrasonic Sensors in Wireless Sensor Networks (WSN 기반 노변 초음파 센서를 이용한 차량인식에 대한 모델링 및 분석)

  • Jo, Youngtae;Jung, Inbum
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.745-761
    • /
    • 2014
  • To address the problems of existing traffic information acquisition systems such as high cost and low scalability, wireless sensor networks (WSN)-based traffic information acquisition systems have been studied. WSN-based systems have many benefits including high scalability and low maintenance cost. Recently, various sensors are studied for traffic surveillance based on WSN, such as magnetic, acoustic, and accelerometer sensors. However, ultrasonic sensor based systems have not been studied. There are many issues for WSN-based systems, such as battery driven operation and low computing power. Thus, power saving methods and specific algorithms with low complexity are necessary. In this paper, we introduce optimal methodologies for power saving of ultrasonic sensors based on the modeling and analysis in detail. Moreover, a new vehicle detection algorithm for low complexity using ultrasonic data is presented. The proposed methodologies are implemented in a tiny microprocessor. The evaluation results show that our algorithm has high detection accuracy.