• Title/Summary/Keyword: 스마트워크 시스템

Search Result 672, Processing Time 0.033 seconds

An Improved Anonymous Authentication Scheme for Remote Health Monitoring System (원격 건강정보 모니터링 시스템을 위한 개선된 익명인증 기법)

  • Park, Youngho;Noh, Si-Wan;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1551-1560
    • /
    • 2016
  • With the advancement of wearable devices and wireless body are networks, smart healthcare systems based on such technologies have been emerging to effectively monitor patient health and disease progression. In order to implement viable smart healthcare systems, the security and privacy of patient's personal health information must be considered. Yang et al. proposed a privacy-preserving authentication scheme using key-insulation technique for remote health monitoring system, however, key-insulation technique is not properly adapted to their scheme which in turn causes a security pitfall contrary to their assertions. Besides, Yang et al.'s scheme does not guarantee user anonymity against healthcare service provider. Therefore, in this paper, we discuss the security concerns for Yang et al.'s scheme and present an improved anonymous authentication scheme.

International Standardization and Implementation of Home Energy Saving System for Smart Grid (스마트 그리드를 위한 홈 에너지 절감 시스템의 IEC 국제표준화 및 구현)

  • Choi, Kwang-Soon;Lee, Sang-Won;Park, Young-Choong;Jung, Kwang-Mo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1222-1229
    • /
    • 2012
  • For the reduction of electric energy consumption and its efficient use at homes or buildings, a new work item proposal for new architecture and functional requirements of Energy Saving System (ESS) was proposed to IEC TC 100 and accepted as a new project, IEC PT 62654 in 2009. Recently, the final ballot for publication passed without negative votes and IEC TS 62654 was finally published in August 2012. For the verification of this standard, Prototype of ESS system composed of an ESS server, ESS clients, and portable ESS terminal were especially implemented in parallel with the standardization. Electric Power Control and Management (EPCM) protocol for the communication between ESS server and clients was also implemented, which supports self-configuration of ESS network, power consumption monitoring, remote power control, and additional functions for intelligent energy saving services.

Development of Convergent IOT Managing Mindmap System (마인드맵 기반의 사물인터넷 융합 관리 시스템의 개발)

  • Ho, Won;Lee, Dae-Hyun;Bae, Ho-Chul
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.45-51
    • /
    • 2019
  • The use of the Internet of things plays a major role in the Fourth Industrial Revolution, and a series of tasks of accumulating, converging, analyzing and reusing various data and services becomes very important. Because the pace and scope if the paradigm shift in Fourth Industrial Revolution is so rapid and unpredictable, the development and utilization of a system to fulfill this role for IOT are urgently required. In this paper, we introduce the Web-based IOT management system, which connects the IOT with OKMindmap, which is a domestic open source software and service, and the Node-RED service. This system combines the advantages of OKMindmap with the advantages of Node-RED, which is capable of visual component based programming, so that it can easily and flexibly connect the IOT based on Web browsers, and various data and services can be integrated and linked. We developed a camera module, a temperature and humidity sensor module, and the motor control module in Raspberry PI basically, and tested the operation successfully. We plan to extend the IOT component gradually by using Arduino and System On Chip.

Development of Lora Wireless Network Based Water Supply Control System for Bare Ground Agriculture (자가 충전 및 장거리 무선 네트워크를 지원하는 노지 농작물 관수 자동화 시스템 설계)

  • Joo, Jong-Yui;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1373-1378
    • /
    • 2018
  • In order to solve the problems such as reduction of agriculture population, aging and declining of grain self sufficiency rate, agriculture ICT convergence technology utilizing IoT technology is actively being developed. Agricultural ICT technology only concentrates on facility houses, and there is no automated control system in the field of cultivation. In this paper, we propose an irrigation control system that automatically controls the solenoid valves and water pumps in a large area with Lora wireless communication. The proposed system does not require a separate power source by using a small solar panel, and it is very convenient to install and operate supporting wireless auto setup by plug-and-play method. Therefore, it is expected that it will contribute to the reduction of labor force, quality of agricultural products, and productivity improvement.

Design and Implementation of User Pattern based Standby Power Reduction System Applying Zigbee-MQTT in a Smart Building Environment (스마트빌딩 환경에서 Zigbee-MQTT를 이용한 사용자 패턴 기반 대기전력 저감 시스템 설계 및 구현)

  • Jang, Young-Hwan;Lee, Sang-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1158-1164
    • /
    • 2020
  • In Korea, the dependence on imported energy is very high, and research to reduce standby power is being conducted based on Zigbee, a low-power technology, to reduce wasted power and improve power efficiency. However, because Zigbee is not an IoT standard protocol and is not network-based, it is necessary to build a network with a separate gateway, and research on standby power is insufficient because the standards for international power consumption of devices are ambiguous. Therefore, in this paper, we applied the IoT standard protocol MQTT to the existing Zigbee technology to build a network network without a separate gateway, and designed and implemented a standby power reduction system that collects standby power degradation and user patterns. As a result of evaluating with the existing system, it was confirmed that about 7.11% of standby power was consumed compared to the existing system.

Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0 (Snort 2.9.0 환경을 위한 TCAM 기반 점핑 윈도우 알고리즘의 성능 분석)

  • Lee, Sung-Yun;Ryu, Ki-Yeol
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.41-49
    • /
    • 2012
  • Wireless network support and extended mobile network environment with exponential growth of smart phone users allow us to utilize the network anytime or anywhere. Malicious attacks such as distributed DOS, internet worm, e-mail virus and so on through high-speed networks increase and the number of patterns is dramatically increasing accordingly by increasing network traffic due to this internet technology development. To detect the patterns in intrusion detection systems, an existing research proposed an efficient algorithm called the jumping window algorithm and analyzed approximately 2,000 patterns in Snort 2.1.0, the most famous intrusion detection system. using the algorithm. However, it is inappropriate from the number of TCAM lookups and TCAM memory efficiency to use the result proposed in the research in current environment (Snort 2.9.0) that has longer patterns and a lot of patterns because the jumping window algorithm is affected by the number of patterns and pattern length. In this paper, we simulate the number of TCAM lookups and the required TCAM size in the jumping window with approximately 8,100 patterns from Snort-2.9.0 rules, and then analyse the simulation result. While Snort 2.1.0 requires 16-byte window and 9Mb TCAM size to show the most effective performance as proposed in the previous research, in this paper we suggest 16-byte window and 4 18Mb-TCAMs which are cascaded in Snort 2.9.0 environment.

Highly Reliability Network Technology for Transmitting a Disaster Information (재해정보 전송을 위한 고신뢰성 네트워크 기술)

  • Kim, Kyung-Jun;Kim, Dongju;Jang, Dae-Jin;Oh, Eun-Ho;Kim, Jin-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.115-124
    • /
    • 2015
  • In this paper we analyse the previous (Quality of Services) and QoE(Quality of Experience) methods, and propose a high reliable network system framework and its service forwarding method that is able to provide seamless N-Screen services for proliferating disaster informations. The service satisfaction measurement, i.e., QoE, of contents consumers in N-screens services is going to be important the factor in disaster information proliferation because N-Screen services in the previous methods based on multi devices only focused on information transmission. The proposed system around these services is composed of a disaster information process framework for accepting user's service requirement, push service modules for minimizing the number of packets to be caused when carrying out the push service, and a push service controller for maximizing QoE measures. In order to provide a seamless N-Screen service on diverse screens, such as smartphone, PC, and big screen, we also have Open API(Application Programming Interface) functions. Through these results, we expect to evaluate QoS and QoE quality in the seamless N-Screen service.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Improvement of Face Recognition Algorithm for Residential Area Surveillance System Based on Graph Convolution Network (그래프 컨벌루션 네트워크 기반 주거지역 감시시스템의 얼굴인식 알고리즘 개선)

  • Tan Heyi;Byung-Won Min
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.1-15
    • /
    • 2024
  • The construction of smart communities is a new method and important measure to ensure the security of residential areas. In order to solve the problem of low accuracy in face recognition caused by distorting facial features due to monitoring camera angles and other external factors, this paper proposes the following optimization strategies in designing a face recognition network: firstly, a global graph convolution module is designed to encode facial features as graph nodes, and a multi-scale feature enhancement residual module is designed to extract facial keypoint features in conjunction with the global graph convolution module. Secondly, after obtaining facial keypoints, they are constructed as a directed graph structure, and graph attention mechanisms are used to enhance the representation power of graph features. Finally, tensor computations are performed on the graph features of two faces, and the aggregated features are extracted and discriminated by a fully connected layer to determine whether the individuals' identities are the same. Through various experimental tests, the network designed in this paper achieves an AUC index of 85.65% for facial keypoint localization on the 300W public dataset and 88.92% on a self-built dataset. In terms of face recognition accuracy, the proposed network achieves an accuracy of 83.41% on the IBUG public dataset and 96.74% on a self-built dataset. Experimental results demonstrate that the network designed in this paper exhibits high detection and recognition accuracy for faces in surveillance videos.

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.