• Title/Summary/Keyword: 스마트 IoT

Search Result 1,194, Processing Time 0.028 seconds

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

A Study on the Safety Monitoring of Bridge Facilities based on Smart Sensors (스마트 센서 기반의 교량 시설물 안전 모니터링 기법 연구)

  • YEON, Sang-Ho;KIM, Joon-Soo;YEON, Chun-Hum
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.2
    • /
    • pp.97-106
    • /
    • 2019
  • Today, many smart sensor's measurement instruments are used to check the safety situation of various medium and large bridge structures that should be maintained in the construction facilities, but most of them use the method of measuring and confirming the displacement behavior of the bridge at regular intervals. In order to continuously check the safety situation, various measuring instruments are used, but most of them are not able to measure and measure the displacement and behavior of main construction structures at regular intervals. In this study, GNSS and environment smart sensors and drone's image data are transmitted to wireless network so that risk of many bridge's structures can be detected beforehand. As a result, by diagnosing the fine displacement of the bridge in real time and its condition, reinforcement, repair and disaster prevention measures for the structural parts of the bridges, which are expected to be dangerous, and various disasters and accidents can be prevented, and disaster can be prevented could suggest a new alternative.

According to the User's Device Selection Priority Automatic Algorithm (사용자 기기 선택에 따른 우선순위 자동 설정 알고리즘)

  • Jeong, Do-Hyeong;Choi, Hyung-Wook;Jang, Ki-Man;Jeong, Dae-Jin;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.891-892
    • /
    • 2016
  • Recent research has become a smart home for operating the joining operation of the relationships between the device progress. However, Existing systems, there is a problem that the efficiency of the work can be degrade by the interference occurs when the operation of the other device, and triggered if the device is operating. In this paper, we designed a priority automatically set algorithm according to a user selection device to solve this problem. The user selects the device used by the application and by comparing between devices, select whether or not to set the priority of the tasks in. This allows the user can configure the working environment of only the desired device, and less chance of interference from other devices that are not selected during the work in progress can expect a more efficient productivity.

  • PDF

Factors affecting success and failure of Internet company business model using inductive learning based on ID3 algorithm (ID3 알고리즘 기반의 귀납적 추론을 활용한 인터넷 기업 비즈니스 모델의 성공과 실패에 영향을 미치는 요인에 관한 연구)

  • Jin, Dong-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.111-116
    • /
    • 2019
  • New technologies such as the IoT, Big Data, and Artificial Intelligence, starting from the Web, mobile, and smart device, enable new business models that did not exist before, and various types of Internet companies based on these business models has been emerged. In this research, we examine the factors that influence the success and failure of Internet companies. To do this, we review the recent studies on business model and examine the variables affecting the success of Internet companies in terms of network effect, user interface, cooperation with actors, creating value for users. Using the five derived variables, we will select 14 Internet companies that succeeded and failed in seven commercial business model categories. We derive decision tree by applying inductive learning based on ID3 algorithm to the analysis result and derive rules that affect success and failure based on derived decision tree. With these rules, we want to present the strategic implications for actors to succeed in Internet companies.

Temporal Interval Refinement for Point-of-Interest Recommendation (장소 추천을 위한 방문 간격 보정)

  • Kim, Minseok;Lee, Jae-Gil
    • Database Research
    • /
    • v.34 no.3
    • /
    • pp.86-98
    • /
    • 2018
  • Point-of-Interest(POI) recommendation systems suggest the most interesting POIs to users considering the current location and time. With the rapid development of smartphones, internet-of-things, and location-based social networks, it has become feasible to accumulate huge amounts of user POI visits. Therefore, instant recommendation of interesting POIs at a given time is being widely recognized as important. To increase the performance of POI recommendation systems, several studies extracting users' POI sequential preference from POI check-in data, which is intended for implicit feedback, have been suggested. However, when constructing a model utilizing sequential preference, the model encounters possibility of data distortion because of a low number of observed check-ins which is attributed to intensified data sparsity. This paper suggests refinement of temporal intervals based on data confidence. When building a POI recommendation system using temporal intervals to model the POI sequential preference of users, our methodology reduces potential data distortion in the dataset and thus increases the performance of the recommendation system. We verify our model's effectiveness through the evaluation with the Foursquare and Gowalla dataset.

Simulation of Fire Evacuation Induction System Using Smartphone Navigation Application

  • Shin, Dongmin;Jeon, Seongman;Lee, SungPil;Cho, Byungjun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.243-251
    • /
    • 2020
  • This study is intended to verify the efficiency of the information system by using the navigation application in case of fire. In the demonstration scenario simulation, it was assumed that a fire occurred 6th floor in Korea Institute of Industrial Design Promotion located in C city, K province. Eighty juniors students from K University's department of paramedics of science participated. As a result of the experiment, the demonstration simulation using the navigation application showed that the evacuation time was faster than the case of evacuation guidance in a fire situation. The need for a fire prevention system and fire prevention awareness before and after the implementation of the demonstration scenario simulation increased the need for a fire prevention system and fire prevention awareness score after the experiment.

Prediction Service of Wild Animal Intrusions to the Farm Field based on VAR Model (VAR 모델을 이용한 야생 동물의 농장 침입 예측 서비스)

  • Kadam, Ashwini L.;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.628-636
    • /
    • 2021
  • This paper contains the implementation and performance evaluation results of a system that collects environmental data at the time when the wild animal intrusion occurred at farms and then predicts future wild animal intrusions through a machine learning-based Vector Autoregression(VAR) model. To collect the data for intrusion prediction, an IoT-based hardware prototype was developed, which was installed on a small farm located near the school and simulated over a long period to generate intrusion events. The intrusion prediction service based on the implemented VAR model provides the date and time when intrusion is likely to occur over the next 30 days. In addition, the proposed system includes the function of providing real-time notifications to the farmers mobile device when wild animals intrusion occurs in the farm, and performance evaluation was conducted to confirm that the average response time was 7.89 seconds.

Prerequisites on Smart Healthcare in the Perspective of Service Design : Focusing on the Elderly Experience Case (서비스 디자인 관점에서 본 스마트 헬스케어의 선행 조건 : 고령자 경험 사례를 중심으로)

  • Kim, Ho-Da;Joo, Ae-Ran
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.3
    • /
    • pp.49-58
    • /
    • 2021
  • Due to the increasing interest in wellness aroused by the aging population and the pursuing feature of active old age, Korean elderly set importance on long life with their healthy condition. Following the change in the paradigm of the medical delivery system from hospital-oriented, treatment-oriented to personal-centered and self-care, Service design application of Smart Healthcare for the elderly became valuable. Smart Healthcare is a healthcare service provided through the fusion of ICT technologies including mobile/wearable devices, IoT, big data, and information technology, and it is utilized to prevent diseases managing abundant health information and living habits. As a methodology for delivering such Smart Healthcare to the elderly, Service design can be adopted. Therefore, this study would like to present the perquisites of Smart Healthcare design for the elderly through analyzing the results from in-depth interview methods between the elderly and medical staff. As a result of this study, guidelines for Service design application of health vulnerability management for the elderly utilizing smart phones were presented. Therefore, this study presented four prerequisites composed of 'high level of supplementation and ethical decision making', 'improvement of inequality in accessibility and experience', 'resolving problems in policy implementation' and 'user-friendliness' for the Smart Healthcare service design for the elderly. Overall, Service design is expected to play an innovative role in improving the quality of life for the elderly through the process of collecting and delivering information on Smart Healthcare centered on the experience of the elderly.