• Title/Summary/Keyword: 위치 식별

Search Result 692, Processing Time 0.028 seconds

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.

A Network-based Locator-Identifier Separation Scheme using DHT in SDN (SDN환경에서 DHT를 이용한 네트워크 기반 위치자-식별자 분리 기술)

  • Lee, Chan-Haeng;Min, Sung-Gi;Choi, Chang-Won
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.37-49
    • /
    • 2016
  • An IP address is used as a host identifier and a locator to bind hosts and applications to their location in existing Internet. Several protocols are proposed to eliminate this binding. Most of these protocols use IPv6-based host identifiers to maintain compatibility with existing Internet, but these identifiers cannot be handled by standard IPv6 routers because such identifiers are unroutable. Therefore, host identifiers need to be usually converted to locators at hosts, and the standard IPv6 protocol should be modified to interoperate with these protocols. In this paper, we propose a network-based host identifier locator separating scheme in software-defined networking. The proposed scheme separates the underlying network into Host Identity and IP domains in order to directly forward unroutable identifiers. The Host Identity domain operates as an overlaid network over IP domain, and it makes the unroutable identifiers to be routable using distributed hash table based routing strategy. For the evaluation, we compared the proposed scheme with the previous scheme using signaling costs and packet delivery costs. The result shows that the proposed scheme is more suitable in the recent mobile-based environments.

Enhanced Query Tree Based Anti-Collision Algorithm for Multiple Tag Identification (다중 태그 식별을 위한 개선된 질의 트리 충돌방지 알고리즘)

  • Lim In-Taek
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.3
    • /
    • pp.307-314
    • /
    • 2006
  • This paper proposes a QT_rev algorithm for identifying multiple tags. The proposed QT_rev algorithm is based on the query tree algorithm. In the algorithm, the tag will send all the bits of their identification codes when the query string matches the first bits of their identification codes. On the other hand, in the QT_rev algorithm, the tag will send the remaining bits of their identification codes. After the leader receives all the responses of the tags, it knows which bit is collided. Therefore, if the collision occurs in the last bit, the reader can identify two tags simultaneously without further query. According to the simulation results, the QT_rev algorithm outperforms the QT algorithm in terms of the number of queries and the number of response bits.

  • PDF

U-건물 화재피난정보 시스템에 관한 연구

  • Jo, Won-Jun;No, Sam-Gyu
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2013.04a
    • /
    • pp.50-51
    • /
    • 2013
  • 화재발생시 기존의 비상경보설비는 화재경보라는 단순한 정보만을 제공함으로서 대피자의 입장에서는 건축물의 안전상황 및 피난상황을 식별할 수 없다. 따라서 화재발생시 대피자들이 밀집되는 병목현상이나 화재 영향에 노출되어 있는 피난경로로의 대피 등은 화재 피해를 가중시키고 있다. 본 연구의 목적은 현재 응용 가능한 대표적인 Ubiquitous 기술 중 개인의 위치를 식별하여 이용하는 위치인식기술 RSSI(Received Signal Strength Indication)을 활용한다. RSSI를 기반으로 한 LQI(Link Quality Indication)는 무선통신기간의 거리인식을 통해 대피자 정보 시스템 정보를 획득한다. 이러한 위치정보시스템을 응용하여 개발한 화재 안전 시스템은 화재 위치를 식별하고 화재위험 지역의 상황변화를 예측하여 피난경로 선정을 위한 안전정보를 제공하여 준다.

  • PDF

Novel Positioning Technique for T-DMB System (T-DMB 시스템에서 위치인식을 위한 기법 연구)

  • Bae, Jung-Nam;Kim, Jin-Young
    • Proceedings of the KAIS Fall Conference
    • /
    • 2009.12a
    • /
    • pp.466-469
    • /
    • 2009
  • 본 논문에서는 T-DMB 시스템에서 위치인식을 위한 워터마킹 기법에 대해 소개하고 성능을 분석하여 보았다. T-DMB 방송용 전송신호에 확산 코드를 이용한 워터마킹 기법을 행하는 기술은 방송용 송신기를 식별하는 기능을 목적으로 사용되고 있다. 송신기 식별을 위해 GPS 기술이 가장 널리 사용되고 있지만, 전파 신호가 미약하고 음영지역이나 실내에서는 수신이 안 되는 단점이 있다. 이러한 관점에서 볼 때 이용요금이 거의 무료이며, 수신 전계강도는 강하면서 다수의 음영지역문제를 해결해 줄 수 있는 새로운 위치인식기술이 필요한 상황이라고 할 수 있고, 지상파 방송신호를 기반으로 위치인식기능과 부가적 정보를 제공해 줄 수 있는 송신기 식별기술은 새로운 솔루션을 제공한다고 할 수 있다.

  • PDF

Study of Multi-Resident Location Tracking Service Model Based on Context Information (상황정보 기반의 다중 거주자 위치 추적 서비스에 관한 연구)

  • Won, Jeong Chang;Man, Ko Kwang;Chong, Joo Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.141-150
    • /
    • 2014
  • In recent years, because of the development of ubiquitous technology in healthcare research is actively progress. Especially, healthcare service area is change to home for the elderly or patients from hospital. The technology to identify residents in a home is crucial for smart home application services. However, existing researches for resident identification have several problems. In this case, residents are needed to attach of various sensors on their body. Also relating private life, it is difficult to apply to resident's environment. In this paper, we used constraint-free sensor and unconscious sensor to solve these problems and we limited using of sensor and indoor environment in the way of working economical price systems. The way of multi-resident identification using only these limited sensors, we selected elements of personal identifications and suggested the methods in giving the weight to apply these elements to systems. And we designed the SABA mechanism to tract their location and identify the residents. It mechanism can distinguish residents through the sensors located each space and can finally identify them by using the records of their behaviors occurred before. And we applied the mechanism designed for applications to approve this location tracking system. We verified to the location tracking system performance according to the scenario.

A Mechanism to identify Indoor or Outdoor Location for Three Dimensional Geofence (3차원 지오펜스를 위한 실내외 위치 식별 메커니즘)

  • Eom, Young-Hyun;Choi, Young-Keun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.169-175
    • /
    • 2016
  • Geofence is a virtual perimeter for a real-world geographical area, which could be statically or dynamically established the specified area if necessary. Many geofencing applications incorporate 2D(two-dimensional) map such as the Google map, allowing administrators to define boundaries on top of a satellite view of a specific geographical area. But these applications do not provide 3D(three-dimensional) spatial information as well as 2D location information no matter where indoor or outdoor. Therefore we propose a mechanism to identify indoor or outdoor location for 3D geofence, and implement 3D geofence using smartphone. The proposed mechanism identifies the position information on 3D geofence regardless of indoor or outdoor, inter-floor with only GPS and WiFi. In the near future, 3D geofence as well as LBS are promising applications that become possible when IoT can become organized and connected by location.

Design of ULID-based Location Information Services (ULID 기반 위치정보 서비스의 설계)

  • Nam, Kwang-Woo;Lee, Seong-Ho
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2004.12a
    • /
    • pp.195-201
    • /
    • 2004
  • 이 논문은 건물 및 상점, 도로표지판 등에 부착된 RFID 태그를 이용하여 위치정보를 획득하는 방법과, 이를 이용하여 위치기반 서비스를 실시할 수 있는 응용 시스템 및 이의 방법을 기술하고 있다. 기존의 GPS를 이용한 위치 정보는 신호를 보내는 인공위성의 지리적 변화에 의하여 정확도가 떨어지거나 전파 인터페이스 문제로 인하여 잘못된 위치정보를 주는 경우가 있다. 그러므로, 이 논문은 RFID 등에 위치정보를 식별할 수 있는 위치정보 식별자를 적용할 것을 제안한다. 이 것은 기존의 GPS 및 무선 네트워크를 사용할 때 발생할 수 있는 상기에 서술된 문제점을 해결하고, 태그를 통해 즉각적인 위치정보의 획득이 가능해 짐으로서 현재 이동통신사에서 제공하고 있는 위치정보 게이트웨이 접근에 대한 비용을 지불하지 않는 장점이 있다.

  • PDF

A Revised QT Protocol for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 개선된 QT 프로토콜)

  • Lim, In-Taek;Choi, Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.430-436
    • /
    • 2006
  • In this paper, a QT_rev protocol is proposed for identifying all the tags within the identification range. The proposed QT_rev protocol revises the QT protocol, which has a memoryless property. In the QT_rev protocol, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. After the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query. According to the simulation results, the QT_rev protocol outperforms the QT protocol in terms of the number of queries and the number of response bits.

A revised Query Tree Protocol for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 개선된 쿼리 트리 프로토콜)

  • Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.491-494
    • /
    • 2005
  • In this paper, a QT_rev protocol is proposed for identifying all the tags within the identification range. The proposed QT_rev protocol revises the QT protocol, which has a memoryless property. In the QT_rev protocol, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. After the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query.

  • PDF