• Title/Summary/Keyword: 유비쿼터스 컴퓨팅 기술

Search Result 769, Processing Time 0.025 seconds

RFID Mutual Authentication Protocol Against Reflection Attack (반사공격에 안전한 RFID 인증 프로토콜)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3C
    • /
    • pp.348-354
    • /
    • 2007
  • RFID system is emerging new technology for ubiquitous computing environment. RFID system, however, provides privacy problems while the technology offers incredible rich opportunities for applications in the filed of logistics, distribution, and medical services, etc. Many researches have been conducted in order to solve this problem, but the current RFID authentication protocols are still insufficient for settling the privacy problem in the point of view of privacy intrusion and system efficiency. The purpose of this paper is to present a RFID mutual authentication protocol which improves safety level, compared with current authentication protocols. The proposed authentication protocol can provide mutual authentication services, and is secure against location tracing, spoofing, reflection attack.

Middleware Implementation for Mobile RFID Terminal (모바일 RFID 단말을 위한 미들웨어 개발)

  • Ye, Seoung-Bin;Ceong, Hee-Taek;Han, Soon-Hee;Kang, Young-Man
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.4
    • /
    • pp.236-243
    • /
    • 2007
  • Radio frequencies used by the logistics of RFID in various areas, including research the core of ubiquitous computing. Moreover, RFID and the convergence of mobile terminals RFID research started as a B2B service area, B2C services and the expansion of the zone. B2B2C to in order to provide services ranging from mobile terminals for RFID technology development is needed. We develop middleware for a mobile RFID terminal. It consists of multi-code recognition module, the reader control module, the module code interpretation, and Dispatcher module. We present the implementation of these functions on an emulator.

  • PDF

Applying Ubiquitous Computing Technology to Proactive and Personalized Decision Support System (유비쿼터스 컴퓨팅 기술을 적용한 차세대형 의사결정지원시스템)

  • Kwon, Oh-Byung;Yoo, Kee-Dong;Suh, Eui-Ho
    • Asia pacific journal of information systems
    • /
    • v.15 no.2
    • /
    • pp.195-218
    • /
    • 2005
  • The emergence of ubiquitous computing environment will change the service architecture of business information systems such as Decision Support System(DSS), which will be a new application. Recent mobile DSSs allow the decision makers to be benefited from web and mobile technology. However, they seldom refer to context data, which are useful for proactive decision support. Meanwhile, ubiquitous applications so far provide restricted personalization service using context and preference of the user, that is, they do not fully make use of decision making capabilities. Hence, this paper aims to describe how the decision making capability and context-aware computing are jointly used to establish ubiquitous applications. To do so, an amended DSS paradigm: CKDDM(Context-Knowledge-Dialogue-Data-Model) is proposed in this paper. What will be considered for the future decision support systems when we regard ubiquitous computing technology as an inevitable impact that enforces the change of the way of making decisions are described. Under the CKDDM paradigm, a framework of ubiquitous decision support systems(ubiDSS) is addressed with the description of the subsystems within. To show the feasibility of ubiDSS, a prototype system, CAMA-myOpt(Context-Aware Multi Agent System-My Optimization) has been implemented as an illustrative example system.

Context Ontology and Trigger Rule Design for Service Pattern Mining (서비스 패턴 마이닝을 위한 컨텍스트 온톨로지 및 트리거 규칙 설계)

  • Hwang, Jeong-Hee
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.291-299
    • /
    • 2012
  • Ubiquitous computing is a technique to provide users with appropriate services, collecting the context information in somewhere by attached sensor. An intelligent system needs to automatically update services according to the user's various circumstances. To do this, in this paper, we propose a design of context ontology, trigger rule for mining service pattern related to users activity and an active mining architecture integrating trigger system. The proposed system is a framework for active mining user activity and service pattern by considering the relation between user context and object based on trigger system.

A Study on the Application of U-SAT System for the Indoor Positioning Technology of Ubiquitous Computing (유비쿼터스 컴퓨팅의 실내 측위 기술을 위한 U-SAT 시스템의 적용에 관한 연구)

  • Lee, Dong-Hwal;Park, Jong-Jin;Kim, Su-Yong;Mun, Young-Song;Lee, Man-Hyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.9
    • /
    • pp.876-882
    • /
    • 2006
  • This study presents an ultrasonic location awareness system for the ubiquitous computing with absolute position. The flight time of ultrasonic waves is determined by a period detecting technique which is able to extend the sensing range compared with traditional methods. For location awareness, ultrasonic waves are sent successively from each ultrasonic transmitter and synchronized by radio frequency (RF) signal, where the transmitting part is fixed and the receiving part is movable. To expand the recognizing range, cell matching technique and coded ultrasonic technique are introduced. The experimentation for various distances is accomplished to verify the used period detecting technique of U-SAT system. The positioning accuracy by using cell matching is also verified by finding the locations of settled points and the usability of coded ultrasonic technique is verified. As a result, the possibility of ultrasonic location awareness system for the ubiquitous computing can be discussed as a pseudo-satellite system with low cost, a high update rate, and relatively high precision, in the places where CPS is not available.

A Design of IoT based Automatic Control System for Intelligent Smart Home Network (지능형 스마트 홈네트워크를 위한 IoT기반 자동조절시스템 설계)

  • Shim, JeongYon
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.21-25
    • /
    • 2015
  • The Internet of Thing (IoT) will be a very important core technology to implement Intelligent Smart Home Network and it will take charge of an important role connected to Smart Phone, Cloud Computing in the Ubiquitous environment. In this paper, Internal Autonomous Regulation by human autonomic nervous system was studied and its core mechanism was applied to the design of IoT based Autonomous Regulation System for Intelligent Smart Home Network. We proposed an autonomous regulating mechanism in which the factors of Temperature, Humidity and Illumination are automatically adjusted as they communicate with the connected things.

Open API service platform designed for embedded (웹 2.0을 위한 임베디드 Open API 서비스 플랫폼 설계)

  • Yang, Moon-seok;No, Young-sik;Byun, Ji-Yoong;Cha, ji-yun;Park, Sang-Yeol;Byun, Yung-cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.587-590
    • /
    • 2008
  • The Web 2.0 is mean to Web as Platform, as the platform provided various service using a data on webs by opening information. That is, it leads to the sharing and participation of information among internet users. In this paper, we research web technology for embedded computers which be supplied data and services to implement Ubiquitous computing. Therefore, we designed Open API service platform used the embedded system for the sharing and opening of web 2.0 trends. This designed platform is provided to internet users with various services and information in real-time.

  • PDF

Implementation of data synchronization for local disks in Linux high availability system (리눅스 고가용 시스템에서 로컬 디스크 간 데이터 동기화 구현)

  • Park, seong-jong;Lee, cheol-hoo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.547-550
    • /
    • 2008
  • Recently, changes in the environment of user-centric internet service such as blog, UCC and IPTV and ubiquitous computing based on web service are needed to high availability system platform. High availability system is to provide safe service continuously even if system failure occurs in clustering system at the network. And it is necessary to synchronize data for reliable service in high availability system. In this paper, I implement DRBD(Disk Replicated Block Device) which is synchronization technique for data of local disks in high availability system.

  • PDF

A Context-Aware Model and It's Application Using Difference of Multiple-Valued Logic Functions (다치 함수의 차분을 이용한 상황 인식 모델 및 응용)

  • Koh, Hyun-Jung;Chung, Hwan-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.6
    • /
    • pp.659-664
    • /
    • 2006
  • The Context-Aware system is the core technology in the Ubiquitous Computing Environment. Recently, the practical use of a sensor is magnified and the application fields of it are gradually extended in order to collect necessary context information. Context-Aware service integrates the context information which is collected by sensors, and then provides, a suitable service to a user through the process of analysis and reasoning. This service is studied in a variety of fields such as marketing, medical treatment, education and so on. In this paper, we analyze the method of recognizing surrounding context and the result of the awareness by using differential and structural property of multiple valued logic function; propose the model that provides appropriate service depending on the change of surrounding contort; confirm the applicability of the Context-aware system by showing the example of application.

A Study on PKI Mechanisms with distributed CA for IEEE 802.15.3 High Rate WPAN (IEEE 802.15.3 High Rate WPAN을 위한 분산된 인종기관을 가지는 PKI 메커니즘 연구)

  • 박정우;양대헌;송주석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.125-135
    • /
    • 2004
  • IEEE 802.15.3 High Rate WPAN is a mechanism for wireless home network such as PDAs, digital video camcoder, etc. While symmetric keys are used for MAC layer security, the process of establishing a secure membership or a secure relationship is outside of the scope of the standard. In addition, to prepare for ubiquitous environment in the near future, it is important to study the process of establishing a secure relationship between DEVs in different dependent piconets. This paper propose a secure model and a process of establishing a secure relationship using PKI without a ousted certificate authority.