• Title/Summary/Keyword: 유비쿼터스 IT

Search Result 1,509, Processing Time 0.037 seconds

A Study on Network Service Using Authorization Ticket in AAA system (AAA시스템의 인가 티켓을 이용한 네트워크 서비스에 관한 연구)

  • Kang, Seo-Il;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2007
  • A ubiquitous network environment is a system where the user can avail of the network's services anytime, anywhere. To establish such an environment, studies continue being conducted on wireless communication technology and mobile terminals. The company that provides such services should have an established system for authentication, authorization and charging for users. This service is referred to as Authentication, Authorization, Accounting(AAA), and its aspects have been consistently studied. On the other hand, existing studies have been promoted with regard to the authentication and efficiency of the mobile terminal. One of the method is that the mobile terminal contacts to the home authentication server through the external authentication server every time it is required and; another one is to use a medium server to provide authentication in the middle between them. Thus, this study aims to determine the best method to use ticketing, where tickets are provided through a mobile terminal, complete with authentication and authorization features. Also, as it uses ticket, it can efficiently provide mobile verification processing.

The research of Sensor network service analysis based on OGC (OGC 기반의 센서 네트워크 서비스 분석 연구)

  • Kim, Nam-Hoon;Ham, Jong-Wan;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.774-780
    • /
    • 2010
  • USN(Ubiquitous Sensor Network) is a core infrastructure that u-life use to enable the realization in the ubiquitous society through various services of area such as u-city, u-Health. Therefore, we need a research for domestic standards to establish USN technique. Currently, status of USN standards is most standard and research that it is a technology for sensor node implementation and a protocol for energy-efficient communication and interlock with existing network. But, Standard and research for sensor network and integration management of heterogeneous sensor networks for USN application and sensing data management and USN database structure definition such as application and middleware is weak level. In this paper, we researched for standard development of domestic a sensor network and the relevant standard analysis to configure SWE(Sensor Web Enablement) of OGC(Open Geospatial Consortium) for standarded plattform technology. Also we researched that it's a connection between domestic ITA(Telecommunications Technology Association) standards and SWE Standard.

The Study on U-Service Priority for Low-Income People Using AHP (계층화분석법을 이용한 저소득층 u-서비스 적용 우선순위에 관한 연구)

  • Byun, Wan-Hee;Yang, Dong-Suk;Kee, Ho-Young;Jeong, Man-Chul
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.1
    • /
    • pp.100-111
    • /
    • 2011
  • u-City(ubiquitous city) pursuing competitiveness of city and improvement the quality of life needs high cost to build and operate it. But not all people get a benefit by u-City. It is important that low-income people have experienced information divide gain practical benefits in u-City. In this paper, first we selected suitable item of u-service for low-income people and then drew a order of priority using AHP method about legal and institutional conditions, possibility of technical realization, and the generalization. As a result, we prioritize to u-service for low-income people, that is the order is prevention for missing a dotard, safety of street, and information providing about job and employment.

Dynamic Full-Scalability-Conversion in SVC (스케일러블 비디오 코딩에서의 실시간 스케일러빌리티 변환)

  • Lee, Dong-Su;Bae, Tae-Meon;Ro, Yong-Man
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.60-70
    • /
    • 2006
  • Currently, Scalable Video Coding (SVC) is being standardized. By using scalability of SVC, QoS managed video streaming service is enabled in heterogeneous networks even with only one original bitstream. But current SVC is insufficient to dynamic video conversion for the scalability, thereby the adaptation of bitrate to meet a fluctuating network condition is limited. In this paper, we propose dynamic full-scalability conversion method for QoS adaptive video streaming in H.264/AVC SVC. To accomplish full scalability dynamic conversion, we propose corresponding bitstream extraction, encoding and decoding schemes. On the encoder, we newly insert the IDR NAL to solve the problems of spatial scalability conversion. On the extractor, we analyze the SVC bitstream to get the information which enable dynamic extraction. By using this information, real time extraction is achieved. Finally, we develop the decoder so that it can manage changing bitrate to support real time full-scalability. The experimental results showed that dynamic full-scalability conversion was verified and it was necessary for time varying network condition.

Design of An Improved Trust Model for Mutual Authentication in USN (USN 상호인증을 위한 개선된 신용모델 설계)

  • Kim Hong-Seop;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.239-252
    • /
    • 2005
  • Ubiquitous Sensor Network(USN) , the core technology for the Ubiquitous environments ,must be operated in the restrictive battery capacity and computing. From this cause, USN needs the lightweight design for low electric energy and the minimum computing. The previous mutual authentication. based on J$\emptyset$sang's trust model, in USN has a character that makes the lightweight mutual authentication possible in conformity with minimum computing. But, it has an imperfection at the components of representing the trust from a lightweight point of view. In this paper, we improve on the J$\emptyset$sang's trust model to apply a lightweight mutual authentication in USN. The proposed trust model in USN defines the trust information with the only degree of trust-entity(x)'s belief. The defined trust information has a superiority over the J$\emptyset$sang's trust model from a computing Point of view. because it computes information by Probability and logic operation(AND).

  • PDF

MyWorkspace: VR Platform with an Immersive User Interface (MyWorkspace: 몰입형 사용자 인터페이스를 이용한 가상현실 플랫폼)

  • Yoon, Jong-Won;Hong, Jin-Hyuk;Cho, Sung-Bae
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.52-55
    • /
    • 2009
  • With the recent development of virtual reality, it has been actively investigated to develop user interfaces for immersive interaction. Immersive user interfaces improve the efficiency and the capability of information processing in the virtual environment providing various services, and provide effective interaction in the field of ubiquitous and mobile computing. In this paper, we propose an virtual reality platform "My Workspace" which renders an 3D virtual workspace by using an immersive user interface. We develop an interface that integrates an optical see-through head-mounted display, a Wii remote controller, and a helmet with infrared LEDs. It estimates the user's gaze direction in terms of horizontal and vertical angles based on the model of head movements. My Workspace expands the current 2D workspace based on monitors into the layered 3D workspace, and renders a part of 3D virtual workspace corresponding to the gaze direction. The user can arrange various tasks on the virtual workspace and switch each task by moving his head. In this paper, we will also verify the performance of the immersive user interface as well as its usefulness with the usability test.

  • PDF

A SOA Web Service Implementation for Adapting to Context Changes using Polymorphism (상황정보 적응을 위하여 다형성을 이용한 SOA 웹서비스 구현 방안)

  • Yoon, Hoi-Jin
    • Journal of Internet Computing and Services
    • /
    • v.9 no.5
    • /
    • pp.73-83
    • /
    • 2008
  • This paper proposes an implementation of an orchestration service of web services, which work as context aware applications in Ubiquitous Computing. The proposed method alms to decrease the cost of adapting to the context changes. UC requires the context adaptation more than any other computing environments, and it works based on networks of various heterogeneous platforms. Web services on SOA could be one of the solutions for the requirements. This paper proposes the way how to implement an orchestration service of SOA to handle the context adaptation while keeping the performance high. We develops an implementation model of orchestration services of web services, and the model decreases the number of code lines of the orchestration service. This paper also shows a simple empirical study, and it also analyzes two different method implementing the polymorphism, overloading and overriding.

  • PDF

Load balancing method of overload prediction for guaranteeing the data completeness in data stream (데이터 스트림 환경에서 데이터 완전도 보장을 위한 과부하 예측 부하 분산 기법)

  • Kim, Young-Ki;Shin, Soong-Sun;Baek, Sung-Ha;Lee, Dong-Wook;Kim, Gyoung-Bae;Bae, Hae-Young
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1242-1251
    • /
    • 2009
  • A DSMS(Data Stream Management System) in ubiquitous environment processes huge data that input from a number of sensor. The existed system is used with a load shedding method that is eliminated with a part of huge data stream when it doesn't process the huge data stream. The Load shedding method has to filter a part of input data. This is because, data completeness or reliability is decreased. In this paper, we proposed the overload prediction load balancing to maintain data completeness when the system has an overload. The proposed method predicts the overload time. and than it is decreased with data loss when achieves the prediction overload time. The performance evaluation shows that the proposed method performs better than the existed method.

  • PDF

Dynamic Address Interworking Scheme between Wireless Sensor Network and Internet Based on IPv4/IPv6 (센서 네트워크와 인터넷(IPv4/IPv6)과의 동적 주소 연동 방안)

  • Kim Jeong-Hee;Kwon Hoon;Kwak Ho-Young;Do Yang-Hoi;Kim Dae-Young;Kim Do-Hyeun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1510-1518
    • /
    • 2006
  • As a promising technology that enables ubiquitous computing and leads IT(information Technology) industries of next generation, the exciting new field of sensor networks is attracting so much attention and considered to be the one of the hottest research topics these days. From now on, all the each node, forming a network, and even the sensor network itself will interact with the generic network and evolve dynamically according to the change of environment with the perpetual creation and extinction. In this paper, we purpose the dynamic address interworking scheme for interactive networking between sensor network and Internet(IPv6). Proposed scheme is enable to interworking dynamically between sensor network address scheme based on Zigbee and Internet address scheme based on IP. Additionally, we implement the proposed address interworking scheme using Berkeley TinyOS, mica motes, and IP protocol. And, we verify the proposed scheme by the interconnection experimental between wireless sensor networks and Internet based on IPv4/IPv6.

Optimized implementation of HIGHT algorithm for sensor network (센서네트워크에 적용가능한 HIGHT 알고리즘의 최적화 구현 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1510-1516
    • /
    • 2011
  • As emergence of the ubiquitous society, it is possible to access the network for services needed to us in anytime and anywhere. The phenomena has been accelerated by revitalization of the sensor network offering the sensing information and data. Currently, sensor network contributes the convenience for various services such as environment monitoring, health care and home automation. However, sensor network has a weak point compared to traditional network, which is easily exposed to attacker. For this reason, messages communicated over the sensor network, are encrypted with symmetric key and transmitted. A number of symmetric cryptography algorithms have been researched. Among of them HIGHT algorithm in hardware and software implementation are more efficient than tradition AES in terms of speed and chip size. Therefore, it is suitable to resource constrained devices including RFID tag, Sensor node and Smart card. In the paper, we present the optimized software implementation on the ultra-light symmetric cryptography algorithm, HIGHT.