• Title/Summary/Keyword: 초연결 기술

Search Result 127, Processing Time 0.023 seconds

Analysis of Trends in Hyper-connected Virtual Infrastructure Management Technology (초연결 가상 인프라 관리 기술 동향 분석)

  • Shim, J.C.;Park, P.K.;Ryu, H.Y.;Kim, T.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.4
    • /
    • pp.135-148
    • /
    • 2020
  • Virtualisation in cloud computing is vital for maintaining maximum resource utilization and easy access to operation and storage management of components. Platform virtualisation technology has the potential to be easily implemented with the support of scalability and security, which are the most important components for cloud-based services. Virtual resources must be allocated to a centralized pool called the cloud, and it is considered as cloud computing only when the virtual resources are orchestrated through management and automation software. Therefore, research and development on the latest technology for such a virtualisation platform provides both academia and industry the scope to deploy the fastest and most reliable technology in limited hardware resource. In this research, we reviewed and compared the popular current technologies for network and service management and automation technology.

Study of Machine Learning Method for Anormaly Detection Using Multivariate Gaussian Distribution in LPWA Network Environment (LPWA 네트워크 환경에서 다변량 가우스 분포를 활용하여 이상탐지를 위한 머신러닝 기법 연구)

  • Lee, Sangjin;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.309-311
    • /
    • 2017
  • With the recent development of the Internet (IoT) technology, we have come to a very connected society. This paper focuses on the security aspects that can occur within the LPWA Network environment of the Internet of things, and proposes a new machine learning method considering next generation IPS / IDS that can detect and block unexpected and unusual behavior of devices.

  • PDF

Limit-Zero Network: Trends of Hyper-Connected Photonics Technology for Limitless Network (한계 제로 네트워크: 한계 없는 네트워크를 위한 초연결 포토닉스 기술 동향)

  • Kim, K.;Park, H.;Chung, H.S.;Cho, S.H.;Lee, J.C.;Song, J.T.;Chang, S.H.;Lee, J.K.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.49-60
    • /
    • 2019
  • The prosperity of modern society is heavily depending on communication technology. Communication is now expanding its roles from personal convenience to social/industrial functioning. Photonics was first introduced to communication in longdistance transmission area since it provided wide bandwidth cost-effectively. However, nowadays, photonics is not only a harmonious collaborator with electronics, but has its own exclusive playgrounds in various parts of communication. Limit-zero network pursues a network that can provide abundant capacity and efficiency using very limited resources. Photonics is the most promising candidate to accomplish the goal. In this article, we review the current status and predict the future contributions of photonics to limit-zero network.

Mobile Network Issues regarding 5G Security (초연결 지능화 인프라 보안기술 동향 -5G 시대의 이동통신 보안 중심)

  • Park, J.G.;Kim, J.H.;Kim, I.K.;Jin, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.36-48
    • /
    • 2019
  • Recently, competition among global mobile operators has focused on the commercialization of 5G for the first time. Apart from protecting the privacy of subscribers and the confidentiality and integrity of communication, protecting the network against various cyber attacks is also important to ensure that high-quality mobile services operate safely. In this study, we examine the security vulnerabilities with respect to mobile communication environments using previous and current LTEs. We also investigate whether existing vulnerabilities can be effectively protected and identify security issues that need to be considered in the approaching 5G environment.

Recent Research Trend in Multifunctional Wearable Energy Storage Devices (다기능성 웨어러블 에너지 저장 장치 연구동향)

  • Park, Sangbaek
    • Prospectives of Industrial Chemistry
    • /
    • v.23 no.2
    • /
    • pp.23-39
    • /
    • 2020
  • 4차 산업혁명의 초연결/초지능 사회가 현실화 되면서 모든 제품이 배터리에 연결되는 사물배터리(battery of things) 시대가 열리고 있다. 이에 따라 기존의 정형화된 에너지 저장 장치를 넘어 전자기기 각각에 걸맞은 스펙과 기능을 갖는 맞춤형 전지 개발이 화두이다. 특히 구부러지거나 변형될 수 있는 웨어러블 전자기기를 구동하기 위해서는 기계적인 변형에 안정한 에너지 저장 장치가 필요하다. 또한 다양한 기능(투명성, 전기변색, 자가치유형, 친환경 등)을 갖는 지능형 전자기기가 개발됨에 따라, 이와 동등한 기능을 갖는 에너지 저장 장치도 요구되고 있다. 나아가 각각 개발된 웨어러블/다기능성 전자기기와 에너지 저장 장치를 어떻게 통합시킬지에 대한 연구도 활발히 이루어지고 있다. 본 기고문에서는 기계적 안정성, 기존 소자와의 적합성, 나아가 신기능성까지 갖춘 차세대 다기능성 웨어러블 에너지 저장 장치를 소개하고 이를 위한 복합나노구조 합성 및 소자 디자인 전략에 관한 최근 연구 동향을 소개하고자 한다.

Wide Range loT Technology and Standardization based on LPWA (LPWA기반 광역 IoT기술 및 표준화)

  • Kim, S.Y.;Park, S.K.;Choi, H.D.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.2
    • /
    • pp.95-106
    • /
    • 2016
  • 사물인터넷(Internet of Things: IoT)이란 모든 사물이 인터넷에 연결되어 상호 간에 직접 통신하는, 향후 정보통신의 미래 인프라 및 서비스이다. 이것이 필요한 이유는 초연결 사회에 기반을 둔 삶의 질 향상과 생산성 향상에 있으며, 최종적으로는 국가 자체의 인프라, 더 나아가서는 인류를 위한 중추 신경계를 이루기 때문에 무엇보다 중요하다. IoT는 셀룰러 이동통신 기반의 IoT와 비셀룰러기반의 IoT로 대분되어 오다가 두 분야의 융합이 이루어지고 있다. 그러나 IoT는 현재 거품 최고조기에 있으며, 아직까지 주목할 만한 큰 수익모델이 없는 상태이다. 그 이유는 사물인터넷 서비스 활성화에 가장 걸림돌이 되어온 보안문제, 배터리수명, 통신거리, IoT 디바이스를 포함한 솔루션 가격 그리고 월정료 문제가 여전히 존재하기 때문이다. 최근 이들 문제 해결을 목적으로, 대량의 IoT 디바이스를 필요로 하는 새로운 사물인터넷 커넥티비티에 대한 재정의, 표준화 및 솔루션 개발이 핫이슈이다. 본고에서는 셀룰라 및 비셀룰라 IoT기반의 Low Power Wide Area(LPWA), 즉 저전력 광역 IoT에 대한 시장, 기술 및 솔루션 비교 그리고 표준화 동향을 다룬다. 또한, 비셀룰라기반 즉 비면허대역과 프리밴드 활용을 통한 기술적 및 정책적 대응전략을 살펴본다.

  • PDF

Cyber Threat Military Response Strategy Using Information Security Risk Management (정보보안 위험관리를 활용한 사이버 위협 군사 대응 전략)

  • Jincheol Yoo
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.173-179
    • /
    • 2023
  • The 4th Industrial Revolution technology has emerged as a solution to build a hyper-connected, super-intelligent network-oriented operational environment, overcoming the obstacles of reducing troops and defense budgets facing the current military. However, the overall risk management, including the increase in complexity of the latest inform ation technology and the verification of the impact with the existing information system, is insufficient, leading to serious threats to system integrity and availability, or negatively affecting interoperability between systems. It can be inhibited. In this paper, we suggest cyber threat response strategies for our military to prepare for cyber threats by examining information security risk management in the United States in order to protect military information assets from cyber threats that may arise due to the advancement of information technology.

A Case Study of Cognitive Warfare in the Israel-Palestinian Conflict in 2021 (2021년 이스라엘-팔레스타인 분쟁에서의 인지전 사례 연구)

  • Cho, Sang Keun;Choi, Soon Sik;Woo, Seong Ha;Kim, Ki Won;Lee, Seung Hyun;Park, Sang Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.537-542
    • /
    • 2022
  • The "cognitive warfare," which has emerged as a result of the Ukrainian-Russian war, has already existed in the previous war and is now emerging as a major aspect of the war, its meaning and influence are increasing. Recognizing the emergence and importance of cognitive warfare and understanding the meaning and characteristics of cognitive warfare must be accompanied by victory in the modern war. After Russia's alleged involvement in the U.S. presidential election in 2016 drew attention, the Israeli-Palestinian conflict in 2021 confirmed its upward influence. In particular, 'cognitive warfare' using SNS played a major role in leading the war to its advantage and maintaining the initiative by selecting clear purposes and targets such as the international community, the people, and Hamas. This new pattern of war is gradually emerging as the world is hyper connected with the advent of the Fourth Industrial Revolution. It is expected that it will play a leading role in the future battle if it clearly recognizes the main contents of the new war, "Injijeon," and has the ability and ability to actively operate it.

Innovation in how to combat the Army's military strategy for future combat victory (미래전 승리를 위한 육군의 군사전략과 싸우는 방법 혁신)

  • Jung, Min-Sub;NamKung, Seung-Pil;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.105-109
    • /
    • 2020
  • The Future Army in 2050 should prepare for various future threats and effectively utilize its superintelligence and hyper-connected weapons systems to develop ways of fighting new concepts to dominate multi-regional battlefields and achieve victory. First, the establishment of active and offensive military strategies based on ability. Second, the battle of central strike for enemy combat will paralysis. Third, the battle of simultaneous integrated mosaic using multidisciplinary areas. Fourth, cyber warfare based on artificial intelligence that transcends time and space. Fifth, Combined Platform War. After all, future wars will be won or lost by invisible wars on cyber space.

CLIAM: Cloud Infrastructure Abnormal Monitoring using Machine Learning

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.105-112
    • /
    • 2020
  • In the fourth industrial revolution represented by hyper-connected and intelligence, cloud computing is drawing attention as a technology to realize big data and artificial intelligence technologies. The proliferation of cloud computing has also increased the number of threats. In this paper, we propose one way to effectively monitor to the resources assigned to clients by the IaaS service provider. The method we propose in this paper is to model the use of resources allocated to cloud systems using ARIMA algorithm, and it identifies abnormal situations through the use and trend analysis. Through experiments, we have verified that the client service provider can effectively monitor using the proposed method within the minimum amount of access to the client systems.