• Title/Summary/Keyword: 초연결 기술

Search Result 128, Processing Time 0.031 seconds

Trend Analysis of IoT Technology Using Open Source (오픈소스를 이용한 IoT 기술의 동향 분석)

  • Kwon, Yong-Kwang;Kim, Sun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • The Internet of Things(IoT) is to build a hyper-connected society through interconnection, and on this basis, to improve the quality of life and productivity, including solving social problems, and to become the next growth engine for the nation. The open common eco-system pursued by the IoT can start with the under- standing of the word 'open'. The IoT can achieve the expected effect of lowering the barriers to entry of technology development, and in these changes, OSSW and OSHW play a very important role in accelerating IoT eco-system maturity and breaking the boundaries between industries to promote convergence. Recently, it has developed into an intelligent IoT that combines artificial intelligence (AI) with the connectivity of the IoT. Here, I will analyze the direction of development of the IoT through understanding and analysis of open source.

MPEG-I Immersive Audio Standardization Trend (MPEG-I Immersive Audio 표준화 동향)

  • Kang, Kyeongok;Lee, Misuk;Lee, Yong Ju;Yoo, Jae-hyoun;Jang, Daeyoung;Lee, Taejin
    • Journal of Broadcast Engineering
    • /
    • v.25 no.5
    • /
    • pp.723-733
    • /
    • 2020
  • In this paper, MPEG-I Immersive Audio Standardization and related trends are presented. MPEG-I Immersive Audio, which is under the development of standard documents at the exploration stage, can make a user interact with a virtual scene in 6 DoF manner and perceive sounds realistic and matching the user's spatial audio experience in the real world, in VR/AR environments that are expected as killer applications in hyper-connected environments such as 5G/6G. In order to do this, MPEG Audio Working Group has discussed the system architecture and related requirements for the spatial audio experience in VR/AR, audio evaluation platform (AEP) and encoder input format (EIF) for assessing the performance of submitted proponent technologies, and evaluation procedures.

The study of the field customized SW training course design based on the analysis of the field suitability of the university SW education (대학 SW 교육의 현장 적합도 분석에 기반한 현장 맞춤형 SW 교육 과정 설계에 대한 연구)

  • Cha, Joon Seub
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.86-92
    • /
    • 2015
  • Recently, it is entering the hyper connectivity age due to the development of sensor and communication technology. In particular, it is emerging new industries such as the IoT, bigdata, cloud by convergence with the ICT and other industries. Because these industries are high the gravity of the software, the demand for software manpower is increasing rapidly. But university curriculum don't deviate from the traditional curriculum, and lack of positive response to these changes is occurring a mismatch with the industry demand. In this paper, investigate a software curriculums of the four-year university, and will attempt to investigate the perception about the university software course of the corporate perspective. Also, we draw a on-site fitness of universities training course by analysis of importance on software training courses between universities and businesses. Finally, we propose a strategy model for software training course design appropriate for the field.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

Analyses of Security into End-to-End Point Healthcare System based on Internet of Things (사물인터넷 기반의 헬스케어 시스템의 종단간 보안성 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.871-880
    • /
    • 2017
  • Recently, service based on internet is inter-connected and integrated with a variety of connection. This kind of internet of things consist of heterogenous devices such as sensor node, devices and end-to end equipment which used in conventional protocols and services. The representative system is healthcare system. From healthcare appliance used by IoT, patient and doctor can utilize healthcare information with safety and high speed management. It is very convenient management to operate mobility. But it induced security and vulnerability issues because it has small memory capacity, low power supply and low computing power. This made impossible to implement security algorithm with embedded engine based on hardware. Nowdays, we can't realize conventional standard algorithm due to these kinds of reasons. From the critical issues, it occurred security and vulnerability issues. Therefore, we analysed and compared with conventional method and proposed techniques. Finally, we evaluated security issues and requirement for end-to-end point healthcare system based on internet of things.

A Study on the Establishment of Entropy Source Model Using Quantum Characteristic-Based Chips (양자 특성 기반 칩을 활용한 엔트로피 소스 모델 수립 방법에 관한 연구)

  • Kim, Dae-Hyung;Kim, Jubin;Ji, Dong-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.140-142
    • /
    • 2021
  • Mobile communication technology after 5th generation requires high speed, hyper-connection, and low latency communication. In order to meet technical requirements for secure hyper-connectivity, low-spec IoT devices that are considered the end of IoT services must also be able to provide the same level of security as high-spec servers. For the purpose of performing these security functions, it is required for cryptographic keys to have the necessary degree of stability in cryptographic algorithms. Cryptographic keys are usually generated from cryptographic random number generators. At this time, good noise sources are needed to generate random numbers, and hardware random number generators such as TRNG are used because it is difficult for the low-spec device environment to obtain sufficient noise sources. In this paper we used the chip which is based on quantum characteristics where the decay of radioactive isotopes is unpredictable, and we presented a variety of methods (TRNG) obtaining an entropy source in the form of binary-bit series. In addition, we conducted the NIST SP 800-90B test for the entropy of output values generated by each TRNG to compare the amount of entropy with each method.

  • PDF

Appropriate Technology, Responding to the COVID-19 Pandemic - Redefined Roles in a Public Health Crisis (Part I) (COVID-19 대유행에 대응하는 적정기술 : 보건 위기에서 재정의된 역할 - 파트 1)

  • Lee, Sungwoo;Suh, Jungwoo;Kim, Jaeeun;Jang, Dongyoon;Pyun, Nayoon;Shin, Kwanwoo
    • Journal of Appropriate Technology
    • /
    • v.6 no.2
    • /
    • pp.238-255
    • /
    • 2020
  • As COVID-19, which occurred at the end of 2019, has become a global pandemic, it has emerged as an unprecedented event that quickly destroys a nation's medical and healthcare system in both developed and developing countries. In the 21st century, most of the civil society that aimed for hyperconnected society is facing a new crisis that has not been experienced so far. Indeed, lack of personal protective equipment, isolation of clustered communities, disruption of medical systems necessary for diagnosis and treatment, and disruption of educational and economic activities due to social isolation are emerging. Since the COVID-19 has occurred, many of the difficulties that have occurred in the past six months indicate the basic infrastructure a society should have particularly in a pandemic. These include personal protective equipment (PPE), decontamination and quarantine tools essential for effective response, rapid and precise large-scale diagnosis, medical devices required for patient care, and identification and fast and wide on-line networks that can be used in social isolation. In this first part, we would like to introduce some representative examples of 1) personal protective equipment, 2) prevention of personal and community health, 3) social response through big data and networks within the framework of appropriate technology.

A Study on the Concept of Convergence and Combined Combat Based on South Korean-style AICBM for the Victory of Future War (미래전 승리를 위한 한국형 AICBM 기반 융·복합 전투개념 연구)

  • Jung, Min-Sub;Lee, Woong;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.321-325
    • /
    • 2020
  • The purpose of this study is to re-concept the future battle of the Army, which combines the effects of advanced technology on the concept of combat and the AICBM technology. The "war concept" changes with the times, and can be seen through the following two examples. First, it is a concept that achieves relative superiority by analyzing enemies. A case in point is the U.S. military's development of a "public joint battle" into a "multi-domain operation." Second, it is 'science and technology' that leads to a change in the concept of combat. A case in point is that the firepower warfare on land and sea in World War I developed from World War II to "air warfare" due to the emergence of aircraft. In this regard, the U.S. military is focusing on the concept of fighting in line with the future operational environment based on high-tech science and technology and the construction of the future military through the creation of the "Future Command." Therefore, our military needs to utilize the major technologies of the fourth industrial revolution as an opportunity to develop the concept of future combat, and the future war will greatly affect the development of the concept of advanced science and technology carrying out war, as AIC technology based on the fourth industrial revolution will promote innovation in defense operations in the form of super-connected, super-intelligence and super-integration. Therefore, this study will present the impact of advanced technology on the concept of combat and the concept of battle of the future Army incorporating the technology of AICBM.

Research on functional area-specific technologies application of future C4I system for efficient battlefield visualization (미래 지휘통제체계의 효율적 전장 가시화를 위한 기능 영역별 첨단기술 적용방안)

  • Sangjun Park;Jungho Kang;Yongjoon Lee;Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.109-119
    • /
    • 2023
  • C4I system is an integrated battlefield information system that automates the five elements of command, control, communications, computers, and information to efficiently manage the battlefield. C4I systems play an important role in collecting and analyzing enemy positions, situations, and operational results to ensure that all services have the same picture in real time and optimize command decisions and mission orders. However, the current C4I has limitations whenever a new weapon system is introduced, as it only provides battlefield visualization in a single area focusing on the battlefield situation for each military service. In a future battlefield that expands not only to land, sea, and air domains but also to cyber and space domains, improved command and control decisions will be possible if organic data from various weapon systems is gathered to quickly visualize the battlefield situation desired by the user. In this study, the visualization technology applicable to the future C4I system is divided into map area, situation map area, and display area. The technological implementation of this future C4I system is based on various data and communication means such as 5G networks, and is expected to enable hyper-connected battlefield visualization that utilizes a variety of high-quality information to enable realistic and efficient battlefield situation awareness.

A study on the policy of de-identifying unstructured data for the medical data industry (의료 데이터 산업을 위한 비정형 데이터 비식별화 정책에 관한 연구)

  • Sun-Jin Lee;Tae-Rim Park;So-Hui Kim;Young-Eun Oh;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.85-97
    • /
    • 2022
  • With the development of big data technology, data is rapidly entering a hyperconnected intelligent society that accelerates innovative growth in all industries. The convergence industry, which holds and utilizes various high-quality data, is becoming a new growth engine, and big data is fused to various traditional industries. In particular, in the medical field, structured data such as electronic medical record data and unstructured medical data such as CT and MRI are used together to increase the accuracy of disease prediction and diagnosis. Currently, the importance and size of unstructured data are increasing day by day in the medical industry, but conventional data security technologies and policies are structured data-oriented, and considerations for the security and utilization of unstructured data are insufficient. In order for medical treatment using big data to be activated in the future, data diversity and security must be internalized and organically linked at the stage of data construction, distribution, and utilization. In this paper, the current status of domestic and foreign data security systems and technologies is analyzed. After that, it is proposed to add unstructured data-centered de-identification technology to the guidelines for unstructured data and technology application cases in the industry so that unstructured data can be actively used in the medical field, and to establish standards for judging personal information for unstructured data. Furthermore, an object feature-based identification ID that can be used for unstructured data without infringing on personal information is proposed.