• Title/Summary/Keyword: 통신재난

Search Result 642, Processing Time 0.025 seconds

Development of Precision Positioning and Fine Displacement Monitoring Based on GNSS (GNSS 기반의 정밀측위 및 미세변위 모니터링 개발)

  • Yeon, Sang-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.145-152
    • /
    • 2017
  • In this paper, GNSS(global navigation satellite system) to monitoring the fine for the construction of structure displacement based on satellite communications signals of GNSS. At the same time on USN(ubiquitous sensor network) and proposed a new approach to precise positioning by analyzing the results. A major construction structure for the safety diagnosis and prevent disaster from the risk of collapse. Precision measurement methods to mm level GNSS in that case and experiments in the application of new technologies that can most commonly used to replace the current through the permanent. The way a GNSS baseline and tested it on to prove. As a result, at our country at precise positioning and fine displacement monitoring application virtual reference station(VRS) in a GNSS mm of a margin of error of horizontal and vertical directions can be found.

Home Management System Using Smartphone and Sensor Networks (스마트폰과 센서 네트워크를 이용한 홈 관리 시스템)

  • Han, Joosik;Jung, Yeonsoo;Son, Youngho;Hwang, Soyoung;Joo, Jaeheum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.405-406
    • /
    • 2012
  • A sensor network is composed of a large number of sensor nodes which have sensing, computation and wireless communication capabilities. The sensor node sends such collected data, usually via radio transmitter, to a command center (sink) either directly or through a data concentration center (a gateway). These sensor networks can be used for various application areas such as health, military, home network, managing inventory, monitoring disaster areas and so on. Moreover, owing to the rapid growth of mobile technology, high-performance smartphones are widespread and in increasing cases are utilized as a terminal device. In this paper, we propose a home management system using smartphone and sensor networks.

  • PDF

Cluster-head Decision Method for Cognitive Radio Based on Wireless Ad-hoc Network (인지 무선 기반 애드 혹 네트워크에서의 클러스터 헤드 선정기법)

  • Lee, Kyung-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.91-96
    • /
    • 2012
  • Ad-hoc networks can be used various environment, which it is difficult to construct infrastructures, such as shadowing areas, disaster areas, war area, and so on. In order to support to considerable and various wireless services, more spectrum resources are needed. However, efficient utilization of the frequency resource is difficult because of spectrum scarcity and the conventional frequency regulation. Ad-hoc networks employing cognitive radio (CR) system that guarantee high spectrum utilization provide effective way to increase the network capacity. In CR based wireless ad-hoc networks, cluster-head decides the existence of primary user using sensing information of primary user from each ad-hoc device. However, it is still defective research to decide cluster head among the a lot of ad-hoc devices. So, in this paper, we show the decision method of cluster head in CR based wireless and detection probabilities of primary user based on decision method of cluster head.

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

Spectrum Sensing Technique in Cognitive Radio Systems Based on Ad-Hoc Networks (애드 혹 네트워크기반 무선인지 시스템에서 스펙트럼 센싱)

  • Lee, So-Young;Kim, Eun-Cheol;Cha, Jae-Sang;Hwang, Sung-Ho;Min, Joon-Ki;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.5
    • /
    • pp.121-127
    • /
    • 2009
  • Wireless devices can communicate between each other without existing infrastructure in mobile Ad-hod network. Ad hoc networks can be used under difficult conditions, where it is difficult to construct infrastructures, such as shadowing areas, disaster areas, war area, and so on. In order to support to considerable and various wireless services, more spectrum resources are needed. However, efficient utilization of the frequency resource is difficult because of spectrum scarcity and the conventional frequency regulation. Ad-hoc networks employing cognitive radio (CR) system that guarantee high spectrum utilization provide effective way to increase the network capacity. In this paper, we simulate and compare the performance of conventional single and cooperative spectrum sensing with CR system using ad-hoc networks. And we demonstrate performance improvement by analyzing the system performance.

  • PDF

Wireless Network Safety Management System on LPWA-based Tram Roads (LPWA 기반 트램 노면의 무선통신망 안전관리 시스템)

  • Jung, Ji-Sung;Lee, Jae-Ki;Park, Jong-Kweon
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.12
    • /
    • pp.57-68
    • /
    • 2018
  • A system to prevent disasters by collecting and analyzing environmental information such as road surface sedimentation, sinkholes, collapse risk of bridges, temperature and humidity around tram station is continuously monitored by monitoring the condition of road surface when constructing tram which is one of the urban railways. In this paper, we propose a wireless network security management system for tram roads based on LPWA that can recognize risk factors of road surface, bridge and tram station of tram in advance and prevent risk. The proposed system consists of a sensor node that detects the state of the tram road surface, a gateway that collects sensor information, and a safety management system that monitors the safety and environmental conditions of the tram road surface, and applies the low power long distance communication technology. As a result of comparing the proposed system with the LTE system in the field test, it was confirmed that there is no significant difference between the sensor information value and the critical alarm level in the monitoring system.

A New Method to Detect Anomalous State of Network using Information of Clusters (클러스터 정보를 이용한 네트워크 이상상태 탐지방법)

  • Lee, Ho-Sub;Park, Eung-Ki;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.545-552
    • /
    • 2012
  • The rapid development of information technology is making large changes in our lives today. Also the infrastructure and services are combinding with information technology which predicts another huge change in our environment. However, the development of information technology brings various types of side effects and these side effects not only cause financial loss but also can develop into a nationwide crisis. Therefore, the detection and quick reaction towards these side effects is critical and much research is being done. Intrusion detection systems can be an example of such research. However, intrusion detection systems mostly tend to focus on judging whether particular traffic or files are malicious or not. Also it is difficult for intrusion detection systems to detect newly developed malicious codes. Therefore, this paper proposes a method which determines whether the present network model is normal or abnormal by comparing it with past network situations.

Implementation of Dynamic Context-Awareness Platform for Internet of Things(IoT) Loading Waste Fire-Prevention based on Universal Middleware (유니버설미들웨어기반의 IoT 적재폐기물 화재예방 동적 상황인지 플랫폼 구축)

  • Lee, Hae-Jun;Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1231-1237
    • /
    • 2022
  • It is necessary to dynamic recognition system with real time loading height and pressure of the loading waste, the drying of wood, batteries, and plastic wastes, which are representative compositional wastes, and the carbonization changes on the surface. The dynamic context awareness service constituted a platform based on Universal Middleware system using BCN convergence communication service as a Ambient SDK model. A context awareness system should be constructed to determine the cause of the fire based on the analysis data of fermentation heat point with natural ignition from the load waste. Furthermore, a real-time dynamic service platform that could be apply to the configuration of scenarios for each type from early warning fire should be built using Universal Middleware. Thus, this issue for Internet of Things realize recognition platform for analyzing low temperature fired fire possibility data should be dynamically configured and presented.

Heterogeneous message conversion for remote buried utility management system IoT(Internet of Things) gateway (원격 매설 유틸리티 관리 시스템을 위한 이기종 간의 메시지 변환 IoT(Internet of Things) 게이트웨이)

  • Kim, InSung;Pak, JuGeon;Park, KeeHyun
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.10
    • /
    • pp.25-32
    • /
    • 2018
  • Recently, the complexity of underground utilities has increased and it has became more difficult to identify and manage information about all underground utilities due to changes such as road extension or building relocation. As a result, number of accidents related to underground utilities caused by excavation works or disasters are in rise, and naturally damages as well are increasing due to the accidents. Therefore, there is a need for a management system capable of easily registering or retrieving information of underground utilities from a remote place. In our previous work, we have developed a utility labelling system based on NFC (Near Field Communication) tag and a utility management system based on IoT (Internet of Things). However, in general, there are diverse communication devices and protocols in IoT environment. Therefore, in this paper, we propose management system and IoT gateway that enables smooth communication even in different types of devices based on the previous our work.

A Study of Verification for Modification of Location Information in Disaster Image Transmitting Through a Smart-phone (스마트폰을 이용한 재난 영상의 위치변조에 대한 검증에 관한 연구)

  • Seo, Tae-Woong;Lee, Sung-Ryoul;Bae, Byung-Chul;Yoon, E-Joong;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.242-249
    • /
    • 2012
  • Recently, value added location based service and convergence monitoring and control system is growing. The cases include increasing usage of smart-phone for taking picture, wireless network, GPS and digital map. Especially, Smart-phone is appropriate for using image information and location information. However it is possible to be exploited for forgery and manipulation. So we experimented on transferring modified data on the smart-phone as image and location information in EXIF and researched the technology for data verification. In addition, we have designed security monitoring and control prototype considering axis-address matching analysis used geocoding, watermarking verification, encryption.