• Title/Summary/Keyword: 표준 메시지

Search Result 481, Processing Time 0.031 seconds

Development of a Hierarchical HydroG-OneFlow Web Services of River GeoSpatial Information (하천공간정보의 계층적 HydroG-OneFlow 웹서비스 개발)

  • Shin, Hyung Jin;Hwang, Eui Ho;Chae, Hyo Sok;Hong, Sung Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.626-626
    • /
    • 2015
  • 본 연구에서는 하천공간정보의 웹서비스를 위해 SOAP(Simple Object Access Protocol) API 및 REST(Representation State Transfer) API로 제공하는 HydroG-OneFlow 웹서비스를 개발하였다. HydroG-OneFlow는 GML 기반의 서비스를 제공하며 GetBasin, GetGeoVariable 및 GetData 등의 기본서비스로 구성된다. GML은 GIS S/W의 벡터 GML 포맷과 공간정보 오픈플랫폼 서비스인 브이월드 데이터 API에서 제공하는 GML 포맷을 참고하여 하천공간 벡터정보를 제공할 수 있도록 GML을 구성하였다. GDM 공간 데이터에 대한 벡터정보 ML 수용 수준을 향상시킬 수 있도록 벡터구조의 점, 선, 면 정보에 대하여 GML의 PointPropertyType, CurvePropertyType, SurfacePropertyType을 도입하였다. 또한 일반적인 공간자료에서는 Multi 객체에 대한 지원도 필요하다. 현 GDM 데이터베이스에서도 OGC 표준의 MultiPoint, MultiLineString, MultiPolygon을 지원하고 있다. 이를 위하여 GML의 상응 요소인MultiPointPropertyType, MultiCurvePropertyType, MultiSurfacePropertyType을 하천공간정보 벡터 스키마에 도입하여 활용하였다. 클라이언트 서버 통신은 메시지 교환프로토콜인 SOAP을 사용하여 서버의 객체를 직접 호출하여 이루어진다. 서버는 서버의 제공 서비스를 WSDL(Web Service Description Language)를 통하여 게시하고 클라이언트는 이 기준(Criteria)을 참고하여 접근한다. GetData의 경우 Type(GRID or VECTOR), GDM(Geospatial Data Model) 여부(true or false), LayerName, BasinID, GenTime을 인자로 받아 GeoData에서 검색된 정보를 반환한다. SOAP버전은 1.1과 1.2를 지원하여 접근하는 클라이언트에서 선택할 수 있도록 개발하였다.

  • PDF

Study of Implementation as Digital Twin Framework for Vertical Smart Farm (식물공장 적용 디지털 트윈 프레임워크 설계 연구)

  • Ko, Tae Hwan;Noe, Seok Bong;Noh, Dong Hee;Choi, Ju Hwan;Lim, Tae Beom
    • Journal of Broadcast Engineering
    • /
    • v.26 no.4
    • /
    • pp.377-389
    • /
    • 2021
  • This paper presents a framework design of a digital twin system for a vertical smart farm. In this paper, a framework of digital twin systems establishes three factors: 1) Client 2) IoT gateway, and 3) Server. Especially, IoT gateway was developed using the Eclipse Ditto, which has been commonly used as the standard open hardware platform for digital twin. In particular, each factor is communicating with the client, IoT gateway, and server by defining the message sequence such as initialization and data transmission. In this paper, we describe the digital twin technology trend and major platform. The proposed design has been tested in a testbed of the lab-scale vertical smart-farm. The sensor data is received from 1 Jan to 31 Dec 2020. In this paper, a prototype digital twin system that collects environment and control data through a raspberry pi in a plant factory and visualizes it in a virtual environment was developed.

Efficient Wi-Fi Security Protocol Using Dual Tokens (이중토큰을 이용한 효율적인 Wi-Fi 보안 프로토콜)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.417-429
    • /
    • 2019
  • WPA2-PSK uses a 4-way handshake protocol based on a shared secret to establish a secure session between a client and an AP. It has various security problems such as eavesdropping attacks and the secure session establishment process is inefficient because it requires multiple interactions between client and AP. The WPA3 standard has recently been proposed to solve the security problem of WPA2, but it is a small improvement using the same 4-way handshake methodology. OAuth 2.0 token authentication is widely used on the web, which can be used to keep an authenticated state of a client for a long time by using tokens issued to an authenticated client. In this paper, we apply the dual-token based randomized token authentication technology to the Wi-Fi security protocol to achieve an efficient Wi-Fi security protocol by dividing initial authentication and secure session establishment. Once a client is authenticated and equipped with dual tokens issued by AP, it can establish secure session using them quickly with one message exchange over a non-secure channel.

MPEG-DASH based 3D Point Cloud Content Configuration Method (MPEG-DASH 기반 3차원 포인트 클라우드 콘텐츠 구성 방안)

  • Kim, Doohwan;Im, Jiheon;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.4
    • /
    • pp.660-669
    • /
    • 2019
  • Recently, with the development of three-dimensional scanning devices and multi-dimensional array cameras, research is continuously conducted on techniques for handling three-dimensional data in application fields such as AR (Augmented Reality) / VR (Virtual Reality) and autonomous traveling. In particular, in the AR / VR field, content that expresses 3D video as point data has appeared, but this requires a larger amount of data than conventional 2D images. Therefore, in order to serve 3D point cloud content to users, various technological developments such as highly efficient encoding / decoding and storage, transfer, etc. are required. In this paper, V-PCC bit stream created using V-PCC encoder proposed in MPEG-I (MPEG-Immersive) V-PCC (Video based Point Cloud Compression) group, It is defined by the MPEG-DASH (Dynamic Adaptive Streaming over HTTP) standard, and provides to be composed of segments. Also, in order to provide the user with the information of the 3D coordinate system, the depth information parameter of the signaling message is additionally defined. Then, we design a verification platform to verify the technology proposed in this paper, and confirm it in terms of the algorithm of the proposed technology.

Development of an IoT-Based Human Interactive Advertising Service for Sharing Economy (공유경제를 위한 IoT 기반의 휴먼 인터랙티브 광고 서비스 구현)

  • Jung, Wonseok;Lee, Chang-Kyo;Ko, Wan-Jin;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.413-415
    • /
    • 2019
  • In this paper, we develop IoT-HiAS(IoT-Human Interactive Advertising Service) for sharing economy. The HiAS device shooting the front of the device via a webcam and recognizes the person in real time through the SSD model using MobileNet. If the number of persons above the set threshold is recognized by counting the recognized person, the advertisement is reproduced on the idle resource through the beam projector. At the same time as the advertisement is reproduced, the captured image of the advertisement start time in the front of the device and the number of recognized persons are sends the IoT server of an oneM2M-compliant HiAS server using the IoT client. When the advertisement is finish, the webcam is shooting the front of the device and the image is sends the IoT server. We implemented the IoT-based human interactive advertising service by transmitting the received data to the advertiser and the advertising producers through the SNS(Social Network Service) agent of the HiAS server.

  • PDF

The DIO Interval Adjustment to Enhance Mobility in RPL (RPL에서 이동성 향상을 위한 DIO 전송 간격 조절)

  • Shin, Yejin;Seol, Soonuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1679-1686
    • /
    • 2019
  • The main purpose of this research is to propose an approach for solving the packet loss problem by quickly adapting to topology change when nodes move in RPL-based IoT environment. In order to enhance mobility, every node is aware of the mobility of its neighbor nodes and quantifies the mobility level based on the number of control messages and all received packets. According to the mobility level, the DIO timer is changed. The proposed approach allows nodes to change their DIO timers according to their mobility levels to adapt topology changes and update paths to the sink. The performance of the proposed approach is evaluated using a Contiki-based Cooja simulator in various moving speeds. The simulation results show that the proposed approach copes with mobility scenarios better than the standard RPL by ascertaining that the packet delivery ratio is improved by 31.03%.

Implementation of Video Signal Delivery Protocols for the Camera Device via the Internet (인터넷을 통한 카메라 디바이스의 영상신호 전달 프로토콜 구현)

  • Lee, Ji-Hoon;Chung, Hae;Baek, Bong-Ki;Jo, Young-Rae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.691-700
    • /
    • 2021
  • The IP cameras have rapidly replaced the analog CCTVs as the cameras have the advantages of not only being able to remotely monitor, but also supplying power through the UTP cable, In this paper, we introduce the protocol architecture of the ONVIF standard which is widely applied to the IP camera and other Internet protocols to support it, and implement the ONVIF Device on a commercial board. Although these functions can be controlled by the Client (PC), several functions such as privacy masks, temperature display of the thermal camera, and ROI (Region of Interest) are implemented through a web viewer on the device. Through the experiment, the functions of ONVIF Profile S and web viewer are verified through SOAP messages exchanged between Device (IP camera) and Client program and streamed images.

Design of MD5 Hash Processor with Hardware Sharing and Carry Save Addition Scheme (하드웨어 공유와 캐리 보존 덧셈을 이용한 MDS 해쉬 프로세서의 설계)

  • 최병윤;박영수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.139-149
    • /
    • 2003
  • In this paper a hardware design of area-efficient hash processor which implements MD5 algorithm using hardware sharing and carry-save addition schemes is described. To reduce area, the processor adopts hardware sharing scheme in which 1 step operation is divided into 2 substeps and then each substep is executed using the same hardware. Also to increase clock frequency, three serial additions of substep operation are transformed into two carry-save additions and one carry propagation addition. The MD5 hash processor is designed using 0.25 $\mu\textrm{m}$CMOS technology and consists of about 13,000 gates. From timing simulation results, the designed MD5 hash processor has 465 Mbps hash rates for 512-bit input message data under 120 MHz operating frequency.

The Modified IPv6 NDP Mechanism for Preventing IP Spoofing (IP 스푸핑 방지를 위한 수정된 IPv6 NDP 메커니즘)

  • Kim Ji-Hong;Nah Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.95-103
    • /
    • 2006
  • IPv6 is a new version of the Internet protocol, designed as the successor to IPv4. Among the changes from IPv4 to IPv6, we focused on the stateless address auto-configuration mechanism. The address auto-configuration mechanism is used by nodes in an IPv6 network to learn the local topology. The current specifications suggest that IPsec AH may be used to secure the mechanism, but there is no security association during address auto-configuration process because it has no initial IP address. As there are so many suity threats, SEND protocol was designed to counter these threats. In this paper we analyzed the security problems in NDP and SEND protocol. So we proposed the Modified NDP mechanism using PKC and AC in order to solve these problems.

DoS attack prevention using methods for reduction of memory usage in 802.11i 4-Way Handshake (메모리 사용 감소를 통한 802.11i 4-Way Handshake에서의 DoS 공격 차단 기법)

  • Kim, Jung-Yoon;Kim, In-Hwan;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.89-98
    • /
    • 2010
  • Wireless LAN (WLAN) is type of wireless service that has higher data transmission than current cellular networks. The usage is continually increasing. There are a lot of vulnerabilities in wireless network, due to the properties of the wireless environment, regardless of its popularity. IEEE announced the 802.11i security standard to solve these problems. The vulnerable point of messages used in the process of key distribution for 802.11i makes the target node attacked lose memory through continuous messages and blocks the legitimate WLAN service. In this paper, we proposed new schemes to solve this problem and compared our proposals with the current process. The proposed protocol eliminates the memory exhaustion problem on the client side by using methods for reduction of memory usage.