• Title/Summary/Keyword: Deployment Information

Search Result 1,014, Processing Time 0.031 seconds

Voronoi diagram-based sensor node deployment (보로노이 다이어그램 기반 센서 노드 배치)

  • Jeon, Seung-Woo;Hong, Bong-Hee;Kwon, Joon-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.411-413
    • /
    • 2012
  • 생강, 양파와 같은 농산물은 재배지에서 우리 식탁에 놓일 때까지 신선도 유지를 위하여 저장고에 넣어 관리한다. 하지만, 현재 설치되어 사용 중에 있는 저장고는 내부에 온/습도를 측정할 수 있는 센서를 부착하고 측정함에도 불구하고, 농산물이 얼거나 부패되는 문제점이 발생하고 있다. 이것은 저장고 내부 센서의 부착이 그만큼 효율적이지 못하다는 것을 반증하고 있는 것이다. 이 문제점을 극복하기 위하여, 본 논문에서는 보로노이 다이어그램을 이용한 센서 배치 기법을 제안한다. 이 기법은 저장고 내부의 공간을 평면 분할하고, 분할된 공간에 센서 배치를 함으로서, 저장고 내부의 온도를 정확히 얻을 수 있을 뿐만 아니라, 배치된 센서 개수의 최소화를 이룰 수 있도록 한다.

Analyses of Security, Privacy Issues and Challenges for RFID System

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.701-705
    • /
    • 2011
  • RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.

Energy-aware Management in Wireless Body Area Network System

  • Zhang, Xu;Xia, Ying;Luo, Shiyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.949-966
    • /
    • 2013
  • Recently, Wireless Body Area Network (WBAN) has promise to revolutionize human daily life. The need for multiple sensors and constant monitoring lead these systems to be energy hungry and expensive with short operating lifetimes. In this paper, we offer a review of existing work of WBAN and focus on energy-aware management in it. We emphasize that nodes computation, wireless communication, topology deployment and energy scavenging are main domains for making a long-lived WBAN. We study the popular power management technique Dynamic Voltage and Frequency Scaling (DVFS) and identify the impact of slack time in Dynamic Power Management (DPM), and finally propose an enhanced dynamic power management method to schedule scaled jobs at slack time with the goal of saving energy and keeping system reliability. Theoretical and experimental evaluations exhibit the effectiveness and efficiency of the proposed method.

FIDO Universal Authentication System Based on Blockchain (블록체인 기반의 FIDO 범용 인증 시스템)

  • Kim, S.H.;Huh, S.Y.;Cho, Y.S.;Cho, S.R.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.34-44
    • /
    • 2018
  • In this paper, we describe a FIDO universal authentication system based on a Blockchain that can share the user's FIDO authentication information between the application services of multiple domains without the use of a server. In addition we provide a method to query the FIDO authentication information of the user recorded in the Blockchain using only the user's service ID. Therefore, even if the user executes the FIDO registration process only once, the user can use the FIDO authentication service of another application service without repeating an additional FIDO registration procedure, and the service provider can securely share and utilize the FIDO authentication information of the user without the use of a trusted third party, thereby lowering the deployment and maintenance costs of the FIDO server.

Time of Arrival range Based Wireless Sensor Localization in Precision Agriculture

  • Lee, Sang-Hyun;Moon, Kyung-Il
    • International journal of advanced smart convergence
    • /
    • v.3 no.2
    • /
    • pp.14-17
    • /
    • 2014
  • Precision agriculture relies on information technology, whose precondition is providing real-time and accurate information. It depends on various kinds of advanced sensors, such as environmental temperature and humidity, wind speed, light intensity, and other types of sensors. Currently, it is a hot topic how to collect accurate information, the main raw data for agricultural experts, monitored by these sensors timely. Most existing work in WSNs addresses their fundamental challenges, including power supply, limited memory, processing power and communication bandwidth and focuses entirely on their operating system and networking protocol design and implementation. However, it is not easy to find the self-localization capability of wireless sensor networks. Because of constraints on the cost and size of sensors, energy consumption, implementation environment and the deployment of sensors, most sensors do not know their locations. This paper provides maximum likelihood estimators for sensor location estimation when observations are time-of arrival (TOA) range measurement.

헬스케어시스템을 위한 역할 기반의 신뢰협상 모델

  • Jo, Hyeon-Suk;Lee, Hyeong
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.84-102
    • /
    • 2007
  • Security is crucial for the successful deployment of large distributed systems. Many of these systems provide services to people across different administrative domains. The traditional identity-based access control mechanisms are un scalable and difficult to manage. Unlike the closed systems, open systems provide services to people from different security domains. Healthcare systems need to be highly available in order for the patients to get a timely treatment. The health care information should be available to authorized users both inside the administrative domain and outside the domain, such as pharmacies and insurance companies. In this paper, we first analyzed the necessities and advantages of importing attribute-based trust-management models into open distributed systems. Then we reviewed traditional access-control models and presented the basic elements of the new trust-management model.

  • PDF

Security Design of Information Security for Wireless Local Area Network (무선 네트워크망의 정보보호를 위한 시스템 설계)

  • Kim, Jung-Tae;Jung, Sung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.729-732
    • /
    • 2003
  • Security and privacy issues complicate wireless local area network deployment. for a wired network, certain levels of security are maintained since access to the physical medium is restricted to the devices physically connected to the network. Though wireless local area networks offer some built-in security features, security breaches are possible if appropriate precautions are not taken. This paper describes security issues related to wireless local area networks and presents a software approach for restricting and controlling wireless access. The system authenticates users on the basis of identity, privileges and access hardware by distributed software agents that implement security policy and restrict unauthorized access.

  • PDF

Energy-Efficient Base Station Operation in Heterogeneous Cellular Networks

  • Nguyen, Hoang-Hiep;Pham, Ngoc-Thai;Hwang, Won-Joo
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.158-159
    • /
    • 2012
  • Heterogeneous cellular networks can provide high throughput and coverage compare to conventional networks of only macrocell deployment, however it operates regardless of total power consumption, which is a very important issue of modern cellular networks. We propose a policy that control the on/off state of base stations in heterogeneous networks according daily traffic profile. Under this policy, the total power consumed can be significantly reduced when the traffic is low while preserving QoS requirement.

  • PDF

A Conceptual Model of Knowledge Management System by using "4+1" views of UML (UML의 "4+1" 뷰를 이용한 지식 관리 시스템의 개념적 모델)

  • Sung Wook Ahn;Nam Yong Lee;Sung Yul Rhew
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.1
    • /
    • pp.123-134
    • /
    • 2000
  • Over the past several decades, several architectural approaches have been applied to develop Information Systems, The software architectural model has been recognized as one of the most important methods for improving productivity. Most conceptual models are difficult to understand and interpret at various system models. As a consequence, conceptual models of many Information Systems fail to represent, exploit, and apply to various aspects, which is needed for reducing development step of the architecture. In this paper, we will explain the architectural model as the 4+1 View of UML. This model integrates the Knowledge Management System into five views: the Logical View, the Process View, the Deployment View, Implementation View, and the Use-Case View. Moreover, this paper will not only provide information on the application of the software architectural model by stakeholders, but also ultimately improve productivity.

  • PDF

Network analysis on the deployment of the industrialization of information and the informatization of industry (산업의 정보화와 정보의 산업화 진전과정에 대한 네트워크 분석)

  • 조형곤;김문수;박광만;김진일;박용태;오형식
    • Proceedings of the Technology Innovation Conference
    • /
    • 1999.12a
    • /
    • pp.197-215
    • /
    • 1999
  • With the advent of knowledge-based economy and information society, information and telecommunications(IT) industry is reckoned as the crucial sector for the creation and diffusion of technological knowledge. In this study, we analyze the process of 'industrialization of IT'and 'informatization of industries' based on the technology linkage structure, or technological knowledge network. The former is defined as the process whereby IT industry absorbs technological knowledge from other industries to grow as an independent industrial sector. The latter is defined as the process whereby other industries adopt IT technology to enhance productivity and upgrade industrial structure, We employ the R&D stock as a proxy for technological knowledge of respective industries and measure the flow of technological knowledge between industries in terms of I/O relationship. By applying the network analysis, we examine the changing pattern of technology linkage structure of the Korean industry throughout the years from 1983 to 1997. Some policy implications are presented based on the findings from the analysis.

  • PDF