• Title/Summary/Keyword: Embedded internet system

Search Result 422, Processing Time 0.023 seconds

Web Service Method using WSDL Repository (웹서비스를 위한 WSDL 리포지토리 설계)

  • Choi, Yue-Soon;Park, Jong-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.745-753
    • /
    • 2007
  • Web service, the next generation of distributed computing, is a distributed solution that handles all businesses through standard techniques in the internet. Web service performs its function using web interface. The goal of this thesis is to reduce network overloading. to manage WSDL efficiently, and to provide convenience to service users by simplifying the web service procedure. Web service system proposed in this thesis is based on WSDL Repository that can include UDDI and store WSDL. WSDL Repository manages WSDL by file system and has UDDI Registry embedded within it. Because this system is based on WSDL Repository, Web service supplier must register WSDL when he registers services. Then, users can receive WSDL too when he searches for services.

IP-PBX System of RasPBX-Based (RasPBX 기반의 IP-PBX 시스템)

  • Jeong, Dae-Jin;Song, Hyun-Ok;Jung, Hoe-kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1131-1136
    • /
    • 2015
  • VoIP and IP Telephony telephony technology development is a growing by easy to using IP-PBX by using phone from using existing lines rather than the internet. IP-PBX do not use the phone line from phone work for many companies and institutions of management costs reduce as provides similar to regular phone line quality. But IP-PBX to introduce for need to be the initial cost on is should buy for expensive hardware equipment or commercial software. In this paper, suggest way to introduce IP-PBX do not buy expensive hardware equipment or commercial software. Suggest IP-PBX on designed and implement for IP-PBX server using Raspberry Pi and Asterisk. And verification treatise on the suitability of conducted by voice calls based on IP-PBX between PC and a Smartphone

A Novel Architecture for Dynamic Mobile Networks with IPv6-based Multiple Network Interfaces (IPv6 기반의 다중 네트워크 인터페이스를 갖는 새로운 동적 이동형 네트워크 아키텍쳐)

  • Kim Wan-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.25-34
    • /
    • 2006
  • In this paper DynaMoNET is suggested as a novel IPv6-based multi-homed mobile network architecture which is composed of nested mobile ad hoc networks dynamically coming together through wireless personal area networks. Each ad hoc network has a mobile router which may work as a root mobile router instead of fixed mobile routers in a DynaMoNET. A root mobile router provides the reliable Internet connectivity for the entire mobile network. This paper includes a innovative handover protocol for multi-homed mobile networks, network switchover algorithm considering multiple decision factors, root mobile router election process based on token-based algorithm fast root mobile router discovery algorithm and fault avoidance mechanism to support reliable Internet connectivity. Finally the system architecture of a mobile router is given in detail.

A Study on AES-based Mutual Authentication Protocol for IoT Devices (사물인터넷 디바이스를 위한 AES 기반 상호인증 프로토콜)

  • Oh, Se-Jin;Lee, Seung-Woo
    • Journal of Industrial Convergence
    • /
    • v.18 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • The Internet of things (IoT) is the extension of Internet connectivity into various devices and everyday objects. Embedded with electronics, Internet connectivity and other forms of hardware. The IoT poses significant risk to the entire digital ecosystem. This is because so many of these devices are designed without a built-in security system to keep them from being hijacked by hackers. This paper proposed a mutual authentication protocol for IoT Devices using symmetric-key algorithm. The proposed protocol use symmetric key cryptographic algorithm to securely encrypt data on radio channel. In addition, the secret key used for encryption is random number of devices that improves security by using variable secret keys. The proposed protocol blocked attacker and enabled legal deives to communicate because only authenticated devices transmit data by a mutual authentication protocol. Finally, our scheme is safe for attacks such as eavesdropping attack, location tracking, replay attack, spoofing attack and denial of service attack and we confirmed the safety by attack scenario.

Embedded Multi-LED Display System based on Wireless Internet using Otsu Algorithm (오츠 알고리즘을 활용한 무선인터넷 기반 임베디드 다중 LED 전광판 시스템)

  • Jang, Ho-Min;Kim, Eui-Ryong;Oh, Se-Chun;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.329-336
    • /
    • 2016
  • In the outdoor advertising and industrial sites, are trying to implement the LED electric bulletin board system that is based on image processing in order to express a variety of intention in real time. Recently, in various field, rather than simple text representation, the importance of intuitive communication using images is increasing. Thus, instead of outputting the simple input information for communication, a system that can output a real-time information being sought. Therefore, the system is directed to overcoming by converting the problem of mapping an image on a variety of conventional LED display that can not be output images, the possible image output formats. Using an LED of low power, it has developed to output the efficient messages and images within a limited resources. This paper provides a system capable of managing the LED display on the wireless network. Atmega2560, Wi-Fi module, using the server and Android applications client, rather than printing a text only, it is a system to reduce the load generated image output character output in to the conversion process as can be managed by the server.

Heterogeneous multi-core simulator based on SMP for the efficient application development at the heterogenous multi-core environment (효과적인 이기종 다중코어 응용 개발을 위한 SMP기반 이기종 다중코어 시뮬레이터)

  • SaKong, June;Shin, Dongha
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.3
    • /
    • pp.111-117
    • /
    • 2018
  • Heterogeneous multi-core environment integrated with different functional cores is the powerful tool for the embedded system that became more complex and diverse. Specialized application requires one chip solution with different operating system over different cores. But this heterogeneity causes difficult configuration of the development environment, makes hard to develop and test software. We show the environment of heterogeneous multi-core processing can be mapped to symmetric multi-core environment. We construct Linux based RPMsg for the data exchange between processes similar with the heterogeneous multi-core RPMsg and experiment that the proposed environment can be used to reduce the steps of the heterogeneous multi-core application development. With this simplification, we suggest simulation method for easy development and debugging the heterogeneous multicore environment that makes complex steps to simple.

Performance Evaluation of IoT Cloud Platforms for Smart Buildings (스마트 빌딩을 위한 IoT 클라우드 플랫폼의 성능 평가)

  • Park, Jung Kyu;Park, Eun Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.664-671
    • /
    • 2020
  • A Smart Building, one that uses automated processes to control its operations, refers in this study to one that uses both Internet of Things (IoT) devices and cloud services software. Cloud service providers (e.g. Amazon, Google, and Microsoft) have recently providedIoT cloud platform application services on IoT devices. According to Postscapes, there are now 152 IoT cloud platforms. Choosing one for a smart building is challenging. We selected Microsoft Azure IoT Hub and Amazon's AWS (Amazon Web Services) IoT. The two platforms were evaluated and selected from a smart building perspective. Each prototype was evaluated on two different IoTplatforms, assuming a typical smart building scenario. The selection was based on information and experience gained from developing the prototype system using the IoT cloud platform. The assessment made in this evaluation may be used to select an IoTcloud platform for smart buildings in the future.

Design and Implementation of LED Lighting Control System Using Arduino Yun and Cloud in IoT (사물인터넷에 아두이노 윤과 클라우드를 이용한 LED 조명 제어 시스템 설계)

  • Xu, Hao;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.10
    • /
    • pp.983-988
    • /
    • 2016
  • Internet of Things Iranian people and things, things and things are connected through the Cloud. It can significantly save energy through a combination of LED lighting as a new ICT technologies and industry-to provide a human-centric, eco-friendly, and the content is embedded multifunction solutions that meet your needs, environment, implementation time according to user requirements, technology It can be systematized as converged next-generation lighting. In this paper, we have developed regarding whether the building in relation to the LED lighting control system using smart devices and Cloud-based user as a human connection through the board to the Arduino Yun lit LED lighting, wireless smart device or to the Cloud or off. After the Arduino Yun is connected to the Internet, taking the current date and time information from the Linux shell command used the way coming across the bridge (BRIDGE) its value.

Beam Scheduling and Task Design Method using TaP Algorithm at Multifunction Radar System (다기능 레이다 시스템에서 TaP(Time and Priority) 알고리즘을 이용한 빔 스케줄링 방안 및 Task 설계방법)

  • Cho, In-Cheol;Hyun, Jun-Seok;Yoo, Dong-Gil;Shon, Sung-Hwan;Cho, Won-Min;Song, Jun-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.61-68
    • /
    • 2021
  • In the past, radars have been classified into fire control radars, detection radars, tracking radars, and image acquisition radars according to the characteristics of the mission. However, multi-function radars perform various tasks within a single system, such as target detection, tracking, identification friend or foe, jammer detection and response. Therefore, efficient resource management is essential to operate multi-function radars with limited resources. In particular, the target threat for tracking the detected target and the method of selecting the tracking cycle based on this is an important issue. If focus on tracking a threat target, Radar can't efficiently manage the targets detected in other areas, and if you focus on detection, tracking performance may decrease. Therefore, effective scheduling is essential. In this paper, we propose the TaP (Time and Priority) algorithm, which is a multi-functional radar scheduling scheme, and a software design method to construct it.

Novel Method for DNA-Based Elliptic Curve Cryptography for IoT Devices

  • Tiwari, Harsh Durga;Kim, Jae Hyung
    • ETRI Journal
    • /
    • v.40 no.3
    • /
    • pp.396-409
    • /
    • 2018
  • Elliptic curve cryptography (ECC) can achieve relatively good security with a smaller key length, making it suitable for Internet of Things (IoT) devices. DNA-based encryption has also been proven to have good security. To develop a more secure and stable cryptography technique, we propose a new hybrid DNA-encoded ECC scheme that provides multilevel security. The DNA sequence is selected, and using a sorting algorithm, a unique set of nucleotide groups is assigned. These are directly converted to binary sequence and then encrypted using the ECC; thus giving double-fold security. Using several examples, this paper shows how this complete method can be realized on IoT devices. To verify the performance, we implement the complete system on the embedded platform of a Raspberry Pi 3 board, and utilize an active sensor data input to calculate the time and energy required for different data vector sizes. Connectivity and resilience analysis prove that DNA-mapped ECC can provide better security compared to ECC alone. The proposed method shows good potential for upcoming IoT technologies that require a smaller but effective security system.