• Title/Summary/Keyword: Gateways

Search Result 172, Processing Time 0.031 seconds

A Study on the Development of Energy IoT Platform (에너지 IoT 플랫폼 개발에 관한 연구)

  • Park, Myung Hye;Kim, Young Hyun;Lee, Seung Bae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.311-318
    • /
    • 2016
  • IoT(Internet of Things areas) rich information based on the user easy access to service creation must be one of the power system of specificity due following: The IoT spread obstacle to the act be, and 'Smart Grid information of this is not easy under power plants approach the Directive on the protection measures, particularly when stringent security policies IoT technologies applied to Advanced Metering Infrastructure sector has been desired. This is a situation that occurs is limited to the application and use of IoT technologies in the power system. Power Information Network is whilst closed network operating is has a smart grid infrastructure, smart grid in an open two-way communication for review and although information security vulnerabilities increased risk of accidents increases as according to comprehensive security policies and technologies are required and can. In this paper, the IoT platform architecture design of information systems as part of the power of research and development IoT-based energy information platform aims. And to establish a standard framework for a connection to one 'Sensor-Gateway-Network-platform sensors Service' to provide power based on the IoT services and solutions. Framework is divided into "sensor-gateway" platform to link information modeling and gateways that can accommodate the interlocking standards and handling protocols variety of sensors Based on this real-time data collection, analysis and delivery platform that performs the role of the relevant and to secure technology.

Comparative Analysis of TTAK.KO-06.0288-Part3 and Development of an Open-source Communication Library for Greenhouse Control System

  • Kim, Joon Yong;Kim, Sangcheol;Lee, Jaesu
    • Journal of Biosystems Engineering
    • /
    • v.43 no.1
    • /
    • pp.72-80
    • /
    • 2018
  • Purpose: A modern greenhouse consists of various Information and Communications Technology (ICT) components e.g., sensor nodes, actuator nodes, gateways, controllers, and operating softwarethat communicate with each other. The interoperability between these components is an essential characteristic for any greenhouse control system. A greenhouse control system could not work unless the components communicate via common interfaces. The TTAK.KO-06.0288 is an interface standard consisting of four parts. Notably, TTAK.KO-06.0288-Part3, which describes the interface between a greenhouse operating system (GOS) and a greenhouse control gateway (GCG), is the core standard of TTAK.KO-06.0288. The objectives of this study were to analyze the TTAK.KO-06.0288-Part3 standard, to suggest alternative solutions for identified issues, and to develop a library as a proof of the alternative solutions. Methods: The "data field" was analyzed using a comparative analysis method, since it is a data transmission unit of TTAK.KO-06.0288-Part3. It was compared with other parts of TTAK.KO-06.0288 in terms of definition, format, size, and possible values. Although TTAK.KO-06.0288-Part1 and TTAK.KO-06.0288-Part2 do not use a "data field," they have a similar data structure. That structure was compared with the "data field" of TTAK.KO-06.0288-Part3. Results: Twenty-one issues were identified across four categories: inter-standard issues, intra-standard issues, operational issues, and misprint issues. Since some of the issues can raise interoperability problems, 16 alternative solutions were suggested. In order to prove the alternative solutions, an open-source communication library called libtp3 was developed. The library passed 14 unit tests and was adapted to two research. Conclusions: Although TTAK.KO-06.0288-Part3 is an interface standard for communication between a GOS and a GCG, it might not communicate between different implementations because of the identified issues in the standard. These issues could be solved by the alternative solutions, which could be used to revise TTAK.KO-06.0288. In addition, a relevant organization should develop a program for compatibility testing and should pursue test products for smart greenhouses.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

The Effect of C Language Output Method to the Performance of CGI Gateway in the UNIX Systems (유닉스 시스템에서 C 언어 출력 방법이 CGI 게이트웨이 성능에 미치는 영향)

  • Lee Hyung-Bong;Jeong Yeon-Chul;Kweon Ki-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.147-156
    • /
    • 2005
  • CGI is a standard interface rule between web server and gateway devised for the gateway's standard output to replace a static web document in UNIX environment. So, it is common to use standard I/O statements provided by the programming language for the CGI gateway. But the standard I/O mechanism is one of buffer strategies that are designed transparently to operating system and optimized for generic cases. This means that it nay be useful to apply another optimization to the standard I/O environment in CGI gateway. In this paper, we introduced standard output method and file output method as the two output optimization areas for CGI gateways written in C language in the UNIX/LINUX systems, and applied the proposed methods of each area to Debian LINUX, IBM AIX, SUN Solaris, Digital UNIX respectively. Then we analyzed the effect of them focused on execution time. The results were different from operating system to operating system. Compared to normal situation, the best case of standard output area showed about $10{\%}$ improvement and the worst case showed $60{\%}$ degradation in file output area where some performance improvements were expected.

Development of Management Systems based on IDEF3 Modeling to Improve Owner's Competency of Implementing Green building Certification (친환경건축물인증 발주자업무 수행역량 제고를 위한 IDEF3 모델기반 관리체계 구축)

  • Park, Kyung-Rog;Yi, June-Seong
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.1
    • /
    • pp.52-62
    • /
    • 2013
  • Owners' efforts to acquire Green building certification, which started in 2002, have been rapidly increasing since 2006. The causes of the increased owners' interests are due to various incentives, legal obligation, and purpose of advertising. As project owners generally are deficient in capabilities and knowledge on how to deal with administrative works on certification, they tend to fulfill the minimum requirements for certification. However, effective administration process need capabilities of identifying individual making decision point and review information. The implementation of green building certification system is expected to provide comfort to both occupants and potential users. Furthermore it contributes to reducing energy costs throughout the phase of O&M. In addition, technology innovation in green industry can be obtained. Therefore, this study is intended to support owners in order that they can clarify certification tasks and make a rational decision-making in time. For this purpose, first of all, the major decision points were selected as the gateways of green building certification process. And then management system based on IDEF3 modeling was developed for supporting owners' decision-making performance. This management system will improve owners' overall capacity in handling all the tasks regarding the certification of Green building.

Development of Urban Tourism through the Improvement of City Image (도시이미지 제고를 통한 도시 관광개발)

  • Kim, Boo-Sung
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.13 no.3
    • /
    • pp.354-380
    • /
    • 2010
  • Cities are the most important type of tourist destination across the world, and yet urban areas have neglected in most academic studies of tourism. Urban destinations serve as gateways for tourist entry to the country, as centers of accommodation and a base for excursion to rural areas as well as destinations in their own right. Increasingly cities rely on image promotion to attract tourists to cities. A city's image is the sum of beliefs, ideas, and impressions that a people have of a city. Image has always been of great interest and concern to city marketers. The image improvement is very important especially in urban tourism development because tourism overwhelmingly depends on image. The cost and effectiveness of the image improvement strategy depends on the city's current image and real attributes. Some cities are blessed with positive images. They don't require changing the image so much as amplifying it and delivering it to more target groups. Many cities are stuck with a negative image. They need to remove it and make a positive out of a negative to correct it. Image reversals, however, are difficult to accomplish. Some cities are not well known because they are small, lack attractions, or don't advertise. They need to identify, develop, and disseminate a strong positive image for the city.

  • PDF

A Bloom Filter Application of Network Processor for High-Speed Filtering Buffer-Overflow Worm (버퍼 오버플로우 웜 고속 필터링을 위한 네트워크 프로세서의 Bloom Filter 활용)

  • Kim Ik-Kyun;Oh Jin-Tae;Jang Jong-Soo;Sohn Sung-Won;Han Ki-Jun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.93-103
    • /
    • 2006
  • Network solutions for protecting against worm attacks that complement partial end system patch deployment is a pressing problem. In the content-based worm filtering, the challenges focus on the detection accuracy and its performance enhancement problem. We present a worm filter architecture using the bloom filter for deployment at high-speed transit points on the Internet, including firewalls and gateways. Content-based packet filtering at multi-gigabit line rates, in general, is a challenging problem due to the signature explosion problem that curtails performance. We show that for worm malware, in particular, buffer overflow worms which comprise a large segment of recent outbreaks, scalable -- accurate, cut-through, and extensible -- filtering performance is feasible. We demonstrate the efficacy of the design by implementing it on an Intel IXP network processor platform with gigabit interfaces. We benchmark the worm filter network appliance on a suite of current/past worms, showing multi-gigabit line speed filtering prowess with minimal footprint on end-to-end network performance.

ZigBee Service Gateway Enabling Dynamic Reconfiguration (동적 설정 가능한 지그비 서비스 게이트웨이 구조)

  • Kim, Seong-Hoon;Kang, Jeong-Seok;Baeg, Sung-Ho;Park, Jae-Han;Park, Hong-Seong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10B
    • /
    • pp.644-654
    • /
    • 2007
  • ZigBee is one of wireless communication standards and many applications based on Zigbee have been developing for commercial applications. Most of those applications require links to Internet like Zigbee service gateways. However, ZigBee service gateway should provides following functions to be effectively utilized itself: translation of messages between diverse ZigBee application profiles and message formats used in Internet, addition/removal of a new ZigBee service without stopping existing services according to addition/removal of a Zigbee node, and no transmission of unwanted packets to ZigBee network. Therefore, this paper proposes a new type of ZigBee Service Gateway, called ZiGate to provide the functions. The proposed ZiGate is capable of re-configurating message translation modules required in case of addition/removal of nodes and doesn't transmit unnecessary packets to the ZigBee networks by synchronizing itself with ZigBee network. And ZiGate provides translation modules between messages defined in Zigbee application profiles and both text-based and binary-based messages used in Internet. In this paper we implements the ZiGate and evaluates it on the test bed. This evaluations show that the proposed ZiGate works efficiently.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.