• 제목/요약/키워드: Home Server

Search Result 371, Processing Time 0.025 seconds

A Study on the Establishment of the Safe Kindergarten Connecting a Home and Disaster Preparedness(Life Safety) for Infants (유아 재난 대비(생활 안전) 및 가정과 연계 유치원 안전 체계 구축 연구)

  • Nam, Kang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.245-252
    • /
    • 2016
  • The Service Platform for going to Kindergarten configured with Beacon Devices, Gateway attached to the BUS, Mobile Communication Network, and Application Server. In this paper, We understand the need for Commuting Kindergarten Services, And interface to Specification of Kindergartener's Beacon Identification, And so design to Gateway Resource Tree Functions. For the Service Interfacing, Commute alerts handled in Parental Cellphone through APP. The Service Platform can check the registered beacon data collection and operation management function.

Measuring Inner or Outer Position of Ship Passenger and Detection of Dangerous Situations based LoRa WAN Communication (LoRa WAN 통신 기반의 선박 내/외부 승선자 측위 및 위험상황 감지 시스템)

  • Park, Seok Hyun;Park, Moon Su
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.2
    • /
    • pp.282-292
    • /
    • 2020
  • In order to minimize casualties from marine vessel accidents that occur frequently at home and abroad, it is important to ensure the safety of the passengers aboard the vessel in the event of an accident. There is an EPIRB system as a system for disaster preparedness in the marine situation currently on the market, but there is a problem that the price is very expensive. In order to overcome the cost problem, which is a disadvantage of previous system, LoRaWAN-based communication is used. LoRaWAN communication-based vessel positioning and risk detection system based on LoRaWAN communication transmits measurement data of each module using two Beacon and GPS modules to stably perform position measurement for both indoor and outdoor situations. The rider danger situation detection system can detect the safety status of the rider using the 3-axis acceleration sensor, collect data from the rider positioning system and the rider safety status detection system, and send to server using LoRa communication. When conducting communication experiments in the long-distance maritime situation and actual communication experiments using the implemented system, it was found that the two experiments showed over 90% communication success rate on average.

Development of u-Lifecare Monitoring System Device (u-라이프케어 모니터링 시스템 단말기 개발)

  • Choi, Dong-Oun;Kang, Yun-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1533-1540
    • /
    • 2012
  • u-Life care device collect body bio formation, and classify and store them in exercise patterns. Afterwards, the devices send the data through bluetooth wireless communication to the smart phones which set Google Android operation system at regular intervals. The information is checked out through application. u-Life care device calculates calories spent a day after monitoring activity quantity with 3-axis acceleration sensor. The device judges the status of health through body data mining and consults tailored exercise treatment. When sending body data, the device sends them in smart phone through Blue Tooth wireless communication at once. So, as a strong point, the device doesn't need mobile gateway or home gateway used for sending to web server information sensed from exercise life care products.

Cloud Security Technology and Vulnerability Assessment (클라우드 보안 기술과 취약점 분석)

  • Kim, A-Yong;Lee, Sung-Ock;Ryu, Seung-Han;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.690-692
    • /
    • 2013
  • Cloud computing is an Internet-based technology, one of the Big Data era aspiring technology. Bring on the internet whenever you need to use multiple physical servers into one virtual server, cloud Cloud technology and large companies, such as leading U.S. IT company, Amazon, IBM, Google, Microsoft and the domestic firm Samsung, SK, KT, NHN the cloud market at home and abroad, and commercialization by investing in the future to continue to grow. The main reason for the introduction of the cloud and reduced operating costs, and to see the most problems is the leakage of personal information. In this paper, we propose a method to improve the security and vulnerability analysis of security technologies and cloud.

  • PDF

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.

Introduction of IPv4 and IPv6 Muliticast address allocation and Standardization trends (IPv4 및 IPv6에서의 멀티캐스트 할당 기법과 표준화 동향)

  • 인민교;박정수;홍용근;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.57-60
    • /
    • 2001
  • In this paper, I will describe the trends of multicast address allocation mechanism. IP Multicast efficiently supports this type of transmission by enabling sources to send a single copy of a message to multiple recipients who explicitly want to receive the information. Generally, MAAs server or MADCAP servers are used to allocate multicast addresses. As the need of home networking and autoconfiguring network mechanism has been increased, not only automatic host IP configuration but also automatic multicast address generation mechanism was demanded. in this paper, I will explain the automatic multicast address mechanism in a host. management techniques and the trends of multicast address generation and allocation mechanism that is bong now discussed In IETF.

  • PDF

A Study on The Development of a Home Server Using An Embedded Linux Board (임베디드 리눅스 보드를 이용한 홈 서버 구현에 관한 연구)

  • Kim, Jin-Ho;Kim, Tae-Min;Lee, Jong-Su
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.367-368
    • /
    • 2007
  • 본 논문은 홈 네트워크 시스템에서 사용자의 편의를 고려한 홈 서버 구현 방안에 대해 제안한다. 홈 서버는 리눅스 기반의 임베디드 보드 또는 PC를 사용할 수 있고 시스템은 인터넷 망을 기반으로 하고 있으며 클라이언트, 서버, 시뮬레이터로 구성되어 있다. 사용자는 웹 브라우저를 내장한 모든 기기에서 서버에 접속할 수 있다. 클라이언트 프로그램은 모든 종류의 CPU와 OS를 지원하기 위하여 자바 애플릿을 사용하였다. 사용자는 별도의 프로그램 설치 없이 원격에서 서버의 웹 페이지를 통해 접속하고 각종 기기들을 제어할 수 있으며 손쉽게 데이터를 공유할 수 있다. 서버는 리눅스 기반으로 웹 서비스를 할 수 있도록 서버가 구축되어있고 클라이언트 프로그램과 동일한 이유로 자바언어를 사용하여 서버 프로그램을 작성하였다. PC 대신 사용할 수 있는 임베디드 리눅스 보드는 내장형 시스템을 구성하는데 유용하며 홈 네트워크 시스템뿐만 아니라 각종 분야 등에도 널리 이용되어 질 수 있다. 임베디드 보드는 많은 자원을 필요로 하지 않는 국한된 목적의 시스템에 적용하기에 적합하며 널리 사용되고 있다. 시스템 구성을 위해 임베디드 보드에 리눅스를 포팅하고, 웹서버를 사용 가능하게 만들어 준 후, 자바 프로그램을 실행하기 위한 JVM(Java Virtual Machine)과 서블릿 및 JSP등의 자바 코드를 이해할 수 있는 엔진을 포팅하였다. 이로써 웹 서버로서의 역할과 홈 네트워킹 서버로서의 역할을 동시에 수행하게 된다. 시뮬레이션 프로그램은 자바 어플리케이션 프로그램을 사용하였고 데이터의 정상적인 전달여부와 기기들의 상태를 모니터링 할 수 있다.

  • PDF

Smart Gateway VPN Tunneling Control System based on IoT (IoT 기반 스마트 게이트웨이 VPN 터널링 제어 시스템)

  • Yang, Seungeui;Kim, Changsu;Lee, Jongwon;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.575-576
    • /
    • 2017
  • Recently, research have smart gateways can provide additional services through the IoT and Big Data. However, the existing System is number of devices connected increases to the Server, the stability of the network is degraded and data security is poor. In this paper, we design a smart gateway VPN tunneling control system based on IoT to solve these problems. we propose an effective VPN tunneling technology for low-end targets such as routers, and a method for efficiently controlling traffic in real-time in an environment where the quality of the Internet line changes dramatically. It is possible to control the sensor in the home safely through the VPN at the remote place.

  • PDF

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

A Fast Authentication Algorithm For Smooth Handoff (Smoothe Handoff 지원을 위한 빠른 인증 알고리즘)

  • Kim, In-Su;Kim, Gi-Cheon;Kim, Hyeon-Gon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.17-20
    • /
    • 2002
  • IMT-2000 technologies are divided 3G packet data system that using mobile IP and GPRS that based on the GSM networks. These technologies Push introduce mobile IP to support seamless roaming. In mobile If environments, use AAA server such as RADIUS or DIAMETER to provide authentication service for dial-up computers. This factor is important for mobile nodes. Mobile If require strong authentication between mobile nodes and home agents. We propose application of AAA protocols for smooth handoff mechanism in IMT-2000 environments.