• 제목/요약/키워드: Home networks security

검색결과 78건 처리시간 0.027초

Capacity Analysis of Internet Protocol Television (IPTV) over IEEE 802.11ac Wireless Local Area Networks (WLANs)

  • Virdi, Chander Kant;Shah, Zawar;Levula, Andrew;Ullah, Imdad
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.327-333
    • /
    • 2022
  • Internet Protocol Television (IPTV) has emerged as a personal entertainment source for home users. Streaming IPTV content over a wireless medium with good Quality of Service (QoS) can be a challenging task as IPTV content requires more bandwidth and Wireless Local Area Networks (WLANs) are susceptible to packet loss, delay and jitter. This research presents the capacity of IPTV using User Datagram Protocol (UDP) and TCP Friendly Rate Control (TFRC) over IEEE 802.11ac WLANs in good and bad network conditions. Experimental results show that in good network conditions, UDP and TFRC could accommodate a maximum of 78 and 75 Standard Definition Television (SDTV) users, respectively. In contrast, 15 and 11 High-Definition Television (HDTV) users were supported by UDP and TFRC, respectively. Performance of UDP and TFRC was identical in bad network conditions and same number of SDTV and HDTV users were supported by TFRC and UDP. With background Transmission Control Protocol (TCP) traffic, both UDP and TFRC can support nearly the same number of SDTV users. It was found that TFRC can co-exist fairly with TCP by giving more throughput to TCP unlike UDP.

인간 적응형 가전기기를 위한 거주자 심박동 기반 신체활동량 추정 (Metabolic Rate Estimation for ECG-based Human Adaptive Appliance in Smart Homes)

  • 김현희;이경창;이석
    • 제어로봇시스템학회논문지
    • /
    • 제20권5호
    • /
    • pp.486-494
    • /
    • 2014
  • Intelligent homes consist of ubiquitous sensors, home networks, and a context-aware computing system. These homes are expected to offer many services such as intelligent air-conditioning, lighting control, health monitoring, and home security. In order to realize these services, many researchers have worked on various research topics including smart sensors with low power consumption, home network protocols, resident and location detection, context-awareness, and scenario and service control. This paper presents the real-time metabolic rate estimation method that is based on measured heart rate for human adaptive appliance (air-conditioner, lighting etc.). This estimation results can provide valuable information to control smart appliances so that they can adjust themselves according to the status of residents. The heart rate based method has been experimentally compared with the location-based method on a test bed.

A Novel Framework Based on CNN-LSTM Neural Network for Prediction of Missing Values in Electricity Consumption Time-Series Datasets

  • Hussain, Syed Nazir;Aziz, Azlan Abd;Hossen, Md. Jakir;Aziz, Nor Azlina Ab;Murthy, G. Ramana;Mustakim, Fajaruddin Bin
    • Journal of Information Processing Systems
    • /
    • 제18권1호
    • /
    • pp.115-129
    • /
    • 2022
  • Adopting Internet of Things (IoT)-based technologies in smart homes helps users analyze home appliances electricity consumption for better overall cost monitoring. The IoT application like smart home system (SHS) could suffer from large missing values gaps due to several factors such as security attacks, sensor faults, or connection errors. In this paper, a novel framework has been proposed to predict large gaps of missing values from the SHS home appliances electricity consumption time-series datasets. The framework follows a series of steps to detect, predict and reconstruct the input time-series datasets of missing values. A hybrid convolutional neural network-long short term memory (CNN-LSTM) neural network used to forecast large missing values gaps. A comparative experiment has been conducted to evaluate the performance of hybrid CNN-LSTM with its single variant CNN and LSTM in forecasting missing values. The experimental results indicate a performance superiority of the CNN-LSTM model over the single CNN and LSTM neural networks.

Internet of Things for in Home Health based Monitoring System: Modern Advances, Challenges and Future Directions

  • Omer Iqbal;Tayyeba Iftakhar;Saleem Zubair Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • 제24권8호
    • /
    • pp.191-204
    • /
    • 2024
  • IOT has carried out important function in converting the traditional fitness care corporation. With developing call for in population, traditional healthcare structures have reached their outmost functionality in presenting sufficient and as plenty as mark offerings. The worldwide is handling devastating developing antique population disaster and the right want for assisted-dwelling environments is turning into inevitable for senior citizens. There furthermore a determination by means of the use of way of countrywide healthcare organizations to increase crucial manual for individualized, right blanketed care to prevent and manipulate excessive coronial situations. Many tech orientated packages related to Health Monitoring have been delivered these days as taking advantage of net boom everywhere on globe, manner to improvements in cellular and in IOT generation. Such as optimized indoor networks insurance, community shape, and fairly-low device fee performances, advanced tool reliability, low device energy consumption, and hundreds higher unusual common usual performance in network safety and privacy. Studies have highlighted fantastic advantages of integrating IOT with health care location and as era is improving the rate also cannot be that terrific of a problem. However, many challenges in this new paradigm shift notwithstanding the fact that exist, that need to be addressed. So the out most purpose of this research paper is 3 essential departments: First, evaluation of key elements that drove the adoption and boom of the Internet of factors based totally domestic some distance off monitoring; Second, present fashionable improvement of IOT in home a long manner off monitoring shape and key building gadgets; Third, communicate future very last effects and distinct guidelines of such type a long way off monitoring packages going ahead. Such Research is a wonderful manner in advance now not outstanding in IOT Terminology but in standard fitness care location.

유비쿼터스 홈 서버 보안 요구사항 및 구현방안 (Security Requirements and Proposals for the Home Server in Ubiquitous Home Networks)

  • 김정태;범민준;박혜경;백의현
    • 전자통신동향분석
    • /
    • 제20권2호통권92호
    • /
    • pp.83-92
    • /
    • 2005
  • 유비쿼터스 환경의 현실화와 일반화의 시발점인 홈 네트워크 기술은 PC와 노트북, 프린터, 냉장고, DTV, 오디오/비디오를 포함하는 댁내의 모든 가전기기들을 하나의 네트워크로 연결함으로써 사용자가 언제 어디에 있든 인터넷을 이용하여 댁내의 상황을 모니터링하고 모든 기기들을 제어할 수 있게 해주는 기술이다. 현재 대부분의 기업들은 각자 회사의 네트워크를 보호하기 위하여 방화벽(firewall)이나 침입탐지시스템(intrusion detection system) 및 가상 사설망(virtual private network) 등의 방어책을 응용하고 있지만, 홈 네트워크는 기업과 비교하여 규모면에서나 보안 기술에 대한 고려 및 응용이 활발하지 않다. 이러한 다양한 보안 정책은 다가올 유비쿼터스 홈 네트워크 환경에서의 중추적 역할을 해야 될 홈 서버의 중요한 역할 중 하나이다. 따라서 본 문서의 유비쿼터스 홈 네트워크 환경에서 홈 서버의 보안 요구사항 및 구현방안들을 살펴 본다.

그룹 환경의 사용자 인증 및 키 교환 서비스 프로토콜 연구 (A Study on the User Authentication and Key Exchange Service for Group Environment)

  • 변진욱;이수미;이동훈
    • 한국IT서비스학회지
    • /
    • 제8권2호
    • /
    • pp.117-136
    • /
    • 2009
  • Over the years a password has been used as a popular authentication method between a client and a server because of its easy-to-memorize property. But, most password-based authentication services have focused on a same password authentication scheme which provides an authentication and key exchange between a client and a server with the same password. With rapid change of communication environments in the fields such as mobile networks, home networking, etc., the end-to-end security allowing users to hold different password is considered as one of main concerns. In this paper, we consider a new authentication service of how each client with different own password is able to authenticate each other, which is a quite new service paradigm among the existing services. This new service can be used in the current or next generation network environment where a mobile user in cell A wants to establish a secure end-to-end channel with users in ceil B, C, and D using only their memorable passwords. This end-to-end security service minimizes the interferences from the operator controlled by network components. To achieve this end-to-end security, we propose an authentication and key exchange service for group users in different realm, and analyze its security in a formal way. We also discuss a generic construction with the existing authentication schemes.

유비쿼터스 홈네트워크를 위한 경량화된 침입탐지 (Lightweight Intrusion Detection for Ubiquitous Home Networks)

  • 유재학;이한성;정용화;최성백;양성현;박대희
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.269-272
    • /
    • 2006
  • 최근 들어, 유비쿼터스 홈네트워크에 대한 관심이 높아지고 있지만, 기능 구현에 초점을 맞추고 있다. 이러한 홈네트워크는 단일 서비스가 아닌 다양한 서비스 집합으로서의 성격이 강하므로 세분화된 보안 요구사항과 제한된 자원에서의 원활한 서비스를 위해 시스템 경량화는 필수적 요소이다. 이에 본 논문에서는 유비쿼터스 홈네트워크 환경에서 요구하는 보안성 및 경량화를 고려한 새로운 침입탐지 모델을 제안한다.

  • PDF

블록체인과 제로 트러스트 기반 클라우드 보안 기법 (Cloud Security Scheme Based on Blockchain and Zero Trust)

  • 나인혜;강혁;이근호
    • 사물인터넷융복합논문지
    • /
    • 제9권2호
    • /
    • pp.55-60
    • /
    • 2023
  • 최근 클라우드 컴퓨팅의 수요가 증가하고 자택근무 및 외부 업무로 인한 원격접속의 증가했다. 또한 외부 공격자의 접근뿐만이 아니라 내부 직원의 업무 접속과 같은 내부에서의 접근을 경계해야 할 필요성이 증가함과 동시에 다양한 공격 기법들이 고도화되는 현 상황에서 그에 맞는 새로운 보안 패러다임이 요구된다. 이로 인해 모든 것을 의심하고 신뢰하지 않는다는 핵심 원칙을 가진 제로 트러스트(Zero-Trust)를 적용한 네트워크 보안 모델이 보안업계에서 주목받기 시작했다. 제로 트러스트 보안은 모든 네트워크를 감시하고 접근을 허용 받기 위해선 먼저 인증을 받아야 하며 접근 요청자에 대한 최소한의 접근 권한을 부여함으로써 보안성을 높인다. 본 논문에서는 제로 트러스트와 제로 트러스트 아키텍처에 대해 설명하고, 제로 트러스트와 블록체인을 이용하여 기존 보안 시스템의 한계점을 극복하고 다양한 기업에서 활용할 수 있고 접근제어 강화를 위한 새로운 클라우드 보안 체계를 제안하고자 한다.

웹 서비스 보안 성능 평가 테스트 방법론 연구 (A Study on Web Service Security Testing Methodology for Performance Evaluation)

  • 이동휘;하옥현
    • 융합보안논문지
    • /
    • 제10권4호
    • /
    • pp.31-37
    • /
    • 2010
  • IT에서 보안은 위험 및 위협으로부터 시스템을 보호하고, 피해를 방지하며 Risk를 최소화해야한다. 이와 같은 맥락으로 정보보안 제품의 정보가 처리, 저장, 전달되는 과정에서 정보와 시스템의 보안기준, 즉 기본적인 기밀성, 가용성, 무결성과 부차적인 명확성, 증명가능성, 감지, 경보 및 방어능력 등이 충분히 보장될 수 있도록 하여야 한다. 웹 서비스에서 보안은 가장 중요한 요소이며, 웹 특성상 서비스를 위해 80번 포트 같은 통로를 열어놔야 하는 구조로서, 웹 어플리케이션, 웹 소스 및 서버, 네트워크 모든 요소가 근본적인 취약점을 안고 있다. 이에 따라 이런 요소를 통해 웹 프로그램의 설정오류나 개발 오류 및 웹 애플리케이션 자체의 취약점을 이용한 홈페이지 와 웹 서버 해킹을 방지하며, 효율성을 높이는 웹서비스 보안 BMT 수행 방법론을 제시하고자 한다.

Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter

  • Osman Goni;Md. Abu Shameem
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.141-146
    • /
    • 2024
  • A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.