• Title/Summary/Keyword: Hyper-Connected Network

Search Result 59, Processing Time 0.025 seconds

Study on key standardization Work Item derivation and strategies for IoT services (사물인터넷 서비스의 중점 표준화 항목 도출 및 전략에 관한 연구)

  • Kim, Jungsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.13-26
    • /
    • 2016
  • Service and technology for the future hyper-connected society, which is every information receive through the mobile internet, will be an Internet of Things. Thus, it is mandatory to derive key standardization work item and establish strategy for the global business with the standardization of device and service platform by the application service. In this study, by analyzing the domestic and international market trends, state of technical development, and standardization of technology, we identified the open platform is the stepping stone for achieving the goal which is establishing the virtuous circulation of IoT ecosystem. Also, we defined emphasized key standardization work item for achieving the open platform are network, server, access authentication, billing system, and software platform. After that, we proposed future strategy direction of standardization. This research could be contribute to the IoT service diffusion by realizing IP communication among low power wireless terminals and implementing light-weight standard internet protocol.

Cloud Computing based NFV Technology Trends for the Hyper-Connected Communications Infrastructure (초연결 통신인프라를 위한 클라우드 기반 NFV 기술동향)

  • Hwang, J.Y.;Hong, S.B.;Ryu, H.Y.;Yang, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.1
    • /
    • pp.86-98
    • /
    • 2016
  • 초연결 사회는 Information & Communication Technology(ICT)를 바탕으로 하는 만물인터넷 또는 사물인터넷으로 사람, 프로세스, 데이터, 사물이 서로 연결되어 지능화된 통신인프라를 통해 새로운 가치와 혁신의 창출이 가능해지는 사회로 변화하게 된다. 이러한 초연결 사회의 유무선 통신서비스를 단일 통신인프라에서 제공할 수 있는 기술이 필요하다. 이를 구현하기 위해서는 분산된 네트워크 장비들을 소프트웨어적으로 용이하게 통합운영 관리할 수 있는 Software Defined Networking(SDN) 기술과 컴퓨팅, 서버 스토리지 및 네트워크 자원을 가상화하고, 오픈 인터페이스를 통하여 소프트웨어적으로 네트워크 기능제어가 가능한 Network Functions Virtualization(NFV) 기술에 의한 지능형 융합 통신인프라가 매우 중요하다. 본고에서는 초연결 통신인프라를 위한 클라우드 컴퓨팅 가상화 기술, NFV 기술동향 및 NFV Use Cases에 대한 내용을 통하여 향후 초연결 서비스 제공을 위한 통신인프라 구축 방향을 제시하고자 한다.

  • PDF

The Sharing Economy Business Model per the Analysis of Value Attributes (공유경제 비즈니스 모델의 가치 요인 분석)

  • Lee, Junmin;Hwang, Junseok;Kim, Jonglip
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.153-174
    • /
    • 2016
  • On account of multiple causes, including prolonged global economic crisis, addressing environmental pollution and the advent of hyper-connected society, a new paradigm called 'sharing economy' has rapidly emerged. Many startups have attempted to build promising business model based on the sharing economy concept. Nevertheless, successful cases are still very rare in the global level, except for Uber and Airbnb cases. Therefore, this study analyzes necessary causes and sufficient causes for successful settlements in the market through a comparative case analysis on digital matching firms in the sharing economy businesses. For the case study, we compare five successful cases (Uber, Airbnb, Kickstarter, TaskRabbit and DogVacay), three failure cases (Homejoy, Ridejoy and Tuterspree) and a platform cooperativism case (Juno) in accordance with six value attributes of business model including value proposition, market segment, value chain, cost structure and profit potential, value network and competitive strategy. We apply Boolean method to support controlled comparison and eliminate unnecessary attributes. The Boolean analysis result shows that value proposition, cost structure and profit potential, value network and competitive strategy are the essential attributes. Furthermore, the result indicates that each attribute is a necessary condition, where all four conditions should be met simultaneously in order to be successful. With this result, we discuss essential consideration for those who are planning startup based on the sharing economy business model.

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

A Study on Amendment to Radio Waves Act for Future Radio Service (미래 전파서비스를 위한 우리나라 전파법 개정안 연구)

  • Kye, Kyoung-Moon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.11
    • /
    • pp.959-971
    • /
    • 2016
  • Hyper-Connected Society means the society that can network between human and human, human and devise, and devise and device transcending time and space. Therefore, the expansion of spectrum resources to provide wireless communications service is our most urgent task. So, radio waves act was amended recently. But, it take effort for drastic expansion of license-exempt spectrum, realization of spectrum usage liberalization, and rational improvement of the legal system that is separated the grant of spectrum and the grant of license to be accomplished. Therefore, this paper proposes amendment to radio waves act for joint use of radio frequencies and unified licenses.

MMOG User Participation Based Decentralized Consensus Scheme and Proof of Participation Analysis on the Bryllite Blockchain System

  • Yun, Jusik;Goh, Yunyeong;Chung, Jong-Moon;Kim, OkSeok;Shin, SangWoo;Choi, Jin;Kim, Yoora
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4093-4107
    • /
    • 2019
  • Proof of Work (PoW) based blockchains have limitations in throughput, time consumption, and energy efficiency. In these systems, a miner will consume significant time and resources to obtain a reward for contributing to the blockchain. To overcome these limitations, recent research on blockchains are focused on accelerating the speed, scalability, and enhancing the security level. By enhancing specific procedures of blockchain system, the level of data integrity supported by the blockchain can become more robust, and efficient. In this paper, a new blockchain consensus model based on the Bryllite Consensus Protocol (BCP) is proposed to support a hyper-connected massively multiplayer online game (MMOG) ecosystem. The BCP scheme enables users to participate directly in new consensus processes through a Proof of Participation (PoP) algorithm. In this model, the consensus algorithm has a simpler form while maintaining high security level. In addition, because the BCP scheme gives users an equal chance to make a contribution to the blockchain, rewards are distributed in an equal fashion, which motivates user participation. The analysis of the proposed scheme is applied to the Bryllite consortium blockchain system (homed in Hong Kong), which is a new blockchain network developed for international game industries, gamers, and game events.

Affective Interaction Technologies for Human Care (휴먼 케어를 위한 초실감 감성 상호작용 기술)

  • Kim, J.S.;Park, C.J.;Lee, K.S.;Kim, M.;Yoo, W.Y.;Jee, H.K.;Jeong, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.43-53
    • /
    • 2021
  • Super-realistic content technology has recently attracted attention as a core of the "new normal" that can overcome the spatial constraints caused by pandemics. It is moreover the core that allows users in remote locations to meet and engage in various social, cultural, and economic activities based on a network. Content technology is rapidly spreading beyond the existing entertainment area to various industries as an innovative tool that can be used to overcome space-time constraints and improve the productivity of industrial sites, because reality and virtual reality are now super-connected with ultra-low latency. However, existing services such as teleconferencing and tele-collaboration do not provide a level of realism that replaces face-to-face services, and various technical requirements have been proposed to overcome this. The trends in core technologies such as XR twins, hyper-realistic reproduction, sensory interaction, and emotional recognition technology, which are necessary for interactive realistic content that leads to feelings, from reproduction to experience and emotion, are explained. In this article, our aim is to present the future of realistic content that enables human care and can even overcome psychological difficulties such as the "Corona blues".

Real 3D Property Integral Imaging NFT Using Optical Encryption

  • Lee, Jaehoon;Cho, Myungjin;Lee, Min-Chul
    • Current Optics and Photonics
    • /
    • v.6 no.6
    • /
    • pp.565-575
    • /
    • 2022
  • In this paper, we propose a non-fungible token (NFT) transaction method that can commercialize the real 3D property and make property sharing possible using the 3D reconstruction technique. In addition, our proposed method enhances the security of NFT copyright and metadata by using optical encryption. In general, a conventional NFT is used for 2D image proprietorial rights. To expand the scope of the use of tokens, many cryptocurrency industries are currently trying to apply tokens to real three-dimensional (3D) property. However, many token markets have an art copyright problem. Many tokens have been minted without considering copyrights. Therefore, tokenizing real property can cause significant social issues. In addition, there are not enough methods to mint 3D real property for NFT commercialization and sharing property tokens. Therefore, we propose a new token management technique to solve these problems using integral imaging and double random phase encryption. To show our system, we conduct a private NFT market using a test blockchain network that can demonstrate the whole NFT transaction process.

Design of Distributed Processing Framework Based on H-RTGL One-class Classifier for Big Data (빅데이터를 위한 H-RTGL 기반 단일 분류기 분산 처리 프레임워크 설계)

  • Kim, Do Gyun;Choi, Jin Young
    • Journal of Korean Society for Quality Management
    • /
    • v.48 no.4
    • /
    • pp.553-566
    • /
    • 2020
  • Purpose: The purpose of this study was to design a framework for generating one-class classification algorithm based on Hyper-Rectangle(H-RTGL) in a distributed environment connected by network. Methods: At first, we devised one-class classifier based on H-RTGL which can be performed by distributed computing nodes considering model and data parallelism. Then, we also designed facilitating components for execution of distributed processing. In the end, we validate both effectiveness and efficiency of the classifier obtained from the proposed framework by a numerical experiment using data set obtained from UCI machine learning repository. Results: We designed distributed processing framework capable of one-class classification based on H-RTGL in distributed environment consisting of physically separated computing nodes. It includes components for implementation of model and data parallelism, which enables distributed generation of classifier. From a numerical experiment, we could observe that there was no significant change of classification performance assessed by statistical test and elapsed time was reduced due to application of distributed processing in dataset with considerable size. Conclusion: Based on such result, we can conclude that application of distributed processing for generating classifier can preserve classification performance and it can improve the efficiency of classification algorithms. In addition, we suggested an idea for future research directions of this paper as well as limitation of our work.