• Title/Summary/Keyword: Industrial Protocol

Search Result 687, Processing Time 0.037 seconds

Load Carrying Effect on the Biomechanical Parameters of Slips and Falls (미끄러져 넘어짐의 생체학적 연구에 있어서 부하이동이 끼치는 영향)

  • Myung, Ro-Hae
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.27 no.2
    • /
    • pp.197-202
    • /
    • 2001
  • The biomechanical analysis of the load carrying effect on different floor surfaces has been conducted. Four different floor surfaces were prepared for ten subjects with each walking at a fixed velocity(1.33 m/sec) while carrying five different loads. The results showed that because of the significant interaction effect between floor slipperiness and the load carrying task, the load carrying effect should be analyzed according to different levels of the floor slipperiness, especially contaminant floors. On oily surfaces, slip distance(SD) and heel velocity (HV) increased whereas stride length(SL) decreased as load increased. In other words, significantly longer SD, faster HV, and no normal gait were found as load increased. As a result, a different protocol should be applied to measure floor slipperiness on oily floors as compared to dry surfaces for tribological approach.

  • PDF

Implementation and Performance Evaluation of Safety Fence System Based on Industrial Fieldbus (산업용 필드버스 기반의 안전 펜스 시스템 개발 및 성능 평가)

  • Lee, Seung-Yong;Lim, Sun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.1
    • /
    • pp.43-49
    • /
    • 2019
  • Recently, the importance of industrial fieldbus has been highlighted since the emergence of Industry 4.0. In particular, the Ethernet-based fieldbus protocol is actively used in automation systems. This paper proposes a safety fence system based on EtherCAT, a type of Ethernet-based fieldbus, to measure external loads. In order to measure the external loads, a force sensor was connected to an EtherCAT slave that transmits the sensor data to an EtherCAT master in real-time. The master ultimately controls the angle of the safety fence when it detects danger based on the given data. In the future, more effiecient safety fence system will be developed by using a HMI system to communicate with the EtherCAT master to manage safety and by employing multiple sensors to increase the accuracy of the fence system.

A design on Light-Weight Key Exchange and Mutual Authentication Routing Protocol in Sensor Network Environments (센서네트워크 환경에서 경량화된 키 교환 및 상호인증 라우팅 프로토콜)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung;Min, So-Yeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7541-7548
    • /
    • 2015
  • Wireless Sensor Networks is the technology which is used in explore role for military purposes, as well as various fields such as industrial equipment management, process management, and leverage available technologies by distributing node into various areas. but there are some limitations about energy, processing power, and memory storage capacity in wireless sensor networks environment, because of tiny hardware, so various routing protocols are proposed to overcome it. however existing routing protocols are very vulnerable in the intercommunication, because they focus on energy efficiency, and they can't use existing encryption for it, Because of sensor's limitations such like processing power and memory. Therefore, this paper propose mutual authentication scheme that prevent various security threats by using mutual authentication techniques and, Key generation and updating system as taking into account energy efficiency.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

A Study on Development of Voice and SMS Alarm System Based on MODBUS Protocol (MODBUS 프로토콜에서 작동되는 음성 및 SMS 경보 시스템 개발에 관한 연구)

  • Seol, Jun-Soo;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.311-318
    • /
    • 2015
  • This dissertation proposes method for development technology of voice and SMS(Short Message Service) alarming system based on modbus protocol. The proposed technology is composed of the following 3 stages; hardware development based on microprocessor, development of input and output driver for modem, mp3 decoder, making modbus protocol stack. In the stage of hardware development based on microprocessor, we develop hardware which receives alarm from modbus master and transmit sms message, play mp3. In the stage of development of input / ouput device driver such as modem, mp3 decoder, we develop program which control each devices. In the stage of making modbus protocol stack, voice and sms alarm system is made for receiving alarm via modbus protocol. To evaluate performance of proposed technology, we issued alarm to voice and sms alarming system on purpose. As a result, response speed of detecting alarm was 10.7ms, communication distance was 1.2Km, operating temperature was from $-25^{\circ}C$ to $70^{\circ}C$, we confirmed supporting modbus protocol. And we verified that proposed voice and sms alarming system in the thesis has a performance to be used as an industrial building alarming system.

Security Analysis of Blockchain Systems: Case Study of Cryptocurrencies (블록체인 시스템의 보안성 분석: 암호 화폐에서의 사례 연구)

  • Lee, Sungbum;Lee, Boohyung;Myung, Sein;Lee, Jong-Hyouk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.5-14
    • /
    • 2018
  • With the advance of the 4th industrial revolution, Internet of Things (IoT) technology is actively being studied. In the era of the IoT, a decentralized operation is required to reduce load on servers and enable autonomous IoT data communication rather than focusing on centralized operation of being server client structures. This paper analyzes the security of a blockchain, a new form of distributed database platform that supports integrity and permanence of data. To achieve this, we divide the blockchain's major operations into a consensus process, network communication process, and key management process, and then describe possible attacks and countermeasures in each process. We also describe the attack occurred in typical cryptocurrency platforms such as Bitcoin and Ethereum.

PROFINET-based Data Collection IIoT Device Development Method (PROFINET 기반 데이터 수집을 위한 IIoT 장치 개발 방안)

  • Kim, Seong-Chang;Kim, Jin-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.92-93
    • /
    • 2022
  • As the importance of smart factories is emphasized, the use of industrial Ethernet-based devices is expected to increase to build smart factories. PROFINET is an industrial Ethernet protocol developed by SIEMENS, and a number of smart factories are currently being built as PROFINET-based products. Accordingly, in order to develop and utilize various industrial IoT-based services, an IIoT device capable of collecting various sensor data and information from PROFINET-based manufacturing equipment and transmitting data to an edge computer is required.

  • PDF

5GHz Wi-Fi Design and Analysis for Vehicle Network Utilization (차량용 네트워크 활용을 위한 5GHz WiFi 설계 및 분석)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.18-25
    • /
    • 2020
  • With the development of water internet technology, data communication between objects is expanding. Research related to data communication technology between vehicles that incorporates related technologies into vehicles has been actively conducted. For data communication between mobile terminals, data stability, reliability, and real-time performance must be guaranteed. The 5 GHz Wi-Fi band, which is advantageous in bandwidth, communications speed, and wireless saturation of the wireless network, was selected as the data communications network between vehicles. This study analyzes how to design and implement a 5 GHz Wi-Fi network in a vehicle network. Considering the characteristics of the mobile communication terminal device, a continuous variable communications structure is proposed to enable high-speed data switching. We simplify the access point access procedure to reduce the latency between wireless terminals. By limiting the Transmission Control Protocol Internet Protocol (TCP/IP)-based Dynamic Host Configuration Protocol (DHCP) server function and implementing it in a broadcast transmission protocol method, communication delay between terminal devices is improved. Compared to the general commercial Wi-Fi communication method, the connection operation and response speed have been improved by five seconds or more. Utilizing this method can be applied to various types of event data communication between vehicles. It can also be extended to wireless data-based intelligent road networks and systems for autonomous driving.

A Study of Authentication Method for Id-Based Encryption Using In M2M Environment (M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구)

  • Jin, Byung-Wook;Park, Jae-Pyo;Lee, Keun-Wang;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1926-1934
    • /
    • 2013
  • M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it has a wireless-communicate weakness because of the machine-communicate request, and also it is difficult to administrate and control each other. So In this Paper, It suggests the safety protocol between Device, Gateway and Network Domain in M2M environment. Proposed protocol is based on ID-Based encryption's certificate and creates session key between the Access Server and the Core Server in the Network Domain. It uses that session key for sending and receiving data in mutual, and adds key renewal protocol so it will automatically update discern result. a comparative analysis of the existing M2M communication technologies and PKI-based certificate technology is compared with the proposed protocol efficiency and safety.

A Study on Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID (13.56Mhz RFID 환경에서 안전한 보안 스킴 구축을 위한 암호 스킴 및 보안 프로토콜 연구)

  • Kang, Jung-Ho;Kim, Hyung-Joo;Lee, Jae-Sik;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1393-1401
    • /
    • 2013
  • What is RFID Microchip tag attached to an object, the reader recognizes technology collectively, through communication with the server to authenticate the object. A variety of RFID tags, 13.56Mhz bandwidth RFID card, ISO/IEC 14443 standards based on NXP's Mifare tag occupies 72.5% of the world market. Of the Mifare tags, low cost tag Mifare Classic tag provided in accordance with the limited hardware-based security operations, protocol leaked by a variety of attacks and key recovery vulnerability exists. Therefore, in this paper, Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID have been designed. The proposed security scheme that KS generated by various fixed values and non-fixed value, S-Box operated, values crossed between LFSR and S-Box is fully satisfied spoofing, replay attacks, such as vulnerability of existing security and general RFID secure requirement. Also, It is designed by considering the limited hardware computational capabilities and existing security schemes, so it could be suit to Mifare Classic now.