• Title/Summary/Keyword: M/T 기법

Search Result 420, Processing Time 0.032 seconds

Reliability-based Message Transmission System in Healthcare Devices (헬스케어 디바이스에서의 신뢰성 기반 메시지 전달 시스템)

  • Lee, Young-Dong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.3
    • /
    • pp.142-147
    • /
    • 2020
  • The Internet of Things is valuable as a means of solving social problems such as personal, public, and industrial. Recently, the application of IoT technology to the healthcare industry is increasing. It is important to ensure reliability and security in IoT-based healthcare services. Communication protocols, wireless transmit/receive techniques, and reliability-based message delivery are essential elements in IoT healthcare devices. The system was designed and implemented to measure body temperature and activity through body temperature and acceleration sensors and deliver them to the oneM2M-based Mobius platform.

Cooperative Firmware Fuzzing Technique for Lightweight Internet of Things (경량 IoT 를 위한 협력적 펌웨어 퍼징 기법)

  • Jin-Min Lee;Seung-Eun Lee;Na-Hyun Kim;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.183-186
    • /
    • 2024
  • IoT(Internet of Things) 기기가 다양한 산업 분야에 활용되면서, 보안과 유지 보수를 위한 관리의 중요성이 커지고 있다. 편리한 IoT 기기 관리를 위해 무선 네트워크를 통한 펌웨어 업데이트 기술인 FOTA(Firmware Over The Air)가 적용되어 있지만, 컴퓨팅 파워가 제한된 경량 IoT 기기 특성상 취약점 탐지를 수행하기 어렵다. 본 연구에서는 IoT 기기들이 퍼징 테스트 케이스를 분할하여 협력적으로 퍼징하고, 노드 간의 퍼징 결과가 다르면 재검증을 수행하는 협력적 퍼징 기법을 제안한다. 실험 결과에 따르면, 중복되는 테스트 케이스를 2 개나 3 개 퍼징하는 협력적 퍼징 기법은 종래 방식 대비 연산량을 최소 약 16%, 최대 약 48% 줄였다. 또한, 종래 퍼징 기법 대비 취약점 탐지 성공률(Success rate of vulnerability detection)을 최소 약 3 배, 최대 약 3.4 배 개선시켰다.

Development of a High-Resolution Encoder System Using Dual Optical Encoders (이중 광학식 회전 엔코더 구조를 이용한 고정밀도 엔코더 시스템 개발)

  • Lee, Se-Han
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.24 no.9
    • /
    • pp.76-85
    • /
    • 2007
  • An optical rotary encoder is easy to implement for automatic control applications. In particular, the output of the encoder has a digital form pulse, which is also easy to be connected to a popular digital controller. By using the encoder, there are various angular velocity detecting methods, M-, T-, and M/T-method. Each of them has a property of its own. They have common limitation that the angular velocity detection period is strongly subject to the destination velocity magnitude in case of ultimate low range. They have ultimate long detection period or cannot even detect angular velocity at near zero velocity. This paper proposes a dual encoder system with two encoders of normal resolution. The dual encoder system is able to keep detection period moderately at near zero velocity and even detects zero velocity within nominal period. It is useful for detecting velocity in case of changing rotational direction at which there occurs zero velocity. In this paper, various experimental results are shown for the dual encoder system validity.

Comparison of Methods for Estimating Extreme Significant Wave Height Using Satellite Altimeter and Ieodo Ocean Research Station Data (인공위성 고도계와 이어도 해양과학기지 관측 자료를 활용한 유의파고 극값 추정 기법 비교)

  • Woo, Hye-Jin;Park, Kyung-Ae;Byun, Do-Seung;Jeong, Kwang-Yeong;Lee, Eun-Il
    • Journal of the Korean earth science society
    • /
    • v.42 no.5
    • /
    • pp.524-535
    • /
    • 2021
  • Rapid climate change and oceanic warming have increased the variability of oceanic wave heights over the past several decades. In addition, the extreme wave heights, such as the upper 1% (or 5%) wave heights, have increased more than the heights of the normal waves. This is true for waves both in global oceans as well as in local seas. Satellite altimeters have consistently observed significant wave heights (SWHs) since 1991, and sufficient SWH data have been accumulated to investigate 100-year return period SWH values based on statistical approaches. Satellite altimeter data were used to estimate the extreme SWHs at the Ieodo Ocean Research Station (IORS) for the period from 2005 to 2016. Two representative extreme value analysis (EVA) methods, the Initial Distribution Method (IDM) and Peak over Threshold (PoT) analysis, were applied for SWH measurements from satellite altimeter data and compared with the in situ measurements observed at the IORS. The 100-year return period SWH values estimated by IDM and PoT analysis using IORS measurements were 8.17 and 14.11 m, respectively, and those using satellite altimeter data were 9.21 and 16.49 m, respectively. When compared with the maximum value, the IDM method tended to underestimate the extreme SWH. This result suggests that the extreme SWHs could be reasonably estimated by the PoT method better than by the IDM method. The superiority of the PoT method was supported by the results of the in situ measurements at the IORS, which is affected by typhoons with extreme SWH events. It was also confirmed that the stability of the extreme SWH estimated using the PoT method may decline with a decrease in the quantity of the altimeter data used. Furthermore, this study discusses potential limitations in estimating extreme SWHs using satellite altimeter data, and emphasizes the importance of SWH measurements from the IORS as reference data in the East China Sea to verify satellite altimeter data.

Design of Authentication and Key Agreement Scheme using ECQV for IoT Environments (IoT 환경을 위한 ECQV 기반의 인증 및 키 합의 기법 설계)

  • Lee, Dae-Hwi;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.188-189
    • /
    • 2019
  • 최근 출시되는 다양한 IoT 서비스 환경에 참여하고 있는 객체들은 각자 인터넷에 연결되어 다른 객체와 통신할 수 있다. 이전에는 디바이스가 직접 인터넷에 연결될 수 있는 능력이 없었기 때문에 게이트웨이와 같은 중간 연결 매개체를 통해 인터넷에 연결되었다. 이후 IoT 디바이스의 성능이 좋아짐에 따라 디바이스가 직접 인터넷에 연결되고, 다른 디바이스들과 직접 통신할 수 있게 되었다. 디바이스는 사용자의 스마트폰이 될 수 있고, 스마트홈이나 스마트시티를 구성하는 여러 디바이스들이 될 수 있으며, 이를 확인하고 안전하게 데이터를 송수신하기 위해서는 인증 및 키 관리가 필수적이다. 객체가 인터넷에 연결될 수 있음에도 불구하고 IoT 디바이스들은 제한된 환경에서 동작하는 특성을 가지기 때문에, 기존 인증 및 키 합의 프로토콜을 그대로 적용할 수 없다. 따라서 본 논문에서는 IoT를 구성하는 객체가 인터넷에 직접 연결되고 서로 안전하게 통신하기 위해 ECQV(Elliptic Curve Qu-Vanstone) 묵시적 인증서를 통해 상호 인증 후 키를 안전하게 합의할 수 있는 인증 및 키 합의 기법에 대해 연구한다.

Deep Clustering Based on Vision Transformer(ViT) for Images (이미지에 대한 비전 트랜스포머(ViT) 기반 딥 클러스터링)

  • Hyesoo Shin;Sara Yu;Ki Yong Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.363-365
    • /
    • 2023
  • 본 논문에서는 어텐션(Attention) 메커니즘을 이미지 처리에 적용한 연구가 진행되면서 등장한 비전 트랜스포머 (Vision Transformer, ViT)의 한계를 극복하기 위해 ViT 기반의 딥 클러스터링(Deep Clustering) 기법을 제안한다. ViT는 완전히 트랜스포머(Transformer)만을 사용하여 입력 이미지의 패치(patch)들을 벡터로 변환하여 학습하는 모델로, 합성곱 신경망(Convolutional Neural Network, CNN)을 사용하지 않으므로 입력 이미지의 크기에 대한 제한이 없으며 높은 성능을 보인다. 그러나 작은 데이터셋에서는 학습이 어렵다는 단점이 있다. 제안하는 딥 클러스터링 기법은 처음에는 입력 이미지를 임베딩 모델에 통과시켜 임베딩 벡터를 추출하여 클러스터링을 수행한 뒤, 클러스터링 결과를 임베딩 벡터에 반영하도록 업데이트하여 클러스터링을 개선하고, 이를 반복하는 방식이다. 이를 통해 ViT 모델의 일반적인 패턴 파악 능력을 개선하고 더욱 정확한 클러스터링 결과를 얻을 수 있다는 것을 실험을 통해 확인하였다.

Design and Implementation of Smart City Data Marketplace based on oneM2M Standard IoT Platform (oneM2M 표준 IoT 플랫폼 기반 스마트시티 데이터 마켓플레이스 설계 및 구현)

  • Jeong, SeungMyeong;Kim, Seong-yun;Lee, In-Song
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.157-166
    • /
    • 2019
  • oneM2M has been adopted to national and global smart city platforms leveraging its benefits, oneM2M platform assures interoperability to devices and services with standard APIs. Existing access control mechanisms in the standard should be extended to easily distribute smart city data. Compared to the as-is standard, this paper proposes a new access control method with minimum human interventions during data distribution between data sellers and buyers. The proposal has been implemented as the new data marketplace APIs to oneM2M platform and used for data marketplace portal interworking. This also has been demonstrated with smart city PoC service.

Efficient Self-Healing Key Distribution Scheme (효율적인 Self-Healing키 분배 기법)

  • 홍도원;강주성;신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.141-148
    • /
    • 2003
  • The self-healing key distribution scheme with revocation capability proposed by Staddon et al. enables a dynamic group of users to establish a group key over an unreliable network, and has the ability to revoke users from and add users to the group while being resistant to collusion attacks. In such a protocol, if some packet gets lost, users ale still capable of recovering the group key using the received packets without requesting additional transmission from the group manager. In this scheme, the storage overhead at each group member is O($m^2$1og p) and the broadcast message size of a group manager is O( ((m$t^2$+mt)log p), where m is the number of sessions, t is the maximum number of colluding group members, and p is a prime number that is large enough to accommodate a cryptographic key. In this paper we describe the more efficient self-healing key distribution scheme with revocation capability, which achieves the same goal with O(mlog p) storage overhead and O(($t^2$+mt)log p) communication overhead. We can reduce storage overhead at each group member and the broadcast message size of the group manager without adding additional computations at user's end and group manager's end.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

Development of the Line Scan Diffusion Weighted Imaging at Low Tesla Magnetic Resonance Imaging System (저자장 자기공명영상시스템에서 선주사확산강조영상기법 개발)

  • Hong, Cheol-Pyo;Lee, Dong-Hoon;Lee, Do-Wan;Lee, Man-Woo;Paek, Mun-Young;Han, Bong-Soo
    • Journal of the Korean Society of Radiology
    • /
    • v.2 no.2
    • /
    • pp.31-38
    • /
    • 2008
  • Line scan diffusion weighted imaging (LSDI) pulse sequence for 0.32 T magnetic resonance imaging (MRI) system was developed. In the LSDI pulse sequence, the imaging volume is formed by the intersection of the two perpendicular planes selected by the two slice-selective $\pi$/2-pulse and $\pi$-pulse and two diffusion sensitizing gradients placed on the both side of the refocusing $\pi$-pulse and the standard frequency encoding readout was followed. Since the maximum gradient amplitude for the MR system was 15 mT/m the maximum b value was $301.50s/mm^2$. Using the developed LSDI pulse sequence, the diffusion weighted images for the aqueous NaCl solution phantom and triacylglycerol solution phantom calculated from the line scan diffusion weighted images gives the same results within the standard error range (mean diffusivities = $963.90{\pm}79.83({\times}10^{-6}mm^2/s)$ at 0.32 T, $956.77{\pm}4.12({\times}10^{-6}mm^2/s)$ at 1.5 T) and the LSDI images were insensitive to the magnetic susceptibility difference and chemical shift.

  • PDF