• Title/Summary/Keyword: M2M technologies

Search Result 656, Processing Time 0.022 seconds

Progress In Commercialization Of Light Emitting Polymers: Dow Polyfluorenes

  • Wu, W.;Inbasekaran, M.;Hudack, M.;Welsh, D.;Yu, W.;Chen, Y.;Wang, C.;Kram, S.;Tacey, M.;Bernius, M.;Fletcher, R.;Kiszka, K.;Munger, S.;O'Brien, J.;Hills, M.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2002.08a
    • /
    • pp.340-343
    • /
    • 2002
  • We report here our recent progress in the development and commercialization of polyfluorenes emitting red, green and blue (ROB) colors as materials for light emitting diodes (LEDs). Our patented version of the Suzuki coupling process has been used to synthesize a variety of fluorenebased homopolymers and copolymers emitting colors across the entire visible spectrum. The optical and electronic properties of the polymers are tailored through selective incorporation of different aromatic units into the polyfluorene backbone. Our latest green emitter, reported herein, provides very efficient devices with a low turn-on voltage of 2.25 V, a peak efficiency of 10.5 Cd/A at 6,600 Cd/$m^2$ at 4.85 V. These devices maintain an efficiency of greater than 10 Cd/A up to 50,000 Cd/$m^2$ and demonstrate very good stability as exemplified by a device half-life of greater than 1,500 hours starting from 1,100 Cd/$m^2$. Considerable progress has also been made with red and blue emitters and will be the subject of this presentation.

  • PDF

Recent Trends in Standards Related to the Internet of Things and Machine-to-Machine Communications

  • Husain, Syed;Prasad, Athul;Kunz, Andreas;Papageorgiou, Apostolos;Song, JaeSeung
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.228-236
    • /
    • 2014
  • One of major purposes of these standard technologies is to ensure interoperability between entities from different vendors and enable interworking between various technologies. As interoperability and interworking are essential for machine-to-machine communications (M2M) and Internet of Things (IoT) for them to achieve their ultimate goal, i.e., things to be connected each other, multiple standards organizations are now working on development M2M/IoT related specifications. This paper reviews the current activities of some of the most relevant standardization bodies in the area of M2M and IoT: third-generation partnership project (3GPP) core and radio network aspects, broadband forum, and oneM2M. The major features and issues being focused upon in these standards bodies are summarized. Finally, some key common trends among the different bodies are identified: a common service layer platform, new technologies mitigating an explosive growth of network traffic, and considerations and efforts related to the development of device management technologies.

Study on the Next Disaster Safety Communication Network in M2M Communication (사물지능통신을 이용한 차세대 재난안전통신망에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.585-590
    • /
    • 2011
  • In the past few years, M2M (Machine-to-Machine) applications have become a hot topic in the wireless industry. While M2M applications can be used for many purposes (smart homes, smart metering/electricity meter reading, fleet management, mobile workforce, automobile insurance, vending machines, etc), and in many sectors (healthcare, agriculture, commercial, industrial, retail, utility, etc.), smart metering applications or smart grids present the biggest growth potential in the M2M market today. M2M platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. The promising technologies to tackle these problems are the Semantic technologies, for interoperability, and the Agent technologies for management of complex systems. In this paper the information communication technique based on the disaster prevention system's for the M2M, concepts and its requirement technology and application are studied.

An Exploratory Study on the Feasibility of M2M Services (사물통신(M2M) 기반 응용 서비스의 사업성에 관한 탐색적 연구)

  • Lee, Ji-Eun;Shin, Min-Soo
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.125-139
    • /
    • 2012
  • Machine-to-Machine(M2M) refers to technologies allowing both wireless and wired systems to communicate with other devices. The enhancement of wireless technologies and the reduced cost of wireless connection have contributed toward the development of M2M market. M2M market currently focuses on public sector services, As M2M can offer scalable and flexible services, M2M services are expected to be applied in various fields. However there are still some doubts on whether the demand for M2M services will be increased. This study investigates the feasibility of M2M services from the perspective of operators. Operators evaluate that M2M services will show high marketability but low profitability in general. In addition, operators predict that M2M services will show both marketability and profitability in the area of car maintenance, insurance, telematics, home and office security, shop floor maintenance, and real-time locating services for children protection. This study may offer some ideas of M2M business models based on empirical feasibility studies.

Machine-to-Machine Communications: Architectures, Standards and Applications

  • Chen, Min;Wan, Jiafu;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.480-497
    • /
    • 2012
  • As a new business concept, machine-to-machine (M2M) communications are born from original telemetry technology with the intrinsic features of automatic data transmissions and measurement from remote sources typically by cable or radio. M2M includes a number of technologies that need to be combined in a compatible manner to enable its deployment over a broad market of consumer electronics. In order to provide better understanding for this emerging concept, the correlations among M2M, wireless sensor networks, cyber-physical systems (CPS), and internet of things are first analyzed in this paper. Then, the basic M2M architecture is introduced and the key elements of the architecture are presented. Furthermore, the progress of global M2M standardization is reviewed, and some representative applications (i.e., smart home, smart grid and health care) are given to show that the M2M technologies are gradually utilized to benefit people's life. Finally, a novel M2M system integrating intelligent road with unmanned vehicle is proposed in the form of CPS, and an example of cyber-transportation systems for improving road safety and efficiency are introduced.

Collision Attacks on Crypton and mCrypton (블록 암호 Crypton, mCrypton에 대한 충돌 공격)

  • Kim, Tae-Woong;Kim, Jong-Sung;Jeong, Ki-Tae;Sung, Jae-Chul;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.53-62
    • /
    • 2009
  • H. Gilbert et al. proposed a collision attack on 7-round reduced Rijndael[5]. Applying this attack, we propose collision attacks on 8-round reduced Crypton, 8-round reduced mCrypton in this paper. Attacks on Crypton requires $2^{161.6}$ time complexity with $2^{96}$ chosen plaintexts, respectively. The attack on mCrypton requires $2^{81.6}$ time complexity with $2^{48}$ chosen plaintexts. These results are the best attacks on Crypton and mCrypton in published literatures.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

Application Areas for Cloud Computing Services using M2M and WoT (클라우드 컴퓨팅 서비스를 위한 M2M과 WoT 활용 방안)

  • Kim, Jangwon;Park, Dae-Ha;Baik, Doo-Kwon
    • Journal of Service Research and Studies
    • /
    • v.2 no.1
    • /
    • pp.61-68
    • /
    • 2012
  • Much technologies building cloud computing environment and supporting sevices on the cloud computing have been developing. Through the environment, accessing new services and sharing knowledge become easy. So far, they have just focused on companies which can support services and people who can use those services. In other words, the environment and models for cloud computing are the most important issue. However, the environment changes rapidly, mobile devices that are connected with each other not only will replace the computing environment based on desktop, but also can create Big data. Therefore, technologies and models are need to follow the trend including mobile based cloud computing environment. In this paper, we explain the cloud computing technologies and trend. Also we address Machine to Machine(M2M) technology and Web of things(WoT) in order to apply those into the cloud computing environment because these two concepts will enhance effectiveness and service reusability in the coming days.

  • PDF

Security Analysis on GFN with Secret S-box (비밀 S-box를 사용한 GFN에 대한 안전성 분석)

  • Lee, Yongseong;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.467-476
    • /
    • 2017
  • In this paper, we analyze Generalized Feistel Network(GFN) Type I, Type II, Type III that round function use SP update function, secret S-box and $k{\times}k$ MDS matirx. In this case an attacker has no advantage about S-box. For each type of GFN, we analyze and restore secret S-box in 9, 6, 6 round using the basis of integral cryptanalysis with chosen plaintext attack. Also we restore secret S-box in 16 round of GFN Type I with chosen ciphertext attack. In conclusion, we need $2^{2m}$ data complexity and ${\frac{2^{3m}}{32k}},{\frac{2^{3m}}{24k}},{\frac{2^{3m}}{36k}}$ time complexity to restore m bit secret S-box in GFN Type I, Type II, Type III.

A Study of the Message Protocols Technologies in M2M Platforms (사물통신에서 메시지 프로토콜 기술 연구)

  • Lee, Chang-Yeol;Hong, Han-Kuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.53-61
    • /
    • 2010
  • M2M Platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. It requires the standardized message protocols among the sensor applications. In this study, we developed the message protocols that support the data abstraction and interoperability among application systems with characteristics of sensor systems. The message protocols consist of the data representation formats and data exchange functions.