• Title/Summary/Keyword: Middleware Security

Search Result 86, Processing Time 0.024 seconds

A Study on the Moving Detection Algorithm for Mobile Intelligent Management System Based on the Cloud (클라우드 기반의 모바일 지능형 관제시스템에서의 움직임 감지 알고리즘에 관한 연구)

  • Park, Sung-Ki;Kim, Ok-Hwan
    • Journal of IKEEE
    • /
    • v.19 no.1
    • /
    • pp.58-63
    • /
    • 2015
  • This study suggested the mobile intelligent management system based on the cloud service. The mobile intelligent management system are composed of cloud server, middleware and sensor networks. Each modules are controlled on mobile environment and observed operating status of each apparatus for environment. In this pater, the image-based moving detection algorithm applied in order to detect an intruder and average 12.3% are measured in moving detection experiments. it was confirmed the validity of the security device.

GEP-based Framework for Immune-Inspired Intrusion Detection

  • Tang, Wan;Peng, Limei;Yang, Ximin;Xie, Xia;Cao, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1273-1293
    • /
    • 2010
  • Immune-inspired intrusion detection is a promising technology for network security, and well known for its diversity, adaptation, self-tolerance, etc. However, scalability and coverage are two major drawbacks of the immune-inspired intrusion detection systems (IIDSes). In this paper, we propose an IIDS framework, named GEP-IIDS, with improved basic system elements to address these two problems. First, an additional bio-inspired technique, gene expression programming (GEP), is introduced in detector (corresponding to detection rules) representation. In addition, inspired by the avidity model of immunology, new avidity/affinity functions taking the priority of attributes into account are given. Based on the above two improved elements, we also propose a novel immune algorithm that is capable of integrating two bio-inspired mechanisms (i.e., negative selection and positive selection) by using a balance factor. Finally, a pruning algorithm is given to reduce redundant detectors that consume footprint and detection time but do not contribute to improving performance. Our experimental results show the feasibility and effectiveness of our solution to handle the scalability and coverage problems of IIDS.

Development of the Jini Surrogate-based Broadband PLC Home Controller (Jini Surrogate에 기반한 광대역 PLC 홈 제어기 개발)

  • Kim Hee-Sun;Lee Chang-Goo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • The home network system guarantees families a safe, economical, socially integrated and healthy life by using information appliances. And it provides a family with domestic safety, control of instruments, controllable energy and health monitoring by connecting to home appliances. This study designs the broadband PLC home controller using broadband PLC(Power Line Communication) technology which can save much cost at a network infrastructure by using the existing power line at home. The broadband PLC home controller consists of the broadband PLC module, the embedded main controller module and I/O module. The broadband PLC home controller can control various domestic appliances such as an auto door-lock, a boiler, an oven, etc., because it has various I/O specifications. In this study, selected home network middleware for the broadband PLC home controller is Jini surrogate using Jini technology designed by means of access to easily a home network system without a limitation of the devices. And a client application program is supported java servlet program to manage and monitor the broadband PLC home controller via web browser of a PC or a PDA, etc. Finally, for an application, we implemented and tested a home security system using one broadband PLC home controller.

Secure Discovery Method of Devices based on a Home Server (홈서버기반의 유효한 디바이스 검색 방법)

  • Kim Do-Woo;Kim Geon-Woo;Lee Jun-Ho;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.745-748
    • /
    • 2006
  • With a home network, a device can dynamically join a home network, obtain an IP address, convey its capabilities, and learn about the presence and capabilities of other devices. Devices can subsequently communicate with each other directly. Device discovery protocol defines how network services can be discovered on the network. In this paper, we propose the secure discovery method of devices that uses mutual authentication with symmetric key between devices. This method that we present distributes symmetric-key to home network devices by the home server. Using this key, mutual authentication is performed between home appliances. It enables any appliance under any middleware's control to securely communicate any other appliances.

  • PDF

Method to Verify the Validity of Device in a Home Network (홈 네트워크에서 디바이스의 유효성 검증 방법)

  • Kim Do-Woo;Kim Geon-Woo;Lee Jun-Ho;Han Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1065-1069
    • /
    • 2006
  • With a home network, a device can dynamically join a home network obtain an IP address, convey its capabilities, and learn about the presence and capabilities of other devices. Devices can subsequently communicate with each other directly. Device discovery protocol defines how network services can be discovered on the network. In this paper, we propose the secure discovery method of devices that uses mutual authentication with symmetric key between devices. This method that we present distributes symmetric-key to home network devices by the home server. Using this key, mutual authentication is performed between home appliances. It enables any appliance under any middleware's control to securely communicate any other appliances.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

Dynamic Virtual Organization Management System for Grid Based Information Retrieval Service (그리드 기반 정보검색 서비스를 위한 동적 가상 조직 관리 시스템)

  • Kim, Yang-Woo;Lee, Seung-Ha;Kim, Hyuk-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.1009-1016
    • /
    • 2006
  • Under foundational precepts of Grid computing, two important requirements that all Grid application systems should satisfy are to accommodate the dynamic nature of Virtual Organizations (VOs), and to enforce different levels of security among different VOs. For the research described in this paper, we developed two different use-case scenarios addressing the two requirements, and then showed how the requirements can be met by implementing a Grid information retrieval (GIR) system prototype. The dynamic nature of VO applies not only to increasing and decreasing number of users, but also to the dynamically changing requirement of computing power among the different subcomponents that consist in overall system configuration. This implies that a request to increase computing power by a certain subcomponent can be satisfied by other idling subcomponents taking advantage of overall system flexibility. This paper describes how we implemented a Grid IR system using VO and security mechanisms provided by Globus toolkit 3.0, and shows how GIR system scalability and security can be improved for dynamic VOs. In order to manage different VOs, we implemented VO management service (VOMS), and registered it to Globus as an additional service.

Implementation of AMGA GUI Client Toolkit : AMGA Manager (AMGA GUI Client 툴킷 구현 : AMGA Manager)

  • Huh, Tae-Sang;Hwang, Soon-Wook;Park, Guen-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.3
    • /
    • pp.421-433
    • /
    • 2012
  • AMGA service, which is one of the EMI gLite middleware components, is widely used for analysis of distributed large scale experiments data as metadata repository by scientific and technological researchers and the use of AMGA is extended farther to include general industries needing metadata Catalogue as well. However AMGA, based unix and Grid UI, has the weakness of being absence of general-purpose user interfaces in comparison to other commercial database systems and that's why it's difficult to use and diffuse it although it has the superiority of the functionality. In this paper, we developed AMGA GUI toolkit to provide work convenience using object-oriented modeling language(UML). Currently, AMGA has been used as the main component among many user communities such as Belle II, WISDOM, MDM, and so on, but we expect that this development can not only lower the barrier to entry for AMGA beginners to use it, but lead to expand the use of AMGA service over more communities.

Study on the Sensor Gateway for Receive the Real-Time Big Data in the IoT Environment (IoT 환경에서 실시간 빅 데이터 수신을 위한 센서 게이트웨이에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.417-422
    • /
    • 2015
  • A service size of the IoT environment is determined by the number of sensors. The number of sensors increase means increases the amount of data generated by the IoT environment. There are studies to reliably operate a network for research and operational dynamic buffer for data when network congestion control congestion in the network environment. There are also studies of the stream data that has been processed in the connectionless network environment. In this study, we propose a sensor gateway for processing big data of the IoT environment. For this, review the RESTful for designing a sensor middleware, and apply the double-buffer algorithm to process the stream data efficiently. Finally, it generates a big data traffic using the MJpeg stream that is based on the HTTP protocol over TCP to evaluate the proposed system, with open source media player VLC using the image received and compare the throughput performance.