• Title/Summary/Keyword: Mobile Server

Search Result 1,299, Processing Time 0.032 seconds

An Audit Model for Information Protection in Smartwork (스마트워크 기반의 정보보호 감리 모형)

  • Han, Ki-Joon;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.229-239
    • /
    • 2014
  • Smartwork technology, using teleworking, smartwork centers and mobile terminal, provides a flexible work environments without constraints of time and space. Smartwork system to increase the work efficiency has the information protection threats according to their convenience. Thus, in order to build smartwork, it is proper to provide information protection audit to help ensure the information protection. In this paper, we have proposed an infortaion protection audit model at the practical and technical level for building a smartwork environment. We were classified as a terminal, network and server area for information protection, and derived a professional information protection check items. Further, by establishing a smartwork information protection audit time to map ISMS control items, we have proposed an audit model so that it is possible to improve the security and efficiency. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check items correspond with the purpose of the smartwork information protection audit to auditors and IT specialists. As the result, this study was 97% satisfaction out of 13 check items.

Design of an In-vehicle Intelligent Information System for Remote Management (차량 원격 진단 및 관리를 위한 차량 지능 정보시스템의 설계)

  • Kim, Tae-Hwan;Lee, Seung-Il;Lee, Yong-Doo;Hong, Won-Kee
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1023-1026
    • /
    • 2005
  • In the ubiquitous computing environment, an intelligent vehicle is defined as a sensor node with a capability of intelligence and communication in a wire and wireless network space. To make it real, a lot of problems should be addressed in the aspect of vehicle mobility, in-vehicle communication, common service platform and the connection of heterogeneous networks to provide a driver with several intelligent information services beyond the time and space. In this paper, we present an intelligent information system for managing in-vehicle sensor network and a vehicle gateway for connecting the external networks. The in-vehicle sensor network connected with several sensor nodes is used to collect sensor data and control the vehicle based on CAN protocol. Each sensor node is equipped with a reusable modular node architecture, which contains a common CAN stack, a message manager and an event handler. The vehicle gateway makes vehicle control and diagnosis from a remote host possible by connecting the in-vehicle sensor network with an external network. Specifically, it gives an access to the external mobile communication network such as CDMA. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixed place, 707ms at rural area and 910ms at urban area.

  • PDF

Implementations of Geographic Information Systems on Sewage Management for Water Resources Protection

  • Wu, Mu-Lin;Chen, Chiou-Hsiung;Chou, Wen-Shang;Huang, Hsiu-Lan
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1188-1190
    • /
    • 2003
  • Taipei Watershed Management Bureau (WRATB) is a government agency entitled for water resources protection at two major watersheds in order to provide drinking water for about four millions population in Taipei on a sustainable basis. At WRATB, there are two major public sewage treatment facilities which can convert sewage in each watershed into an acceptable state before they were discharged into rivers. More than 82% of household wastewater have been collected and treated by the two public sewage systems. However, households at remote area still need more effective sewage management prescriptions. The objective of this paper is to implement geographic information systems in order to provide more effective approaches that sewage management can be easier and cost effective. ArcIMS was implemented for Internet browsing and map server of those sewage facilities on personal computers, laptop computers. In the open field, ArcPAD was implemented with personal digital assistant (PDA) such that compact flash type's global positioning systems (GPS) and digital camera can be utilized with PDA. All sewage facilities digital files were convert into ArcMap format files. MapObjects and visual BASIC were used to create sewage application modules to meet every single technician personal flavor. ASP.NET was implemented for Internet database manipulations of all sewage databases. Mobile GIS was the key component of GIS applications in the open field for sewage management on a basis of house by house. Houses at remote area, which can not cover by the two public sewage systems, were managed by PDA and laptop computers with GPS and digital camera. Sewage management at Taipei Watershed Management Bureau is easier both in the open field and in the office. Integration of GPS, GIS, and PDA makes sewage management in the open field much easier. ArcIMS, MapObjects, ASP.NET and visual BASIC make sewage management can be done in the office and over Internet.

  • PDF

Authentication Processing Optimization Model for the EAP-MD5 AAAv6 Operation (EAP-MD5 AAAv6 운영을 위한 인증처리 최적화 모델)

  • Jeong, Yoon-Su;Woo, Sung-Hee;Lee, Sang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.757-764
    • /
    • 2005
  • With the increasing service Qualify and security in the Mobile Internet Diameter technology based on the AAAv6 is being used in the user authentication. But there are some Problems on the authentication Procedures of the Diameter in which the security falls down from a loaming service or Internet transmission course. We combine it with the cipher algorithm like EAP-MD5 and accomplish a user authentication processing. If we want to supply the user authentication with the mobility among domains by AAAv6-based Diameter, we need the efficient capacity allocation among AAA attendent, AAAv, AhAb, AAAh, HA servers in the AAAv6. Therefore in this paper, we propose to make the authentication capacity index to carry out user authentication ability by analyzing an EAP-MD5S server capacity model of AAAv6 authentication models for users with mobility among domains, and to find the optimized condition for the AAAv6 capacity by the index.

Implementation of WAP Gateway Agents for Wireless Communication Efficiency Improvement (무선통신 효율 향상을 위한 WAP 게이트웨이 에이전트)

  • Park, Kee-Hyun;Kang, Dong-Woo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.45-54
    • /
    • 2005
  • Recently, researches on various base technologies for wireless Internet services have been conducted. In the WAP (Wireless Application Protocol) Forum, a WAP gateway which does mutual conversion between existent wired Internet protocols and WAP protocols was proposed. In this paper, CSA(Client Side Agent) and SSA(Server Side Agent) for WAP gateway environments are designed and implemented, as a way of improving communication efficiency in such restrictive environments as wireless communications. Located on mobile WAP devices(CSA) and a WAP Gateway(SSA), the agents perform communication efficiency improvement activities such as a packet header reduction mechanism and a data reduction mechanism using data differencing analysis in order to reduce the size of data transmission in wireless communication environments. The Internet phone emulator of Phone.com is used in order to make sure that the implemented agents work correctly, Experimental results show that the implemented agents reduce the size of data transmission significantly.

  • PDF

A Study on the Improvement of Military Information Communication Network Efficiency Using CCN (CCN을 활용한 군 정보통신망 효율성 향상 방안)

  • Kim, Hui-Jung;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.799-806
    • /
    • 2020
  • The rapid growth of smartphone-to-Internet of Things (IoT) connections and the explosive demand for data usage centered on mobile video are increasing day by day, and this increase in data usage creates many problems in the IP system. In a full-based environment, in which information requesters focus on information providers to receive information from specific servers, problems arise with bottlenecks and large data processing. To address this problem, CCN networking technology, a future network technology, has emerged as an alternative to CCN networking technology, which reduces bottlenecks that occur when requesting popular content through caching of intermediate nodes and increases network efficiency, and can be applied to military information and communication networks to address the problem of traffic concentration and the use of various surveillance equipment in full-based networks, such as scientific monitoring systems, and to provide more efficient content.

Estimation of Accessibility and Usability in Web Interaction for Personalized Ubiquitous Web Information Services (개인화된 유비쿼터스 웹 정보 서비스를 위한 웹 상호작용의 접근성 및 사용성 평가)

  • Kim, Yung-Bok
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.8
    • /
    • pp.512-521
    • /
    • 2008
  • Web-based information services should be evaluated for accessibility and usability with various types of Internet Web-browsing devices, interacting with web information servers. A reliable ubiquitous Web information server, accessible and usable with a variety of Web-browsing devices (e.g. a full-browsing mobile phone), should be a unified center for personalized ubiquitous Web information services as well as for business models based on personalized advertisements. We studied an estimation of the accessibility and usability in Web interaction for personalized ubiquitous Web information services, as metrics for real-time estimation. We show empirical results based on implementation and experiments in Korea, Japan and China, using a test-bed Web site ('ktrip.net') and single-character Korean domain names (e.g. 김.net, 이.net, 박.net, 최.net, ㄱ.net, ㄴ.net ... ㅎ.net, ㅏ.net, ... ㅔ.net, ㄱ.com, ㄴ.com ... ㅎ.com).

A Recommendation Procedure based on Intelligent Collaboration between Agents in Ubiquitous Computing Environments (유비쿼터스 환경에서 개체간의 자율적 협업에 기반한 추천방법 개발)

  • Kim, Jae-Kyeong;Kim, Hyea-Kyeong;Choi, Il-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.31-50
    • /
    • 2009
  • As the collected information which is static or dynamic is infinite in ubiquitous computing environments, information overload and invasion of privacy have been pressing issues in the recommendation service. In this study, we propose a recommendation service procedure through P2P, The P2P helps customer to obtain effective and secure product information because of communication among customers who have the similar preference about the products without connection to server. To evaluate the performance of the proposed recommendation service, we utilized real transaction and product data of the Korean mobile company which service character images. We developed a prototype recommender system and demonstrated that the proposed recommendation service makes an effect on recommending product in the ubiquitous environments. We expect that the information overload and invasion of privacy will be solved by the proposed recommendation procedure in ubiquitous environment.

  • PDF

A Study on User Authentication of Mobile Internet Environment Based on WPKI - (무선 인터넷 환경의 WPKI 기반 사용자 인증에 관한 연구)

  • Lee, Cheol-Seung;Park, Young-Ok;Lee, Ho-Young;Lee, Jeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.560-563
    • /
    • 2003
  • In this paper describes for use Authentication with the WPKI and Kerberos protocol. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses wireless public key-based structure and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 with using WIM for complement an authentication protocol Kerberos and its disadvantages.

  • PDF

Performance Evaluation of Advanced Container Security Device(ACSD) system based on IoT(Internet of Things) (IoT 기반 컨테이너 보안 장치 및 시스템 성능 평가)

  • Moon, Young-Sik;Choi, Sung-Pill;Lee, Eun-Kyu;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2183-2190
    • /
    • 2013
  • Container Security Device (ConTracer) which is suggested in this study is to monitor temperature, humidity, and impact inside of the container while the container is transported. ConTracer could also give information to users when a door of the container is opened over 2 inch within 1 second. Additionally, GPS/GLONASS based global position and status information about container are transmitted to a remote server using IoT (Internet of Things) based communication. In this research, we are looking into the development trend of global container security devices; and applying ConTracer to real freight transport from domestic to overseas using Global Roaming Service which is offered for domestic Mobile Communication Companies as well. As a result, we estimate the performance of ConTracer and verify it.