• Title/Summary/Keyword: Network Device

Search Result 2,405, Processing Time 0.033 seconds

Vulnerability Analysis of Network Communication Device by Intentional Electromagnetic Interference Radiation (IEMI 복사에 의한 네트워크 통신 장비의 취약성 분석)

  • Seo, Chang-Su;Huh, Chang-Su;Lee, Sung-Woo;Jin, In-Young
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.31 no.1
    • /
    • pp.44-49
    • /
    • 2018
  • This study analyzed the Vulnerability of Network Communication devices when IEMI is coupled with the Network System. An Ultra Wide Band Generator (180 kV, 700 MHz) was used as the IEMI source. The EUTs are the Switch Hub and Workstation, which are used to configure the network system. The network system was monitored through the LAN system configuration, to confirm a malfunction of the network device. The results of the experiment indicate that a malfunction of the network occurs as the electric field increases. The data loss rate increases proportionally with increasing radiating time. In the case of the Switch Hub, the threshold electric field value was 10 kV/m for all conditions used in this experiment. The threshold point causing malfunction was influenced only by the electric field value. The correlation between the threshold point and pulse repetition rate was not found. However, in case of the Workstation, it was found that as the pulse repetition rate increases, the equipment responds weakly and the threshold value decreases. To verify the electrical coupling of the EUT by IEMI, current sensors were used to measure the PCB line inside the EUT and network line coupling current. As a result of the measurement, it can be inferred that when the coupling current due to IEMI exceeds the threshold value, it flows through the internal equipment line, causing a malfunction and subsequent failure. The results of this study can be applied to basic data for equipment protection, and effect analysis of intentional electromagnetic interference.

Device Objectification and Orchestration Mechanism for IoT Intelligent Service (IoT 서비스 지능화를 위한 디바이스 오브젝트화 및 오케스트레이션 메커니즘)

  • Kim, Youngjun;Jeon, Yongkeun;Chong, Ilyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.19-32
    • /
    • 2013
  • This paper suggests smart gateway structure and functionalities that provide device web service which can be used by user using objectified devices. The smart gateway objectify a physical device in other to provide the device web service in IoT intelligent service. And the paper suggests a mechanism that provide orchestrated service of various devices to user using a concept of service overlay network. and also suggests a interface that provide device web services and the orchestrated service between the smart gateway and a web service platform. In the paper, the objectified devices can be combined with web service objects and device contexts based on the service overlay network, furthermore the objectified devices can provide intelligence and dynamic service in the IoT environment.

Speed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Network

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.683-688
    • /
    • 2011
  • The wireless sensor network (WSN) is well known for an enabling technology for the ubiquitous environment such as real-time surveillance system, habitat monitoring, home automation and healthcare applications. However, the WSN featuring wireless communication through air, a resource constraints device and irregular network topology, is threatened by malicious nodes such as eavesdropping, forgery, illegal modification or denial of services. For this reason, security in the WSN is key factor for utilizing the sensor network into the commercial way. There is a series of symmetric cryptography proposed by laboratory or industry for a long time. Among of them, recently proposed HUMMINGBIRD algorithm, motivated by the design of the well-known Enigma machine, is much more suitable to resource constrained devices, including smart card, sensor node and RFID tags in terms of computational complexity and block size. It also provides resistance to the most common attacks such as linear and differential cryptanalysis. In this paper, we implements ultra-lightweight cryptography, HUMMINGBIRD algorithm into the resource constrained device, sensor node as a perfectly customized design of sensor node.

An Embedded Network-Engine for Video On Demand Service (VOD(Video On Demand) 서비스를 위한 임베디드 네트워크 엔진)

  • Md, Amiruzzaman;Son, Sung-Ok;No, Jae-Chun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06a
    • /
    • pp.145-148
    • /
    • 2007
  • Although the embedded network-engine is a demand of time, it is observed that up to this time the network-engines are not sufficient to control the input and output device for Video On Demand (VOD). In this paper we have proposed the wireless network-engine with the capability of controlling the input and output device.

  • PDF

A Heterogeneous Home Network Control System Using HNCP

  • Jeon, Joseph;Kwon, Wook-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1598-1601
    • /
    • 2005
  • In this paper, a heterogeneous home network control system using HNCP is proposed and implemented. A power line and 802.15.4 are used as media for the system. Information about home environment gathered by sensors is transferred to a power line connected device through the 802.15.4. HNCP stimulate the home network based on the both media. Sensor device definition for the HNCP address and message set is proposed. TinyOS supports the HNCP stack on the wireless sensor board. The home network control system implemented with these techniques has a benefit of user friendly operation of home appliances based on the sensing data. Implementation and experiment shows validity of the system.

  • PDF

A Study of Web-based Remote Pneumatic Servo Control System Using Java Language (자바를 이용한 웹 기반 원격 공압 서보 제어 시스템에 관한 연구)

  • 박철오;안경관;송인성
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.3
    • /
    • pp.196-203
    • /
    • 2003
  • Recent increase in accessibility to the internet makes it easy to use the internet-connected devices. The internet could allow any user can reach and command any device that is connected to the network. But these teleoperation systems using the internet connected device have several problems such as the network time delay, data loss and development cost of an application for the communication with each other. One feasible solution is to use local and external network line for the network time delay, transmission control protocol for data loss and Java language to reduce the development period and cost. In this study, web-based remote control system using Java language is newly proposed and implemented to a pneumatic servo control system to solve the time delay, data loss and development cost. We have conducted several experiments using pneumatic rodless cylinder through the internet and verified that the proposed remote control system was very effective.

Web-based Distribute Control Networks

  • Kiwon Song;Kim, Jonghwi;Park, Gi-Sang;Park, Gi-Heung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.82.4-82
    • /
    • 2001
  • Requirements for device control networks differ greatly from those of data (business) networks. Consequently, any control network which uses a filedbus protocol is, in general, different from If network protocol TCP/IP. One then needs to integrate both fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. Connecting these remote Lon Works networks to the Internet can provide a powerful, integrated, distributed control system. This paper suggests a basic concept that be applied to distributed control over IP network or internet. Specially, Lonworks technology that used LonTalk protocol is reviewed as device network and ...

  • PDF

Main/Sub Device Authentication and Authorization Protocol in Ubiquitous Office Network (유비쿼터스 오피스 네트워크에서의 Main/Sub 디바이스 인증/인가 프로토콜)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.105-118
    • /
    • 2009
  • In modern society, as the rapid development of IT technology combined with the computer-based high-speed communication networks makes it possible to provide a wide spectrum of services and devices, we have been confronting a new cultural transformation era, referred to as the information society. However, the requirements to be considered in security aspect have became more complicated and diversified, and there remains the same security weaknesses as in the existing media or protocol. Particularly, the office network device with roaming is susceptible to the different kinds of attacks such as terminal hacking, virus attacks, and information leakage because the computing capacity is relatively low and the loading of already developed security functions is difficult. Although developed as one solution to this problems, PKI security authentication technology isn't suitable for multi-domain environments providing uonments proffice network service, and so the development of a novel authentication system is needed. Therefore, in this paper researched the roaming and device authentication/auth for multitechnology using an ID-based public key, authorization ticket, and Sub-device ticket with a purpose to contribute to the development of the secured and efficient technology.

Analyzing Technological Convergence for IoT Business Using Patent Co-classification Analysis and Text-mining (특허 동시분류분석과 텍스트마이닝을 활용한 사물인터넷 기술융합 분석)

  • Moon, Jinhee;Gwon, Uijun;Geum, Youngjung
    • Journal of Technology Innovation
    • /
    • v.25 no.3
    • /
    • pp.1-24
    • /
    • 2017
  • With the rise of internet of things (IoT), there have been several studies to analyze the technological trend and technological convergence. However, previous work have been relied on the qualitative work that investigate the IoT trend and implication for future business. In response, this study considers the patent information as the proxy measure of technology, and conducts a quantitative and analytic approach for analyzing technological convergence using patent co-classification analysis and text mining. First, this study investigate the characteristics of IoT business, and characterize IoT business into four dimensions: device, network, platform, and services. After this process, total 923 patent classes are classified into four types of IoT technology group. Since most of patent classes are classified into device technology, we developed a co-classification network for both device technology and all technologies. Patent keywords are also extracted and these keywords are also classified into four types: device, network, platform, and services. As a result, technologies for several IoT devices such as sensors, healthcare, and energy management are derived as a main convergence group for the device network. For the total IoT network, base network technology plays a key role to characterize technological convergence in the IoT network, mediating the technological convergence in each application area such as smart healthcare, smart home, and smart grid. This work is expected to effectively be utilized in the technology planning of IoT businesses.

The Design and Implementation of the Reliable Network RAM using Compression on Linux (리눅스에서 압축을 이용한 안정적인 네트웍 램의 설계 및 구현)

  • 황인철;정한조;맹승렬;조정완
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.232-238
    • /
    • 2003
  • Traditional operating systems use a virtual memory to provide users with a bigger memory than a physical memory. The virtual memory augments the insufficient physical memory by the swap device. Since disks are usually used as the swap device, the cost of a page fault is relatively high compared to the access cost of the physical memory. Recently, numerous papers have investigated the Network RAM in order to exploit the idle memory in the network instead of disks. Since today's distributed systems are interconnected with high-performance networks, the network latency is far smaller than the disk access latency In this paper we design and implement the Network RAM using block device driver on Linux. This is the first implementation of the Network RAM on Linux. We propose the new reliability method to recover the page when the other workstation's memory is damaged. The system using the Network RAM as the swap device reduces the execution time by 40.3% than the system using the disk as the swap device. The performance results suggest that the new reliability method that use the processor more efficiently has the similar execution time with others, but uses smaller server memory and generates less message traffic than others.