• Title/Summary/Keyword: Personal communication network

Search Result 486, Processing Time 0.027 seconds

A Secure Healthcare System Using Holochain in a Distributed Environment

  • Jong-Sub Lee;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.261-269
    • /
    • 2023
  • We propose to design a Holochain-based security and privacy protection system for resource-constrained IoT healthcare systems. Through analysis and performance evaluation, the proposed system confirmed that these characteristics operate effectively in the IoT healthcare environment. The system proposed in this paper consists of four main layers aimed at secure collection, transmission, storage, and processing of important medical data in IoT healthcare environments. The first PERCEPTION layer consists of various IoT devices, such as wearable devices, sensors, and other medical devices. These devices collect patient health data and pass it on to the network layer. The second network connectivity layer assigns an IP address to the collected data and ensures that the data is transmitted reliably over the network. Transmission takes place via standardized protocols, which ensures data reliability and availability. The third distributed cloud layer is a distributed data storage based on Holochain that stores important medical information collected from resource-limited IoT devices. This layer manages data integrity and access control, and allows users to share data securely. Finally, the fourth application layer provides useful information and services to end users, patients and healthcare professionals. The structuring and presentation of data and interaction between applications are managed at this layer. This structure aims to provide security, privacy, and resource efficiency suitable for IoT healthcare systems, in contrast to traditional centralized or blockchain-based systems. We design and propose a Holochain-based security and privacy protection system through a better IoT healthcare system.

Federated Learning Based on Ethereum Network (이더리움 네트워크 기반의 연합학습)

  • Seung-Yeon Hwang;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.191-196
    • /
    • 2024
  • Recently, research on intelligent IoT technology has been actively conducted by various companies and research institutes to analyze various data collected from IoT devices and provide it through actual application services. However, security issues such as personal information leakage may arise in the process of transmitting and receiving data to use data collected from IoT devices for research and development. In addition, as data collected from multiple IoT devices increases, data management difficulties exist, and data movement is costly and time consuming. Therefore, in this paper, we intend to develop an Ethereum network-based federated learning system with guaranteed reliability to improve security issues and inefficiencies in a federated learning environment composed of various devices.

Analysis of the Usage patterns of Social Network Service Users (소셜 네트워크 서비스 사용 시기에 따른 사용자 이용패턴 연구: 페이스북을 중심으로)

  • Park, Sang Hyeok;Oh, Seung Hee;Sung, Haeng Nam
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.251-265
    • /
    • 2013
  • The emergence of social network services, is changing the foundation of human relationship formation and method of communication of individuals through sharing of free information. Social network service is a service to support or facilitate an on-line extension of off-line network among people by helping them to share personal profile. History of social network services very short. But users of the various layers is increasing rapidly and ripple effect social as a result is very large. The focus of existing research was mainly devoted to motivation of use and acceptance of social network services. Currently the use of SNS was maturing. Thus, in-depth research on the use pattern of SNS users is needed. The purpose of this study is that, for Facebook in social network services, to analyze the changes in the initial stage of use, medium-term, usage patterns at the current time. Results of the study by analyzing the characteristics of the change in the pattern of usage of user of Facebook, it can be used as basic materials for SNS researchers and service provider.

The Performance Experiments on the Tactical Data Communication over the Legacy Radio Systems (기존 전술 무전기를 이용한 전술 데이터 통신 성능 실험)

  • Sim, Dong-Sub;Kang, Kyeong-Sung;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.243-251
    • /
    • 2010
  • The military has been putting great efforts into applying data communication on existing voice communication systems being used in NCW(Network Centric Warfare). Data communication will be an effective choice in one of many effort to yield a minimum kill chain, comparing to legacy voice communications, when tactical units conduct their missions. However, the required budget will be enormous, in case of the replacement of a lot of legacy communication systems with new one. As a cost-effective alternative, the tactical data communication systems using the conventional radio systems instead of the development of new radio systems has been proposed. It is mandatory, though, to ensure QoS while maintaining data communication by making use of legacy radio systems already in use. This paper focuses on the performance issues experimented and analyzed for tactical data communication through the legacy radio systems as the first step towards guaranteed QoS. We have conducted various experiments such as the transmission error rate on certain tactical messages, performance evaluation of redundant transfers, the relationship between the transmission frame size and rate of error, the identification of error points in the transmission frame, and techniques to reduce the errors in both hopping and non-hopping modes. As a result of the performance experiments, The adaptive communication module which decides the redundant transmission or the Forward Error Correction(FEC) technique by analyzing channel status and current transmission status(hopping/non-hopping) of the legacy radio should be designed. the FEC technique in non-hopping, and the redundant transmission technique in hopping mode was recommended from the result of experiment with the frame size is 20bytes in non-hopping and 10Bytes frame size in hopping mode.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

A Study on the Remote Manufacturing System for the developing of Direct Numeric Control System using the Vericut Applications (Vericut으로 구현한 원격 가공 시스템)

  • 김희중;이동훈;김정욱;정재현
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2002.05a
    • /
    • pp.205-208
    • /
    • 2002
  • The vericut is one of the best CAM application for manufacturing data verification system. It is much applied in most manufacturing company for checking the manufacturing work. Using it a off-line manufacturing system is connected for on-line working on local area network. First, we choose the serial communication to chain an off-line manufacturing system and a personal computer which link with the server running the vericut.

  • PDF

Design and Implementation of Multi-Position Diagnostic System(MPDS) For Personal Communication System(PCS)'s Base Station (개인 휴대 통신 시스템(PCS) 기지국의 Multi-Position 진단 시스템(MPDS) 설계 및 구현)

  • 이상원;이순흥
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.700-702
    • /
    • 1999
  • 본 논문에서는 개인 휴대통신 시스템에서 다수 기지국에 대해서 동시 진단 및 진단 이력 관리 기능을 가지는 Multi-Position 진단 시스템(MPDS)의 설계 및 구현 방법을 기술하고 앞으로의 발전 방향을 제시한다. MPDS는 Network을 통한 진단 기능의 분산 처리가 가능하고, 그에 따른 진단 결과 Message를 각 Client별로 실시간 분리 전달 기능을 가지며, RDBMS를 이용한 진단 결과 이력 관리 및 Graphic을 사용한 운용자 정합 기능을 수행한다.

  • PDF