• Title/Summary/Keyword: Push 메시지

Search Result 52, Processing Time 0.025 seconds

Android-based Implementation of Remote Monitoring System for Industrial Gas Turbines (안드로이드 기반 산업용 가스터빈 원격 모니터링 시스템 구현)

  • Choi, Joon-Hyuck;Lee, Dong-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.369-376
    • /
    • 2018
  • This paper presents an android-based implementation of real-time remote monitoring system for industrial gas turbines. The use of remote monitoring techniques can be beneficial in terms of not only the reduction of monitoring cost but also the earlier detection of abnormal status. In order to achieve the ability of protecting sensitive information from unauthorized persons, the proposed system supports secure transmissions using the RSA(Rivest Shamir Adleman) algorithm. In the event of abnormal situation on the gas turbine, the remote monitoring system generates an alarm to attract the user's attention by exploiting a push-message technique. The proposed system has been verified through a series of experiments with an experimental setup including a virtual data generator.

Pushback based Advanced ICMP Traceback Mechanism Against DDoS Attack (DDoS 공격에 대한 Pushback 기반 개선된 ICMP Traceback 기법)

  • Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.85-97
    • /
    • 2004
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive tracing. Proactive tracing(such as packet marking and messaging) prepares information for tracing when packets are in transit. Reactive tracing starts tracing after an attack is detected. In this paper, we propose a "advanced ICMP Traceback" mechanism. which is based on the modified push back system. Proposed mechanism can detect and control DDoS traffic on router and can generate ICMP Traceback message for reconstructing origin attack source.ck source.

  • PDF

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

A Study on the Securing Technological Safety of Mobile Electronic Notification Service in Public and Administrative Agencies (공공·행정기관 모바일전자고지서비스의 기술적인 안전성 확보 방안에 대한 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.7-16
    • /
    • 2020
  • The mobile electronic notification service delivers notifications through mobile phone text or app-based message push to solve various problems of the paper-based mail service. And it is a service that an electronic document relay company proves to prove delivery. In order for public and administrative agencies to provide mobile electronic notification service, the user's identification information of the mobile phone number or the subscribed app is required. To overcome these limitations, ICT-regulated sandbox system was used to allow collective conversion of users' resident registration numbers into connecting information (CI). Therefore, in this paper, we propose a technical method for safe management of user CI in mobile electronic notice service, identity verification of electronic notice readers, and prevention of forgery and forgery of electronic notices. Through the proposed method, it is confirmed that the service can be activated by minimizing the adverse function of the mobile electronic notification service by securing the user's convenience and technical safety for the CI.

A Study on Optimized Disaster Broadcasting Service for Vulnerable Populations based on ATSC 3.0 Standards (ATSC 3.0 기반 재난약자 맞춤형 재난방송서비스에 대한 연구)

  • Kim, Nayeon;Hyun, Eunhee;Bae, Byungjun
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.928-938
    • /
    • 2019
  • Republic of Korea has established 'Transmission and Reception for Terrestrial UHDTV Broadcasting Service' standard based on ATSC 3.0, the next-generation broadcasting standard in North America and is now providing commercial services. Republic of Korea has been studying terrestrial UHDTV based disaster broadcasting service using the ATSC 3.0 AEA system's technology since 2018. ATSC 3.0 has established a standard for expanding disaster broadcasting services, which were used to be simple push-type text message broadcasting, by introducing bidirectional and rich-media transporting mechanisms. However, the disaster information is still focused on the general public, and disaster broadcasting service including detailed information for the vulnerable are still insufficient. In this paper, we proposed the optimized disaster broadcasting service for vulnerable populations based on ATSC 3.0 after defined the disaster vulnerable populations as the target of the service. And we defined the extension element of disaster broadcasting message for service provision. The proposed service can be an effective means to increase the possibility of disaster information reception and evacuation to vulnerable populations. In addition, it is expected to be used as a basic research for development of diverse and effective advanced services for vulnerable populations through linkage with existing disaster alerting and countermeasures studies.

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment (모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1393-1400
    • /
    • 2017
  • As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.

A combination of periodic and on-demand scheduling for data broadcasting in mobile convergence networks (모바일 융합망에서 주기적방법과 on-demand 방법을 결합한 데이터 방송 스케줄링 기법)

  • Kang, Sang-Hyuk;Ahn, Hee-June
    • Journal of Broadcast Engineering
    • /
    • v.14 no.2
    • /
    • pp.189-196
    • /
    • 2009
  • We propose a hybrid broadcast scheduling based on a combination of periodic and on-demand data scheduling methods for mobile data broadcasting in convergence networks from communication and broadcasting. We consider an environment in which the forward channel is for data broadcasting and the reverse channel is for sending data requests via cellular phones, WLAN, WiBro, etc. Collecting statistics of requests from clients, the server partitions the data items into hot-item and cold-item sets. Hot items are sent based on a push-based scheduling. An on-demand scheduling method is applied to cold items. Performance evaluation from simulations shows that our proposed scheduling algorithm yields small response time with high successful response ratio.

Development of a Communication Protocol for a Digital Traffic Signal Controller (디지털 교통신호제어기 통신체계 개발)

  • Kim, Min-Sung;Ko, Kwang-Yong;Lee, Choul-Ki;Jeong, Jun-Ha;Heo, Nak-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.1-10
    • /
    • 2013
  • Most of the current traffic signal controller use load switches to transmit high voltage power to the signal lamps. The direct transmission of high voltage power may cause a lot of problems like leakages of electric power, obstructions of pedestrian, environmental disfigurements. To overcome these problems, the development of digital type signal controller has been trying in the various methods. Digital communication between a master controller and signal lamps is the most important part to improve control performance in the digital type controller. A communication system for the digital signal controller was developed in this study. The system bases on CAN specification, includes ID structure for most peripheral devices like loops, signal lamps, push buttons, police switches. The operability of this system verified with a software based CAN simulation tool.

Fabrication of smart alarm service system using a tiny flame detection sensor based on a Raspberry Pi (라즈베리파이 기반 미소 불꽃 감지를 이용한 스마트 경보 서비스 시스템 구현)

  • Lee, Young-Min;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.9
    • /
    • pp.953-958
    • /
    • 2015
  • Raspberry Pi is a credit card-sized computer with support for a large number of input and output peripherals. This makes it the perfect platform for interaction with many different devices and for usage in a wide range of applications. When combined with Wi-Fi, it can communicate remotely, therefore increasing its suitability for the construction of wireless sensor nodes. In addition, data processing and decision-making can be based on artificial intelligence, what is performed in developed testbed on the example of monitoring and determining the confidence of fire. In this paper, we demonstrated the usage of Raspberry Pi as a sensor web node for fire-safety monitoring in a building. When the UV-flame sensors detect a flame as thin as that of a candle, the Raspberry Pi sends a push-message to notify the assigned smartphone of the on-site situation through the GCM server. A mobile app was developed to provide a real-time video streaming service in order to determine a false alarm. If an emergency occurs, one can immediately call for help.

A Study on User-Centered Design for Cut-scene in Action-Adventure Games (액션어드벤쳐게임 컷신을 위한 UCD 디자인 연구)

  • Ruan, Xiaoyin;Cho, Dong-Min
    • Journal of Korea Game Society
    • /
    • v.14 no.5
    • /
    • pp.137-146
    • /
    • 2014
  • Recently, the games on the market are getting rich and excellent in the category of design and productions. The style and production quality of cut-scenes also have achieved a continuous development, so how to stand out from multiple designs and gain popularity always acts as a challenge to designers. However, such design strategy up to developers will be failed to judge whether or not design achievements are loved by players and thus cannot meet rapidly changing market demands on both in a quantity and quality. Therefore, this study holds that cut-scene design for video games must set out from user-centered design(UCD). According to literatures with respect to product market, we know that Market Pull imposes far more impacts on success in bringing new products to the market than the technology Push, hence players actually determines the success of a game in competitive game market. This study will help to enhance the immersion of playing game, including the interest and standing out the designer's message without distorting the original impression in the game publishing environment.