• Title/Summary/Keyword: Security light

Search Result 380, Processing Time 0.036 seconds

Development of a Bi-Directional Security Light Control System based on Low-Bandwidth Wireless Sensor Network (저대역 센서 네트워크 기반의 양방향 보안등 관제 시스템 개발)

  • Lee, Ho-Gun;Lee, Sang-Ho;Lee, Suk-Gyu;Choi, Jeong-Won
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.10
    • /
    • pp.58-66
    • /
    • 2010
  • This paper shows an implementation and management result of wireless networks based security light control system, which performs a great role in protection of pedestrians and prevention of crime. Conventional security light units have severe limits in confirmation and inspection of security light unit failure, like wilful damage by someone or failure by influence of other equipment or failure by spontaneous heat-increase, and so on. In addition, local government offices are responsible for maintenance of security light units and as a matter of fact, most of civil complaints are about security light units. It is an obvious that the existing security light maintenance system reaches the limit and the security light maintenance problem is a difficulty of local government. Therefore, efficient security light control system is needed, which enables central control and intelligent maintenance. Moreover, the system has to be easy to control and has to be stable. In this study, wireless sensor network based security light control system is implemented, which is independent of programming language and platform, and which is simple to control and extend the system. The proven protocols, HTTP and SOAP, are utilized in order to improve the system reliability. This paper shows the excellence of our proposed system by implementing and operating it in real environment.

Security APIs for Security Services in Ultra Light-weight Environment (초경량 환경의 보안 서비스 지원을 위한 보안 API)

  • Kim, Won-Young;Lee, Young-Seok;Lee, Jae-Wan;Seo, Chang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.485-492
    • /
    • 2008
  • Computers used fer light-weight computing environments are considerably limited in resources and performance running in ubiquitous environment. Because of the limited resources, it is difficult to apply existing security technologies to the light-weight computers. In this paper, light-weight security software is implemented using RC-5 encryption and SHA-1 authentication algorithm which is appropriate for light-weight computing environments. The design of components based on security software of a light-weight computer application and the test-bed for security software are presented. The simulation verifies the correctness of the security software. The architecture of the light-weight and reconfigurable security software for light-weight computer applications is proposed. The proposed security software is small size and provides reconfigurable security library based on the light-weight component and the software manager that configures software platform is loaded with the library at the time it is needed.

Development of Optical System for 50W LED Security Lamp (50W급 LED 보안등용 조명광학계 개발)

  • Jung, Byoung-Jo;Jang, Sung-Whan;Roh, Yong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.296-305
    • /
    • 2012
  • In this paper, we develop about glare phenomenon at security light caused by light source's straight characteristic, maintaining uniformity ratio of illuminance as high, have long light distribution not by symmetry of rotation but a single axis. we develop second lens for security light that lack of light distribution phenomenon at each of security light can be solved. Our developed light system design satisfies lighting standard of security light's and shape of lens is single lens. so our lens optimizes designing or analysis by using lighting design and interpretation program. Making a Mock-up to do real measure, we have intensity of illumination and maintaining uniformity ratio of illuminance measurement data.

Study on a Forward Light Changes According to the Surface Treatment of Light Cutoff Panel (차광판 표면 처리 방법에 따른 전사광 변화에 관한 연구)

  • Gu, Jinhoi;Kwon, Myunghee;Lee, Yoon-Gyeong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.12
    • /
    • pp.1-5
    • /
    • 2014
  • Since the "Light Pollution Prevention Act" was executed, the installation of the light cutoff panel to the security lightings which caused light trespass has been increased in the local government. The light cutoff panel is effective in reducing the light trespass in term of the cost-benefit. Because the installation of the light cutoff panel is inexpensive than the change of the security lighting. But the reflected light from the surface of the light cutoff panel has been regarded as another light pollution problem to solve. Therefore, we try to improve light cutoff panel by changing the light reflectivity characteristic of the surface of the light cutoff panel. First, we laminated the surface of light cutoff panel by black powder to reduce the light reflectivity of the light cutoff panel. After the black powder lamination, the light reflectivity on the light cutoff panel improved from 85% to 5%. And we compared reflected light caused by black powder laminated light cutoff panel with the one of no surface treatment cutoff panel. The vertical illuminance was measured at 3, 6, 9m in front of the security lighting and 3, 6, 9, 12, 15, 18m in back of the security lighting to evaluate the reflected light. And the measurement height was determined of 1.5m considering the height of the 1th floor of an apartment house. In this study, we found that the reflected light from the light cutoff panel can be reduced about 90% by the black powder lamination method. The results derived from this study will be helpful to develope the various kind of light cutoff panel which minimize the adverse effect like reflected light of light cutoff panel.

A study on the street security light management system using Zigbee network (지그비 통신망을 이용한 보안등 관제 시스템에 관한 연구)

  • Jeon, Joong Sung
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.4
    • /
    • pp.430-436
    • /
    • 2014
  • This paper relates to the study about the street security light management system. The purpose of the wireless remote management system is to manage street security lights efficiently. The system is composed of three components like light controller, CDMA gateway and web based remote management server. The zigbee solution is adopted to make local wireless network between street security lights. The CDMA network is used for the wireless communication between street security light controller and the remote control center. The gateway to interconnect zigbee network and CDMA was designed with low power 32 bits Cortex M3 micro-controller. For the data communication between the management server and the gateway, SMS and socket based TCP streaming is used. The management server sends SMS to the gateway to deliver light control and management requests, and the gateway replies with the light controllers report via TCP streaming. By using both SMS and TCP streaming communication, it was verified that simple cost effective management is possible for street security lights. We tried real test for 95 street security lights in real environment during two months and analyzed the practical possibility for mass supply.

Key Phase Mask Updating Scheme with Spatial Light Modulator for Secure Double Random Phase Encryption

  • Kwon, Seok-Chul;Lee, In-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.4
    • /
    • pp.280-285
    • /
    • 2015
  • Double random phase encryption (DRPE) is one of the well-known optical encryption techniques, and many techniques with DRPE have been developed for information security. However, most of these techniques may not solve the fundamental security problem caused by using fixed phase masks for DRPE. Therefore, in this paper, we propose a key phase mask updating scheme for DRPE to improve its security, where a spatial light modulator (SLM) is used to implement key phase mask updating. In the proposed scheme, updated key data are obtained by using previous image data and the first phase mask used in encryption. The SLM with the updated key is used as the second phase mask for encryption. We provide a detailed description of the method of encryption and decryption for a DRPE system using the proposed key updating scheme, and simulation results are also shown to verify that the proposed key updating scheme can enhance the security of the original DRPE.

A Design of an Energy-saving Doorbell with Blinking Light Function using IoT Technology (IoT 기술을 활용한 에너지 절약형 전등점멸 초인종 설계)

  • You, Ho-Gyun;Kim, Ye-Eun;Kim, Hee-Jeong;Jang, Woo-Hee;Kook, Joongjin;Lee, Kwangjae
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.2
    • /
    • pp.90-93
    • /
    • 2018
  • This paper is a system that visually informs the hearing impaired to visit other people by blinking the light of a room using the IoT(Internet of Things) technology. The system combines the power of home-use lights with low-power IoT devices to provide visual notifications. Using a current sensor, this system can track user location and then turns on and off the light in that room only to save energy. The proposed idea can create a society that is equal to everyone and can live more conveniently.

LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications

  • Roy, Siddhartha;Roy, Saptarshi;Biswas, Arpita;Baishnab, Krishna Lal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4122-4144
    • /
    • 2021
  • In this fast-paced technological world, the Internet of Things is a ground breaking technology which finds an immense role in the present electronic world which includes different embedded sensors, devices and most other things which are connected to the Internet. The IoT devices are designed in a way that it helps to collect various forms of data from varied sources and transmit them in digitalized form. In modern era of IoT technology data security is a trending issue which greatly affects the confidentiality of important information. Keeping the issue in mind a novel light encryption strategy known as LCB is designed for IoT devices for optimal security. LCB exploits the benefits of Feistel structure and the architectural benefits of substitution permutation network both to give more security. Moreover, this newly designed technique is tested on (Virtex-7) XC7VX330T FPGA board and it takes much little area of 224 GE (Gate Equivalent) and is extremely fast with very less combinational path delay of 0.877 ns. An in-depth screening confirms the proposed work to promise more security to counter cryptographic attacks. Lastly the Avalanche Effect (AE) of LCB showed as 63.125% and 63.875% when key and plaintext (PT) are taken into consideration respectively.

Design and Implementation of Double-Key based Light Weight Security Protocol in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 더블키를 이용한 경량 보안 프로토콜 설계 및 구현)

  • Zhung, Yon-Il;Lee, Sung-Young
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.239-254
    • /
    • 2007
  • Ubiquitous computing supports environment to freely connect to network without restrictions of place and time. This environment enables easy access and sharing of information, but because of easy unauthorized accesses, specified security policy is needed. Especially, ubiquitous sensor network devices use limited power and are small in size, so, many restrictions on policies are bound to happen. This paper proposes double-key based light weight security protocol, independent to specific sensor OS, platform and routing protocol in ubiquitous sensor network. The proposed protocol supports safe symmetric key distribution, and allows security manager to change and manage security levels and keys. This had a strong merit by which small process can make large security measures. In the performance evaluation, the proposed light weight security protocol using double-key in ubiquitous sensor network allows relatively efficient low power security policy. It will be efficient to ubiquitous sensor network, such as smart of ace and smart home.

Smartphone Color-Code based Gate Security Control

  • Han, Sukyoung;Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Lee, Seungyoun;Lee, Juyoung;Kim, Jintae;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.66-71
    • /
    • 2016
  • Smart building gate security control system using smartphone integrated with near field communication (NFC) has become part of daily life usage these days. The technology change in replacing RF NFC device using visible light communication technology based approach growing faster in recent days. This paper propose a design and development of gate security control system using color code based user authentication ID generation as part of an intelligent access control system to control automatic door open and close. In this approach gate security access control use the recent visible light communication technology trends to transfer the user specific authentication code to door access control system using color code on smartphone screen. Using a camera in the door access control system (ACS), color codes on smartphone screens are detected and matched to the database of authenticated user to open the door automatically in gate security system. We measure the visual light communication technology efficiency as a part of the research and the experiments have revealed that more than 95% users authenticated correctly at the suggested experiment environment on gate security control system.