• Title/Summary/Keyword: Service Location Protocol

Search Result 123, Processing Time 0.028 seconds

Design And Implementation of Zone Based Location Tracking System Using ZigBee in Indoor Environment (실내 환경에서 ZigBee를 이용한 Zone 기반 위치추적 시스템 설계 및 구현)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1003-1006
    • /
    • 2009
  • Recently, Ubiquitous computing technology is increasing necessity for object recognition and a location tracking technology to meet various applications. The location tracking technology is the fundamental to the Context-Aware of users in Ubiquitous environment and its efficiency has to be improved using IEEE 802.15.4 ZigBee used in current infra such as ubiquitous sensor network. But because the IEEE 802.15.4 ZigBee protocol has limitation to apply location tracking technology such as ToA and TDoA, Zone-based Location Tracking technology using RSSI is needed. In this paper suggests RSSI-based 802.15.4 ZigBee local positioning protocol to support a positioning tracking service in Ubiqutous environment. And Zone-based location tracking system is designed for actual the indoor location tracking service.

  • PDF

A Design and Implementation of Security Image Information Search Service System using Location Information Based RSSI of ZigBee (ZigBee의 RSSI 위치정보기반 보안 영상정보 검색 시스템 설계 및 구현)

  • Kim, Myung-Hwan;Chung, Yeong-Jee
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.243-258
    • /
    • 2011
  • With increasing interest in ubiquitous computing technology, an infrastructure for the short-distance wireless communication has been extended socially, bringing spotlight to the security system using the image or location. In case of existing security system, there have been issues such as the occurrences of blind spots, difficulty in recognizing multiple objects and storing of the unspecified objects. In order to solve this issue, zone-based location-estimation search system for the image have been suggested as an alternative based on the real-time location determination technology combined with image. This paper intends to suggest the search service for the image zone-based location-estimation. For this, it proposed the location determination algorism using IEEE 802.15.4/ZigBee's RSSI and for real-time image service, the RTP/RTCP protocol was applied. In order to combine the location and image, at the event of the entry of the specified target, the record of the time for image and the time of occurrence of the event on a global time standard, it has devised a time stamp, applying XML based meta data formation method based on the media's feature data based in connection with the location based data for the events of the object. Using the proposed meta data, the service mode which can search for the image from the point in time when the entry of the specified target was proposed.

A Study on the Mobile Emergency Service Protocol (모바일 긴급서비스 프로토콜 연구)

  • Jang Jeong-Ah;Choi Hae-Ock;Choi Wan-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3B
    • /
    • pp.224-231
    • /
    • 2006
  • The location information of wired 112, 119 emergency call is provided immediately by subscriber database of KT. But emergency call made by mobile phone should be ask location information to mobile network. This paper proposes the network protocol for mobile emergency service refer to TIA/EIA/J-STD-036-A with reviews about technical issues, legacy factors and related researches. The mobile emergency service is divided to mobile emergency rescue service and mobile emergency alert service. The network reference model for mobile emergency rescue service is released in domestic sector. In this paper, the interfaces between modules of the network reference model, and service scenarios, message flows are defined. Supplement to mobile emergency rescue service, the network reference model, interfaces and message flows for mobile emergency alert service are developed.

A Study and Implementation of Location-to-Service Translation Protocol (위치-서비스 변환 프로토콜의 연구 및 구현)

  • Cho, Hyun-Sik;Chon, Ji-Hun;Choi, Sun-Wan;Huh, Mi-Young;Kang, Shin-Gak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.958-961
    • /
    • 2007
  • 본 논문에서는 IETF ECRIT (Emergency Context Resolution with Internet Technologies) WG 에서 논의 중인 LoST (Location-to-Service Translation)를 기반으로 사용자의 현재 위치에서 적절한 서비스를 검색하여 정보를 전송하는 서비스 모델을 연구 및 구현하였다.

  • PDF

Design for Access Control of SLP Client using PMI (PMI를 이용한 SLP 클라이언트 접근제어 방안 설계)

  • 남윤중;유황빈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.679-681
    • /
    • 2003
  • 최근 인터넷과 무선통신의 발전으로 많은 외부 클라이언트들이 학교나 공공기관 같은 내부 네트워크를 사용하게 되었다. 이러한 클라이언트들은 내부 네트워크를 사용하게 되면서 여러 가지 서비스를 받기 위해 다양한 서비스의 위치정보를 검색하는데 사용되는 프로토콜인 SLP(Service Location Protocol)를 사용한다. 이 때 악의를 가진 클라이언트가 SLP(Service Location Protocol)를 이용해 서비스 리스트를 얻어 자신이 내부 네트워크의 모든 자원을 사용할 수 있게 만드는 것과 같은 악의적인 행동을 할 수 있는 문제점이 있다. 본 논문은 이러한 문제점을 해결하기 위해 PMI(Privilege Management Infrastructure)를 이용하여 내부 네트워크에 들어온 외부 클라이언트에 관해 내부 서비스에 대한 권한을 설정하고자 하는 방안을 제안하고자 한다.

  • PDF

Design of MPLS-based micro-mobility management protocol with QoS support

  • Kim, Byung-Chul;Lee, Jae-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.64-70
    • /
    • 2003
  • In order to provide seamless wireless Internet service, the basic mobile IP protocol should be enhanced to solve packet loss problem from large registration latency because frequent handoffs occur in cellular networks. In this paper, we suggest a new micro-mobility management protocol based on MPLS while supporting Qos, and evaluate its performance using simulation. We use MPLS label switching techniuqe in cellular access networks to simplify location management and speed up packet transmission. We adopt context transfer procedure to minimize the delay needed to attain prior level of service after handoff Packet loss can be minimized during handoff by transmitting received packets from old BSLER to new BSLER using a spliced LSP between them. Simulation results show that the proposed MPLS-based micro-mobility management protocol provides a seamless handoff and supports QoS of user traffic.

Design of Authentication Protocol for IMT-2000 (IMT-2000 인증 프로토콜 설계)

  • Gang, Hyeong-U;Yun, Lee-Jung;Lee, Su-Yeon;Park, Chang-Seop;Lee, Dong-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2133-2144
    • /
    • 1999
  • IMT-2000 system is expected to start its service at the beginning of 2000 on the purpose of providing with the highest qualitative service through one mobile terminal. In this paper, we investigate some of the important issues which need to be addresses in designing an authentication protocol for IMT-2000. Also proposed is an authentication protocol which addresses the above issues, and we design a correct and efficient authentication protocol to establish secure communication channel. Our protocol provides an authentication of the communication entities, location privacy, and secure messaging as well as global roaming service.

  • PDF

Development Strategies for Business GIS Based on NGIS (NGIS 기반하의 Business GIS 발전방안)

  • Lee, Bong-Gyou;Song, Ji-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.2 s.14
    • /
    • pp.3-14
    • /
    • 2005
  • The purpose of this study is to present the role of NGIS(National Geographic Information System) and the development strategy for Business GIS in the ubiquitous society. We analyze the level of GIS technology with the ICT(Information Communication Technology) as well as GIS application trends especially in location-based circumstances. Also, we advocate not only making GIS contents to meet the international standards such as GML(Geography Markup Language) and TPEG(Transport Protocol Experts Group) but applying GIS as a killer application to oncoming diverse ICT areas including LBS(Location -Based Service), Telematics, ITS(Intelligent Transport System), gCRM(geographic Customer Relationship Management), DMB(Digital Multimedia Broadcasting), u(ubiquitous)-City and u-Town. Finally, we build a conceptual Business GIS model based on NGIS for QoS, standardization, R&D, education, and security.

  • PDF

Development of a LonRF Intelligent Device-based Ubiquitous Home Network Testbed (LonRF 지능형 디바이스 기반의 유비쿼터스 홈네트워크 테스트베드 개발)

  • 이병복;박애순;김대식;노광현
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.6
    • /
    • pp.566-573
    • /
    • 2004
  • This paper describes the ubiquitous home network (uHome-net) testbed and LonRF intelligent devices based on LonWorks technology. These devices consist of Neuron Chip, RF transceiver, sensor, and other peripheral components. Using LonRF devices, a home control network can be simplified and most devices can be operated on LonWorks control network. Also, Indoor Positioning System (IPS) that can serve various location based services was implemented in uHome-net. Smart Badge of IPS, that is a special LonRF device, can measure the 3D location of objects in the indoor environment. In the uHome-net testbed, remote control service, cooking help service, wireless remote metering service, baby monitoring service and security & fire prevention service were realized. This research shows the vision of the ubiquitous home network that will be emerged in the near future.

Attack and Solution on 3K-RFID Authentication Protocol (3K-RFID 인증 프로토콜에 대한 공격과 해결책)

  • Yoon, Eun-Jun;Bu, Ki-Dong;Ha, Kyeoung-Ju;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6C
    • /
    • pp.578-587
    • /
    • 2009
  • In 2005, Ko-Kim-Kwon pointed out Henrici-Muller's hash based RFID authentication protocol is insecure to location tracking attack, spoofing attack and Denial of Service attack. Then, they proposed a new RFID authentication protocol(3K-RFID) that can withstand these security problems. However, this paper shows that 3K-RFID authentication protocol is still not only vulnerable to spoofing attack and Denial of Service attack but also does not provide forward secrecy, and then proposes an improved secure I3K-RFID authentication protocol in order to resolve such problems.