• Title/Summary/Keyword: Service using Smart Device

Search Result 260, Processing Time 0.021 seconds

Study on Smart Office Functionality Utilizing KEPCO Gateway (한전 Gateway를 활용한 Smart Office 기능 연구)

  • Nam, Kang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1107-1112
    • /
    • 2016
  • This study is the Smart Office features that take advantage of KEPCO eIoT(: energy Internet of Thing) platform, and it's Network configuration is composed of sensing device, gateway, platform, and the service server. The key features are parts for processing protocol data between the gateway and the device using LoRa(: Long Range) technology, Intelligent applications and public safety data connected to the PS-LTE(: Public Safety-Long-Term Evolution) system. And the resource tree provided Smart Office for the service, which commonly used in the application server and the device.

Device Authentication Protocol for Smart Grid Systems Using Homomorphic Hash

  • Kim, Young-Sam;Heo, Joon
    • Journal of Communications and Networks
    • /
    • v.14 no.6
    • /
    • pp.606-613
    • /
    • 2012
  • In a smart grid environment, data for the usage and control of power are transmitted over an Internet protocol (IP)-based network. This data contains very sensitive information about the user or energy service provider (ESP); hence, measures must be taken to prevent data manipulation. Mutual authentication between devices, which can prevent impersonation attacks by verifying the counterpart's identity, is a necessary process for secure communication. However, it is difficult to apply existing signature-based authentication in a smart grid system because smart meters, a component of such systems, are resource-constrained devices. In this paper, we consider a smart meter and propose an efficient mutual authentication protocol. The proposed protocol uses a matrix-based homomorphic hash that can decrease the amount of computations in a smart meter. To prove this, we analyze the protocol's security and performance.

Position Information Acquisition Method Based on LED Lights and Smart Device Camera Using 3-Axis Moving Distance Measurement (3축 이동량 측정을 이용한 LED조명과 스마트단말 카메라기반 위치정보 획득 기법)

  • Jung, Soon-Ho;Lee, Min-Woo;Kim, Ki-Yun;Cha, Jae-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.226-232
    • /
    • 2015
  • As the age of smart device has come, recently many application services related to smart phone are developing. The LBS(Location Based Service) technique is considered as one of the most important techniques to support location based application services. Usually the smart phone acquires the information of position by using the position recognition systems and sensors such as GPS(Global Positioning System) and G-Sensor. However, since the GPS signal from the satellite can hardly be received in the indoor environments, new LBS techniques for the indoor environment are required. In this paper, to solve the problem a position information transceiver using LED lights and smart phone camera sensor is proposed. We proved the possibility of the proposed positioning system through the experiments in the laboratory for the practical verification.

Development of Real Time Information Service Model Using Smart Phone Lock Screen (스마트 폰 잠금 화면을 통한 실시간 정보제공 서비스 모델의 개발)

  • Oh, Sung-Jin;Jang, Jin-Wook
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.323-331
    • /
    • 2014
  • This research is based on real-time service model that uses lock screen of smart devices which is mostly exposed to device users. The potential for lock screen space is immense due to their exposing time for user. The effect can be maximized by offering useful information contents on lock screen. This service model offers real-time keyword with abridged sentence. They match real-time keyword with news by using text matching algorithm and extracts kernel sentence from news to provide short sentence to user. News from the lock screen to match real-time query sentence, and then only to the original core of the ability to move a user evaluation was conducted after adding. The report provided a key statement users feel the lack of original Not if you go to an average of 5.71%. Most algorithms allow only real-time zoom key sentence extracted keywords can accurately determine the reason for that was confirmed.

Multi transmission method of data among near smart devices using inaudible sound and wireless network

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.83-90
    • /
    • 2015
  • In this paper, we propose a new method for multi transmission method of data among near smart devices. Existing methods require the use of an extra application service where the operating system differs between smart devices. In contrast, the proposed method makes use of the smart device's inner speaker and microphone to confirm the transmission signal. Then, real sharing data is transmitted via WiFi or LTE. Therefore, the proposed method overcomes operating system issues with existing methods. Besides, BUMP technology works in a similar way to the method we propose, it only supports one-to-one transmission. To evaluate the efficacy of the new method, we tested one-to-many data transmission in an experiment: the results showed a 96% success rate. As a result, we believe that the proposed method is an effective multi transmission method of data among near smart devices.

Design and Implementation of the DRM Supporting Smart Multimedia Streaming in Ubi-Home (Ubi-Home에서의 지능적 멀티미디어 스트리밍을 지원하는 DRM 설계 및 구현)

  • Park Jong-Hyuk;Lee Sang-Jin;Hong In-Hwa;Ahn Tae-Won;Lee Deok-Gyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3C
    • /
    • pp.293-301
    • /
    • 2006
  • In this paper, we design and implement the UHSNS-DRM(Ubi-Home Smart Multimedia Streaming-Digital Right Management) in Ubi-Home. The proposed system support flexible distribution platform for digital content copyright protection and management in Ubi-Home. This system also can provide multimedia streaming service to authorized users who are using PC, STB, PDA, and Portable Device, etc. Furthermore, we adopt concept of domain authentication and it help to improve the efficiency of license management for all devices in Ubi-Home. We design user's location recognition algorithm in order to provide intelligent services. Of course, this algorithm is applied for the proposed system. Start after striking space key 2 times.

Continuous Human Activity Detection Using Multiple Smart Wearable Devices in IoT Environments

  • Alshamrani, Adel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.221-228
    • /
    • 2021
  • Recent improvements on the quality, fidelity and availability of biometric data have led to effective human physical activity detection (HPAD) in real time which adds significant value to applications such as human behavior identification, healthcare monitoring, and user authentication. Current approaches usually use machine-learning techniques for human physical activity recognition based on the data collected from wearable accelerometer sensor from a single wearable smart device on the user. However, collecting data from a single wearable smart device may not provide the complete user activity data as it is usually attached to only single part of the user's body. In addition, in case of the absence of the single sensor, then no data can be collected. Hence, in this paper, a continuous HPAD will be presented to effectively perform user activity detection with mobile service infrastructure using multiple wearable smart devices, namely smartphone and smartwatch placed in various locations on user's body for more accurate HPAD. A case study on a comprehensive dataset of classified human physical activities with our HAPD approach shows substantial improvement in HPAD accuracy.

A Fusion Context-Aware Model based on Hybrid Sensing for Recommendation Smart Service (지능형 스마트 서비스를 위한 하이브리드 센싱 기반의 퓨전 상황인지 모델)

  • Kim, Svetlana;Yoon, YongIk
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.1-6
    • /
    • 2013
  • Variety of smart devices including smart phone have become and essential item in user's daily life. This means that smart devices are good mediators to get collecting user's behavior by sensors mounted on the devices. The information from smart devices is important clues to identify by analyzing the user's preferences and needs. Through this, the intelligent service which is fitted to the user is possible. This paper propose a smart service recommendation model based on user scenario using fusion context-awareness. The information for recommendation services is collected to make the scenario depending on time, location, action based on the Fusion process. The scenarios can help predict a user's situation and provide the services in advance. Also, content categories as well as the content types are determined depending on the scenario. The scenario is a method for providing the best service as well as a basis for the user's situation. Using this method, proposing a smart service model with the fusion context-awareness based on the hybrid sensing is the goal of this paper.

A Location Tracking System using BLE Beacon Exploiting a Double-Gaussian Filter

  • Lee, Jae Gu;Kim, Jin;Lee, Seon Woo;Ko, Young Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1162-1179
    • /
    • 2017
  • In this paper, we propose indoor location tracking method using RSSI(Received Signal Strength Indicator) value received from BLE(Bluetooth Low Energy) beacon. Due to the influence of various external environmental factors, it is very difficult to improve the accuracy in indoor location tracking. In order to solve this problem, we propose a novel method of reducing the noise generated in the external environment by using a double Gaussian filter. In addition, the value of the RSSI signal generated in the BLE beacon is different for each device. In this study, we propose a method to allocate additional weights in order to compensate the intensity of signal generated in each device. This makes it possible to improve the accuracy of indoor location tracking using beacons. The experiment results show that the proposed method effectively decrease the RSSI deviation and increase location accuracy. In order to verify the usefulness of this study, we compared the Kalman filter algorithm which is widely used in signal processing. We further performed additional experiments for application area for indoor location service and find that the proposed scheme is useful for BLE-based indoor location service.

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.