• Title/Summary/Keyword: Smart platform

Search Result 1,382, Processing Time 0.027 seconds

A Blockchain-based User Authentication Model Using MetaMask (메타마스크와 연동한 블록체인 기반 사용자 인증모델)

  • Choi, Nakhoon;Kim, Heeyoul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.119-127
    • /
    • 2019
  • This paper proposes a new authentication model to solve the problem of personal information takeover and personal information theft by service providers using centralized servers for user authentication and management of personal information. The centralization issue is resolved by providing user authentication and information storage space through a decentralize platform, blockchain, and ensuring confidentiality of information through user-specific symmetric key encryption. The proposed model was implemented using the public-blockchain Ethereum and the web-based wallet extension MetaMask, and users access the Ethereum main network through the MetaMask on their browser and store their encrypted personal information in the Smart Contract. In the future, users will provide their personal information to the service provider through their Ethereum Account for the use of the new service, which will provide user authentication and personal information without subscription or a new authentication process. Service providers can reduce the costs of storing personal information and separate authentication methods, and prevent problems caused by personal information leakage.

Competitiveness of Cable TV in the Multiplatform Media Marketplace (멀티플랫폼 시대 케이블 TV의 경쟁력 강화방안)

  • Ryu, Seung-Kwan;An, Su-Keon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.142-153
    • /
    • 2012
  • This study investigated a current situation of cable TV in order to seek and suggest cable TV's competitive superiority in the era of multiplatform media marketplace. This study suggested cable TV's direction from two aspects, short-term and mid and long-term strategies. As a result, it recommended that cable TV industry need to establish content circulation representatives, and reinforce multiformat contents suitable for various multiplatform uses, digital cable promotion, production of SO's originated programs, HD VOD, bundling services and diverse programs. As a long-term strategy, this study also suggested cable TV industry need to cooperate with smart TV industry in order to widen openness of its platform, and to provide not only diverse contents but also applications by offering two-way, mobile, and on-demand contents and services. Finally, this study proposed cable TV is needed to move towards a comprehensive media portal, which is a contents aggregator with the aforementioned business strategies.

Design of wireless sensor network and its application for structural health monitoring of cable-stayed bridge

  • Lin, H.R.;Chen, C.S.;Chen, P.Y.;Tsai, F.J.;Huang, J.D.;Li, J.F.;Lin, C.T.;Wu, W.J.
    • Smart Structures and Systems
    • /
    • v.6 no.8
    • /
    • pp.939-951
    • /
    • 2010
  • A low-cost wireless sensor network (WSN) solution with highly expandable super and simple nodes was developed. The super node was designed as a sensing unit as well as a receiving terminal with low energy consumption. The simple node was designed to serve as a cheaper alternative for large-scale deployment. A 12-bit ADC inputs and DAC outputs were reserved for sensor boards to ease the sensing integration. Vibration and thermal field tests of the Chi-Lu Bridge were conducted to evaluate the WSN's performance. Integral acceleration, temperature and tilt sensing modules were constructed to simplify the task of long-term environmental monitoring on this bridge, while a star topology was used to avoid collisions and reduce power consumption. We showed that, given sufficient power and additional power amplifier, the WSN can successfully be active for more than 7 days and satisfy the half bridge 120-meter transmission requirement. The time and frequency responses of cables shocked by external force and temperature variations around cables in one day were recorded and analyzed. Finally, guidelines on power characterization of the WSN platform and selection of acceleration sensors for structural health monitoring applications were given.

System Improvement for Application and Diffusion of Earthwork Surveying Automation Technology (토공측량 자동화 기술의 적용 활성화를 위한 제도개선 방안)

  • Lee, Du-Heon;Park, Jae-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.303-313
    • /
    • 2018
  • The purpose of this study is digitalization of earthwork such as development of 3D terrain analysis platform using latest technologies including unmanned aerial vehicle and terrestrial laser scanner to ultimately achieve earthwork automation. It is necessary to develop related element technologies and to establish regulations so that it can be applied to the domestic construction projects. As a result of pilot project about the earthwork surveying automation technology, it was confirmed that information such as terrain coordinates, soil, boring, and excavation volume is acquired smoothly. In this paper, we investigate related regulations and manuals in Japan and propose the improvement plan of domestic regulation. We plan to study regulations from early to final construction stage, combine with the 'regulation for public surveying', and improve the regulations in detail.

Implementation and Measurement of Spectrum Sensing for Cognitive Radio Networks Based on LoRa and GNU Radio

  • Tendeng, Rene;Lee, YoungDoo;Koo, Insoo
    • International journal of advanced smart convergence
    • /
    • v.7 no.3
    • /
    • pp.23-36
    • /
    • 2018
  • In wireless communication, efficient spectrum usage is an issue that has been an attractive research area for many technologies. Recently new technologies innovations allow compact radios to transmit with power efficient communication over very long distances. For example, Low-Power Wide Area Networks (LPWANs) are an attractive emerging platform to connect the Internet-of-Things (IoT). Especially, LoRa is one of LPWAN technologies and considered as an infrastructure solution for IoT. End-devices use LoRa protocol across a single wireless hop to communicate to gateway(s) connected to the internet which acts as a bridge and relays message between these LoRa end-devices to a central network server. The use of the (ISM) spectrum sharing for such long-range networking motivates us to implement spectrum sensing testbed for cognitive radio network based on LoRa and GNU radio. In cognitive radio (CR), secondary users (SUs) are able to sense and use this information to opportunistically access the licensed spectrum band in absence of the primary users (PUs). In general, PUs have not been very receptive of the idea of opportunistic spectrum sharing. That is, CR will harmfully interfere with operations of PUs. Subsequently, there is a need for experimenting with different techniques in a real system. In this paper, we implemented spectrum sensing for cognitive radio networks based on LoRa and GNU Radio, and further analyzed corresponding performances of the implemented systems. The implementation is done using Microchip LoRa evolution kits, USRPs, and GNU radio.

Research Trend Analysis on Living Lab Using Text Mining (텍스트 마이닝을 이용한 리빙랩 연구동향 분석)

  • Kim, SeongMook;Kim, YoungJun
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.37-48
    • /
    • 2020
  • This study aimed at understanding trends of living lab studies and deriving implications for directions of the studies by utilizing text mining. The study included network analysis and topic modelling based on keywords and abstracts from total 166 thesis published between 2011 and November 2019. Centrality analysis showed that living lab studies had been conducted focusing on keywords like innovation, society, technology, development, user and so on. From the topic modelling, 5 topics such as "regional innovation and user support", "social policy program of government", "smart city platform building", "technology innovation model of company" and "participation in system transformation" were extracted. Since the foundation of KNoLL in 2017, the diversification of living lab study subjects has been made. Quantitative analysis using text mining provides useful results for development of living lab studies.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

A Study on the Virtual Switch Implementation and Comparison for Smart Node Platform (가상 스위치 구현 및 비교에 관한 연구)

  • Jeong, Gab Joong;Choi, Kang-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2911-2918
    • /
    • 2014
  • Nowadays, most Internet servers run on virtual a network which connects each virtual machine, to process large amounts of data on single physical computer. The virtual machines for their own purposes are interconnected to other virtual server systems with various types of operating systems. Each virtual server may share one physical computer resources and operates at a service seamlessly to each other. Sometimes even the virtual machines are implemented using a method that lease the physical IT resources without purchasing physical server. Therefore, a virtual switch is needed to improve the performance when a large number of virtual machines operate on physical server. In this study, the implementation and investigation was performed for the virtual switches, OpenvSwitch and DPDKvSwitch, in order to provide the necessary high-performance cloud services to creative business.

The analysis of technology of the connected car (커넥티드 카의 기술 분석)

  • Shim, Hyun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.211-215
    • /
    • 2015
  • It comes into the spotlight as the new Blue Ocean in which the connected car industry in which the car and mobile communication technology is convergence. All sorts of infortainments services connecting with the portable electronic device(Smart phone, tablet PC, and MP3 player) and car are rapidly grown. The Connected car emphasizes the vehicle connectivity with the concept that the car has communication with the around on a real time basis and it provides the safety and expedience to the operator and using the thing of Internet (IoT) in the car and supports the application, presently, the entertainment service including the real-time Navigation, parking assistant function, not only the remote vehicle control and management service but also Email, multimedia streaming service, SNS and with the platform. Intelligent vehicle network is studied as the kind according to MANET(Mobile Ad Hoc Network) for the safety operation of the cars of the road and improving the efficiency of the driving. The intelligent vehicle network is comprised for the driving information offering changing rapidly of the communication(V2V: Vehicle to Vehicle) between the car and the car, communication(V2I : Vehicle to Infrastructure) between the infrastructure and the car, and V2X (Vehicle to Nomadic).

  • PDF

Optimal Machine Learning Model for Detecting Normal and Malicious Android Apps (안드로이드 정상 및 악성 앱 판별을 위한 최적합 머신러닝 기법)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.1-10
    • /
    • 2020
  • The mobile application based on the Android platform is simple to decompile, making it possible to create malicious applications similar to normal ones, and can easily distribute the created malicious apps through the Android third party app store. In this case, the Android malicious application in the smartphone causes several problems such as leakage of personal information in the device, transmission of premium SMS, and leakage of location information and call records. Therefore, it is necessary to select a optimal model that provides the best performance among the machine learning techniques that have published recently, and provide a technique to automatically identify malicious Android apps. Therefore, in this paper, after adopting the feature engineering to Android apps on official test set, a total of four performance evaluation experiments were conducted to select the machine learning model that provides the optimal performance for Android malicious app detection.