• Title/Summary/Keyword: Smart-key system

Search Result 520, Processing Time 0.027 seconds

Analysis of Key Success Factors for Building a Smart Supply Chain Using AHP (AHP를 이용한 스마트 공급망 구축을 위한 주요 성공요인 분석)

  • Cheol-Soo Park
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.1-15
    • /
    • 2023
  • With the advent of the Fourth Industrial Revolution, propelled by digital technology, we are transitioning into an era of hyperconnectivity, where everything and objects are becoming interconnected. A smart supply chain refers to a supply chain system where various sensors and RFID tags are attached to objects such as machinery and products used in the manufacturing and transportation of goods. These sensors and tags collect and analyze process data related to the products, providing meaningful information for operational use and decision-making in the supply chain. Before the spread of COVID-19, the fundamental principles of supply chain management were centered around 'cost minimization' and 'high efficiency.' A smart supply chain overcomes the linear delayed action-reaction processes of traditional supply chains by adopting real-time data for better decision-making based on information, providing greater transparency, and enabling enhanced collaboration across the entire supply chain. Therefore, in this study, a hierarchical model for building a smart supply chain was constructed to systematically derive the importance of key factors that should be strategically considered in the construction of a smart supply chain, based on the major factors identified in previous research. We applied AHP (Analytical Hierarchy Process) techniques to identify urgent improvement areas in smart SCM initiatives. The analysis results showed that the external supply chain integration is the most urgent area to be improved in smart SCM initiatives.

The Implementation of Idle Stop System with the OBD-II Interface in the Automotive Smart Key System (OBD-II 인터페이스를 이용한 차량용 스마트키 시스템에서의 공회전 방지 알고리즘의 구현)

  • Kim, Kyeong-Seob;Lee, Yong-Hoon;Lee, Yun-Seob;Choi, Sang-Bang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1292-1305
    • /
    • 2013
  • Along with the strengthening vehicle environmental regulations and the growing needs for the energy consumption reduction technology, the researches on the engine idle stop system, have been briskly carried out around the automobile manufacturers before the development of alternative energy. Furthermore, there is a movement to disseminate the environment friendly idle stop system by combining the system to the generalized smart key system to not only increase purchasing but also provide the convenience and save the energy as well. In this paper, we designed and implemented the idle stop system algorithm for the aftermarket smart key system with the OBD-II interface. The implemented start stop system is capable of controlling two independent systems, the smart key system and intelligent idle stop system, on a single ECU. In addition, the implemented start stop system standardizes the communication interface with the vehicles to reduce the time required for installing the start stop system to the various vehicles, and satisfies every standard response time limit for the vehicle status request signals.

A User Authentication Scheme using Blockchain in Smart Grid-based Edge Computing Environments (스마트 그리드 기반 엣지 컴퓨팅 환경에서 블록체인을 이용한 사용자 인증 기법)

  • Hakjun Lee;Youngsook Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.71-79
    • /
    • 2022
  • The smart grid system has emerged to maximize energy efficiency through real-time information exchange between power providers and consumers by combining information technology and power supply systems. The authentication schemes using blockchain in a smart grid system have been proposed, which utilize an edge server's architecture to collect and store electric power-related information and process data between a central cloud server and smart grid-IoT devices. Although authentication schemes are being proposed to enhance security in the smart grid environment, many vulnerabilities are still reported. This paper presents a new mutual authentication scheme to guarantee users' privacy and anonymity in a smart grid based on edge computing using blockchain. In the proposed scheme, we use the smart contract for the key management's efficiency, such as updating and discarding key materials. Finally, we prove that the proposed scheme not only securely establishes a session key between the smart grid-IoT device of the user and the edge server but also guarantees anonymity.

Smart Tourism Information System and IoT Data Collection Devices for Location-based Tourism and Tourist Safety Services

  • Ko, Tae-Seung;Kim, Byeong-Joo;Jwa, Jeong-Woo
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.310-316
    • /
    • 2022
  • The smart tourism service provides services such as travel planning and tour guides to tourists using key technologies of the 4th industrial revolution, such as the Internet of Things, communication infrastructure, big data, artificial intelligence, AR/VR, and drones. We are developing smart tourism services such as recommended travel products, my travel itinerary, tourism information, and chatbots for tourists through the smart tourism app. In this paper, we develop a smart tourism service system that provides real-time location-based tourism information and weather information to tourists. The smart tourism service system consists of a smart tourism app, a smart tourism information system, and an IoT data collection device. The smart tourism information system receives weather information from the IoT data collection device installed in the tourist destination. The location-based smart tourism service is provided as a smart tourism app in the smart tourism information system according to the Beacon's UUID in the IoT data collection device. The smart tourism information system stores the Beacon's UUIDs received from tourists and provides a safe hiking service for tourists.

Design and Implementation of Serial Key Certification System Using Smartcard (스마트카드를 이용한 시리얼 키 인증 시스템 구현 및 설계)

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.473-478
    • /
    • 2007
  • Current certification system use serial key for protect copyright of software and digital contents. But It is not efficient system, because It is not protect copyright through create virtual key or use public key. So we research on various cryptology for prevent illegal copy of serial key, but It is not enough protection of copyright that use software technology only. In this paper, we propose certification system using smart card for protect copyright of software and digital contents.

  • PDF

The Design and Implementation of Improved Anti-Collision Algorithm for Vehicle User Authentication System (차량 사용자 인증 시스템을 위한 향상된 충돌 방지 알고리즘의 설계 및 구현)

  • Kim, Kyeong-Seob;Lee, Yun-Seob;Choi, Sang-Bang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.57-67
    • /
    • 2013
  • Because many of the FOB key, anti-collision algorithm for a seamless multi-access is applied to the smart-key system. In this paper, we have designed and implemented improved anti-collision algorithm that dramatically reduces the communication response time required in the user authentication process immediately after by dynamically changing the order in which the request of the user ID as the user ID on immediately before in the smart key system for vehicles that use many of the FOB key. In order to evaluate the performance of the system the improved anti-collision algorithm is applied, we show the behavior of the algorithm implemented in the state actually mounted on the vehicle and verify that communication response time required for many of the FOB key was reduced by about 33% compared to existing algorithms.

Cost Minimization of Solidity Smart Contracts on Blockchain Systems

  • Lee, Wan Yeon
    • International journal of advanced smart convergence
    • /
    • v.9 no.2
    • /
    • pp.157-163
    • /
    • 2020
  • Recently the blockchain technology has been actively studied due to its great potentiality. The smart contract is a key mechanism of the blockchain system. Due to the short history of the smart contract, many issues have not been solved yet. One main issue is vulnerability and another main issue is cost optimization. While the vulnerability of smart contract has been actively studied, the cost optimization has been rarely studied. In this paper, we propose two cost optimization methods for smart contracts running on the blockchain system. Triggering a function in a smart contract program code may require costs and it is repeated continuously. So the minimization of costs required to trigger a function of smart contract while maintaining the performance equally is very important. The proposed two methods minimize the usage of expensive permanent variables deployed on the blockchain system. We apply the proposed two methods to three prevalent blockchain platforms: Ethereum, Klaytn and Tron. Evaluation experiments verify that the proposed scheme significantly reduces the costs of functions in the smart contract written with Solidity.

Parameter Identification of 3R-C Equivalent Circuit Model Based on Full Life Cycle Database

  • Che, Yanbo;Jia, Jingjing;Yang, Yuexin;Wang, Shaohui;He, Wei
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.4
    • /
    • pp.1759-1768
    • /
    • 2018
  • The energy density, power density and ohm resistance of battery change significantly as results of battery aging, which lead to decrease in the accuracy of the equivalent model. A parameter identification method of the equivale6nt circuit model with 3 R-C branches based on the test database of battery life cycle is proposed in this paper. This database is built on the basis of experiments such as updating of available capacity, charging and discharging tests at different rates and relaxation characteristics tests. It can realize regular update and calibration of key parameters like SOH, so as to ensure the reliability of parameters identified. Taking SOH, SOC and T as independent variables, lookup table method is adopted to set initial value for the parameter matrix. Meanwhile, in order to ensure the validity of the model, the least square method based on variable forgetting factor is adopted for optimizing to complete the identification of equivalent model parameters. By comparing the simulation data with measured data for charging and discharging experiments of Li-ion battery, the effectiveness of the full life cycle database and the model are verified.

A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test (제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계)

  • Lee, Myung-Hoon;Son, Sung-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.

Key Exchange Protocol based on Signcryption in SMART Highway (SMART Highway 환경에서의 사인크립션 기반 키 교환 프로토콜)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.2
    • /
    • pp.180-189
    • /
    • 2013
  • The SMART Highway project combines road construction with advanced technology and vehicle telecommunications. Its expected outcome is a world-leading intelligent road that is green, fast, and comfortable. A vehicular ad-hoc network(VANET) is the core technology of the SMART Highway, whose transport operation is based on road vehicles. The VANET is a next-generation networking technology that enables wireless communication between vehicles or between vehicles and a road side unit(RSU). In the VANET system, a vehicle accident is likely to cause a serious disaster. Therefore, some information on safety is essential to serve as the key exchange protocol for communication between vehicles. However, the key exchange scheme of the general network proposed for a fast-moving communication environment is unsuitable for vehicles. In this paper, communication between multiple vehicles more efficient and secure key exchange at the vehicle certification by signcryption is proposed.