• Title/Summary/Keyword: Things Internet

Search Result 2,796, Processing Time 0.025 seconds

QoS-Guaranteed IP Mobility Management For Fast Moving Vehicles Using Multiple Tunnels (멀티 터널링을 이용한 고속 차량에서 QoS 보장 IP 이동성 관리 방법)

  • Chun, Seung-Man;Nah, Jae-Wook;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.44-52
    • /
    • 2011
  • In this article, we present a QoS-guaranteed IP mobility management scheme of Internet service for fast moving vehicles with multiple wireless network interfaces. The idea of the proposed mechanism consists of two things. One is that new wireless connections are established to available wireless channels whenever the measured data rate at the vehicle equipped with mobile gateway drops below to the required data rate of the user requirement. The other is that parallel distribution packet tunnels between an access router and the mobile gateway are dynamically constructed using multiple wireless network interfaces in order to guarantee the required data rate during the mobile gateway's movement. By doing these methods, the required data rate of the mobile gateway can be preserved while eliminating the possible delay and packet loss during handover operation, thus resulting in the guaranteed QoS. The architecture of the IETF standard HMIPv6 has been extended to realize the proposed scheme, and detailed algorithms for the extension of HMIPv6 has been designed. Finally, simulation has been done for performance evaluation, and the simulation results show that the proposed mechanism demonstrates guaranteed QoS during the handover with regard to the handover delay, packet loss and throughput.

Process of Social Stigma on Behavioral Addictions -The Attribution Affection Theory applied - (행위중독에 대한 사회적 낙인과정 - 귀인정서이론 적용 -)

  • Park, Keun Woo;Seo, Mi Kyung
    • Korean Journal of Social Welfare
    • /
    • v.69 no.3
    • /
    • pp.241-265
    • /
    • 2017
  • This study was conducted to propose anti-stigma strategies by verifying the social stigma on behavioral addiction under the premise that social stigma is a main obstacle to the treatment of addiction. A research model was constructed by applying the attribution affection theory and the modified attribution affection theory, which are very useful for explaining emotional and behavioral responses to the persons with mental illness. In other words, when attributing the causes of behavioral addiction to the personally controllable things such as personality, will and lifestyle, social distance can be increased by the mediate of anger. However, when attributing the causes of behavioral addiction to biological factors that can not be controlled by an individual, there can exist two pathway, one is the arising of helping behaviors by the mediate of sympathy (the attribution affection theory), and the other is the aggravation in the social distance due to rising fear (the modified attribution affection theory). In order to verify the research model, 383 adult subjects mainly in South Gyeongsang Province were randomly presented with the vignettes of gambling addiction and internet game addiction, and asked about the causes of the problems and their emotional, prejudicial, and behavioral responses to them. As a result, all pathway had statistically significant predictive effect. Therefore, in the case of attributing to personal causes, social distance increased by the mediate of anger. In the case of attributing to biological causes, both pathway had significant predictive effect, but the indirect effect of the pathway predictive of the helping behavior by the mediate of sympathy was greater. Researchers suggested that anti-stigma strategies, which emphasize that behavioral addiction is a mental health problem requiring treatment, are necessary.

  • PDF

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

A study on the potential market conditions and the road map of Korean vehicles for people with disabilities (장애인 복지차 시장현황과 한국형 장애인 복지차 로드맵에 관한 연구)

  • Rhee, K.M.;Kim, D.O.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.7 no.1
    • /
    • pp.29-37
    • /
    • 2013
  • The purpose of this study is to suggest the potential domestic and international market conditions vehicles for people with disabilities through a review of the literature and internet resources, and to propose a road map developing South Korean vehicles for people with disabilities taking into consideration the current state of domestic and international technology and the usage of the vehicles for people with disabilities depending on the type of disability. The results of the study are as follows: First, vehicles for people with disabilities safety standards of South Korea do not meet the safety standards of developed countries and the technology of development related vehicles for people with disabilities is not as advanced as that of developed countries. Vehicles for people with disabilities installation methods, specifications, features and safety standards should be designed to be more similar to those of Japan and the United States. Second, vehicle modifications for people with disabilities will become more common as measures directed at promoting the welfare of people with disabilities, such as travel and transportation measures, employment opportunities, education, and funding for vehicle modifications, are implemented along with laws, such as The Americans with Disabilities Act, The British Disability Discrimination Act, and Japan's barrier-free transport law, that protect people with disabilities generally. Third, through a comparative analysis of domestic and international market conditions and demands of people with disabilities in vehicle modifications, important things to pay attention by purchasing a modified vehicle for people with disabilities are the employment rate for people with disabilities and monthly income. To enable this, government agencies and industry bodies should work together through the revision of the current Disability Welfare Act or the enactment of the special law for guiding principles of Disability Welfare Act. Through the future changes in vehicles for people with disabilities-related system or society of South Korean, the annual demand of the vehicles is expected to be more than 10,000.

  • PDF

A Study on the Policy Trends for the Revitalization of Medical Big Data Industry (의료 빅데이터 산업 활성화를 위한 정책 동향 고찰)

  • Kim, Hyejin;Yi, Myongho
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.325-340
    • /
    • 2020
  • Today's rapidly developing health technology is accumulating vast amounts of data through medical devices based on the Internet of Things in addition to data generated in hospitals. The collected data is a raw material that can create a variety of values, but our society lacks legal and institutional mechanisms to support medical Big Data. Therefore, in this study, we looked at four major factors that hinder the use of medical Big Data to find ways to enhance use of the Big Data based healthcare industry, and also derived implications for expanding domestic medical Big Data by identifying foreign policies and technological trends. As a result of the study, it was concluded that it is necessary to improve the regulatory system that satisfies the security and usability of healthcare Big Data as well as establish Big Data governance. For this, it is proposed to refer to the Big Data De-identification Guidelines adopted by the United States and the United Kingdom to reorganize the regulatory system. In the future, it is expected that it will be necessary to have a study that has measures of the conclusions and implications of this study and to supplement the institutional needs to play a positive role in the use of medical Big Data.

An Enhanced System of Group Key Management Based on MIPUF in IoT (IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선)

  • Tak, Geum Ji;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1243-1257
    • /
    • 2019
  • With the emergence of the IoT environment, various smart devices provide consumers with the convenience and various services. However, as security threats such as invasion of privacy have been reported, the importance of security issues in the IoT environment has emerged, and in particular, the security problem of key management has been discussed, and the PUF has been discussed as a countermeasure. In relation to the key management problem, a protocol using MIPUF has been proposed for the security problem of the group key management system. The system can be applied to lightweight IoT environments and the safety of the PUF ensures the safety of the entire system. However, in some processes, it shows vulnerabilities in terms of safety and efficiency of operation. This paper improves the existing protocol by adding authentication for members, ensuring data independence, reducing unnecessary operations, and increasing the efficiency of database searches. Safety analysis is performed for a specific attack and efficiency analysis results are presented by comparing the computational quantities. Through this, this paper shows that the reliability of data can be improved and our proposed method is lighter than existing protocol.

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.

Real-Time Management System of Reefer Container based on IoT (IoT 기반 냉동컨테이너 실시간 관리 시스템)

  • Moon, Young-Sik;Jung, Jun-Woo;Choi, Sung-Pill;Kim, Tae-Hoon;Lee, Byung-Ha;Kim, Jae-Joong;Choi, Hyung-Lim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2093-2099
    • /
    • 2015
  • To prevent damage to the cargo, monitoring and remote management for reefer containers is necessary. The currently used remote monitoring service is the Power Cable Transmission(PCT) system, which is recommended by the International Maritime Organization(IMO). However, this system is not widely used because it requires a separate PCT infrastructure and is susceptible to data loss problems. To solve this problem, this study introduces the "IoT-based reefer container management system", The proposed system which is attached to reefer container collects and transmits data on the temperature, status and location of reefer container to middleware using RS-232 communication and WCDMA/GSM communication. Middleware is store the data received in the database and provide information to user in real time through the web and mobile program. At this time, users able to change setting temperature in real time from a distant place through the web program. This study tested by transit about shipment of strawberries to monitor and analyze and check the system's overall effectiveness.

Analysis of visible light communication system using 15 watt LED and 40 watt solar panel (소형 창고형 공장 적용을 고려한 15와트 LED 조명과 40와트 태양광 패널을 활용한 가시광통신 송수신 시스템 분석)

  • Woo, Deok Gun;Mariappan, Vinayagam;Park, Jong Yong;Lee, Jong Hyeok;Kim, Young Min;Cha, Jae Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.608-614
    • /
    • 2018
  • In addition to the diffusion of ICT technology, various protocols of short range wireless communication technology are being applied for efficient information operation. However, due to limitations of short-range wireless communication, communication is not smooth in places where frequency environment is poor, such as frequency confusion and warehouse type factory. When an alternative is needed. The development of LED technology and expansion of infrastructure through LED based visible light communication is attracting attention as an alternative and spreading the usage in wide range now a days. In addition, the infrastructure has been expanded with solar panels in response to the development of smarthome built-in with renewable energy. In this situation, visible light communication using PD has been limitedly applied in a near environment where the receiving angle of the PD and the ambient light ensure the LoS and the influence of the ambient light is small. In order to solve this problem, we have implemented visible light communication using LED lighting with large current infrastructure and solar panel with large receiving area, and proposed a circuit for restoring accurate data even in ambient light. Through this study results, it is expected that visible light communication can be more widely used and this result used as the base data for visible light communication research using the solar panel as the receiver.

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.