• Title/Summary/Keyword: Ubiquitous Computing Technology

Search Result 585, Processing Time 0.025 seconds

An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks (브로커를 통한 모바일 IPv6 네트워크의 효율적인 계층적 인증기법)

  • Jung, Ha-Gwon;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • As quick and secure mobility service is becoming a critical issue in the ubiquitous environment. Internet Engineering Task Force (IETF) has done a lot of meaningful work in order to cope with the critical issues, which is a key technology of guaranteeing the legally and safely using of network resources, they has proposed Hierarchical Mobile IPv6 (HMIPv6) to complement for such problems as handover latency and signaling overhead in existing MIPv6. Most of the current research about HMIPv6 focuses on how to optimize the interactive processes between the HMIPv6 and AAA (Authentication, Authorization, Accounting) protocol. This paper describes a cost-effective hierarchical authentication scheme, which makes its focus on minimizing the authentication latency in AAA processing. In this scheme, a hierarchical AAA architecture is proposed, in which the AAA servers are deployed on the Mobility Anchor Point (MAP), the Root AAA server manages several Leaf AAA servers and the Brokers on behalf of the AAA server in home domain. The simulation results shows that the proposed scheme reduces the handoff and authentication latency evidently compared to the previous traditional authentication combination modeling.

Client Profile Framework for Providing Adapted Content to Context (상황에 적응화된 콘텐츠 제공을 위한 클라이언트 프로파일 프레임워크)

  • Kim, Kyung-Sik;Lee, Jae-Dong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.293-304
    • /
    • 2007
  • In this paper, a client-side framework for processing of the profile that is necessary for providing adapted content to user's context in the client is designed and implemented. The profile must be constituted context information and various user's information for providing the adapted content to user's context. The client device also provides functionalities such as the creation, the management, and the transmission of the profile. The profile which is used in the proposed profile framework consists of various related information of a user for content adaptation. The technology such as creation, transmission and manage of the profile for effective processing is proposed and apply this technologies to client profile framework during the design are applied. As the result of evaluation, techniques of the proposed framework for processing profiles is more effective than previous techniques.

An efficient hardware implementation of 64-bit block cipher algorithm HIGHT (64비트 블록암호 알고리듬 HIGHT의 효율적인 하드웨어 구현)

  • Park, Hae-Won;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1993-1999
    • /
    • 2011
  • This paper describes a design of area-efficient/low-power cryptographic processor for HIGHT block cipher algorithm, which was approved as standard of cryptographic algorithm by KATS(Korean Agency for Technology and Standards) and ISO/IEC. The HIGHT algorithm, which is suitable for ubiquitous computing devices such as a sensor in USN or a RFID tag, encrypts a 64-bit data block with a 128-bit cipher key to make a 64-bit cipher text, and vice versa. For area-efficient and low-power implementation, we optimize round transform block and key scheduler to share hardware resources for encryption and decryption. The HIGHT64 core synthesized using a 0.35-${\mu}m$ CMOS cell library consists of 3,226 gates, and the estimated throughput is 150-Mbps with 80-MHz@2.5-V clock.

A Study on the Agent Component Development Support to PDA (PDA 지원 에이전트 컴포넌트 개발에 대한 연구)

  • Kim Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.37-50
    • /
    • 2006
  • In the focusing on the important of wireless internet, mobile terminal device plays a central role in tracking and coordinating terms in mobile business processing. Especially, mobile device has been considered as a key technology for embedded software and ubiquitous era. Because existing web environments is moving to wireless internet, the new concepts for wireless internet computing environments has gained increasing interest. Mobile agents provide a new abstraction for deploying over the existing infrastructures. Mobile application systems require the flexibility, adaptability, extensibility, and autonomous. New software developments methodology is required to meet the requirements. In this paper, we present an agent architectures model that allows compassable components with pluggable and independable. Our approach involves wrapping components inside a servlet. We have used the model and components to develop the PDA mobile agent.

Resource Allocation and Control System for VoIP QoS Provision in Cognitive Radio Networks (인지 무선네트워크에서 VoIP QoS 보장을 위한 자원 할당 및 제어 시스템)

  • Kim, Bosung;Lee, Gyu-Min;Roh, Byeong-Hee;Choi, Geunkyung;Oh, Ilhyuk
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.688-693
    • /
    • 2014
  • With the advent of ubiquitous environments, the smart phone has come into wide use and the demand for various content increases. Thus, in order to efficiently utilize limited resources cognitive radio technology is regarded as a possible solution. Besides spectrum sensing or access schemes, the provision of VoIP traffic service for secondary users with limited spectrum resources is a very important issue. In this paper, a resource allocation and control system for VoIP QoS provision in cognitive radio networks is proposed. Firstly, as the system model, the time structure of the network is addressed and, according to the structure, a bandwidth broker is proposed. In addition, based on available bandwidth estimated by the bandwidth broker, a connection admission control for secondary users is developed. It is demonstrated that the provision of VoIP QoS is greatly affected by channel utilization, the number of channels, and the length of timeslot.

Implementation of Environmental Information Monitoring System using Multi-Query Indexing Technique and Wireless Sensor (다중 질의 색인기법과 무선 센서를 이용한 환경정보 모니터링 시스템 구현)

  • Kim, Jung-Yee;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.307-312
    • /
    • 2007
  • Wireless Sensor Network(WSN) is considered as a core technology necessary for Ubiquitous computing, with its numerous possible applications in many practical areas, is being researched and studied actively by many around the world. WSN utilizes wireless sensors spatially placed to gather information regarding temperature, light condition, motion and change in speed of the objects within their surrounding environment. This paper implements an environmental information monitoring and indexing system based on spatial indexing technique by constructing a WSN system. This Multi-Query Indexing Technique coupled with wireless sensors provides an output based on the pre-defined built-in data index and new input from the sensors. If environment data is occured, system have to perform a proper action after collecting and analyzing this data. This is the purpose of implementing environment data monitoring system. We constructed environmental application using TinyOS and built tested with MICAz sensor bords. We designed and implemented a monitoring system which detects and multi-indexing process environmental data from distributed sensors.

  • PDF

Analysis of Keyword Trend for ICT Convergence Services (ICT 융합 서비스의 키워드 트렌드 분석)

  • Jang, HeeSeon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • With ubiquitous computing and network, the concern of government, business and academy for IT or ICT convergence has been increased. In this paper, through the analysis of keyword trend for ICT convergence services from 2000's mid, the efficient policy is proposed by estimating the understanding and concern of common people. In addition to, the concept and development step of convergence are analyzed, and the keyword analysis for the ICT convergence services defined in TTA is performed. The services are classified into smart home work transportation, Health ICT, RFID USN, M2M IoT, e-Navigation, intelligent robot, and the keywords for each service are analyzed. The analytic results indicate that the keyword trend varies in the time, and highly indexing keywords and new trend are defined. To provide the efficient ICT services, the new ICT convergence services needed for customer will be proposed with new IT technology development, IT standard, law management, and policy provisioining.

Small-Scale Warehouse Management System by Log-Based Context Awareness (로그기반 상황인식에 의한 소규모 창고관리시스템)

  • Kim, Young-Ho;Choi, Byoung-Yong;Jun, Byung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.507-514
    • /
    • 2006
  • Various application systems are developed using RFID as a part of ubiquitous computing, and it is expected that RFID chip will become wide-spread for the distribution industry especially. Efficient and efact intelligent-type of warehouse management system is essential for small-to-medium-sized enterprises in the situation having a trouble in the viewpoint of expense and manpower. In this paper, we implement small-scale warehouse management system using log-based context awareness technology. This system is implemented to be controlled on web, configuring clients to control RFID readers and building up DBMS system in a server. Especially, it grasps user's intention of storing or delivering based on toE data for the history of user's access to the system and it reports user's irregular pattern of warehouse use and serves predictive information of the control of goods in stock. As a result, the proposed system can contribute to enhance efficiency and correctness of small-scale warehouse management.

Comparison of NTP and Master-Slave Network Synchronization Methods in in-door Environment (실내 망 동기화를 위한 NTP와 Master-Slave 방식의 비교)

  • Lee Hyojung;Kwon Youngmi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.61-66
    • /
    • 2005
  • Location Positioning is a major technology for ubiquitous computing. Recently the research on Location Positioning using UWB is on going. In order to construct an in-door location network, synchronization of base stations is very important. NTP is Popularly used as clock synchronization protocol ranging from LAN to WAN. Also Master-Slave scheme is the simplest method to synchronize in-door network. We compare and analyze NTP and Master-Slave schemes according to the statistical channel model for indoor multipath propagation environment. In this paper, error ranges are calculated at various circumstances that in-door network expands from one primary base station into several base stations. We compared the correctness of NTP and Master-Slave synchronization methods. NTP is more reasonable synchronization protocol in in-door environment.

Protection of Location Privacy for Spatio-Temporal Query Processing Using R-Trees (R-트리를 활용한 시공간 질의 처리의 위치 개인정보 보호 기법)

  • Kwon, Dong-Seop
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.85-98
    • /
    • 2010
  • The prevailing infrastructure of ubiquitous computing paradigm on the one hand making significant development for integrating technology in the daily life but on the other hand raising concerns for privacy and confidentiality. This research presents a new privacy-preserving spatio-temporal query processing technique, in which location based services (LBS) can be serviced without revealing specific locations of private users. Existing location cloaking techniques are based on a grid-based structures such as a Quad-tree and a multi-layered grid. Grid-based approaches can suffer a deterioration of the quality in query results since they are based on pre-defined size of grids which cannot be adapted for variations of data distributions. Instead of using a grid, we propose a location-cloaking algorithm which uses the R-tree, a widely adopted spatio-temporal index structure. The proposed algorithm uses the MBRs of leaf nodes as the cloaked locations of users, since each leaf node guarantees having not less than a certain number of objects. Experimental results show the superiority of the proposed method.