• Title/Summary/Keyword: Ubiquitous Information Network

Search Result 1,232, Processing Time 0.022 seconds

Analyses of Security Design for Home Gateway in Ubiquitous Surroundings (유비쿼터스 환경하에서의 홈게이트웨어를 위한 보안 설계 분석)

  • Kim Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.761-764
    • /
    • 2006
  • We have developed a new remote-configurable firewall system that provides secure and easy-to-use access to home-network appliances such as network cameras, PVRs, and home file servers, through the internet. With a simple web browser operation, remote users can dynamically open and close the firewall of the home gateway. The firewall rule creation is based on an authentication of the remote client, and thus only packets from the authorized client can pass through the firewall, we analyses the sorority design for home gateway in ubiquitous surroundings.

  • PDF

Intelligent Data Reduction Algorithm for Sensor Network based Fault Diagnostic System

  • Youk, Yui-Su;Kim, Sung-Ho;Joo, Young-Hoon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.4
    • /
    • pp.301-308
    • /
    • 2009
  • In the modern life, machines are used for various areas in industries as the advance of science and industrial development has proceeded. In many machines, the rotating machines play an important role in many processes. Therefore, the development of fault diagnosis and monitoring system for rotating machines is required. An ubiquitous sensor network (USN) is a combination of the key computer science and engineering area technology including the wireless network, embedded system hardware and software, communication, real-time system, etc. It collects environmental information to realize a variety of functions. In this work, a data reduction algorithm for USN based remote fault diagnostic system which can be easily applied to previously built factories is proposed. To verify the feasibility of the proposed scheme, some simulations and experiments are executed.

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.

A Empirical Study on Applying Ubiquitous Technology for Gas Safety Management (U-기반 가스안전관리의 기술을 적용을 위한 실증적 연구)

  • Oh, Jeong-Seok;Choi, Kyung-Suhk;Kwon, Jeong-Rock
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.2
    • /
    • pp.63-68
    • /
    • 2008
  • The ubiquitous technology is capable of innovating various area to constructing intelligent and network to all objects. This technology can construct network infrastructure to facilities for applying legacy industry and need to develop intelligent service that analyze context-aware through network. This paper derive and propose the introduction range of ubiquitous technology, which should be testified and analyzed network, and studied the detection and analysis of information for managing gas facilities. We investigate the current status of gas facilities and automatic reading system, testing and analyzing wireless personal area network and mobile communication by scalability, self-configuration, connection in underground. Furthermore, we propose modelization method for intelligent service and derive the introduction range for applying ubiquitous technologies for managing gas facilities.

  • PDF

Context-Aware Framework Using Context Ontology for Supporting QoS-based Services (상황 온톨로지를 활용한 QoS 제공 상황인식 프레임워크)

  • Seo, Dong-Woo;Lee, Jae-Yeol
    • IE interfaces
    • /
    • v.21 no.1
    • /
    • pp.65-74
    • /
    • 2008
  • In the future, the ubiquitous computing environment will provide users with context-aware services, intelligently interacting with omnipresent resources and surrounding environments at any location and time. Therefore, the ubiquitous computing environment requires context-aware applications in order to gather and analyze context information in various situations. However, existing context-aware applications have mainly focused on providing services and adapting themselves to users based on user related contexts. But this environment requires not only user related contexts but also Quality-of-Service (QoS) related contexts. In this paper we propose a frame-work for supporting user-oriented QoS in ubiquitous environments. The proposed approach adopts a semantic ontology and a neural network algorithm in order to reason about explicit and uncertain contexts. We also show the possibility of applying the framework to real environments such as collaborative engineering service, automobile maintenance service and ubiquitous home service.

A Study on the Design Concept of Stream Cipher Algorithm in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서의 스트림 암호 설계 고찰)

  • Kim, Whayoung;Kim, Eunhong
    • Journal of Information Technology Services
    • /
    • v.3 no.1
    • /
    • pp.101-115
    • /
    • 2004
  • The phrase "Ubiquitous Computing" has become popular ever since Mark Weiser used it in an article. It is to realize a computerized environment in which small computers are embedded and cooperate with each other. This environment will support many activities of our daily life. In a Ubiquitous Computing environment, various devices will be connected to the network from houses and buildings. Therefore it is necessary to ensure network security and to protect private data from tapping, falsification and the disguising of identity by others. This study reviews the Ubiquitous Computing technologies in detail and outlines the design concept of the Stream Cipher Algorithm.

A Semantic Service Discovery Network for Large-Scale Ubiquitous Computing Environments

  • Kang, Sae-Hoon;Kim, Dae-Woong;Lee, Young-Hee;Hyun, Soon-J.;Lee, Dong-Man;Lee, Ben
    • ETRI Journal
    • /
    • v.29 no.5
    • /
    • pp.545-558
    • /
    • 2007
  • This paper presents an efficient semantic service discovery scheme called UbiSearch for a large-scale ubiquitous computing environment. A semantic service discovery network in the semantic vector space is proposed where services that are semantically close to each other are mapped to nearby positions so that the similar services are registered in a cluster of resolvers. Using this mapping technique, the search space for a query is efficiently confined within a minimized cluster region while maintaining high accuracy in comparison to the centralized scheme. The proposed semantic service discovery network provides a number of novel features to evenly distribute service indexes to the resolvers and reduce the number of resolvers to visit. Our simulation study shows that UbiSearch provides good semantic searchability as compared to the centralized indexing system. At the same time, it supports scalable semantic queries with low communication overhead, balanced load distribution among resolvers for service registration and query processing, and personalized semantic matching.

  • PDF

A study on WSN based ECG and body temperature measuring system for ubiquitous healthcare: 1. the construction of sensor network platform (유비쿼터스 헬스케어를 위한 센서 네트워크 기반의 심전도 및 체온 측정 시스템: 1. 센서 네트워크 플랫폼 구축)

  • Lee, Young-Dong;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.15 no.5
    • /
    • pp.362-370
    • /
    • 2006
  • The wireless sensor network (WSN) based ECG and body temperature measuring system for ubiquitous health-care were designed and developed. The system was composed of a wireless sensor network node, base station and server computer for the continuous monitoring of ECG signals and body temperatures of patients at home or hospital. ECG signal and body temperature data, important vital signals which are commonly used in clinical and trauma care, were displayed on a graphical user interface (GUI). The data transfer from sensor nodes on patients' body to server computer was accomplished through a base-station connected to a server computer using Zigbee compatible IEEE802.15.4 standard wireless communication. Real-time as well as historical, ECG data of elderly persons or patients, can also be retrieved and played back to assist the diagnosis. The ubiquitous health care system presented in this study can effectively reduce social medical expenses, which will be increased greatly in the coming aging society.

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

Echelons Scale Identification Scheme of Surveillance and Reconnaissance Sensor Network (감시정찰 센서네트워크에서 제대규모 식별 기법)

  • Choi, Ji-Hye;Kwon, Tae-Wook
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.3
    • /
    • pp.438-444
    • /
    • 2010
  • Surveillance and reconnaissance sensor network system is an application system based on ubiquitous sensor network technology. This technique is to avoid accidental close combat, to minimize the consumption of limited military resources and personnel, and to provide battlefield situational awareness information for the unit's future combat missions. In this paper, we have proposed a echelons scale identification scheme based on information obtained from surveillance and reconnaissance sensor network system.