• Title/Summary/Keyword: Ubiquitous Information Technology

Search Result 1,404, Processing Time 0.024 seconds

Implementation of Static Address-Internetworking Scheme between Wireless Sensor Network and Internet (센서 네트워크와 인터넷과의 정적 주소 연동 방안 구현)

  • Kim, Jeong-Hee;Kwon, Hoon;Kwak, Ho-Young;Do, Yang-Hoi;Byun, Yung-Cheol;Kim, Do-Hyeun
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.40-49
    • /
    • 2006
  • As a promising integrated circuit, wireless communication and micro-computing technology, the technology of sensor network that will lead the information technology industries of the next generation and realize the ubiquitous computing is one of the most active research topics and its research activities are also making today. From now on, each node, the network formation, and even the sensor network itself will interact with the generic network and evolve dynamically according to environmental changes in a process of continual creation and extinction. Therefore, address-internetworking between sensor network and generic network which are used different address mechanism is required. In this paper, we propose a static address-internetworking scheme for interactive networking between a sensor network and the Internet. The proposed scheme that possess a gateway approach to perform the protocol translation from one protocol to another, an overlay approach to constructs an overlay network on the WSNs and enables static internetworking between a sensor network address scheme based on Zigbee and the Internet address scheme based on the Internet Protocol. In addition, we verify the proposed scheme by an interconnection experiment.

  • PDF

A Study on the Enhancement of Network Survivability through Smart Sensor Technologies Convergence (스마트 센서 기술 융합을 통한 망 생존성 강화에 관한 연구)

  • Yang, Jung-Mo;Kim, Jeong-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.269-276
    • /
    • 2016
  • Public Safty-LTE(Long Term Evolution) is being deployed in the direction of reducing cost by using both of municipal network and commercial network. However, LTE Network is difficult to ensure the survivability during the information communication infrastructure failures. In addition, it is vulnerable in communication coverage of inside buildings and underground. In this study, we propose to implement effectively the network survivability technique through the convergence to the proven technology. As the advent of the IoT Age, smart sensors which are embedded in the environment and the things will be able to provide a useful infrastructure for ensuring the network survivability. Based on the feature of the smart sensor, we designed the sink node architecture to guarantee the network survivability in disaster situation through the convergence of the small cell technology and extension of wireless network coverage technology. The computing power inherent in the environment is a valuable resource that can be utilized in the disaster situation.

Demand Analysis of the home ubiquitous network services using conjoint method (컨조인트 분석방법을 이용한 홈 유비퀴터스 네트워크 서비스의 수요 분석)

  • Lee, Jong-Su;Ahn, Ji-Woon;Lee, Jeong-Dong;Shin, Hye-Young
    • Journal of Korea Technology Innovation Society
    • /
    • v.7 no.1
    • /
    • pp.89-110
    • /
    • 2004
  • Home networks consist of two or more home appliances or communication devices enabling the mutual data communication between appliances such as personal computers, refrigerators, phones, television sets, personal digital assistants(PDA), etc. There are three factors that create demand for the home network services. The first factor is development of technology. Second, on the demand side, consumer demand for the home appliances having access to the Internet is in the increase. Finally, producers need a strategy to deal with the problem of market saturation. Home networks are emerging markets. They are unique in that they unite information technologies with home appliances that provide new services. in this paper we study the main attributes of home network services and analyze consumers' preferences for them. However, it is not quite possible to use the revealed preference approach since the home network market is still at an incipient stage. We therefore use the conjoint analysis method using stated preference data. conjoint analysis has been widely use in the area of marketing for evaluating consumer preferences for new products and services. it presents a hypothetical product to the respondents along with the product's attributes and their levels. The respondents are asked to either rank each alternative or choose between several hypothetical products. By estimating consumers' willingness to pay for the attributes of the home network services and analyzing consumers' preferences, we predict the pattern of the development of the home network services and related technologies along various quality dimensions. Based on the estimation results, we draw policy implications for the national- and company-level strategy.

  • PDF

A Multi-Objective Shortest Paths Finding Considering Multi-Class in A Multi-Modal Transit Network for Providing User-Customized Route Information (사용자 맞춤형 대중교통 경로정보제공을 위한 다계층의 다목적 경로탐색기법 연구)

  • Lee, Mee-Young;Park, Je-Jin;Jeong, Jeom-Rae;Park, Dong-Joo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.1-14
    • /
    • 2008
  • Mass transit information should contribute many benefits to users. Especially transportation information technology is developing highly with information technology in Korea recently. Hereafter it is expected to provide customized transportation information to users individually with the advent of ubiquitous age in earnest. This public transportation information service can be realized by path finding algorithms in public transportation networks including travel and transfer attributes. In this research, multi objectives such as travel time, transfer time, and number of transfer and so on are constructed with the primary facts influencing users. Moreover, the method reducing user's path finding alternatives arbitrarily is proposed by selecting the best alternative which provides maximum utility to users among non dominated paths. Therefore, the ultimate goal of this study proposes a multi objective shortest paths finding algorithm which can take into account multiple user classes in a transit network with multiple travel modes. The proposed algorithm is demonstrated based on the two case studies - a small toy network and the large-scaled Seoul Metropolitan subway network.

  • PDF

Enhance Issues of the global competitiveness of Telemedicine Industry in Korea (우리나라 원격의료산업의 글로벌 경쟁력 강화를 위한 정책 과제)

  • Yoon, Young-Han
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.325-351
    • /
    • 2011
  • This paper is focused on problem in the law and system caused by the infringement of medical information and in the law and system indicate the solution. Interests in the medical service are increasing in internet environment as life quality of the people improves because of development in information and medical technology. The current main issues of the legislative system and the law improvement suggestion for telemedicine activation which is related to the ubiquitous health in which the medicine field and IT technology convergence appearance. In particular, South Korea in the privacy-related legislation should be amended. The reason, Medical information record contains a lot of patient's private secrets. Therefore, if privacy protection is not enough this could cause problem violate a patient's privacy. Thus we need consequently the maintenance of the health medical treatment field to suit a telemedicine environment of a law system. Specifically, this law enacted to protect medical treatment information and the technical security services with confidence and stability against security treats are necessary.

  • PDF

Plans for the Integrated Operation of Intelligent Service Facilities (지능화시설의 통합운영 방안)

  • YIM, Du-Hyun;PARK, Jeong-Woo;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.1
    • /
    • pp.127-136
    • /
    • 2017
  • U-City laws are divided into three categories: intellectual laws, information superhighway laws, and integrated operation center laws. Previous studies have suggested that efficient infrastructure operation and management is necessary in Ubiquitous-City (U-City). However, infrastructure is often interpreted differently by different laws. The purpose of this study was to plan for the integrated operation of intelligent service facilities by comprehensively analyzing the law system of domestic intelligent service facilities and problems in operation and management based on this critical mind. For this, present conditions and problems of intelligent service facilities were found through interviews with people who are in charge of the law system and other practitioners. The necessity of integrated use, including city information generated from intelligent service facilities and installment locations, has been demonstrated. Government ministries and local governments have established various information systems using ICT and U-City laws that specify integrated management and operation, but do not clearly specify definitions for the specific responsibility and authority for main agents participating in facility operation. A system is needed to smoothly mediate the relevant divisions so that they can use installed equipment simultaneously for efficient operation in generating city information. This objective of this study was to prepare a unitary law system for efficient installment and management of intelligent service facilities by establishing a logically linked relationship among the relevant laws and regulations. This will provide a foundation for a management system that has an integrated linkage of intelligent service facilities.

Technical problems of Li-Fi wireless network (무선 네트워크 기술 Li-Fi의 문제점)

  • Park, Hyun Uk;Kim, Hyun Ho;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.186-188
    • /
    • 2014
  • In recent years, domestic as well as LTE wireless network of Wi-Fi and most used. In addition, mobile-intensive services that used mainly in our society makes it easier, SNS, application (APP), and file downloads. As such, the amount of data requested, while living at the time of mobile users will want to be safe from the earliest. And the wireless network communications mortality (3G, 4G (LTE), LTE-A) and Wi-Fi (802.11 n-2.4 G H z z H a c-5, 802.11 G), and users are mainly used in the death 4G (LTE), communication Wi-Fi, 802.11 n-2.4 GHz are used most frequently. As above, use the wireless network in order to safely and quickly developed the technology of the Li-Fi. Li-Fi light (visible light) technology to communicate with, and Wi-Fi (802.11 n-2.4 G z H) 100 times faster, LTE-A 66 times faster. However, the current Li-Fi to commercialise the big issue exists. In this paper, there are a lot of existing problems in the commercialization of Li-Fi being used in Wi-Fi, and a comparative analysis.

  • PDF

ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment (IoT 환경에서의 CoAP을 이용한 ARP Spoofing 공격 시나리오 및 대응방안)

  • Seo, Cho-Rong;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.39-44
    • /
    • 2016
  • Due to the dazzling development of IT in this IT-oriented era, information delivering technology among objects, between objects and humans, and among humans has been actively performed. As information delivery technology has been actively performed, IoT became closely related to our daily lives and ubiquitous at any time and place. Therefore, IoT has become a part of our daily lives. CoAp, a web-based protocol, is mostly used in IoT environment. CoAp protocol is mostly used in the network where transmission speed is low along with the huge loss. Therefore, it is mostly used in IoT environment. However, there is a weakness on IoT that it is weak in security. If security issue occurs in IoT environment, there is a possibility for secret information of individuals or companies to be disclosed. If attackers infect the targeted device, and infected device accesses to the wireless frequently used in public areas, the relevant device sends arp spoofing to other devices in the network. Afterward, infected devices receive the packet sent by other devices in the network after occupying the packet flow in the internal network and send them to the designated hacker's server. This study suggests counter-attacks on this issues and a method of coping with them.

Ontology Modeling and Its Application for Managing Control Points (기준점 관리를 위한 온톨로지 모델링과 적용 방안)

  • Cui, Yulan;Hwang, Hyun-Suk;Shin, Seong-Hyun;Suh, Yong-Cheol;Kim, Chang-Soo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.3
    • /
    • pp.34-42
    • /
    • 2008
  • The control points are important assets of countries which express the most accurate location information that is used in surveying land and other measurements. The location information has played an important role in our daily lives with the development of ubiquitous technology. While many researchers have recently applied new technology like RFID(Radio-Frequency Identification) to the effective management of control points, the research into data retrieval and the interoperability of control point data is still primitive step. Therefore, we construct a data modeling to effectively manage control points using ontology data structure and focus on semantic retrieval method. Our retrieval system can provide the inferred and associated information among data using Prot$\acute{e}$g$\acute{e}$-OWL tool. Our system has advantages in reducing the number of repeated queries by hierarchy searching and improving the searching time by association searching. Also, we propose an effective method to construct retrieval systems being able to edit items of categories and properties without editing the related codes.

  • PDF

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.