• Title/Summary/Keyword: Ubiquitous communication networking

Search Result 59, Processing Time 0.025 seconds

Feasibility Study of IEEE 802.15.4 LR-WPAN to the Real-time Voice Application (IEEE 802.15.4 LR-WPAN의 실시간 음성 데이터 응용에 대한 적용 가능성 연구)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.82-94
    • /
    • 2007
  • Wireless sensor networking technology is one of the basic infrastructures for ubiquitous environment. It enables us to gather various sensory data such as temperature, humidity, gas leakage, and speed from the remote sensor devices. To support these networking functions, IEEE WPAN working group makes standards for PHY and MAC, while ZigBee Alliance defines the standards for the network, security, and applications. The low-rate WPAN was emerged to have the characteristics of network resilience, low cost, and low power consumption. It has a broad range of applications including, but not limit to industrial control and monitoring, home automation, disaster forecast and monitoring, health care. In order to provide more intelligent and robust services, users want voice-based solutions to accommodate to low-rate WPAN. In this paper, we have evaluated voice quality of an IEEE 802.15.4 standard compliant voice node. Specifically, it includes the design of a voice node and experiments based on the prediction of voice quality using the E-model suggested by ITU-T G.107, and the network communication mechanisms considering beacon-enabled and nonbeacon-enabled networks for real-time voice communications.

  • PDF

The Study of Sensor Network for Information Retrieval and Communication protocol High Performance (센서네트워크의 정보검색 및 통신프로토콜 성능향상에 관한 연구)

  • Kang, Jeong-Yong;Kwon, Hyuk-Dae;Roh, Yong-Gi;Kim, Byoung-Man
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.529-532
    • /
    • 2011
  • Recently research efforts for ubiquitous technology that includes RFID(Radio Frequency Deification and sensor networks are conducted very actively The architectural framework of the USN sensor network discovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology USN networking technology and USN middleware along with the service platform, With respect to each technological division domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research outputs. Boasted on the result of the survey we establish a USN software model that includes data sensing, sensor data storage sensor data storage sensor data naming and sensor feed name service. This main objective of this model is to provide a reference model for the facilitation of USN application developments.

  • PDF

Development of Embedded System for Home Automation using Android OS (안드로이드 OS를 이용한 가정 자동화용 임베디드 시스템 개발)

  • Lee, Cheul-Hee;Park, Hyoung-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4574-4577
    • /
    • 2011
  • In this paper, In this paper, analyzed structure of home networking used in USN(Ubiquitous Sensor Network) and embedded systems for home automation was implemented on the Android operating system. Developed a system for building a home network using wireless communication, so it is possible to minimize the difficulty of installation. Home automation system has built based on pre-defined ID according electronic components that make a house. In addition, a data structure suitable for home automation was defined and developing application programs based on Android OS according to packet structure, embedded system for home automation was developed.

Design and Implementation of User-Centered Document Generation System Using RFID Information (RFID 정보를 이용한 사용자-중심 문서 생성 시스템의 설계 및 구현)

  • Park, Hee-Sook;Park, Tae-Hee;Tak, Chung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1815-1821
    • /
    • 2008
  • Recently, Since growth of the ubiquitous computing environment and development of networking technology, User is a possible to connect the Internet out of constraints of time and space. Using RFID of core technique of ubiquitous computing, various application cases are increasing rapidly. In this paper, we propose design of the User-Centered Document Generation System which can makes several format of documents using RFID information stored in relational database. Our system can makes HTML file, EXCEL file and XML document file that provide for users over internet. Also, whenever user need to the document that can save easy and conveniently them on local computer and then is a possible to exploit them for other works.

Zone based on Wireless Sensor Network Management Protocol for Smart Home (스마트 홈을 위한 영역기반 무선 센서네트워크 관리 프로토콜)

  • Kim, Gang-Seok;Huh, Jee-Wan;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.65-71
    • /
    • 2009
  • As a core area of the new computing paradigm, the Ubiquitous Sensor Network Technology utilizes a wireless sensor networking which can be applied to the Context Information Monitoring System. When the technology is used in a poor user-environment for monitoring purposes, it can cost-effectively gather the context data on real-time basis, analyze the information gathered, effectively response to the user situation, and execute orders to create environmental factors desired by the user. This study structures a system able to monitor information in regards to a user-environment based on wireless-node sensor technology coupled with the Ubiquitous Sensor Network Technology. In this paper, the protocol in which it manages the wireless sensor network as the zone based by using the management protocol standardized at the smart home with a profile is proposed. The proposed system requires a minimal collection of data without continuous monitoring. Monitoring periodically, it can sense the user-environment more efficiently than the existing monitoring technologies based on the wire-communication technology.

  • PDF

Design of 868/915MHz SoC System Architecture for Wireless Personal Area Network (개인 무선 통신을 위한 868/915MHz SoC 시스템 구조 설계)

  • Park, Joo-Ho;Oh, Jung-Yeol;Ko, Young-Joon;Kil, Min-Su;Kim, Jae-Young
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.1
    • /
    • pp.24-30
    • /
    • 2007
  • According to development of wireless communication technologies, we need not only high data rate but low data rate system of low power consumption. This low data rate system is utilized in the field of home automation, health care, sensoring and monitoring, etc. IEEE 802.15.4 LR-WPAN system is the best choice for realizing ubiquitous networking system. In this paper SoC Architecture for IEEE 802.15.4 Low Rate WPAN is designed. IEEE 802.15.4 Low Rate WPAN system serves the functions and realization of home area network. We propose the SoC architecture for 868/915MHz frequency band of IEEE 802.15.4 Low Rate WPAN system. The key issue is to design SoC architecture which provides the function of Low Rate WPAN system to meet the requirement of IEEE 802.15.4 standards.

  • PDF

Query-based Indoor air Quality monitoring system Using wireless sensor network inside the Building (빌딩내에서 무선센서네트워크를 이용하는 쿼리기반의 실내공기 질 모니터링시스템)

  • Lee, Seung-Chul;Chung, Wan-Young
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.627-628
    • /
    • 2008
  • This paper proposes an indoor air Quality monitoring system for measuring various indoor air qualities using IEEE 802.15.4 based wireless sensor network. For indoor air quality monitoring, sensor nodes include carbon monoxide sensor and dust sensor were used. The wireless network by deployed sensor nodes has limited energy, computing, communication capabilities and memory sizes. In this paper, the query process in indoor air quality monitoring was designed to improve the limited sensor node resources such as battery consumption and networking.

  • PDF

A Multi-Agent Scheme Considering User's Mobility RFID based on Knowledge Management System (사용자의 이동성을 고려한 멀티 에이전트 방식의 RFID 기반 지식 관리 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.2
    • /
    • pp.99-108
    • /
    • 2010
  • The Wireless Ad Hoc network is discussed as a core technology for ubiquitous computing, and the smart tag technology is currently being actively discussed as a part of the sensor network. Thus, considering its security may advance the realization of ubiquitous computing. RFID (Radio Frequency Identification) technology using the smart tag technology as a part of the sensor network is currently in the limelight. In particular, when RFID is applied to a knowledge management system managing various data, data mobility and management convenience are ensured and automated knowledge service can be provided to users. Accordingly, this paper to proposed a secure scheme for mobility knowledge management systems using multi-agents differentiated from the existing knowledge management systems. Specifically, the proposed scheme designates user's authentication and privilege information in multi-agents and provides effective knowledge service through grouping based on user information. Moreover, even user's movement, the proposed scheme ensures service availability and provides continuous information through communication with multi-agent systems.

A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments (유비쿼터스 환경에서의 안전하고 효율적인 이종 RFID 관리 기법)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.275-285
    • /
    • 2009
  • RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.

Security Authentication Technique using Hash Code in Wireless RFID Environments (무선 RFID 환경에서 해시코드를 이용한 EPC 코드 보안)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1077-1082
    • /
    • 2019
  • The development of computing technology and networking has developed into a fundamental technology of the Fourth Industrial Revolution, which provides a ubiquitous environment. In the ubiquitous environment, the IoT environment has become an issue so that various devices and the things can be actively accessed and connected. Also, the RFID system using the wireless identification code attaches an RFID tag to the object, such as the production and distribution of products. It is applied to the management very efficiently. EPCglobal is conducting a research on RFID system standardization and various security studies. Since RFID systems use wireless environment technology, there are more security threats than wire problems. In particular, failure to provide confidentiality, indistinguishability, and forward safety could expose them to various threats in the Fourth Industrial Revolution. Therefore, this study analyzes the standard method of EPCgolbal and proposes RFID security method using hash code that can consider the amount of computation.