• Title/Summary/Keyword: Ubiquitous information technology

Search Result 1,404, Processing Time 0.03 seconds

An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks (브로커를 통한 모바일 IPv6 네트워크의 효율적인 계층적 인증기법)

  • Jung, Ha-Gwon;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • As quick and secure mobility service is becoming a critical issue in the ubiquitous environment. Internet Engineering Task Force (IETF) has done a lot of meaningful work in order to cope with the critical issues, which is a key technology of guaranteeing the legally and safely using of network resources, they has proposed Hierarchical Mobile IPv6 (HMIPv6) to complement for such problems as handover latency and signaling overhead in existing MIPv6. Most of the current research about HMIPv6 focuses on how to optimize the interactive processes between the HMIPv6 and AAA (Authentication, Authorization, Accounting) protocol. This paper describes a cost-effective hierarchical authentication scheme, which makes its focus on minimizing the authentication latency in AAA processing. In this scheme, a hierarchical AAA architecture is proposed, in which the AAA servers are deployed on the Mobility Anchor Point (MAP), the Root AAA server manages several Leaf AAA servers and the Brokers on behalf of the AAA server in home domain. The simulation results shows that the proposed scheme reduces the handoff and authentication latency evidently compared to the previous traditional authentication combination modeling.

A Study on the Agent Component Development Support to PDA (PDA 지원 에이전트 컴포넌트 개발에 대한 연구)

  • Kim Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.37-50
    • /
    • 2006
  • In the focusing on the important of wireless internet, mobile terminal device plays a central role in tracking and coordinating terms in mobile business processing. Especially, mobile device has been considered as a key technology for embedded software and ubiquitous era. Because existing web environments is moving to wireless internet, the new concepts for wireless internet computing environments has gained increasing interest. Mobile agents provide a new abstraction for deploying over the existing infrastructures. Mobile application systems require the flexibility, adaptability, extensibility, and autonomous. New software developments methodology is required to meet the requirements. In this paper, we present an agent architectures model that allows compassable components with pluggable and independable. Our approach involves wrapping components inside a servlet. We have used the model and components to develop the PDA mobile agent.

Resource Allocation and Control System for VoIP QoS Provision in Cognitive Radio Networks (인지 무선네트워크에서 VoIP QoS 보장을 위한 자원 할당 및 제어 시스템)

  • Kim, Bosung;Lee, Gyu-Min;Roh, Byeong-Hee;Choi, Geunkyung;Oh, Ilhyuk
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.688-693
    • /
    • 2014
  • With the advent of ubiquitous environments, the smart phone has come into wide use and the demand for various content increases. Thus, in order to efficiently utilize limited resources cognitive radio technology is regarded as a possible solution. Besides spectrum sensing or access schemes, the provision of VoIP traffic service for secondary users with limited spectrum resources is a very important issue. In this paper, a resource allocation and control system for VoIP QoS provision in cognitive radio networks is proposed. Firstly, as the system model, the time structure of the network is addressed and, according to the structure, a bandwidth broker is proposed. In addition, based on available bandwidth estimated by the bandwidth broker, a connection admission control for secondary users is developed. It is demonstrated that the provision of VoIP QoS is greatly affected by channel utilization, the number of channels, and the length of timeslot.

Users' Privacy Concerns in the Internet of Things (IoT): The Case of Activity Trackers (사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로)

  • Bae, Jinseok;Jung, Yoonhyuk;Cho, Wooje
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.23-40
    • /
    • 2015
  • Despite much interest and investment in the Internet of Things (IoT) which expand the Internet to a ubiquitous network including objects in the physical world, there is growing concerns of privacy protections. Because the risk of privacy invasion is higher in IoT environments than ever before, privacy need to be a key issue in the diffusion of IoT. Considering that the privacy concern is a critical barrier for user to adopt information technologies, it is important to investigate users' privacy concerns related to IoT applications. From the triad perspective (i.e., risk on technology, risk on service provider, and trust on legislation), this study aims to examine users' privacy concerns in the context of activity trackers.

A Design of SCORM based on Learning Contents Interconnection Framework for U-Learning (U-러닝을 위한 SCORM기반의 학습콘텐츠 상호연결 프레임워크 설계)

  • Jeong, Hwa-Young;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.426-431
    • /
    • 2009
  • Recently, the application of E-learning is changing the method that is able to process the learning to learner more efficiently and conveniently. For this purpose, the application research of U-learning that is able to support the learning using mobile device such as PDA, NetBook, Tablet PC and so on is actively processing. But lots of U-learning framework is only considering the change to fit the exist learning contents the mobile device without SCORM that is able to support to make and process the learning contents by regular forms. In this paper, we proposed the learning contents interconnection of U-learning framework considering SCORM. For this purpose, we have to construct the learning by learning object and asset within SCORM. And this method can support learning information that was reconstructed it by learning contents to fit the mobile device as used the mobile device meta-data.

  • PDF

Detection of Unsafe Zigzag Driving Maneuvers using a Gyro Sensor (자이로센서를 이용한 사행운전 검지 및 경고정보 제공 알고리즘 개발)

  • Rim, Hee-Sub;Jeong, Eun-Bi;Oh, Cheol;Kang, Kyeong-Pyo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.2
    • /
    • pp.42-54
    • /
    • 2011
  • This study presented an algorithm to detect zigzag driving maneuver that is highly associated with vehicle crash occurrence. In general, the zigzag driving results from the driver's inattention including drowsy driving and driving while intoxicated. Therefore, the technology to detect such unsafe driving maneuver will provide us with a valuable opportunity to prevent crash in the road. The proposed detection algorithm used angular velocity data obtained from a gyro sensor. Performance evaluations of the algorithm presented promising results for the actual implementation in practice. The outcome of this study can be used as novel information contents under the ubiquitous transportation systems environment.

A Study on Media Security in Ubiquitous Network System (유비쿼터스 네트워크 시스템에서의 미디어 보안에 관한 연구)

  • Ju, Min-Seong;Ahn, Seong-Soo;Woo, Young-Hwan;Kim, Yong-Tae;Kim, Tai-Hoon;Park, Gil-Cheol;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributers of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction.

  • PDF

A Study on Knowledge Based-AR System for Pipe Maintenance Support in Offshore Structure (해양구조물에서의 파이프정비 지원을 위한 지식기반형 증강현실 시스템에 관한 연구)

  • Kim, Chung-Hyun;Lee, Kyung-Ho;Lee, Jung-Min;Kim, Dea-Seok;Han, Eun-Jung
    • Journal of Ocean Engineering and Technology
    • /
    • v.24 no.1
    • /
    • pp.178-184
    • /
    • 2010
  • Today, there has been a decrease in international shipping because of the weakening in global economies. Therefore, shipowners are thinking more about Floating Production Storage and Offloading (FPSO), which can perform functions related to the transporting, storage, and tracking of crude oil from oil wells. Given the huge expense of these special ships, shipowners require workers who can solve problems quickly and secure sustainable production functions in this age of globalization. Furthermore, it is important to design, construct, and maintain facilities so that a ship remains in operation over a long term. This paper discusses a system that uses knowledge-based AR to help workers improve their understanding and deal with pipeline equipment problems safely. In addition, it displays a 3CAD model and status information for products to improve their recognition on the FPSO that they intend to inspect. At the same time, the system works quickly and offers solutions for dangerous circumstances or malfunctions. It thus helps to maintain the functionality of the FPSO throughout its life-cycle.

Distributed Dynamic Lighting Energy Management System based on Zigbee Mesh Network (지그비 메쉬망 기반 분산형 동적 에너지 관리 시스템)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.85-91
    • /
    • 2014
  • Nowadays, Dynamic lighting control and management skills are studied and used. If the system which is to manage multiple intelligent spot applied ubiquitous service technology is built with decision making and used in the complex intelligent space like a apartment then will improve energy efficiency and provide comfortability in optimal conditions. To solve this problem distributed autonomous control middleware and energy management system which process data gathering by zigbee mesh network and search proper services to save energy by the existing state of things is necessary. In paper we designed DDLEMS (Distributed Dynamic Lighting Energy Management System) that is to service duplex communication embedded by software based home server platform to provide mobile services in the smart place and support decision making about energy saving to the best use of wireless censor node and controled network, energy display devices.

Data Origin Authentication Scheme for Wireless Mesh Networks (무선 메쉬 네트워크를 위한 데이터 송신 인증 기술)

  • Kang, Nam-Hi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.135-142
    • /
    • 2010
  • Wireless mesh network, which is an access network technology, adopts ubiquitous features of ad-hoc network that includes capabilities of self-configuration and self-management. This paper proposes a scheme which enables nodes along route in wireless mesh network to authenticate data and verify data integrity. The scheme distinguishes infra-node, which is a network device used to form mesh network, and user node in ad-hoc network, which operates functions as a sender, receiver or relayer, to deploy different authentication scheme. That is, hop-based authentication scheme along route forming wireless backbone differs from authentication scheme for user nodes in route over MANET. The proposed scheme is less complex than previously proposed schemes from the repects of security setup procedures and managements. In addition, the scheme is able to reduce transmission delay from a source to a destination owing to fast authentication over wireless backbone.