• Title/Summary/Keyword: Use of Smart Devices

Search Result 789, Processing Time 0.025 seconds

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.

LTE Spectrum Policy: Focused on the OECD 12 Countries (이동통신 LTE 주파수 정책: 주요국 사례를 중심으로)

  • Jun, Soo-Yeon;Jeong, In-Jun
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.1-18
    • /
    • 2014
  • Recently, many of the mobile network operators or telcos are introducing the LTE service in order to effectively cope with an explosive increasing mobile traffics due to an expansion of the use of smart phones. The 1.8GHz, 2.6GHz, and 800MHz band classes are most widely used for LTE. In particular, the 1.8GHz band class is the most useful one in terms of the reusability of the existing (2G) network, global harmonization, bandwidth, eco-system of equipments and devices, and so on. In recent years, major countries in the world have allocated the 1.8GHz band spectrum in a wide bandwidth unit suitable for the upcoming LTE-Advanced service. This paper surveyed the 1.8GHz band spectrum allocation policies of the 12 OECD countries, including Republic of Korea. From the survey, we have found that they rebuilt or refarmed the existing holders' bands, recovered the public (i.e., military)-use bands, and allocated the bands in a wide bandwidth and in an equal or similar size.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.

Ontology Modeling and Rule-based Reasoning for Automatic Classification of Personal Media (미디어 영상 자동 분류를 위한 온톨로지 모델링 및 규칙 기반 추론)

  • Park, Hyun-Kyu;So, Chi-Seung;Park, Young-Tack
    • Journal of KIISE
    • /
    • v.43 no.3
    • /
    • pp.370-379
    • /
    • 2016
  • Recently personal media were produced in a variety of ways as a lot of smart devices have been spread and services using these data have been desired. Therefore, research has been actively conducted for the media analysis and recognition technology and we can recognize the meaningful object from the media. The system using the media ontology has the disadvantage that can't classify the media appearing in the video because of the use of a video title, tags, and script information. In this paper, we propose a system to automatically classify video using the objects shown in the media data. To do this, we use a description logic-based reasoning and a rule-based inference for event processing which may vary in order. Description logic-based reasoning system proposed in this paper represents the relation of the objects in the media as activity ontology. We describe how to another rule-based reasoning system defines an event according to the order of the inference activity and order based reasoning system automatically classify the appropriate event to the category. To evaluate the efficiency of the proposed approach, we conducted an experiment using the media data classified as a valid category by the analysis of the Youtube video.

Mobile Contents Transformation System Research for Personalization Service (개인화 서비스를 위한 모바일 콘텐츠 변환 시스템 연구)

  • Bae, Jong-Hwan;Cho, Young-Hee;Lee, Jung-Jae;Kim, Nam-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.119-128
    • /
    • 2011
  • The Sensor technology and portable device capability able to collect recent user information and the information about the surrounding environment haven been highly developed. A user can be made use of various contents and the option is also extending with this technology development. In particular, the initial portable device had simply a call function, but now that has evolved into 'the 4th screen' which including movie, television, PC ability. also, in the past, a portable device to provided only the services of a SMS, in recent years, it provided to interactive video service, and it include technology which providing various contents. Also, it is rising as media which leading the consumption of contents, because it can be used anytime, anywhere. However, the contents available for the nature of user's handheld devices are limited. because it is very difficult for making the contents separately according to various device specification. To find a solution to this problem, the study on one contents from several device has been progressing. The contents conversion technology making use of the profile of device out of this study comes to the force and profile study has been progressing for this. Furthermore, Demand for a user is also increased and the study on the technology collecting, analyzing demands has been making active progress. And what is more, Grasping user's demands by making use of this technology and the study on the technology analyzing, providing contents has been making active progress as well. First of all, there is a method making good use of ZigBee, Bluetooth technology about the sensor for gathering user's information. ZigBee uses low-power digital radio for wireless headphone, wireless communication network, and being utilized for smart energy, automatic home system, wireless communication application and wireless sensor application. Bluetooth, as industry standards of PAN(Personal Area Networks), is being made of use of low power wireless device for the technology supporting data transmission such as drawing file, video file among Bluetooth device. With analyzing the collected information making use of this technology, it utilizes personalized service based on network knowledge developed by ETRI to service contents tailor-made for a user. Now that personalized service builds up network knowledge about user's various environments, the technology provides context friendly service constructed dynamically on the basis of this. The contents to service dynamically like this offer the contents that it converses with utilizing device profile to working well. Therefore, this paper suggests the system as follow. It collects the information, for example of user's sensitivity, context and location by using sensor technology, and generates the profile as a means of collected information as sensor. It collects the user's propensity to the information by user's input and event and generates profile in the same way besides the gathered information by sensor. Device transmits a generated profile and the profile about a device specification to proxy server. And proxy server transmits a profile to each profile management server. It analyzes profile in proxy server so that it selects the contents user demand and requests in contents server. Contents server receives a profile of user portable device from device profile server and converses the contents by using this. Original source code of contents convert into XML code using the device profile and XML code convert into source code available in user portable device. Thus, contents conversion process is terminated and user friendly system is completed as the user transmits optimal contents for user portable device.

A study on a flow of the technological convergence in webtoon - Focused on the interactiontoon of webtoon (기술 융합형 웹툰의 몰입도 연구 -인터랙션 툰 <마주쳤다>를 중심으로)

  • Baek, Eun-Ji;Son, Ki-Hwan
    • Cartoon and Animation Studies
    • /
    • s.50
    • /
    • pp.101-130
    • /
    • 2018
  • Since the advent of the Smart Devices, the smartphone has become a popular tool to view Webtoon. This phenomenon has caused the convergence of cutting-edge technologies and Webtoons in diverse forms, creating unique versions of Webtoons including, but not limited to Smart-toon, Effect-toon, Cut-toon, Dubbing-toon, Moving-toon, AR-toon, VR-toon, and Interaction-toon. By comparison to these rich diversities of Webtoons in the online industry, there is a lack of academic research on this topic. There are some papers which talk about the different types of multimedia technology conversion and its case presentation or the effectiveness and problems of visual effect, but the effects of these convergence technologies on comic readers' concentration and reading effectiveness have never been investigated so far. Therefore, this paper will discuss the unique method of immersive storytelling that is often used in comics and analyze each aspects of immersive method in technology-converged Webtoons along with its problems. Furthermore, this paper will analyze different aspects of "immersion" and interaction elements that can be found in the popular Interaction-toon, (Encountered). Through this, this paper discusses the positive influence of the interaction elements on comic readers' immersion level and its limitation. To classify the technology-converged Webtoons in terms of the immersion level, the Effect-toon sometimes interferes viewer's flow by using excessive use of multimedia effect, creating information overload. The Smart-toon which applied motions to each frame under horizontal mode of smartphones was a good try, but it hindered the readers' activeness and made it hard for the readers to be fully absorbed in the story. The VR-toon, which utilizes virtual reality gadgets to allow viewers to explore the world of Webtoon was also a nice try to overcome the limitation of vertical screens. However, it often caused dispersion of user's attention and reduced the users' immersion level. The Moving-toon which only emphasized the reading convenience also invaded readers' activeness and disturb users' concentration. On the other hand, the cartoonist Il-Kwon Ha applied high technologies such as face recognition technology, augmented reality techniques, 360-degree panorama technology, and haptic technology to his cartoon (Encountered). This allowed the readers to form a sense of closeness towards the cartoon characters which let the readers to identify themselves with the characters and interact with them. By this way, the readers can be fully immersed in the story. However, technology abuse, impractical production and hackneyed storylining often showed later in the story remains as its limitations.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

A Study on the Critical Success Factors of Social Commerce through the Analysis of the Perception Gap between the Service Providers and the Users: Focused on Ticket Monster in Korea (서비스제공자와 사용자의 인식차이 분석을 통한 소셜커머스 핵심성공요인에 대한 연구: 한국의 티켓몬스터 중심으로)

  • Kim, Il Jung;Lee, Dae Chul;Lim, Gyoo Gun
    • Asia pacific journal of information systems
    • /
    • v.24 no.2
    • /
    • pp.211-232
    • /
    • 2014
  • Recently, there is a growing interest toward social commerce using SNS(Social Networking Service), and the size of its market is also expanding due to popularization of smart phones, tablet PCs and other smart devices. Accordingly, various studies have been attempted but it is shown that most of the previous studies have been conducted from perspectives of the users. The purpose of this study is to derive user-centered CSF(Critical Success Factor) of social commerce from the previous studies and analyze the CSF perception gap between social commerce service providers and users. The CSF perception gap between two groups shows that there is a difference between ideal images the service providers hope for and the actual image the service users have on social commerce companies. This study provides effective improvement directions for social commerce companies by presenting current business problems and its solution plans. For this, This study selected Korea's representative social commerce business Ticket Monster, which is dominant in sales and staff size together with its excellent funding power through M&A by stock exchange with the US social commerce business Living Social with Amazon.com as a shareholder in August, 2011, as a target group of social commerce service provider. we have gathered questionnaires from both service providers and the users from October 22, 2012 until October 31, 2012 to conduct an empirical analysis. We surveyed 160 service providers of Ticket Monster We also surveyed 160 social commerce users who have experienced in using Ticket Monster service. Out of 320 surveys, 20 questionaries which were unfit or undependable were discarded. Consequently the remaining 300(service provider 150, user 150)were used for this empirical study. The statistics were analyzed using SPSS 12.0. Implications of the empirical analysis result of this study are as follows: First of all, There are order differences in the importance of social commerce CSF between two groups. While service providers regard Price Economic as the most important CSF influencing purchasing intention, the users regard 'Trust' as the most important CSF influencing purchasing intention. This means that the service providers have to utilize the unique strong point of social commerce which make the customers be trusted rathe than just focusing on selling product at a discounted price. It means that service Providers need to enhance effective communication skills by using SNS and play a vital role as a trusted adviser who provides curation services and explains the value of products through information filtering. Also, they need to pay attention to preventing consumer damages from deceptive and false advertising. service providers have to create the detailed reward system in case of a consumer damages caused by above problems. It can make strong ties with customers. Second, both service providers and users tend to consider that social commerce CSF influencing purchasing intention are Price Economic, Utility, Trust, and Word of Mouth Effect. Accordingly, it can be learned that users are expecting the benefit from the aspect of prices and economy when using social commerce, and service providers should be able to suggest the individualized discount benefit through diverse methods using social network service. Looking into it from the aspect of usefulness, service providers are required to get users to be cognizant of time-saving, efficiency, and convenience when they are using social commerce. Therefore, it is necessary to increase the usefulness of social commerce through the introduction of a new management strategy, such as intensification of search engine of the Website, facilitation in payment through shopping basket, and package distribution. Trust, as mentioned before, is the most important variable in consumers' mind, so it should definitely be managed for sustainable management. If the trust in social commerce should fall due to consumers' damage case due to false and puffery advertising forgeries, it could have a negative influence on the image of the social commerce industry in general. Instead of advertising with famous celebrities and using a bombastic amount of money on marketing expenses, the social commerce industry should be able to use the word of mouth effect between users by making use of the social network service, the major marketing method of initial social commerce. The word of mouth effect occurring from consumers' spontaneous self-marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers; in this context, the word of mouth effect should be managed as the CSF of social commerce. Third, Trade safety was not derived as one of the CSF. Recently, with e-commerce like social commerce and Internet shopping increasing in a variety of methods, the importance of trade safety on the Internet also increases, but in this study result, trade safety wasn't evaluated as CSF of social commerce by both groups. This study judges that it's because both service provider groups and user group are perceiving that there is a reliable PG(Payment Gateway) which acts for e-payment of Internet transaction. Accordingly, it is understood that both two groups feel that social commerce can have a corporate identity by website and differentiation in products and services in sales, but don't feel a big difference by business in case of e-payment system. In other words, trade safety should be perceived as natural, basic universal service. Fourth, it's necessary that service providers should intensify the communication with users by making use of social network service which is the major marketing method of social commerce and should be able to use the word of mouth effect between users. The word of mouth effect occurring from consumers' spontaneous self- marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers. in this context, it is judged that the word of mouth effect should be managed as CSF of social commerce. In this paper, the characteristics of social commerce are limited as five independent variables, however, if an additional study is proceeded with more various independent variables, more in-depth study results will be derived. In addition, this research targets social commerce service providers and the users, however, in the consideration of the fact that social commerce is a two-sided market, drawing CSF through an analysis of perception gap between social commerce service providers and its advertisement clients would be worth to be dealt with in a follow-up study.

A Study on the Safety Characterization Grounding Design of the Inner Photovoltaic System (태양광 발전단지 내부 그리드의 안전 특성화 접지 설계에 관한 연구)

  • Kim, Hong-Yong;Yoon, Suk-Ho
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.2
    • /
    • pp.130-140
    • /
    • 2018
  • Purpose: In this paper, we propose a design technique for the safety characterization grounding in the construction of the photovoltaic power generation complex which can be useful and useful as an alternative power energy source in our society. In other words, we will introduce the application of safety grounding for each application, which can improve and optimize the reliability of the internal grid from the cell module to the electric room in the photovoltaic power generation complex. Method: We analyze the earth resistivity of the soil in the solar power plant and use the computer program (CDEGS) to analyze the contact voltage and stratospheric voltage causing the electric shock, and propose the calculation and calculation method of the safety ground. In addition, we will discuss the importance of semi-permanent ground electrode selection in consideration of soil environment. Results: We could obtain the maximum and minimum value of ground resistivity for each of the three areas of the data measured by the Wenner 4 - electrode method. The measured data was substituted into the basic equation and calculated with a MATLAB computer program. That is, it can be determined that the thickness of the minimum resistance value is the most favorable soil environment for installing the ground electrode. Conclusion: Through this study, we propose a grounding system design method that can suppress the potential rise on the ground surface in the inner grid of solar power plant according to each case. However, the development of smart devices capable of accumulating big data and a monitoring system capable of real-time monitoring of seismic changes in earth resistances and grounding systems should be further studied.

Enhanced Energy Harvester Based on Vibration Analysis of Bicycle Riding (자전거 주행의 진동 분석에 기반한 에너지 수확 증진 기술 개발)

  • Yeo, Jung-Jin;Ryu, Mun-Ho;Kim, Jung-Ja;Yang, Yoon-Seok
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.1
    • /
    • pp.47-56
    • /
    • 2012
  • Bicycle has a large amount of kinetic energy available for energy harvesting technology in its speedy and balanced riding movement. Systematic and realistic analysis of its dynamic property is essential to improve the efficiency of energy harvester. However, there has not been enough researches about precise measurement or analysis of bicycle dynamics on real roads. This study aims to investigate the characteristics of vibrational movement of bicycle using MEMS-based accelerometer and to develop a prototype of electromagnetic energy harvester with nonlinear behavior which is proper to the random vibrations accompanied in bicycle riding. The vibrational components have average magnitude of 1 g and turn out to be independent of riding speed. The developed prototype of energy harvester was installed on a front port of a bicycle to use this ambient vibration and generated an average electrical power of 1.5 mW which is enough to support power for most of portable sensors and short range radio-frequency communication. Further study about isolation of vibration from a rider and conversion efficiency is ongoing. The developed energy harvester is expected to be a platform technology for sustainable portable power supply for various smart IT devices and applications.