• 제목/요약/키워드: WiFi network

검색결과 319건 처리시간 0.024초

A Study on Medical Information Service System Design using Wireless LAN (WLAN을 이용한 의료정보서비스 시스템 설계에 관한 연구)

  • Yu, Ho-Jun;Ahn, Byoung-Hee;v, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2005년도 추계종합학술대회
    • /
    • pp.455-458
    • /
    • 2005
  • Current medical information management systems use man's hands or wired network for information transmission. It is difficult to check the situation information of the patient in real time. Moreover, it is also cumbersome to transfer the information. In this paper, we obtain the bio-signal in real time through wireless LAN, and store the carrer information of the patient at the management server in the hospital. We studied about development of system which provide the management server in the hospital. We studied about development of system which provide a career information service through PDA to the doctor as well as patients.

  • PDF

A implement of smart Blockbox with GPS and Wireless network (GPS와 무선랜을 이용한 스마트블랙박스 구현)

  • Kim, Jang-Ju;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2010년도 춘계학술대회
    • /
    • pp.90-93
    • /
    • 2010
  • Lately, increasing utilization of vehicle blackbox, there is acted research and development of blackbox. But, currently used Blackbox was stored only video, sound and have Limit to know details of an accident. When disappeared mounted blackbox inside the vehicle, there don't know information of blackbox. In this paper, because using video and sound and GPS, blackbox store current location and route and vehicle speed, blackbox increase efficiency and accuracy of accident analysis. and using wareless LAN, smart blackbox implement to transfer external store media.

  • PDF

Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network (인증 네트워크 상의 비 인가된 모바일 AP 탐지 및 차단 기법)

  • Lim, Jae-Wan;Jang, Jong-Deok;Yoon, Chang-Pyo;Ryu, Hwang-Bin
    • Convergence Security Journal
    • /
    • 제12권1호
    • /
    • pp.55-61
    • /
    • 2012
  • Owing to the development of wireless infrastructure and mobile communication technology, There is growing interest in smart phone using it. The resulting popularity of smart phone has increased the Mobile Malicious AP-related security threat and the access to the wireless AP(Access Point) using Wi-Fi. mobile AP mechanism is the use of a mobile device with Internet access such as 3G cellular service to serve as an Internet gateway or access point for other devices. Within the enterprise, the use of mobile AP mechanism made corporate information management difficult owing to use wireless system that is impossible to wire packet monitoring. In this thesis, we propose mobile AP mechanism-based mobile malicious AP detection and prevention mechanism in radius authentication server network. Detection approach detects mobile AP mechanism-based mobile malicious AP by sniffing the beacon frame and analyzing the difference between an authorized AP and a mobile AP mechanism-based mobile malicious AP detection.

Study on the Security Threats Factors of A Bluetooth Low Energy (저전력 블루투스의 보안 위협 요인들에 관한 연구)

  • Jeon, Jeong Hoo
    • Convergence Security Journal
    • /
    • 제17권4호
    • /
    • pp.3-9
    • /
    • 2017
  • Recently, Wireless communication has been widely used as a short distance communication medium in various industrial fields as well as communication connection between home appliances due to the appearance of the Internet of Things. And Most commonly used wireless communication media include WiFi, Bluetooth, and NFC. Among them, Bluetooth is widely used for communication between smart devices as well as computer peripheral devices. And Bluetooth in the home network fields is being used to control electronic products. However, since Bluetooth security vulnerabilities are known, more and more attacks are being exploited. As the application range of Bluetooth is expanding, it is necessary to prepare countermeasures accordingly. Therefore, this study investigates the security threat factors of through Bluetooth'attack case and attack technology. And By proposing countermeasures against this problem, we intend to utilize it as data for improving the security of wireless network service in the future.

A Design and Implementation of Wi-Fi Based Unmanned Ship Control System (무선랜 기반 무인선박 제어시스템 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Chae-Seok;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제18권2호
    • /
    • pp.437-444
    • /
    • 2014
  • The unmanned ship control system controls the unmanned ship at a distance in ocean. Expecially, in order to control the unmanned ship, it needs the wireless communication networks and we use the IEEE 802.11 based WLAN. The IEEE 802.11 based WLAN technology for supporting a wide bandwidth is suitable for unmanned ship control system which has to transmit the multimedia data. First, we design the system structure for controlling the unmanned ship. Then, in order to overcome the limited communication area, we design the network structure for the unmanned ship communication network which can use a various communication network. we implemented and evaluated the unmanned ship system based on WLAN. We controlled the unmanned ship by use the WLAN and confirmed the signal feature of WLAN in the ocean.

Enhanced Peer-to-Peer Streaming Protocol to Provide The Selective VoD Service in Live Streaming Session (스트리밍 세션에서 선택적 VoD 서비스 제공을 위한 향상된 피어-투-피어 스트리밍 프로토콜)

  • Yi, Seonwoo;Cho, Sunghyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • 제52권1호
    • /
    • pp.40-47
    • /
    • 2015
  • We propose a method to provide a selective VoD service during live streaming sessions. In the proposed method, each peer joined the live streaming session receives video stream packets with P2P manner and stores the packets to provide a VoD service. To mitigate the overhead of each peer node to store the video stream packets, the proposed scheme categorizes peers into three different groups based on their link types. To increase data gathering speed and reduce the network load, we also proposes the P2P transmission scheme within the same AP network for the peers with Wi-Fi link. To evaluate the performance of the proposed method, we implement computer simulator using NS-3. Simulation results show that the proposed method reduces the overhead about 66% and increases the P2P data gathering speed about 50% compared to the conventional schemes.

Considerations for Applying SDN to Embedded Device Security (임베디드 디바이스 보안을 위한 SDN 적용 시 고려사항)

  • Koo, GeumSeo;Sim, Gabsig
    • The Journal of the Korea Contents Association
    • /
    • 제21권6호
    • /
    • pp.51-61
    • /
    • 2021
  • In the era of the 4th industrial revolution symbolized by the Internet of Things, big data and artificial intelligence, various embedded devices are increasing exponentially. These devices have communication functions despite their low specifications, so the possibility of personal information leakage is increasing, and security threats are also increasing. Embedded devices can have security issues at most levels, from hardware to services over the network. In addition, it is difficult to apply general security techniques because it has characteristics of resource constraints such as low specifications and low power, and the related technology has not been standardized. In this study, we present vulnerabilities and possible problems and considerations in applying SDN to embedded devices in consideration of structural characteristics and real-world discovered cases. This study presents vulnerabilities and possible problems and considerations when applying SDN to embedded devices. From a hardware perspective, we consider the problems of Wi-Fi chips and Bluetooth, the problems of open flow implementation, SDN controllers, and examples of structural properties. SDN separates the data plane and the control plane, and provides a standardized interface between the two, enabling efficient communication control. It can respond to the security limitations of existing network technologies that are difficult to respond to rapid changes.

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제40권2호
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.

Performance Evaluation of Wireless Sensor Networks in the Subway Station of Workroom (지하철 역사내 무선 센서네트워크 환경구축을 위한 무선 스펙트럼 분석 및 전송시험에 관한 연구)

  • An, Tea-Ki;Kim, Gab-Young;Yang, Se-Hyun;Choi, Gab-Bong;Sim, Bo-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제12권7호
    • /
    • pp.3220-3226
    • /
    • 2011
  • In order to monitor internal risk factors such as fire, terror, etc. on the subway station, the surveillance systems using CCTV and various kinds of sensors have been implemented and recently, introduction of surveillance systems using an advanced IT technology, sensor network technology is tried on several areas. Since 2007, Korean government has made an effort to develop the intelligent surveillance and monitoring system, which can monitor fire, intrusion, passenger congestion, health-state of structure, etc., by using wireless sensor network technology and intelligent video analytic technique. For that purpose, this study carried out field wireless communication environment test on Chungmuro Station of Seoul Metro on the basis of ZigBee that is considered as a representative wireless sensor network before field application of the intelligent integrated surveillance system being developed, arranged and analyzed and ZigBee based wireless communication environment test results on the platform and waiting room of Chungmuro Station on this paper. Results of wireless spectrum analysis on the platform and waiting room showed that there is no radio frequency overlapped with that of ZigBee based sensor network and no frequency interference with adjacent frequencies separated 10MHz or more. As results of wireless data transmission test using ZigBee showed that data transmission is influenced by multi-path fading effect from the number and flow rate of passengers on the platform or the waiting room rather than effects from entrance and exit of the train to/from the platform, it should be considered when implementing the intelligent integrated surveillance system on the station.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제18권5호
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.