• Title/Summary/Keyword: WiFi network

Search Result 319, Processing Time 0.026 seconds

Safe Network Technologies (세이프 네트워크 기술)

  • Song, J.T.;Noh, S.K.;Park, H.S.;Park, J.D.;Kim, S.G.
    • Electronics and Telecommunications Trends
    • /
    • v.28 no.6
    • /
    • pp.28-36
    • /
    • 2013
  • 사이버 테러의 급증으로 인해 사이버 공간에서의 네트워크 역할이 중요해 지고 있다. 이러한 사이버 공격, 정보 유출 등에 의한 국가적 차원의 사이버 안보 위협에 적극적으로 대처하고자 세이프 네트워크기술 개발을 추진 중이다. 본고에서는 (1) IP 주소 은닉기반 라우팅 기술, (2) 전역적 제어 관리 시스템 기술 (3) 폐쇄망용 프로텍티드 WiFi시스템기술, (4) 보안을 강화한 네트워크 SW 기술을 주축으로 하는 세이프 네트워크의 핵심기술 및 주요 시스템의 기술개발 동향에 대해 알아본다.

Smart Phone Based Image Processing Methods for Motion Detection of a Moving Object via a Network Camera (네트워크 카메라의 움직이는 물체 감지를 위한 스마트폰 기반 영상처리 방법)

  • Kim, Young Jin;Kim, Dong Hwan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.1
    • /
    • pp.65-71
    • /
    • 2013
  • In this work, new smart phone based moving target detection is proposed. In order to implement the task, methods of real time image transmission from network camera, motion detecting algorithm and its effective implementation are also addressed. The network camera transfers image data by MJPEG format which contains various information such as data and IP address, and the smart phone separates the image data received through a WiFi module. Later, the image data is converted to a Bitmap image format, and with the help of the embedded OpenCV library on a smart phone and algorithm, it was found that the moving object was identified effectively in terms of real time monitoring and detection.

Building up a Wireless Network Infrastructure for Rolling-Stock (철도차량에서의 무선인터넷 환경 구축)

  • Lee, Yong-Cheol;Kim, Dong-Il;Chun, Sang-Hun
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.850-856
    • /
    • 2010
  • With skyrocketing number of people who use smartphone, the technology of wireless internet that is mobile-phone, Wi-Fi, Wibro, HSDPA has been developed remarkably. The environment that one can use wireless internet easily and inexpensively anywhere has been made. So, the customer of railway have needs and desire that could use the wireless internet network as travelling in rolling-stock. Although KTX, KTX-II and some subway agency has built-up wireless internet network and serviced it, it's closed infra and inconvenient environment has been criticized. So, we survey the wireless internet network that is serviced at present and the way to build wirelee internet infra to satisfy the needs of customers.

  • PDF

Mobile-based Universal Integrated Control Module for an Efficient Vehicle Control System (효율적인 차량제어를 위한 모바일기반의 범용 통합 제어모듈)

  • Hwang, Jae-Young;Lee, Ju-Han;Lee, Ho-Jin;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.1993-1998
    • /
    • 2010
  • This paper presents an integrated control module for controlling transportation machine and automatic navigation using a combined technology of mobile telematics and transportation machine telematics, i.e. Mobile In Vehicle (MIV). This development includes hardware implementation and its verification of control mechanism applied to vehicle. In particular, the module is designed to be versatile in such a way that it can collect various information and facilitate various options for convenience by supporting existing networks, such as TCP/IP, Wi-Fi and 3G mobile radio networks. The study offers its versatility, intelligence and cost-effectiveness by enabling the module to support network-independent service, whereas conventional modules operate only in a certain network. Based on this module, a multiple of subsequent convenient functions for transportation machine can further be developed for safe and intelligent transportation machines.

Localization Algorithm for Moving Objects Based on Maximum Measurement Value in WPAN (WPAN에서 최대 측정거리 값을 이용한 이동객체 위치추정 보정 알고리즘)

  • Choi, Chang Yong;Lee, Dong Myung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.5
    • /
    • pp.407-412
    • /
    • 2014
  • Concerns and demands for the Location Based Services (LBS) using Global Positioning System (GPS) and Wi-Fi are largely increased in the world in the present. In some experimental results, it was noted that many errors are frequently occurred when the distances between an anchor node and a mobile node acre measured in indoor localization environment of Wireless Personal Area Network (WPAN). In this paper, localization compensation algorithm based on maximum measurement value ($LCA_{MMV}$) for moving objects in WPAN is proposed, and the performance of the algorithm is analyzed by experiments on three scenarios for movement of mobile nodes. From the experiments, it was confirmed that the average localization accuracy of suggested algorithm was more increased than Symmetric Double-Sided Two-Way Ranging (SDS-TWR) and triangulation as average 40.9cm, 77.6cm and 6.3cm, respectively on scenario 1-3.

Robust Acknowledgement Transmission for Long Range Internet of Things (장거리 사물 인터넷 기기를 위한 간섭에 강인한 ACK 기술)

  • Lee, Il-Gu
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.47-52
    • /
    • 2018
  • Wi-Fi enabled Internet of Things (IoTs) had a substantial impact on society, economy and industry. However wireless connectivity technologies in unlicensed band such as Wi-Fi are vulnerable to interferences. They also face difficulty providing wireless connectivity over long range in dense networks due to the dynamically changed interference effect and asymmetric interference conditions. In this paper, robust acknowledgement transmission scheme is proposed for long range IoTs. According to the proposed scheme, it is possible to control the transmission rate of the transmission success rate of the response frame by adjusting the transmission rate of the response frame when the interference is present asymmetrically. It is also possible to use higher data rate when high quality link is guaranteed. The evaluation results demonstrated the proposed scheme improves the aggregate throughput by at most 9 Mbps when 20 MHz bandwidth transmission mode was adopted.

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

Transmission Performance of MANET with Intermittent Blackhole Attacks (간헐적 블랙홀 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1037-1040
    • /
    • 2013
  • Based on easy construction and operation compared with infra-structure communication netowrks, and rapid spreading of smart phone having high powered calculation ability and Wi/Fi function, usage of MANET(Mobile Ad-Hoc Network), which is configured with simply several terminals, is increased in applications of emergency communications, leisure, explorations. However, because of supporting difficulty of communication infra-structure makes some defects of malicious information intrusion like as hacking. In this paper, effects of transmission performance caused by information intrusion is analyzed. The results of published studies is based on environment of continuous intrusions, but this paper assumed intermittent attacking condition. In this paper, blackhole attack is used for intrusion type to MANET, voice traffic is used as a application traffic. Compuer simulation, based on NS-2, is used for measuring of performance parameters, and the analysis for the simulation results is shown as considerations of this paper.

  • PDF

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

File Transmission using Push Service in Multi-source Environment (다중 송신자 환경에서 푸시 서비스 기반 파일 전송 기법)

  • An, Dong Hyeok
    • Smart Media Journal
    • /
    • v.4 no.3
    • /
    • pp.38-43
    • /
    • 2015
  • The increased number of smart devices leads users to share multimedia contents with others. Smart device users transmit multimedia files using apps. For multimedia file transfer under NAT (Network Address Translator), a lot of apps exploit a server with public IP or short range communication technologies such as WiFi Direct or Bluetooth because smart devices with private IP address cannot communicate each other directly. We first proposed the push service based file transmission scheme without an additional server and distance limitation. Second, for the push service based transmission, we proposed congestion control scheme to adapt transmission rate to the receiver's link bandwidth. Third, we considered bandwidth aware transmission for senders with different bandwidth. We implemented apps to evaluate the proposed scheme, and conducted experiments with smart devices.