• Title/Summary/Keyword: Wired/wireless count sensor

Search Result 2, Processing Time 0.017 seconds

Development of AI Image Analysis Emergency Door Opening and Closing System linked Wired/Wireless Counting (유무선 카운팅 연동형 AI 영상분석 비상문 개폐 시스템 개발)

  • Cheol-soo, Kang;Ji-yun, Hong;Bong-hyun, Kim
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.1-8
    • /
    • 2022
  • In case of a dangerous situation, the roof, which serves as an emergency exit, must be open in case of fire according to the Fire Act. However, when the roof door is opened, it has become a place of various incidents and accidents such as illegal entry, crime, and suicide. As a result, it is a reality to close the roof door in terms of facility management to prevent crime, various incidents, and accidents. Accordingly, the government is pushing to legislate regulations on housing construction standards, etc. that mandate the installation of electronic automatic opening and closing devices on rooftop doors. Therefore, in this paper, an intelligent emergency door opening/closing device system is proposed. To this end, an intelligent emergency door opening and closing system was developed by linking wired and wireless access counting and AI image analysis. Finally, it is possible to build a wireless communication-based integrated management platform that provides remote control and history management in a centralized method of device status real-time monitoring and event alarm.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.