• Title/Summary/Keyword: Wireless

Search Result 16,248, Processing Time 0.047 seconds

Different Heterogeneous IoT Data Management Techniques for IoT Cloud Environments (IoT 클라우드 환경을 위한 서로 다른 이기종의 IoT 데이터 관리 기법)

  • Cho, Sung-Nam;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.15-21
    • /
    • 2020
  • Although IoT systems are used in a variety of heterogeneous environments as cloud environments develop, all IoT devices are not provided with reliable protocols and services. This paper proposes an IoT data management technique that can extend the IoT cloud environment to an n-layer multi-level structure so that information collected from different heterogeneous IoT devices can be efficiently sorted and processed. The proposed technique aims to classify and process IoT information by transmitting routing information and weight information through wireless data link data collected from heterogeneous IoT devices. The proposed technique not only delivers information classified from IoT devices to the corresponding routing path but also improves the efficiency of IoT data processing by assigning priority according to weight information. The IoT devices used in the proposed technique use each other's reliable protocols, and queries for other IoT devices locally through a local cloud composed of hierarchical structures have features that ensure scalability because they maintain a certain cost.y channels of IoT information in order to make the most of the multiple antenna technology.

An IoT based Green Home Architecture for Green Score Calculation towards Smart Sustainable Cities

  • Kumaran, K. Manikanda;Chinnadurai, M.;Manikandan, S.;Murugan, S. Palani;Elakiya, E.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2377-2398
    • /
    • 2021
  • In the recent modernized world, utilization of natural resources (renewable & non-renewable) is increasing drastically due to the sophisticated life style of the people. The over-consumption of non-renewable resources causes pollution which leads to global warming. Consequently, government agencies have been taking several initiatives to control the over-consumption of non-renewable natural resources and encourage the production of renewable energy resources. In this regard, we introduce an IoT powered integrated framework called as green home architecture (GHA) for green score calculation based on the usage of natural resources for household purpose. Green score is a credit point (i.e.,10 pts) of a family which can be calculated once in a month based on the utilization of energy, production of renewable energy and pollution caused. The green score can be improved by reducing the consumption of energy, generation of renewable energy and preventing the pollution. The main objective of GHA is to monitor the day-to-day usage of resources and calculate the green score using the proposed green score algorithm. This algorithm gives positive credits for economic consumption of resources and production of renewable energy and also it gives negative credits for pollution caused. Here, we recommend a green score based tax calculation system which gives tax exemption based on the green score value. This direct beneficiary model will appreciate and encourage the citizens to consume fewer natural resources and prevent pollution. Rather than simply giving subsidy, this proposed system allows monitoring the subsidy scheme periodically and encourages the proper working system with tax exemption rewards. Also, our GHA will be used to monitor all the household appliances, vehicles, wind mills, electricity meter, water re-treatment plant, pollution level to read the consumption/production in appropriate units by using the suitable sensors. These values will be stored in mass storage platform like cloud for the calculation of green score and also employed for billing purpose by the government agencies. This integrated platform can replace the manual billing and directly benefits the government.

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

Distributed Certificate Authority under the GRID-Location Aided Routing Protocol (Ad hoc 네트워크에서 GRID-Location Aided Routing 프로토콜을 이용한 분산 CA 구성)

  • Lim, Ji-Hyung;Kang, Jeon-Il;Koh, Jae-Young;Han, Kwang-Taek;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.59-69
    • /
    • 2005
  • Ad hoc network is the network which can be considered without a pre-constructed infrastructure, and a mobile node can join the network freely. However, the participation of the mobile nodes to the ad hoc network brings up much burden of re-computation for new routes, because it leads to losing the connection frequently. And, also, it causes serious security problem to be broadcasted wrong information by the malicious user. Therefore, it needs authentication against the mobile nodes. To make that Possible, we have two methods: single CA and distributed CA. In the case of CA method, the wireless network can be collapsed owing to expose the CA, but still the distributed CA method is a little more safe than previous one because it needs attacks toward a lot of CAs to collapse the network We can consider Secret Share scheme as the method that constructs the distributed CA system, but it is weak when the network size is too large. In this paper, we suggest hierarchical structure for the authentication method to solve this problem, and we will show the results of simulation for this suggestion.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Design and Implementation of Mobile Medical Information System Based Radio Frequency IDentification (RFID 기반의 모바일 의료정보시스템의 설계 및 구현)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.317-325
    • /
    • 2005
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. That is, with the new guidelines and technology, hospital business escapes simple fee calculation and insurance claim center. Moreover, MIS(Medical Information System), PACS(Picture Archiving and Communications System), OCS(Order Communicating System), EMR(Electronic Medical Record), DSS(Decision Support System) are also developing. Medical Information System is evolved toward integration of medical IT and situation si changing with increasing high speed in the ICT convergence. These changes and development of ubiquitous environment require fundamental change of medical information system. Mobile medical information system refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to Internet whenever and wherever. RFID is one of the technologies for Automatic Identification and Data Capture(AIDC). It is the core technology to implement Automatic processing system. This paper provides a comprehensive basic review of RFID model in Korea and suggests the evolution direction for further advanced RFID application services. In addition, designed and implemented DB server's agent program and Client program of Mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented medical information system that performed patient data based EMR, HIS, PACS DB environments, and so reduced delay time of requisition, medical treatment, lab.

  • PDF

Automatic Bee-Counting System with Dual Infrared Sensor based on ICT (ICT 기반 이중 적외선 센서를 이용한 꿀벌 출입 자동 모니터링 시스템)

  • Son, Jae Deok;Lim, Sooho;Kim, Dong-In;Han, Giyoun;Ilyasov, Rustem;Yunusbaev, Ural;Kwon, Hyung Wook
    • Journal of Apiculture
    • /
    • v.34 no.1
    • /
    • pp.47-55
    • /
    • 2019
  • Honey bees are a vital part of the food chain as the most important pollinators for a broad palette of crops and wild plants. The climate change and colony collapse disorder (CCD) phenomenon make it challenging to develop ICT solutions to predict changes in beehive and alert about potential threats. In this paper, we report the test results of the bee-counting system which stands out against the previous analogues due to its comprehensive components including an improved dual infrared sensor to detect honey bees entering and leaving the hive, environmental sensors that measure ambient and interior, a wireless network with the bluetooth low energy (BLE) to transmit the sensing data in real time to the gateway, and a cloud which accumulate and analyze data. To assess the system accuracy, 3 persons manually counted the outgoing and incoming honey bees using the video record of 360-minute length. The difference between automatic and manual measurements for outgoing and incoming scores were 3.98% and 4.43% respectively. These differences are relatively lower than previous analogues, which inspires a vision that the tested system is a good candidate to use in precise apicultural industry, scientific research and education.

A Study on Displaying the Flag for Indicating the Nationality of Ships (선박 국적 표시를 위한 국기 게양에 대한 고찰)

  • Yun, Gwi-ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.4
    • /
    • pp.465-473
    • /
    • 2021
  • Since the past, ships have hoisted national flags as a means of indicating their nationality. Both domestically and internationally, laws and conventions related to the nationality and hoisting of the flag have been enacted because it is significant that the nationality of a ship is a matter of the jurisdiction of the ship. Nevertheless, there are differences in domestic and international regulations related to the hoisting of the flag of a ship, and if the flag is not hoisted irrespective of the intention, there may be a difference in interpretation as to whether or not the ship will be regarded unconditionally as a stateless ship. However, there is no disagreement locally or abroad about the necessity of indicating the nationality of ships. Therefore, I would like to propose a method to indicate and confirm the nationality of the ship by using wireless communication equipment with hoisting the flag as the only way to express its nationality, reflecting the situation of the era such as high-speed, larger and unmanned ship. Representatively, the method utilizes the automatic identification system(AIS), which is one of the equipment legally installed in the ship, and includes the ship's nationality in its information. If the nationality information is included in the AIS, nationality can be identified earlier and even from a distance, and there will not be instances of nationality not being identified because the flag is not hoisted or the flag is damaged. In addition, it is expected that the problem of nationality indication can be solved even when vessels are unmanned in future.

Research on The Implementation of Smart Factories through Bottleneck improvement on extrusion production sites using NFC (NFC를 활용한 압출생산현장의 Bottleneck 개선을 통한 스마트팩토리 구현 연구)

  • Lim, Dong-Jin;Kwon, Kyu-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.104-112
    • /
    • 2021
  • For extrusion processes in the process industry, the need to build smart factories is increasing. However, in most extrusion production sites, the production method is continuous, and because the properties of the data are undeed, it is difficult to process the data. In order to solve this problem, we present a methodology utilizing a near field communication (NFC) sensor rather than water-based data entry. To this end, a wireless network environment was built, and a data management method was designed. A non-contact NFC method was studied for the production performance-data input method, and an analysis method was implemented using the pivot function of the Excel program. As a result, data input using NFC was automated, obtaining a quantitative effect from reducing the operator's data processing time. In addition, using the input data, we present a case where a bottleneck is improved due to quality problems.