• Title/Summary/Keyword: Wireless Internet Device

Search Result 334, Processing Time 0.024 seconds

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Performace Evaluation of Global MANET adapted to Internet Access solution (인터넷 억세스 솔루션을 적용한 Global MANET의 성능 분석)

  • Jung, Chan-Hyuk;Oh, Se-Duk;Kim, Hyun-Wook;Lee, Kwang-Bae;Yu, Choung-Ryoul;Mun, Tae-Su
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.75-86
    • /
    • 2006
  • The MANET that can make autonomous distributed Network with Routing function has many differences than past wireless communication. For upcoming ALL-IP environment, MANET device should be connected with wired Internet Network and MANET is required to have a gateway to bridge two different networks to share information from any place. In this paper, Using the GMAHN Algorithm proposed Proactive, Reactive, Hybrid method that provides Inteface between Wired Internet network and MANET, we learned each method's the advantage and disadvantage through the various network environments. And also, we presented the optimization method of Hybrid combined Proactive with Reactive.

  • PDF

Organizing the Smart Devices' Set for Control of Periodic Sensing Data in Internet of Things (사물인터넷에서 주기적 센싱 데이터 제어를 위한 스마트 디바이스 집합 구성 방안)

  • Sung, Yoon-young;Woo, Hyun-je;Lee, Mee-jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.758-767
    • /
    • 2017
  • IoT paradigm which makes a information without direct intervention of a human and interworks with other objects, humans and systems is attracting attention. It will be expected the number of smart devices equipped with sensors and wireless communication capabilities is reached to about 260 billion by 2020. With the vast amount of sending data generated from rapidly increasing number of smart devices, it will bring up the traffic growth over internet and congestion in wireless networks. In this paper, we utilize the smart device as a sink node to collect and forward the sensing data periodically in IoT and propose a heuristic algorithm for a selection of sink nodes' set with each sink node satisfies the QoS its applications because a selection of optimal sink nodes' set is NP-hard problem. The complexity of proposed heuristic algorithm is $O(m^3)$ and faster than the optimal algorithm.

Secure 6LoWPAN Neighbor Discovery Address Registration Protocol (안전한 6LoWPAN Neighbor Discovery 주소 등록 프로토콜)

  • Han, Sang-woo;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.17-28
    • /
    • 2019
  • 6LoWPAN based on IEEE 802.15.4 is a realistic standard platform for various Internet of Things (IoT) applications. To bootstrap the LoWPAN (Low-power Wireless Personal Area Network), each device must perform 6LoWPAN-ND address registration to assign a unique IPv6 address. Without adequate security mechanisms, 6LoWPAN-ND is vulnerable to a variety of security attacks including corrupted node attacks. Several security mechanisms have been proposed as a supplement to the vulnerability, but the vulnerability exists because it relies solely on IEEE 802.15.4 hop-by-hop security. In this paper, we propose and analyze a vulnerability of 6LoWPAN-ND address registration and a new security mechanism suitable for preventing the attack of damaged node. It also shows that the proposed security mechanism is compatible with the Internet Engineering Task Force (IETF) standard and is more efficient than the mechanism proposed in the IETF 6 lo WG.

A Development of Application System for Mobile Environment (무선 이동 환경을 위한 원서접수시스템 개발)

  • 정상혁;주경수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.1
    • /
    • pp.71-83
    • /
    • 2003
  • Nowadays on-line services based on Internet are being popularized and there are lots of E-Commerce applications using Internet. So we can use lots of information on anytime. To maximize the convenience of the network, the platform of the service is moving from E-Commerce to M-Commerce. In this paper we developed the application system for mobile environment. Therefore applicants can apply their applications and see the competition rate of the applying departments anytime and anywhere even if in the network disconnection regions. And we can manage more economically the application system because we use the network only the time when we syncronize the mobile device to mobile server.

  • PDF

Path Collision-aware Real-time Link Scheduling for TSCH Wireless Networks

  • Darbandi, Armaghan;Kim, Myung Kyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4429-4445
    • /
    • 2019
  • As low-power and low-rate WSNs are being widely used for industrial applications, the scheduling of such applications becomes a critical issue to guarantee meeting the stringent requirements of determinism and tight latencies. This paper studies the link scheduling problem for real-time industrial applications in time-slotted channel hopping (TSCH) networks. We propose a heuristic algorithm for centralized link scheduling referred to as path-collision aware least laxity first (PC-LLF) algorithm, which dynamically prioritizes the packets based on the laxity time to the end-to-end deadlines and the amount of collisions that messages might deal with along their designated paths to the destination device. We propose schedulability analysis of real-time applications scheduled under our prioritization approach over TSCH networks, based on the literature on real-time schedulability analysis of multiprocessors and distributed systems. We show that our methodology provides an improved schedulability condition with respect to the existing approaches. Performance evaluation studies quantify to quantify the performance of our proposed approach under a variety of scenarios.

Development of wearable Range of Motion measurement device capable of dynamic measurement

  • Song, Seo Won;Lee, Minho;Kang, Min Soo
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.154-160
    • /
    • 2019
  • In this paper, we propose the miniaturization size of wearable Range of Motion(ROM) and a system that can be connected with smart devices in real-time to measure the joint movement range dynamically. Currently, the ROM of the joint is directly measured by a person using a goniometer. Conventional methods are different depending on the measurement method and location of the measurement person, which makes it difficult to measure consistently and may cause errors. Also, it is impossible to measure the ROM of joints in real-life situations. Therefore, the wearable sensor is attached to the joint to be measured to develop a miniaturize size ROM device that can measure the range of motion of the joint in real-time. The sensor measured the resistance value changed according to the movement of the joint using a load cell. Also, the sensed analog values were converted to digital values using an Analog to Digital Converter(ADC). The converted amount can be transmitted wireless to the smart device through the wearable sensor node. As a result, the developed device can be measured more consistently than the measurement using the goniometer, communication with IoT-based smart devices, and wearable enables dynamic observation. The developed wearable sensor node will be able to monitor the dynamic state of rehabilitation patients in real-time and improve the rapid change of treatment method and customized treatment.

Authentication Mechanism of Devices in Smart Home Using Internet of Things (사물 인터넷망을 이용한 스마트 홈에서의 기기 인증 메카니즘)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.258-259
    • /
    • 2017
  • Recently, as science and technology is very growing, wire and wireless communication is merged and interconnected. Therefore, advanced internet technology allow all kinds of communication to integrate with heterogeneous device and sensors. The representative example is smart home network based on internet of things. Communication surroundings under IoT services are more complex. Conventional encryption techniques can't provide to IoT application because of its limited resources such as small memory capacity and low computing power. In this paper, we analyzed authentication procedure between home gateway and node in sensor under smart home network.

  • PDF

User Authentication Mechanism for using a Secure IPTV Service in Mobile Device (이동 장비에서 안전한 IPTV 서비스를 사용하기 위한 사용자 인증 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.377-386
    • /
    • 2009
  • IPTV technology for providing multimedia content with high-speed is the network which combines existing network, multimedia and internet technology etc. But internet, broadcasting and web technologies which is now being used is not optimized to IPTV because the security problem between user who gets content service through mobile units and content server is not guaranteed. This paper proposes user certification mechanism between mobile device and content server to receive the service which the user for the content chooses by mobile device safely. The proposed mechanism uses the random number which user creates and certification token for preventing illegal user who uses other's service that already paid. Also the proposed protocol encrypts the delicate data like user's information or profile using shared-key between java card attached on user's mobile device and grant sewer and then prevents reply attack which happens often in wireless section and man-in-the-middle attack by MAC.

A System of Mobile Device Information Processing (모바일 단말 정보 처리 시스템)

  • Bang, Jin-Suk;Lee, Seung-Yun;Lee, Kang-Chan;Lee, Won-Suk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2135-2142
    • /
    • 2007
  • Mobile device will be able to use the various contents from the advancement of the wireless Internet and mobile device manufacture technique. Each devices is HTTP headers about under using provides device information to contents provider in the provide the contents. However, There is no standard for device information provided, so interoperability problems, because external contents using mobile phone companies to provide the device information in a different way. International Organization for Standard OMA UAProf about under using it solved interoperability problems from outside. However, in using the UAProf can not provide for the complete device information, because MMS support information, smart card support, information and support for external storage is not specified. Thus, In this paper, we designed UAProf in base which provides the contents which has become optimize to the mobile device of domestic environment the mobile device description language which expresses device information which is necessar, and it used to design and implementation of the Contents Adaptation System.