• Title/Summary/Keyword: Wireless Internet Device

Search Result 334, Processing Time 0.024 seconds

Design and Implementation of Ubiquitous Parking Management System using Sensor Network (센서 네트워크를 이용한 유비쿼터스 주차관리 시스템의 설계 및 구현)

  • Byun, Chang-Hee;Lee, Je-Hye;Joe, Hyun-Woo;Kim, Hyung-Shin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.6
    • /
    • pp.388-396
    • /
    • 2007
  • In this paper, a ubiquitous parking management system(UPMS) using sensor network is proposed. Ubiquitous parking management system provides information on free space in the parking lot through PDA or cellular phone connected to wireless LAN. For the implementation of UPMS, we have developed sensor node, sensor application and web server application. The proposed system periodically updates parking space data and monitors in real-time according to the user's request from the personal internet device. Collected parking data are stored onto the database for further analysis. The implemented UPMS system was installed on campus parking lot using 10 sensor nodes and we successfully demonstrated its feasibility by accessing the web server from out of the campus.

Design and Implementation of a Location-Based Push-Service Platform (위치기반 푸쉬서비스 플랫폼 설계 및 구현)

  • Shim, Jae-Min;Lee, Eung-Jae;Ju, Yang-Wan;Nam, Kwang-Woo;Ryu, Keun-Ho
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.4
    • /
    • pp.47-55
    • /
    • 2009
  • As the wireless internet technology such as mobile phone, WIBRO, HSDPA develops, customized location-based services for traffic, tourism, shopping, and emergency relief has lately attracted attention. For giving customized services. we should consider dynamic characteristics of moving object which continuously change their location. In this paper, we define the context trigger type of moving object and design triggering method for processing context generated by moving object. Also we propose location-based push service platform including context trigger of moving object for supporting location-based information to user. The proposed system gathers moving object stream from the terminal based on MS-assisted or Stand-alone positioning mode of embedded GPS in terminal extract user context by user device agent, and send context information to server.

  • PDF

Measuring and Improving Method the Performance of E-Commerce Websites (전자상거래 웹사이트의 성능 측정 및 향상 방법)

  • Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.223-230
    • /
    • 2017
  • In the current wireless Internet environment, using a mobile device to quickly access a web site is closely related to measuring the performance of a website. When accessing a website, the user has a long time to access the website and has no access to the website.In this case, the performance of the web site should be improved by measuring and analyzing the performance of the connection delay due to a problem of the web site.Among the performance measurement factors of Web sites, Web page loading time is a very important factor for a successful service business in the situation where most of e-commerce business is being developed as a web-based service.An open source tool was analyzed to analyze the performance of the e-commerce web page to present problems, software optimization methods and hardware optimization methods. Applying two optimization methods to suit the environment will enable stable and e-commerce websites.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

Implementation of a Client Display Interface for Mobile Devices via Serial Transfer (모바일 직렬 전송방식의 클라이언트 디스플레이 인터페이스 구현)

  • Park Sang-Woo;Lee Yong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.522-525
    • /
    • 2006
  • Recently, mobile devices support multi-functions such as 3D game, wireless internet, moving pictures, DMB, GPS, and PMP. Bigger size of display device is indispensable to support these functions and higher speed of the interface is needed. However, conventional parallel interfaces between processor and display nodule are not competent enough for that high speed transfers. High-speed serial interface is beginning to appear as an alternative for parallel interface. The advantages of the serial interface are high bandwidth, small number of interconnections, low-power consumption, and good quality of electro-magnetic interference. In this paper, we implement serial interface and use it for a display module. LVDS is used for PHY layer and a defined packet is used for link layer. The feature of the implemented serial interface is the reduced number of interconnections with enough bandwidth.

  • PDF

BLE-OTP Authorization Mechanism for iBeacon Network Security (iBeacon 네트워크 보안을 위한 BLE-OTP 인증 메커니즘)

  • Jung, Hyunhee;Shin, Dongryeol;Cho, Kwangsu;Nam, Choonsung
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.979-989
    • /
    • 2015
  • Machine to Machine (M2M) technology has gained attention due to the fast diffusion of Internet of Things (IoT) technologies and smart devices. Most wireless network experts believe that Bluetooth Low Energy (BLE) Communications technology in an iBeacon network has amazing advantages in terms of providing communication services at a low cost in smartphone applications. Specifically, BLE does not require any pairing process during its communication phases, so it is possible to send a message to any node without incurring additional transmissions costs if they are within the BLE communication range. However, BLE does not require any security verification during communication, so it has weak security. Therefore, a security authorization process would be necessary to obtain customer confidence. To provide security functions for iBeacon, we think that the iBeacon Message Encryption process and a Decryption (Authorization) process should be designed and implemented. We therefore propose the BLE message Authorization Mechanism based on a One Time Password Algorithm (BLE-OTP). The effectiveness of our mechanism is evaluated by conducting a performance test on an attendance system based on BLE-OTP.

Design of Tourist Information System based on the Current Location using Merged Reality (MR을 이용한 현재 위치 기반 관광 안내 시스템 설계)

  • Cho, Kyoung-Woo;Jeon, Min-Ho;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.843-845
    • /
    • 2016
  • Concomitant with development of AR(Augmented Reality) and VR(Virtual Reality), interest in location based games and augmented reality have increased and various services have been developed. Due to this, AR, VR, MR(Merged Reality) techniques are considered one of fourth industrial revolution techniques. Oculus Rift which is representative of VR technology, and HTC VIVE need separate controllers, and don't offer service such as receiving external video information when users are using devices. In the case of project Alloy, which is a MR device of Intel, this has advantages such as controlling devices through hand signals and facial expressions, and receiving external video information. In this paper, we propose tourist guide system based on current position using MR. This system makes economical tour possible by arranging tourist attraction information which is from current position of tourists in correct places through external video information using MR, location determination using GPS, tourism information search using wireless internet.

  • PDF

Space-Efficient Compressed-Column Management for IoT Collection Servers (IoT 수집 서버를 위한 공간효율적 압축-칼럼 관리)

  • Byun, Siwoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.1
    • /
    • pp.179-187
    • /
    • 2019
  • With the recent development of small computing devices, IoT sensor network can be widely deployed and is now readily available with sensing, calculation and communi-cation functions at low cost. Sensor data management is a major component of the Internet of Things environment. The huge volume of data produced and transmitted from sensing devices can provide a lot of useful information but is often considered the next big data for businesses. New column-wise compression technology is mounted to the large data server because of its superior space efficiency. Since sensor nodes have narrow bandwidth and fault-prone wireless channels, sensor-based storage systems are subject to incomplete data services. In this study, we will bring forth a short overview through providing an analysis on IoT sensor networks, and will propose a new storage management scheme for IoT data. Our management scheme is based on RAID storage model using column-wise segmentation and compression to improve space efficiency without sacrificing I/O performance. We conclude that proposed storage control scheme outperforms the previous RAID control by computer performance simulation.

Implementation of Smart Shoes for Dementia Patients using Embedded Board and Low Power Wide Area Technology (저전력장거리 기술과 임베디드 보드를 이용한 치매 돌봄 스마트 신발 구현)

  • Lee, Sung-Jin;Choi, Jun-Hyeong;Seo, Chang-Sung;Park, Byung-Kwon;Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.100-106
    • /
    • 2020
  • In this paper smart shoes for dementia care using embedded boards and Low Power Wide Area technology and their application software are implemented. The communication board composed of Cortex-M3 board and LoRa module is embedded into groove made in outsole of smart shoes. Including the mold, the shoe outsole was manufactured by hand. By using application software and embedded board, caregiver can track the position of dementia patient using GPS and LoRa network. The location tracking and data transmission operations of smart shoes have been successfully verified in the outdoor environment. The smart shoes of this paper are applicable to a safety device to prevent the disappearance of demented patients through results of experiments and if bigdata is collected and analyzed by deep-learning, it may be helpful to analyze the predictive path of dementia patients or the pattern of dementia.

A Research on Effective Wi-Fi Easy Connect Protocol Improvement Method Applicable to Wired and Wireless Environments (유·무선 환경에 적용 가능한 효율적인 Wi-Fi Easy Connect 프로토콜 개선방안 연구)

  • Ho-jei Yu;Chan-hee Kim;Sung-sik Im;Seo-yeon Kim;Dong-woo Kim;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.45-54
    • /
    • 2023
  • Recently, with the development of the Internet of Things, research on protocols that can easily connect devices without a UI to the network has been steadily conducted. To this end, the Wi-Fi Alliance announced Wi-Fi Easy Connect, which can connect to a network using a QR code. However, since Wi-Fi Easy Connect requires a large amount of computation for safety, it is difficult to apply to low-power and miniaturized IoT devices. In addition, Wi-Fi Easy Connect considering scalability is designed to operate in a wired environment, but problems such as duplicate encryption occur because it does not consider a security environment like TLS. Therefore, in this paper, we analyze the Wi-Fi Easy Connect protocol and propose a protocol that can operate efficiently in the TLS environment. It was confirmed that the proposed protocol satisfies the existing security requirements and at the same time reduces about 67% of ECC scalar multiplication operations with a large amount of computation.