• Title/Summary/Keyword: Wireless internal

Search Result 189, Processing Time 0.033 seconds

Adjacent Matrix-based Hole Coverage Discovery Technique for Sensor Networks

  • Wu, Mary
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.169-176
    • /
    • 2019
  • Wireless sensor networks are used to monitor and control areas in a variety of military and civilian areas such as battlefield surveillance, intrusion detection, disaster recovery, biological detection, and environmental monitoring. Since the sensor nodes are randomly placed in the area of interest, separation of the sensor network area may occur due to environmental obstacles or a sensor may not exist in some areas. Also, in the situation where the sensor node is placed in a non-relocatable place, some node may exhaust energy or physical hole of the sensor node may cause coverage hole. Coverage holes can affect the performance of the entire sensor network, such as reducing data reliability, changing network topologies, disconnecting data links, and degrading transmission load. It is possible to solve the problem that occurs in the coverage hole by finding a coverage hole in the sensor network and further arranging a new sensor node in the detected coverage hole. The existing coverage hole detection technique is based on the location of the sensor node, but it is inefficient to mount the GPS on the sensor node having limited resources, and performing other location information processing causes a lot of message transmission overhead. In this paper, we propose an Adjacent Matrix-based Hole Coverage Discovery(AMHCD) scheme based on connectivity of neighboring nodes. The method searches for whether the connectivity of the neighboring nodes constitutes a closed shape based on the adjacent matrix, and determines whether the node is an internal node or a boundary node. Therefore, the message overhead for the location information strokes does not occur and can be applied irrespective of the position information error.

Implementation of IoT System for Wireless Acquisition of Vibration and Environmental Data in Distributing Board (제진형 배전반의 진동 및 환경 데이터수집을 위한 IoT 시스템 구현)

  • Lee, Byeong-Yeong;Lee, Young-Dong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.4
    • /
    • pp.199-205
    • /
    • 2021
  • The distributing board in directly installed on the ground or the bottom surface of the building, and when vibrations such as earthquakes or external shocks occur, the possibility of damage or malfunction of electric components such as internal power devices, wiring, and protection relays increases. Recently, the need for a seismic type distributing board is increasing, and research and development of a distributing board having a vibration damping function and product launch are being conducted. In this paper, an IoT-based data collection device system capable of measuring vibration and environmental data of distributing board was designed and implemented. When vibration occurred on the distributing board, data was stored and visualized in the MySQL DB through Node-RED for monitoring and data storage using the MQTT protocol for reliable messaging transmission. The test was conducted by attaching the IoT device of the distributing board, and data was collected in real-time and monitored through Node-RED.

Development of a Customized Beacon Equipped with a Strain Gauge Sensor to Detect Deformation of Structure Displacement (구조물의 변위 변형 감지를 위한 변형률 센서를 장착한 커스터마이징 비콘 개발)

  • Kim, Junkyeong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.5
    • /
    • pp.1-7
    • /
    • 2021
  • This study attempted to detect possible collapse and fire accidents in facilities for disaster monitoring of large facilities, and to develop a customized beacon to recognize the internal situation of an IoT-based facility when a disaster occurs. In the case of data measurement using the existing strain gauge sensor, the strain gauge sensor was connected by wire to measure it, but this study changed it to wireless so that the presence and absence of structural deformation can be monitored in real time. In this process, in order to use the Wheatstone bridge, a strain sensor module that can be connected to a customized beacon was manufactured, and a system configuration was conducted to remotely check the measurement data. To verify measurement data, 10 customized beacons and 2 gateways were installed on the 15th floor of the Advanced Institue of Convergence Technology, and as a result of analysis of measurement data, it was confirmed that the strain data values were distributed between 7 and 8.

A Study on Improvement of 5G In-Building Quality using Antenna Orientation Principle (안테나 지향성 원리를 이용한 5G 건물 내 품질향상에 관한 연구)

  • Lee, Byung-Chan;Lee, Sung-Hwa;Kim, Jin-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.41-48
    • /
    • 2022
  • This study is a study that designed in-building antennas with improved orientation to improve 5G quality in buildings as 5G is stabilized and more and more traffic is expected to occur in buildings. Instead of applying the forward arrangement of antenna elements, which is the Yagi antenna propagation orientation principle, the antenna design method of vertical arrangement applied to the base station antenna was proposed, and it was confirmed through experiments that antenna orientation increased. According to the experimental results, the directivity did not increase significantly within 10m of the separation distance from the antenna, but the directivity increased by about 3dB at the distance separated by more than 10m. Considering that the wireless environment in the building has various variables such as structure of internal structure, materials such as concrete and glass, closed space, and walls, it is expected that antenna with improved orientation can expand the scope of 5G quality improvement and maintain stable communication service in the building.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

Development of a Monitoring System Based on the Cooperation of Multiple Sensors on SenWeaver Platform (센위버 플랫폼 기반의 다중센서 협업을 이용한 모니터링 시스템 개발)

  • Kwon, Cha-Uk;Cha, Kyung-Ae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.91-98
    • /
    • 2010
  • This study proposes a monitoring system that effectively watches surroundings by cooperating the various sensor information including image information on a sensor network system. The monitoring system proposed in this paper is developed to watch certain intruders to the internal spaces through the interested region for exceptional time by installing cameras, PIR(Pyroelectric Infrared Ray) sensor and body detectors in such interested regions. Moreover the monitering system is implemented based on the SenWeaver plateform which is a integrated development tools for building wireless sensor network system. In the results of the test that was applied to a practically experimental environment by implementing some interfaces for the proposed system, it was considered that it is possible to watch surroundings effectively using the image information obtained from cameras and multiple sensor information acquisited from sensor nodes.

An Empirical Study on the Influencing Factors of Perceived Job Performance in the Context of Enterprise Mobile Applications (업무성과에 영향을 주는 업무용 모바일 어플리케이션의 주요 요인에 관한 연구)

  • Chung, Sunghun;Kim, Kimin
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.31-50
    • /
    • 2014
  • The ubiquitous accessibility of information through mobile devices has led to an increased mobility of workers from their fixed workplaces. Market researchers estimate that by 2016, 350 million workers will be using their smartphones for business purposes, and the use of smartphones will offer new business benefits. Enterprises are now adopting mobile technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness, and cultivate their innovativeness. For these reasons, various organizational aspects concerning "mobile work" have received a great deal of recent attention. Moreover, many CIOs plan to allocate a considerable amount of their budgets mobile work environments. In particular, with the consumerization of information technology, enterprise mobile applications (EMA) have played a significant role in the explosive growth of mobile computing in the workplace, and even in improving sales for firms in this field. EMA can be defined as mobile technologies and role-based applications, as companies design them for specific roles and functions in organizations. Technically, EMA can be defined as business enterprise systems, including critical business functions that enable users to access enterprise systems via wireless mobile devices, such as smartphones or tablets. Specifically, EMA enables employees to have greater access to real-time information, and provides them with simple features and functionalities that are easy for them to complete specific tasks. While the impact of EMA on organizational workers' productivity has been given considerable attention in various literatures, relatively little research effort has been made to examine how EMA actually lead to users' job performance. In particular, we have a limited understanding of what the key antecedents are of such an EMA usage outcome. In this paper, we focus on employees' perceived job performance as the outcome of EMA use, which indicates the successful role of EMA with regard to employees' tasks. Thus, to develop a deeper understanding of the relationship among EMA, its environment, and employees' perceived job performance, we develop a comprehensive model that considers the perceived-fit between EMA and employees' tasks, satisfaction on EMA, and the organizational environment. With this model, we try to examine EMA to explain how job performance through EMA is revealed from both the task-technology fit for EMA and satisfaction on EMA, while also considering the antecedent factors for these constructs. The objectives of this study are to address the following research questions: (1) How can employees successfully manage EMA in order to enhance their perceived job performance? (2) What internal and/or external factors are important antecedents in increasing EMA users' satisfaction on MES and task-technology fit for EMA? (3) What are the impacts of organizational (e.g. organizational agility), and task-related antecedents (e.g., task mobility) on task-technology fit for EMA? (4) What are the impacts of internal (e.g., self-efficacy) and external antecedents (e.g., system reputation) for the habitual use of EMA? Based on a survey from 254 actual employees who use EMA in their workplace across industries, our results indicate that task-technology fit for EMA and satisfaction on EMA are positively associated with job performance. We also identify task mobility, organizational agility, and system accessibility that are found to be positively associated with task-technology fit for EMA. Further, we find that external factor, such as the reputation of EMA, and internal factor, such as self-efficacy for EMA that are found to be positively associated with the satisfaction of EMA. The present findings enable researchers and practitioners to understand the role of EMA, which facilitates organizational workers' efficient work processes, as well as the importance of task-technology fit for EMA. Our model provides a new set of antecedents and consequence variables for a TAM involving mobile applications. The research model also provides empirical evidence that EMA are important mobile services that positively influence individuals' performance. Our findings suggest that perceived organizational agility and task mobility do have a significant influence on task-technology fit for EMA usage through positive beliefs about EMA, that self-efficacy and system reputation can also influence individuals' satisfaction on EMA, and that these factors are important contingent factors for the impact of system satisfaction and perceived job performance. Our findings can help managers gauge the impact of EMA in terms of its contribution to job performance. Our results provide an explanation as to why many firms have recently adopted EMA for efficient business processes and productivity support. Our findings additionally suggest that the cognitive fit between task and technology can be an important requirement for the productivity support of EMA. Further, our study findings can help managers in formulating their strategies and building organizational culture that can affect employees perceived job performance. Managers, thus, can tailor their dependence on EMA as high or low, depending on their task's characteristics, to maximize the job performance in the workplace. Overall, this study strengthens our knowledge regarding the impact of mobile applications in organizational contexts, technology acceptance and the role of task characteristics. To conclude, we hope that our research inspires future studies exploring digital productivity in the workplace and/or taking the role of EMA into account for employee job performance.

ARP Spoofing attack scenarios and countermeasures using CoAP in IoT environment (IoT 환경에서의 CoAP을 이용한 ARP Spoofing 공격 시나리오 및 대응방안)

  • Seo, Cho-Rong;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.39-44
    • /
    • 2016
  • Due to the dazzling development of IT in this IT-oriented era, information delivering technology among objects, between objects and humans, and among humans has been actively performed. As information delivery technology has been actively performed, IoT became closely related to our daily lives and ubiquitous at any time and place. Therefore, IoT has become a part of our daily lives. CoAp, a web-based protocol, is mostly used in IoT environment. CoAp protocol is mostly used in the network where transmission speed is low along with the huge loss. Therefore, it is mostly used in IoT environment. However, there is a weakness on IoT that it is weak in security. If security issue occurs in IoT environment, there is a possibility for secret information of individuals or companies to be disclosed. If attackers infect the targeted device, and infected device accesses to the wireless frequently used in public areas, the relevant device sends arp spoofing to other devices in the network. Afterward, infected devices receive the packet sent by other devices in the network after occupying the packet flow in the internal network and send them to the designated hacker's server. This study suggests counter-attacks on this issues and a method of coping with them.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Development of Performance Verification Method for Components of IoT-based Industrial Valve Safety Management System (IoT 기반 산업용 밸브 안전관리 시스템 구성장치의 성능검증 방안 개발)

  • Kim, Jae-Ok;Lyu, Geun-Jun;Lee, Kyung-Sik;Kim, Jung-Hoon
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.5
    • /
    • pp.10-19
    • /
    • 2020
  • Valve leak accidents in petrochemistry plants and gas utilities cause human and property damage. The main reason why happen gas inhalation, poisoning, fire and explosion accidents is gas valve leakage. To prevent gas leakage, inspectors check the facilities in the field. And they are at risk of gas leak accidents. So we applied IoT-based risk assessment, monitoring and automatic control system. It can detect both internal and external gas leakage, do real-time monitoring of industrial valve in the plant by using hybrid sensor. As the new safety management system for industrial valve is developed, it needs method to evaluate device performance and environmental components for the system. This study is about development of method to verify performance of the explosion-proofed hybrid sensing system include gas detector and optical fiber sensor supporting wire and wireless communication.