• Title/Summary/Keyword: Wireless machine

Search Result 242, Processing Time 0.026 seconds

Enhancing the Reliability of Wi-Fi Network Using Evil Twin AP Detection Method Based on Machine Learning

  • Seo, Jeonghoon;Cho, Chaeho;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.541-556
    • /
    • 2020
  • Wireless networks have become integral to society as they provide mobility and scalability advantages. However, their disadvantage is that they cannot control the media, which makes them vulnerable to various types of attacks. One example of such attacks is the evil twin access point (AP) attack, in which an authorized AP is impersonated by mimicking its service set identifier (SSID) and media access control (MAC) address. Evil twin APs are a major source of deception in wireless networks, facilitating message forgery and eavesdropping. Hence, it is necessary to detect them rapidly. To this end, numerous methods using clock skew have been proposed for evil twin AP detection. However, clock skew is difficult to calculate precisely because wireless networks are vulnerable to noise. This paper proposes an evil twin AP detection method that uses a multiple-feature-based machine learning classification algorithm. The features used in the proposed method are clock skew, channel, received signal strength, and duration. The results of experiments conducted indicate that the proposed method has an evil twin AP detection accuracy of 100% using the random forest algorithm.

Ubiquitous-Based Mobile Control and Monitoring of CNC Machines for Development of u-Machine

  • Kim Dong-Hoon;Song Jun-Yeob
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.455-466
    • /
    • 2006
  • This study was an attempt to control and monitor Computerized Numerical Controller (CNC) machines anywhere and anytime for the development of a ubiquitous machine (u-machine). With a Personal Digital Assistant (PDA) phone, the machine status and machining data of CNC machines can be monitored in wired and wireless environments, including the environments of IMT2000 and Wireless LAN. Moreover, CNC machines can be controlled anywhere and anytime. The concept of the anywhere-anytime controlling and monitoring of a manufacturing system was implemented in this study for the purpose of u-manufacturing and u-machines. In this concept, the communication between the CNC controller and the PDA phone was successfully performed anywhere and anytime for the real-time monitoring and control of CNC machines. In addition, the interface between the CNC controller and the developed application module was implemented by Object linking and embedding for Process Control (OPC) and shared CNC memory. For communication, the design of a server contents module within the target CNC was based on a TCP/IP. Furthermore, the client contents module within the PDA phone was designed with the aid of embedded c++ programming for mobile communication. For the interface, the monitoring data, such as the machine status, the machine running state, the name of the Numerical Control (NC) program, the alarm and the position of the stage axes, were acquired in real time from real machines with the aid of the OPC method and by sharing the CNC memory. The control data, such as the start, hold, emergency stop, reserved start and reserved stop, were also applied to the CNC domain of the real machine. CNC machines can therefore be controlled and monitored in real time, anywhere and anytime. Moreover, prompt notification from CNC machines to mobile phones, including cellular phones and PDA phones, can be automatically realized in emergencies.

Estimating Indoor Radio Environment Maps with Mobile Robots and Machine Learning

  • Taewoong Hwang;Mario R. Camana Acosta;Carla E. Garcia Moreta;Insoo Koo
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.92-100
    • /
    • 2023
  • Wireless communication technology is becoming increasingly prevalent in smart factories, but the rise in the number of wireless devices can lead to interference in the ISM band and obstacles like metal blocks within the factory can weaken communication signals, creating radio shadow areas that impede information exchange. Consequently, accurately determining the radio communication coverage range is crucial. To address this issue, a Radio Environment Map (REM) can be used to provide information about the radio environment in a specific area. In this paper, a technique for estimating an indoor REM usinga mobile robot and machine learning methods is introduced. The mobile robot first collects and processes data, including the Received Signal Strength Indicator (RSSI) and location estimation. This data is then used to implement the REM through machine learning regression algorithms such as Extra Tree Regressor, Random Forest Regressor, and Decision Tree Regressor. Furthermore, the numerical and visual performance of REM for each model can be assessed in terms of R2 and Root Mean Square Error (RMSE).

Development of a Wireless Control System for Rice Transplanter of Walking Type (보행(步行) 이앙기(移秧機)를 위(爲)한 무선자동제어(無線自動制御) 시스템의 개발(開發)(I))

  • Kim, C.S.;Choi, K.H.;Kim, S.T.;Min, Y.B.
    • Journal of Biosystems Engineering
    • /
    • v.17 no.1
    • /
    • pp.45-54
    • /
    • 1992
  • A wireless control system was designed and constructed to control the rice transplanter of walking type with remote control. VHF(very high freqency) was sent from wireless transmitter to wireless reciever by usig 6 channels to control main clutch, steering clutch, plant lever and throttle lever within 200 meter distance between remote control and rice transplanter. The rice transplanter with wireless control system showed good performance for accuracy of travel speed, traveling mobility and turning diameter in the concrete, paddy and dry field. It is concluded that the developed wireless control system could be adapted to control not only conventional rice transplanters but also most of the agricultural machine by changing some parts of the control system.

  • PDF

Multi-functional Automated Cultivation for House Melon;Development of Tele-robotic System (시설멜론용 다기능 재배생력화 시스템;원격 로봇작업 시스템 개발)

  • Im, D.H.;Kim, S.C.;Cho, S.I.;Chung, S.C.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.33 no.3
    • /
    • pp.186-195
    • /
    • 2008
  • In this paper, a prototype tele-operative system with a mobile base was developed in order to automate cultivation of house melon. A man-machine interactive hybrid decision-making system via tele-operative task interface was proposed to overcome limitations of computer image recognition. Identifying house melon including position data from the field image was critical to automate cultivation. And it was not simple especially when melon is covered partly by leaves and stems. The developed system was composed of 5 major modules: (a) main remote monitoring and task control module, (b) wireless remote image acquisition and data transmission module, (c) three-wheel mobile base mounted with a 4 dof articulated type robot manipulator (d) exchangeable modular type end tools, and (e) melon storage module. The system was operated through the graphic user interface using touch screen monitor and wireless data communication among operator, computer, and machine. Once task was selected from the task control and monitoring module, the analog signal of the color image of the field was captured and transmitted to the host computer using R.F. module by wireless. A sequence of algorithms to identify location and size of a melon was performed based on the local image processing. Laboratory experiment showed the developed prototype system showed the practical feasibility of automating various cultivating tasks of house melon.

u-Manufacturing needs M2M (Machine to Machine) for Ubiquitous Computing World

  • Cha, Suk-Keun;Song, Jun-Yeob;Choi, Jin-Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1112-1114
    • /
    • 2005
  • Core position of the M2M (Machine to Machine) is device integration fusion using an emerging wireless and next internet technologies as well as IEEE 802.x, Bluetooth, Zigbee, DMB, Wibro etc. for ubiquitous environment that is complementary with IT839 strategy from Ministry of Information & Communication. This paper define and deploy about major functional requirements of M2M devices and middleware for how to it works, worldwide M2M technology trend & activities with its current & future application in manufacturing area that is called u-Manufacturing (Ubiquitous Manufacturing).

  • PDF

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

An Exploratory Study on the Feasibility of M2M Services (사물통신(M2M) 기반 응용 서비스의 사업성에 관한 탐색적 연구)

  • Lee, Ji-Eun;Shin, Min-Soo
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.125-139
    • /
    • 2012
  • Machine-to-Machine(M2M) refers to technologies allowing both wireless and wired systems to communicate with other devices. The enhancement of wireless technologies and the reduced cost of wireless connection have contributed toward the development of M2M market. M2M market currently focuses on public sector services, As M2M can offer scalable and flexible services, M2M services are expected to be applied in various fields. However there are still some doubts on whether the demand for M2M services will be increased. This study investigates the feasibility of M2M services from the perspective of operators. Operators evaluate that M2M services will show high marketability but low profitability in general. In addition, operators predict that M2M services will show both marketability and profitability in the area of car maintenance, insurance, telematics, home and office security, shop floor maintenance, and real-time locating services for children protection. This study may offer some ideas of M2M business models based on empirical feasibility studies.

Data Alignment for Data Fusion in Wireless Multimedia Sensor Networks Based on M2M

  • Cruz, Jose Roberto Perez;Hernandez, Saul E. Pomares;Cote, Enrique Munoz De
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.229-240
    • /
    • 2012
  • Advances in MEMS and CMOS technologies have motivated the development of low cost/power sensors and wireless multimedia sensor networks (WMSN). The WMSNs were created to ubiquitously harvest multimedia content. Such networks have allowed researchers and engineers to glimpse at new Machine-to-Machine (M2M) Systems, such as remote monitoring of biosignals for telemedicine networks. These systems require the acquisition of a large number of data streams that are simultaneously generated by multiple distributed devices. This paradigm of data generation and transmission is known as event-streaming. In order to be useful to the application, the collected data requires a preprocessing called data fusion, which entails the temporal alignment task of multimedia data. A practical way to perform this task is in a centralized manner, assuming that the network nodes only function as collector entities. However, by following this scheme, a considerable amount of redundant information is transmitted to the central entity. To decrease such redundancy, data fusion must be performed in a collaborative way. In this paper, we propose a collaborative data alignment approach for event-streaming. Our approach identifies temporal relationships by translating temporal dependencies based on a timeline to causal dependencies of the media involved.