• Title/Summary/Keyword: common industrial protocol

Search Result 24, Processing Time 0.026 seconds

A Study on Home's Emergency Monitoring System Using Embedded System (임베디드 시스템을 이용한 가택의 긴급상황 감시 시스템에 대한 연구)

  • 최재우;양승현;노방현;황희융
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.1
    • /
    • pp.60-64
    • /
    • 2004
  • In this paper, we implemented a real-time remote home monitoring system which we have ported the Linux OS and HTTP(Hypertext Transfer Protocol) web server. The GoAhead web server was ported using by ARM cross compiler. And then we used the analog to digital converter ADC0809 for sensing the vii able input signal at widely separated home. We have implemented linux device driver for ADC(Analog to Digital Convertor) and CGI-C(Common Gateway Interface - C language) application program using Client pull method for monitoring real-time changing data. The factor of monitoring is temperature, intensity of illumination and gas's existence. And this system has ability which check the status of out door and gas valve. We have designed the embedded web server system for home emergency monitoring in low cost.

  • PDF

Development of Real-time Diagnostic Monitering System and the OBD-II Protocol for Industrial CRDI Engine (산업용 CRDI 엔진을 위한 OBD-II 프로토콜 및 실시간 진단 모니터링 시스템 개발)

  • Jang, Sung-jin;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.355-358
    • /
    • 2015
  • 산업용 CRDI 엔진에서 센서의 정보를 분석하여 최적의 조건으로 엔진이 동작하도록 하기 위해 산업용 CRDI 시스템에 적합한 OBD-II 프로토콜을 설계하고 ECU의 센서 정보를 전문가 아닌 일반 사용자가 내용을 이해하기 쉽도록 사용자 중심의 진단기의 개발이 필요하다. 따라서, 본 연구에서는 자동차 고장진단 신호 및 센서 출력 신호를 유선시스템과 무선 시스템인 블루투스 모듈을 이용하여 실시간 통신이 제공 될 수 있는 OBD-II 진단기 S/W를 설계 및 구현하였다. 엔진이상으로 인한 사고의 예방이 가능하고, 최적의 조건으로 엔진이 동작하므로 과도한 배기가스 배출이나 불완전 연소가스 배출과 같은 대기환경오염을 예방할 수 있다.

  • PDF

Cloud-IP based Broadcasting Media Production Technology (클라우드-IP 기반의 방송 미디어 제작 기술 동향)

  • H.J., Oh;J.Y., Lee;S.C., Kim;D.J., Choi
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.6
    • /
    • pp.64-73
    • /
    • 2022
  • This document describes the technologies related to internet protocol (IP)-based media production systems. As high-capacity, high-quality data transmission increases, broadcast production platforms are shifting to IP. The IP-based production system uses the network by sharing resources and is easy to control centrally. It also facilitates software-based cloud production. A cloud IP-based media production platform can work regardless of dedicated hardware and can easily collaborate. Associations and industrial groups have created common standards related to production, and manufacturers are developing solutions with their technologies based on their product competitiveness. This study investigates the open standard technologies used for IP-based media production and technology trends in the ProAV industry and describes the production in the cloud environment and cloud AI-based production technology trends.

Effect of the Sheath Layer Ground of Telecommunication Cable to Induced Voltage Measurement (통신 케이블 쉬스 층 접지가 전력선 전자유도 전압 측정에 미치는 영향)

  • Lee, Sangmu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.713-719
    • /
    • 2015
  • The change in induced voltage according to the relationship of ground connection between the aluminum sheath layer and a conductor pair in a general telecommunication cable is analyzed. When a measurement is practiced under the condition of separated sheath grounds with an averaged ground resistance of $42.6{\Omega}$, the induced voltage decreases 10 % to the induced voltage without sheath grounds. The induced voltage decreases approximately 50 % in the case of a one-sided common ground and decreases by more than 90 % in the case of a both-sided common ground. This experimental result is similar to the values calculated using the methods of the ITU Directives. In addition, according to a comparison analysis utilizing this ITU method, the measurement error range will be below 10 % in the state of ground resistance of central office less than $10{\Omega}$ and for the terminal side with $100{\Omega}$ less or more.

A Study On Performance Evaluation of Cryptographic Module and Security Functional Requirements of Secure UAV (보안 UAV를 위한 암호모듈의 성능평가와 보안성 평가 방법에 대한 연구)

  • Kim, Yongdae;Kim, Deokjin;Yi, Eunkyoung;Lee, Sangwook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.737-750
    • /
    • 2022
  • The demands of Unmanned Aerial Vehicles (UAVs) are growing very rapidly with the era of the 4th industrial revolution. As the technology of the UAV improved with the development of artificial intelligence and semiconductor technology, it began to be used in various civilian fields such as hobbies, bridge inspections, etc from being used for special purposes such as military use. MAVLink (Macro Air Vehicle Link), which started as an open source project, is the most widely used communication protocol between UAV and ground control station. However, MAVLink does not include any security features such as encryption/decryption mechanism, so it is vulnerable to various security threats. Therefore, in this study, the block cipher is implemented in UAV to ensure confidentiality, and the results of the encryption and decryption performance evaluation in the UAV according to various implementation methods are analyzed. In addition, we proposed the security requirements in accordance with Common Criteria, which is an international recognized ISO standard.

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

The Communication protocol proposal at Ad-hoc for Water-Treatment (수처리 계측제어망 Ad-hoc 적용시 데이터 신뢰성 확보를 위한 통신 프로토콜 제안)

  • Yu, Chool;Seo, Gang do;Choi, Hong yeol;Hong, Sung taek;Ji, Yu chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.984-987
    • /
    • 2013
  • In concept, such as the backup of wired network and disaster prevention network of water treatment measurement and control system, reliability and security of high level of sending and receiving data between the nodes must be ensured in Ad-hoc network construction. Rather than apply the common communication protocols of Ad-hoc network construction during the FA network of closed water treatment facility with the facility of a certain scale is concentrated contrast, and high characteristics of the water treatment system infrastructure, public facilities We have developed a specific protocol another that applies the OTP of communication frame of process control commands and H-ARQ with ZRP by applying the flexibility to time constraints such as precision industrial plants to ensure the safety and property of facility operation.

  • PDF

An OS Platform Independent Architecture of Web-based Teleoperation for mobile robot

  • Ko, Deok-Hyeon;Lee, Soon-Geul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.346-349
    • /
    • 2004
  • The teleoperation system applies all of the industrial fields due to the development of the network infrastructure. It is one of the indispensable elements for controlling the robot at a remote sight and monitoring the limit or unknown environment. The common teleoperation robot system is what has the visual module to supply the network system and realistic UI to the existed robot system. Therefore, remarked that the fusion between modules and transmission of visual data the remarked the important element to improve the robot application in the various environments. Delay of development time by robot platform and noneffective communication among developers are also problem to approach. In this paper we propose the independent teleoperation system. The main application language is JAVA in this system, which is applied JAVA API like JNI and JMF to construct the effective teleoperation system. The system has the both side communication system between sever and client as a basic structure. The visual data that is attached the robot at a remote sight is captured by JMF API and then is transmitted to the web browser called client by RTR protocol. JNI is used to connect between JAVA and the lower part application (sensor fusion, motion control.) of the robot programmed by various Native languages. The proposed system is the application that can perform the elements, for instance transmission of visual data, the fusion of various native application modules and the effective network communication, with any platform.

  • PDF

Design and Implementation of Integrated Ethernet Communication System for FA (FA를 위한 통합형 이더넷 통신 시스템 설계 및 구현)

  • Kim, Bae-Hyun;Moon, Tae-Hyun;Kwon, Moon-Taek
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.1-8
    • /
    • 2007
  • Currently, the needs of open standard and integrated network, and also applications of Ethernet network based system are increasing. By applying and expanding TCP/IP based network technology from high to low control level, factory automation application has been implemented, and thus integrated factory automation system has been accomplished, which is directly interoperable between high level management program and DB system. This paper proposes a communication control device which is based on Ethernet/IP standard system for factory automation. The proposed system is workable in the environment of a network system, which is based on CIP standard interface technology. The proposed system can also contribute to improve data communication characteristics.

  • PDF