• 제목/요약/키워드: device access

검색결과 951건 처리시간 0.032초

Smart Device의 MAC Address를 이용한 건물 출입통제 시스템 (Building Access Control System Using MAC Address of Smart Device)

  • 정용진;이종성;오창헌
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.873-875
    • /
    • 2014
  • 본 논문에서는 스마트 디바이스의 MAC address를 이용한 bluetooth 기반의 건물 출입통제 시스템을 제안한다. 제안하는 출입통제 시스템은 서버에 등록된 MAC address와 출입자의 스마트 디바이스 MAC address를 비교하여 일치 여부에 따라 출입통제가 이루어진다. 실험 결과, 스마트 디바이스와 bluetooth 모듈의 bluetooth 페어링만으로 출입문의 통제가 가능하기 때문에 별도의 출입 도구가 필요하지 않고, 출입 승인을 위한 행동이 생략됨에 따라 기존 출입통제 시스템에 비해 출입 승인절차가 간소화되어 편의성을 향상시킬 수 있다.

  • PDF

IoT 환경에서의 지역 Gateway 기반 데이터 전송에 관한 연구 (A Study on Region Gateway-based Data Transmission in IoT Environment)

  • 조경우;오창헌
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 추계학술대회
    • /
    • pp.531-532
    • /
    • 2017
  • oneM2M의 domain은 Device, Network, Application domain으로 구분되며, 다양한 device에서 생성되는 데이터를 IoT/M2M gateway를 통해 취합, Core/Access Network를 거쳐 적합한 IoT/M2M Infrastructure에 전달한다. 그러나 device가 동일한 지역 내에 위치하는 Infrastructure에 데이터를 전달 할 경우에도 Core/Access Network에 접근이 필요하다. 본 논문에서는 oneM2M domain에 지역 network domain의 개념을 추가하여 데이터의 지역정보를 판단 후 전송, 불필요한 Core/Access Network의 접근을 방지하는 지역 gateway 기반 데이터 전송방법을 제안한다.

  • PDF

Debug Port Protection Mechanism for Secure Embedded Devices

  • Park, Keun-Young;Yoo, Sang-Guun;Kim, Ju-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제12권2호
    • /
    • pp.240-253
    • /
    • 2012
  • In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentication token includes user access information which represents the user's permitted level of access and the maximum number of authentications allowed using the token. The device authenticates the user with the token and grants limited access based on the user's access level. The proposed approach improves the degree of overall security by removing the need to expose the device's secret key. Availability is also enhanced by not requiring server connection after the initial token generation and further by supporting flexible token transfer among predefined device groups. Low implementation cost is another benefit of the proposed approach, enabling it to be adopted to a wide range of environments in demand of debug port protection.

혈액투석 혈관통로 소독에 있어 클로르헥시딘의 효과 (The Efficacy of Chlorhexidine in Hemodialysis Vascular Access Device Disinfection)

  • 양지현;유영미;유민경;문성미;박수진
    • 한국의료질향상학회지
    • /
    • 제23권1호
    • /
    • pp.55-67
    • /
    • 2017
  • Purpose:The purpose of this study was to apply the disinfection method using chlorhexidine in practice on disinfection of vascular access for hemodialysis. Methods: This study was designed as a randomized controlled trial for examining effectiveness on infection of the vascular access device for hemodialysis when using chlorhexidine and betadine/alcohol. One-hundred-thirty study participants were separated into two groups randomly. Infection signs of the vascular access device for hemodialysis were observed and recorded before disinfection on vascular access device. Result: Before the study, there was no difference between the experimental group (chlorhexidine group) and the control group (betadine/alcohol group) in general characteristics and hematological index. Incidence of infection rate of chlorhexidine group was 0 percent and the betadine/alcohol group was 1.5 percent. There was no significant difference between the two groups. Conclusion: This study examined the effectiveness of prevention of infection with the disinfection method using chlorhexidine and betadine/alcohol. The disinfection method using chlorhexidine is considered an effective and alternative method of betadine/alcohol.

IoT 단말 인증 시스템 구현 (Implement IoT device Authentication System)

  • 강동연;전지수;한성화
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 추계학술대회
    • /
    • pp.344-345
    • /
    • 2022
  • 스마트 팜이나 스마트 해양, 스마트 홈, 스마트 에너지 등 많은 분야에서 IoT 기술을 사용하고 있다. 이러한 IoT 서비스에는 다양한 IoT 단말이 이용된다. 여기서 IoT 단말은 물리적으로 다양한 장소에 설치된다. 악의적 공격자는 인가되지 않은 IoT device를 사용하여 IoT 서비스 접근하여, 인가되지 않은 중요 정보에 접근 후 이를 변조할 수 있다. 본 연구에서는 이러한 문제점을 개선하기 위하여 IoT 서비스에서 사용하는 IoT device의 단말 인증 시스템을 제안한다. 본 연구에서 제안하는 IoT device 인증 시스템은 IoT device에 탑재된 인증 모듈과 IoT 서버의 인증 모듈로 구성된다. 본 연구에서 제안하는 IoT device 인증 기능을 사용하면, 인가된 IoT Device만 서비스에 접근할 수 있으며 인가되지 않은 IoT device의 접근을 차단할 수 있다. 본 연구는 기본적인 IoT device 인증 메커니즘만을 제안하므로, 보안 강도에 따른 추가적인 IoT device 인증 기능의 추가 연구가 필요하다.

  • PDF

무선망 설계/최적화 시뮬레이션 툴 의 다양한 신뢰도 향상 기법 (Various Techniques for Improving of the Reliability of the Wireless Network Design/Optimization Simulation Tool)

  • 전현철;류재현;박상진;박주열;김정철
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2006년도 하계학술대회
    • /
    • pp.39-42
    • /
    • 2006
  • There are various analysis functions(including prediction of path loss, analyzing of capacity and coverage, etc.) of simulation tool to design and optimize the mobile communication network. Its reliability absolutely effects the performance of mobile communication network. Especially as the wireless network highly advancing focused on data service, it more needs to research and develop on the standard establishment of reliability of the simulation tool. Also it is important the systematic research how to improve the reliability of simulation tool. In this paper, to give the concrete process and skill about how to improve reliability, we define the kinds of reliability at first. And then we explain the comparison results between real field measurement data and theoretic simulation data.

  • PDF

Grant-Free Random Access in Multicell Massive MIMO Systems with Mixed-Type Devices: Backoff Mechanism Optimizations under Delay Constraints

  • Yingying, Fang;Qi, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권1호
    • /
    • pp.185-201
    • /
    • 2023
  • Grant-free random access (GFRA) can reduce the access delay and signaling cost, and satisfy the short transmission packet and strict delay constraints requirement in internet of things (IoT). IoT is a major trend in the future, which is characterized by the variety of applications and devices. However, most existing studies on GFRA only consider a single type of device and omit the effect of access delay. In this paper, we study GFRA in multicell massive multipleinput multiple-output (MIMO) systems where different types of devices with various configurations and requirements co-exist. By introducing the backoff mechanism, each device is randomly activated according to the backoff parameter, and active devices randomly select an orthogonal pilot sequence from a predefined pilot pool. An analytical approximation of the average spectral efficiency for each type of device is derived. Based on it, we obtain the optimal backoff parameter for each type of devices under their delay constraints. It is found that the optimal backoff parameters are closely related to the device number and delay constraint. In general, devices that have larger quantity should have more backoff time before they are allowed to access. However, as the delay constraint become stricter, the required backoff time reduces gradually, and the device with larger quantity may have less backoff time than that with smaller quantity when its delay constraint is extremely strict. When the pilot length is short, the effect of delay constraints mentioned above works more obviously.

Assessing Efficiency of Handoff Techniques for Acquiring Maximum Throughput into WLAN

  • Mohsin Shaikha;Irfan Tunio;Baqir Zardari;Abdul Aziz;Ahmed Ali;Muhammad Abrar Khan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권4호
    • /
    • pp.172-178
    • /
    • 2023
  • When the mobile device moves from the coverage of one access point to the radio coverage of another access point it needs to maintain its connection with the current access point before it successfully discovers the new access point, this process is known as handoff. During handoff the acceptable delay a voice over IP application can bear is of 50ms whereas the delay on medium access control layer is high enough that goes up to 350-500ms. This research provides a suitable methodology on medium access control layer of the IEEE 802.11 network. The medium access control layer comprises of three phases, namely discovery, reauthentication and re-association. The discovery phase on medium access control layer takes up to 90% of the total handoff latency. The objective is to effectively reduce the delay for discovery phase to ensure a seamless handoff. The research proposes a scheme that reduces the handoff latency effectively by scanning channels prior to the actual handoff process starts and scans only the neighboring access points. Further, the proposed scheme enables the mobile device to scan first the channel on which it is currently operating so that the mobile device has to perform minimum number of channel switches. The results show that the mobile device finds out the new potential access point prior to the handoff execution hence the delay during discovery of a new access point is minimized effectively.

IoT 환경의 단말 인증 시스템 (Device Authentication System in IoT environment)

  • 강동연;전지수;한성화
    • 한국정보통신학회논문지
    • /
    • 제27권1호
    • /
    • pp.97-102
    • /
    • 2023
  • IoT는 전통적인 정보 서비스뿐만 아니라 다양한 분야에서 활용되고 있다. 특히 스마트 홈, 스마트 해양, 스마트 에너지나 스마트 팜 등 많은 융합 IT 분야에서 IoT 기술을 활용하고 있다. IoT 기반 정보 서비스의 서버에 대하여, 지정된 프로토콜을 사용하는 IoT 단말은 신뢰된 객체이다. 그래서 악의적 공격자는 인가되지 않은 IoT device를 사용하여 IoT 기반 정보 서비스 접근, 인가되지 않은 중요 정보에 접근 후 이를 변조하거나 외부에 유출할 수 있다. 본 연구에서는 이러한 문제점을 개선하기 위하여 IoT 기반 정보 서비스에서 사용하는 IoT 단말 인증 시스템을 제안한다. 본 연구에서 제안하는 IoT 단말 인증 시스템은 MAC address 등의 식별자 기반 인증을 적용한다. 본 연구에서 제안하는 IoT 단말 인증 기능을 사용하면, 인증된 IoT 단말만 서버에 접근할 수 있다. 본 연구는 비인가 IoT 단말의 세션을 종료하는 방식을 적용하므로, 보다 안전한 단말 인증 방식인 접근 차단에 대한 추가연구가 필요하다.

USB에 기반한 홈 제어 시스템 개발 (Development of The Home Control System Base on USB)

  • 이창구;김희선
    • 제어로봇시스템학회논문지
    • /
    • 제12권4호
    • /
    • pp.405-410
    • /
    • 2006
  • This paper presents the design of a USB home controller and a home control system that specially is focused on controlling home appliances as a part of home network systems, the implementation of the USB device access class in an OSGi service platform and a home security system as an application. Designed USB home controllers are able to control various home appliances. They can be used not only to control big home appliances like a boiler but also to control small home appliances like a toaster because they are low-cost solutions. The USB home controller supports real time control using the interrupt transfer of the USB specification. And It is easy to use by homemakers who have no technical knowledge of the system because they just plug and unplug it in a home server then it automatically joins and leaves a home control system. This technique is based on hot-plug and the USB Device Access class in an OSGi Service Platform. The USB Device Access class supports the coordination of automatic detection and attachment of the USB home controller on an OSGi Service Platform, and it downloads and installs device drivers on demand. For an application, we implemented and tested a home security system using two USB home controllers and a CDMA module.