• Title/Summary/Keyword: internet environment

Search Result 4,976, Processing Time 0.039 seconds

Blockchain and Physically Unclonable Functions Based Mutual Authentication Protocol in Remote Surgery within Tactile Internet Environment

  • Hidar, Tarik;Abou el kalam, Anas;Benhadou, Siham;Kherchttou, Yassine
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.15-22
    • /
    • 2022
  • The Tactile Internet technology is considered as the evolution of the internet of things. It will enable real time applications in all fields like remote surgery. It requires extra low latency which must not exceed 1ms, high availability, reliability and strong security system. Since it appearance in 2014, tremendous efforts have been made to ensure authentication between sensors, actuators and servers to secure many applications such as remote surgery. This human to machine relationship is very critical due to its dependence of the human live, the communication between the surgeon who performs the remote surgery and the robot arms, as a tactile internet actor, should be fully and end to end protected during the surgery. Thus, a secure mutual user authentication framework has to be implemented in order to ensure security without influencing latency. The existing methods of authentication require server to stock and exchange data between the tactile internet entities, which does not only make the proposed systems vulnerables to the SPOF (Single Point of Failure), but also impact negatively on the latency time. To address these issues, we propose a lightweight authentication protocol for remote surgery in a Tactile Internet environment, which is composed of a decentralized blockchain and physically unclonable functions. Finally, performances evaluation illustrate that our proposed solution ensures security, latency and reliability.

A Study of the Determinants on the Housewives요 Internet Usage (주부의 인터넷활용 결정요인에 관한 연구)

  • 김세라;이기영
    • Journal of Family Resource Management and Policy Review
    • /
    • v.5 no.2
    • /
    • pp.45-57
    • /
    • 2001
  • The object of this study is to understand the determinants of housewives’internet usage, examining empirically their internet usage motivation and activity, and to find the way to promote housewives’internet usage. The major findings of this study can be summarized as follows; 1) the housewives’internet usage motivation was composed of the motivation to make a good use of leisure by internet, self-developmental, practical, and children educational motivations. The mean score of self-developmental motivation was the highest in the internet users and that of child educational motivation was the highest in the non-internet users. 2) the significant variables which affected on the internee usage of housewives were age, internet related housing environment the perception of internet usefulness, internet usage of husband, the motivation to make a good use of leisure by internet, and children educational motivation.

  • PDF

The Effect of Social Support on Service Quality of Youth Training Facility Employees in Internet of Thing Environment: The Mediating Effect of Empowerment (사물인터넷 환경에서 청소년수련시설 종사자의 사회적 지지가 서비스 질에 미치는 영향: 임파워먼트의 매개효과 중심으로)

  • Youn, Ki-Hyok;Lee, Jin-Yoel
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.31-38
    • /
    • 2020
  • This study was intended to verify the parameter effects of empowerment in the effect of social support of the employees of youth training facilities on the quality of service. The purpose of this study was to provide basic data for improving the service quality of youth training facility workers. As a result of this study, first, social support and empowerment had a positive effect on service quality. Second, the partial mediating effect of empowerment can be confirmed. Based on the results of this study, the following suggestions were made. First, for the social support of the employees, the middle managers and facility managers of youth training facilities should use the Internet environment such as the Internet and smart phones. Second, in order to improve empowerment, support for information related to work, material support related to compensation, and evaluation support related to business processing should be provided. Third, to improve the empowerment of workers, it is necessary to augmented reality(AR), virtual reality(VR), and flip learning program using the Internet of Things environment.

Rate Control Scheme for Improving Quality of Experience in the CoAP-based Streaming Environment (CoAP 기반의 스트리밍 환경에서 사용자 체감품질 향상을 위한 전송량 조절 기법)

  • Kang, Hyunsoo;Park, Jiwoo;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.44 no.12
    • /
    • pp.1296-1306
    • /
    • 2017
  • Recently, as the number of Internet of Things users has increased, IETF (Internet Engineering Task Force) has released the CoAP (Constrained Application Protocol). So Internet of Things have been researched actively. However, existing studies are difficult to adapt to streaming service due to low transmission rate that result from buffer underflow. In other words, one block is transmitted one block to client's one request according to the internet environment of limited resources. The proposed scheme adaptively adjusts the rate of CON(Confirmable) message among all messages for predicting the exact network condition. Based on this, the number of blocks is determined by using buffer occupancy rate and content download rate. Therefore it improves the quality of user experience by mitigating playback interruption. Experimental results show that the proposed scheme solves the buffer underflow problem in Internet of Things streaming environment by controlling transmission rate according to the network condition.

The Design and Implementation of XML Digital Signature System Using Java Card (Java Card를 이용한 XML 전자서명 시스템 설계 및 구현)

  • 장창복;김동혁;최의인
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.303-308
    • /
    • 2004
  • As developed wireless internet and performance of wireless terminal, E-commerce of wire internet move to wireless internet. This I-commerce in wireless internet environment called M-Commerce, recognized user authentication and data security as very important technology such as E-commerce in environment of wire internet. So authentication technology such as WPKI and Hermes system and XML digital signature was studied. But WPKI is difficulty to implement system, if authentication system that consisted in WPKI environment was heterogeneous. And Hermes system is not interoperate to XML digital signature system. So, our paper suggested XML digital signature system based java card to interoperate among the digital signature system, to apply XML digital signature used in wire internet. Our system offer XML digital signature in wireless internet, can interoperate among the XML digital signature systems.

  • PDF

Design of Improved Authentication Protocol for Sensor Networks in IoT Environment (사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계)

  • Kim, Deuk-Hun;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.467-478
    • /
    • 2015
  • Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. Especially sensor network area of the device is an increased using and diversified for a low specification devices because of characteristic of the Internet of Things. However, there is difficulty in directly applying the security technologies such as the current authentication technologies to a low specification device, so also increased security threats. Therefore, authentication protocol between entities on the sensor network communication in Internet of Things has being studied. In 2014, Porambage et al. suggested elliptic curve cryptography algorithm based on a sensor network authentication protocol for advance security of Internet of Things environment, but it is vulnerability exists. Accordingly, in this paper, we analyze the vulnerability in elliptic curve cryptography algorithm based on authentication protocol proposed by Porambage et al. and propose an improved authentication protocol for sensor networks in Internet of Things environment.

CoAP/6LoWPAN-based Smart Home Network system using DTLS (DTLS 보안기술이 적용된 CoAP/6LoWPAN 기반의 스마트 홈네트워크 시스템)

  • Kim, Yeon-Su;Kim, Ki-Tae;Lee, Bo-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.53-61
    • /
    • 2018
  • Recently, technologies related to the Internet of Things have developed rapidly and research on mobile environment home network systems is actively in progress. The Internet Engineering Task Force (IETF) Working Group proposed the CoAP/6LoWPAN technology as a suitable protocol for internetworking IoT devices with the Internet in a limited environment and adopting it as a standard. However, the existing home network systems hardly include security protocols. IETF recommends DTLS(Datagram Transport Layer Security) on UDP as security protocol suitable for IoT environments. In this paper, smart home network system based on CoAP/6LoWPAN by using DTLS is implemented in mobile environments. The data transfer time is measured according to each procedure of the DTLS protocol and the need to improve DTLS protocol is suggested.

Research of Security Methods based on Mobile Internet (모바일 인터넷 상의 보안 기법 연구)

  • 이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.296-300
    • /
    • 2004
  • In this paper, we discuss about mobile Internet security. The past few years have seen unprecedented growth in the number of wireless user, applications, and network access technologies. Wireless Internet is similar to wired internet, but it has some constrained wireless environment. So many internet technologies for wireless are developing now

  • PDF

Design of an Secure Internet Auction System (안전한 인터넷 경매시스템 설계)

  • 박진호;안성진
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.69-76
    • /
    • 2002
  • Becoming Internet is public, various services using Web are created. Internet auction is not exceptional but make rapid progress. Internet auction system damages user because its security is not perfect and faultless. In this paper, we propose a design of internet auction system providing more secure and convenient environment.

  • PDF

Possibility and Challenge of Using Internet for International Exchange - Focused on Korean Students' Views -

  • Shin-hye, Heo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.55-62
    • /
    • 2024
  • International exchange implementing the Internet began inevitably due to the pandemic, but it provided Digital Nomads with new experiences in their lives using the Internet. This study the possibility and challenge of international exchange implementing the Internet identified. To this end, we explored its strengths and weaknesses through interviews and descriptions of students who participated in international exchange. As a result, we identified that students were positive in the diverse aspects of communication tools and ways, whereas they were negative because they felt difficulties in the physical environment, inaccessible physical conditions especially. They were also negative in the emotional exchange, an ice-breaking which needed much more time than offline exchange. Therefore, we identified in the case of designing or conducting student activities implementing the Internet, including international exchange, the possibility of activities implementing the Internet could be much more extended if their developer various programs considered in the introduction step.