• Title/Summary/Keyword: internet of thing

Search Result 220, Processing Time 0.03 seconds

A Web-GIS based on Object Location Information Monitoring System for Ubiquitous Environment (유비쿼터스 환경을 위한 Web-GIS 기반의 객체위치정보 모니터링 시스템)

  • Kim, Taek-Cheon;Kim, Seok-Hun;Kim, Jin-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1755-1763
    • /
    • 2007
  • Specially, location information can say that is important information in this ubiquitous environment and solutions of new GIS system to utilize this are required. Examine method to improve web geography information service system because this paper uses XML and presented specific implementation result. Through internet. it planed various geography information that offer in form of service that do not receive restriction of heterogeneous system environment. Also, did thing that is easy when request service about geography information that user need and deliver fast by purpose. Supplement and to improve open-ended and XML of form normalized use and developed existent web geography information service. So that can use map service in web browser without setup of application program that buy expensive GIS software or offer in each company design and implement.

An Analysis of the Vulnerability of SSL/TLS for Secure Web Services (안전한 웹 서비스를 위한 SSL/TLS 프로토콜 취약성 분석)

  • 조한진;이재광
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1269-1284
    • /
    • 2001
  • The Secure Sockets Layer is a protocol for encryption TCP/IP traffic that provides confidentiality, authentication and data integrity. Also the SSL is intended to provide the widely applicable connection-oriented mechanism which is applicable for various application-layer, for Internet client/server communication security. SSL, designed by Netscape is supported by all clients' browsers and server supporting security services. Now the version of SSL is 3.0. The first official TLS vl.0 specification was released by IETF Transport Layer Security working group in January 1999. As the version of SSL has had upgraded, a lot of vulnerabilities were revealed. SSL and TLS generate the private key with parameters exchange method in handshake protocol, a lot of attacks may be caused on this exchange mechanism, also the same thing may be come about in record protocol. In this paper, we analyze SSL protocol, compare the difference between TLS and SSL protocol, and suggest what developers should pay attention to implementation.

  • PDF

Arduino-based power control system implemented by the MyndPlay (MyndPlay를 이용한 Arduino기반의 전원제어시스템 구현)

  • Kim, Byeongsu;Kim, Seungjin;Kim, Taehyung;Baek, Dongin;Shin, Jaehwan;An, Jeong-Eun;Jeong, Deok-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.924-926
    • /
    • 2015
  • In this paper, we use the interface, which many countries concentrates research of Brain - Computer Interface with the device and MyndPlay based on the IoT intelligent Arduino. Finally we will make the Brain - Computer Connection environment, the purpose of Brain - Computer Interface. Recognizes the EEG of a person who wearing the equipment, analyze, classify, and we did a research to design an intelligent thing to suit user's condition. In addition, we use the XBee, and Bluetooth to communicate to other devices, such as smart phone. In conclusion, this paper check users current status via brain waves, and it allows to control the power and other objects by using the EEG(Electroencephalography).

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Similarity Evaluation and Analysis of Source Code Materials for SOC System in IoT Devices (사물인터넷 디바이스의 집적회로 목적물과 소스코드의 유사성 분석 및 동일성)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.55-62
    • /
    • 2019
  • The needs for small size and low power consumption of information devices is being implemented with SOC technology that implements the program on a single chip in Internet of Thing. Copyright disputes due to piracy are increasing in semiconductor chips as well, arising from disputes in the chip implementation of the design house and chip implementation by the illegal use of the source code. However, since the final chip implementation is made in the design house, it is difficult to protect the copyright. In this paper, we deal with the analysis method for extracting similarity and the criteria for setting similarity judgment in the dispute of source code written in HDL language. Especially, the chip which is manufactured based on the same specification will be divided into the same configuration and the code type.

The Power Analysis of Smart Work Industry and Increase Plan (스마트워크 산업 경쟁력 분석 및 육성방안)

  • Yu, Seung-Yeob;Noh, Kyoo-Sung
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.187-196
    • /
    • 2011
  • This study found the power analysis and increase plan of Smart work industry out. We did the internet survey with 117 experts of Smart work and analyzed International competitive power and Smart work marketability. The results was as follows: First, Experts recognized the growth about Cloud computing industry so that they were most high. Second, The thing which the earning of Smart work industry is high appeared a Security industry, Cloud computing industry, and Mobile office industry etc sequence. Third, The Smart work industry which an international technique power level is high appeared in a Smart e-learning industry, Mobile office industry, and Security industry etc sequence. Lastly, An Smart work industry which the concentration supports in the government dimension Security industry, Cloud computing industry, Smart work user SW industry, and Smart e-learning industry etc sequence. This research products will use for there even though it prepares a concentration support industry in the government dimension an activation policy.

The Service Discovery System based on ontology for efficient SaaS in the cloud (클라우드 환경에서 효율적인 SaaS를 위한 온톨로지를 이용한 서비스 검색 시스템)

  • Hwang, Chi-gon;Yoon, Chang-Pyo;Jung, Kye-dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.678-680
    • /
    • 2013
  • Recently, A computing environment are provided that can easily be used for services based on the cloud environment. Among them, SaaS(SoftWare as a Service) is that it provides cloud users to be available by placing the cloud systems on the Internet software. But, the problem with this, problems is that user can not be utilized to not find a service registered in the cloud system. The thing to make clear the meaning and relationship between services using the ontology to solve these problems, It must be supported to be used to find the exact service the user wants. Ontology for service discovery can be used to help to find services by guessing relevance by using the function or service names entered by the user. We provide how to configure the service ontology and the search system of services using ontology.

  • PDF

A Network Time Server using CPS (GPS를 이용한 네트워크 시각 서버)

  • 황소영;유동희
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.5
    • /
    • pp.1004-1009
    • /
    • 2004
  • Precise time synchronization is a main technology in high-speed communications, parallel and distributed processing systems, Internet information industry and electronic commerce. Synchronized clocks are useful for many leasers. Often a distributed system is designed to realize some synchronized behavior, especially in real-time processing in factories, aircraft, space vehicles, and military applications. Nowadays, time synchronization has been compulsory thing as distributed processing and network operations are generalized. A network time server obtains, keeps accurate and precise time by synchronizing its local clock to standard reference time source and distributes time information through standard time synchronization protocol. This paper describes design issues and implementation of a network time server for time synchronization especially based on a clock model. The system uses GPS (Global Positioning System) as a standard reference time source and offers UTC (universal Time coordinated) through NTP (Network Time protocol). Implementation result and performance analysis are also presented.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Library Information Service on the Web 2.0 (웹 2.0 기반의 도서관 정보서비스)

  • Yang, Byeong-Hoon
    • Journal of Information Management
    • /
    • v.39 no.1
    • /
    • pp.199-220
    • /
    • 2008
  • Most people choose Internet search engine first more than the library for their information search in these days. Many users do not know library homepage's content. How to improve the users in library homepage? This study aims to suggest the direction of library homepage service in Web 2.0. For this study the author analyzed library homepage that is introducing some representative Web 2.0 and other Web 2.0 sites. AJAX, RSS, Open API, MashUp, Wikis, Blog are the main technologies in Web 2.0. Those technologies become a tool that can do user centered library homepage. But, more important thing is information production that introduce to users. Web 2.0 suggests good information transfer for users. It needs to produce the information that stimulates the library user. It means that Web 2.0 give a good opportunity for libraries as an information production.