• Title/Summary/Keyword: machine-to-machine(M2M)

Search Result 1,072, Processing Time 0.034 seconds

Development of External Device and Embedded Middleware system using Sensor fusion-based M2M Technology (센서 융합 M2M 기반 기술을 활용한 외부 디바이스 및 내장 미들웨어 시스템 개발)

  • Kim, Dae-ho;Park, Joon-hoon;Lee, Chol-u;Oh, Ryum-duck
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.109-110
    • /
    • 2014
  • 본 연구에서는 공공 시설물 관리를 위한 센서 융합 기술을 활용한 M2M 기반의 외부 디바이스 및 내장 미들웨어 시스템을 개발하였다. 시설안전체계의 개선 및 M2M 기반기술을 접목한 기술개발을 통해 시설물 안전수준은 급격히 향상되고. 있다 무인 시설물 관리를 위하여 지속적인 촬영 및 저장방식이 아닌 센서와 영상 데이터를 융합하여 상황인지 방식의 외부 디바이스 및 내장 미들웨어 시스템을 개발하고 정보에 대한 신뢰성을 향상시켜 센서 융합형 외부 디바이스를 활용하여 이벤트 발생시에만 정보 전달을 통해 데이터 전송이 감소되는 효율적인 감시시스템을 개발하였다.

  • PDF

WiBro/LTE 기반의 M2M 단말 표준 플랫폼

  • Kim, Gyeong-Su;Jeong, Jong-Il;Kim, Yong-Jin;Heo, Seong-Pil
    • Information and Communications Magazine
    • /
    • v.30 no.2
    • /
    • pp.18-28
    • /
    • 2013
  • 본 논문에서는 M2M(Machine-to-Machine) 서비스의 확산과 산업 시장 활성화를 위해서 필수적으로 요구되는 M2M 단말에 대한 표준 플랫폼 기술과 연구개발 결과를 소개한다. 먼저 본 연구개발의 추진 배경 및 연구 내용과 M2M 단말 플랫폼의 표준화 필요성에 대해 살펴보고 현재 국내외적으로 진행되고 있는 M2M 기술 표준화 현황을 소개한다. M2M 서비스 계층과 M2M 통신모듈과 관련된 주요 표준화 기구의 작업 현황을 살펴보고, 이를 M2M 단말 표준 플랫폼 개발에 어떻게 적용하였는지를 설명한다. 이어서 국내외 표준화 추진 결과와 함께 연구개발의 결과로서 국내외 M2M 표준을 적용하여 개발된 M2M 통신모듈, 단말 관점에서 M2M 서비스를 지원하기 위한 미들웨어 플랫폼 SDK(Software Development Kit), M2M 단말 개발을 위한 통합 개발 환경을 제공하는 RDK(Reference Design Kit)의 세부내용을 소개한다. 또한, 개방되고 표준화 된 M2M 서비스를 위해 M2M 단말과 연동되는 M2M 서비스 플랫폼의 구조에 대해서도 간략히 살펴보며 이들이 실제 서비스에 적용 가능한 지를 검증하기 위해 구현된 M2M 서비스 사례에 대해서 소개한다. 마지막으로 본 연구개발 결과물의 활용방안과 여러 단말 개발업체들이 참여할 수 있는 M2M 테스트베드 구축 현황에 대해 살펴보고, 향후 M2M 서비스 활성화를 위해 나아갈 방향에 대해서 정리해 본다.

Adaption and Assessment of ETSI M2M Standard in Smart Home Environments (ETSI M2M 표준의 스마트 홈 적용 및 적합성 평가)

  • Park, Yunjung;Wu, Hyuk;Paek, Hyung-Goo;Min, Dugki
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.241-255
    • /
    • 2012
  • Recently, smart home environments which provide complex services through smart appliances are becoming realized, due to the advances in connected devices and network technologies. Current smart home environments are mostly restricted, because of difficultly of integration of heterogeneous smart appliances. Therefore radical service integration is impracticable. In this paper, we analyze and implement Machine-to-Machine (M2M) standards which are established by European Telecommunications Standards Institute (ETSI) for integrating heterogeneous devices and services. Smart Home is one of the areas covered by ETSI M2M standards, however these standards are just standardized, so adaption and assessment in smart home are not proved yet. Therefore, this paper analyze ETSI M2M standards by focusing the data transport model and evaluate by selecting the most commonly used smart home scenarios and by implementing ETSI M2M standards compatible smart metering system. In some points ETSI M2M standards are not efficient because of its complexity of structure, however ETSI M2M provides sophisticated features for integrating M2M which are appropriate to adopt diverse smart home environments.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Trend of M2M/IoT Communication Technology (사물지능인터넷(M2M/IoT) 통신 기술 동향)

  • Shin, Young-hyun;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.491-494
    • /
    • 2014
  • 정보통신 기술의 발전으로 우리가 사용하는 모든 사물들이 네트워크를 통해서 사람과 상호 연결을 할 수 있는 시대로 접근하는 추세이다. 또한 ICT분야의 융합이 빠르게 발전하고 있으며, 이를 통해서 유비쿼터스 환경으로 도약하고 있다. 스마트 폰 이후에 센서 대중화, 비용 절약, 기기 보급 확산, 네트워크의 확대 등의 이유로 사물 통신 M2M(Machine to Machine)/사물 인터넷 IoT(Internet of Things) 기술이 점차 활용되고 있으며, 관련 분야의 많은 연구가 진행 중에 있다. 본 논문에서는 이러한 IoT/M2M의 기술 및 표준화 동향을 살펴보고 발전 방향을 예상해 보고자 한다.

Smart Phone and Vehicle Authentication Scheme with M2M Device (M2M 기기에서 스마트폰 및 차량 인증 기법)

  • Yeo, Seong-Gwon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.1-7
    • /
    • 2011
  • As the developing of the information technology, M2M market that is using communication between devices is growing rapidly and many companies are involved in M2M business. In this paper, the concept of telematics and vulnerabilities of vehicle network security are discussed. The convergence of vehicle and information technology, the development of mobile communication technology have improved quality of service that provided to user but as a result security threats has diverse. We proposed new business model that be occurred to the participation of mobile carriers in telematics business and we analyzed mobile radio communication network security vulnerabilities. We proposed smart phone and Vehicle authentication scheme with M2M device as a way to solve vulnerabilities.

Design and Performance Evaluation of a Spindle System for Centerless Grinding Machine (무심연삭기 주축계의 설계 및 성능평가)

  • Park Chun Hong;Hwang Joo Ho;Cho Soon Joo;Cho Chang Rae
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.11 s.176
    • /
    • pp.142-150
    • /
    • 2005
  • Design and performance evaluation of a spindle system which was composed of a grinding spindle and a regulating spindle for the centerless grinding of ferrule were performed in this paper. Layout and details of spindle system were designed and hydrostatic bearings for spindles were also designed. Prototype of spindle system was developed and its availabilities to machine the ferrule were discussed using the experimental results on the spindle stiffness of each spindle, loop stiffness, rotational accuracy and thermal characteristics. Loop stiffness of the spindle system was $130\;N/{\mu}m$, which was enough to machine the ferrule. Rotational accuracies of each spindle were about $0.2{\mu}m$ at the primary speed of 2,300 rpm(grinding spindle) and 300 rpm(regulating spindle). Temperature rises at the same speed were about $4.4\~4.7^{\circ}C$ in the case of grinding spindle and $1.8^{\circ}C$ in the case of regulating spindle, which agreed well with the designed value. From these results, it was estimated that the prototype of spindle system had enough performances for the centerless grinding machine to machine the ferrule.

Implementation and Experiment of CoAP Protocol Based on IoT for Verification of Interoperability (상호 호환성 검증을 위한 IoT 기반의 CoAP 프로토콜 구현 및 실험)

  • Jin, Wen-Quan;Kim, Do-Hyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.7-12
    • /
    • 2014
  • IETF (Internet Engineering Task Force) CoAP (Constrained Application Protocol) protocol is supported communication between sensor or actuator nodes by in a constrained environment, such as small amount of memory, and low power. CoAP and HTTP protocol can convert easily, and can use to monitor or controll the infrastructure utility through low-power sensor and actuator networks in IoT (Internet of Thing) and M2M (Machine-to-Machine) environment. IETF CoRE(Constrained RESTful environments) Working Group proposed CoAP protocol in 2010, and began to standardize it. Recently, CoAP protocol is published RFC (Request for Comments) 7252. In this paper, we design and implement of CoAP protocol for testing the interoperability in heterogeneous operating environments. For this experiment, we developed the CoAP client program based on Windows environment and CoAP server program in Linux environment to test the interoperability.

An Analysis of the Influence Factors of Floor Impact Sound Levels (바닥충격음레벨 영향요인 분석)

  • 김경우;최현중;양관섭;이승언
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2003.05a
    • /
    • pp.255-260
    • /
    • 2003
  • The regulation for floor impact sound level is expected to be amended to 50㏈(L$\_$i, Fmax, AW/) and below in heavy-weight impact sound and 58㏈(L'$\_$n, AW/) and below in light-weight impact sound in Korea. The purpose of this paper is to analyze the influence factors of floor impact sound levels in apartments. The influence factors were air pressure of bang machine, height of microphones, data acquisition rate, etc. The air pressure range of bang machine were from 2.2 Pa to 2.6 Fa. Five microphones were installed at a height of 0.5m, 0.7m, 0.9m, 1.2m, 1.5m or 1.7m from floor level. The floor impact sound level was varied about 1-3㏈(L$\_$i, Fmax, AW/) in heavy-weight impact sound according to the influence factors.

  • PDF

Performance Analysis of LoRa(Long Range) according to the Distances in Indoor and Outdoor Spaces (실내·외 공간에서 거리에 따른 LoRa(Long Range) 성능 분석)

  • Lim, Junyeong;Lee, Jaemin;Kim, Donghyun;Kim, Jongdeok
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.733-741
    • /
    • 2017
  • LPWAN(Low Power Wide Area Network) technology is M2M (Machine to Machine) networking technology for the Internet of Things. The technology is designed to support low-power, long-distance and low-speed communications that are typical of LoRaWAN(Long Range Wide Area Network). To exchange inter-object information using a LoRaWAN, the link performances for various environments must be known. however, active performance analysis research that is based on an empirical environment is nonexistent. Therefore, this paper empirically evaluates the performance of the LoRa (Long Range) link, a physical communication technology of the LoRaWAN for various variables that may affect the link quality in indoor and outdoor environments. To achieve this, a physical performance monitoring system was designed and implemented. A communication experiment environment was subsequently constructed based on the indoor and outdoor conditions. The SNR(Signal to Noise Ratio), RSSI(Received Signal Strength Indication), and the PDR(Packet Delivery Ratio) were evaluated.