• Title/Summary/Keyword: mobile communication environment

Search Result 1,403, Processing Time 0.03 seconds

A Study on the Development of IoT Inspection System for Gas Leakage Inspection in Kitchen Gas Range Built-in Method (주방 가스레인지 빌트인 방식에서 가스 누출검사를 위한 IoT 검사 시스템 개발에 관한 연구)

  • Kang, Dae Guk;Choi, Young Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.283-290
    • /
    • 2022
  • In this study, an IoT inspection system that can be linked with a server was developed using a gas timer and ESP-01 Wi-Fi module installed on a gas valve in the home. The server environment of the gas leak IoT inspection system was installed with APM (Apache, PHP, MySQL) to collect gas pressure data by generation so that leakage checks could be performed. In order to control the gas leak IoT inspection system, the app inventory was used to manage the gas leak check value in real time. In addition, user convenience has been enhanced so that membership management, WiFi settings, and leakage check values can be checked through mobile apps. In order to manage subscribers by region, the user list was checked by logging in in in the administrator mode so that the information on whether or not the leak test was conducted and the results could be provided. In addition, when the user presses the gas leak check button, the pressure is automatically checked, and the measured value is stored in the server, and when a gas leak occurs, the leakage check is performed after alarm and repair so that it can be used if normal. In addition, in order to prevent overlapping membership, membership management can be performed based on MAC addresses.

Analysis of Remote Driving Simulation Performance for Low-speed Mobile Robot under V2N Network Delay Environment (V2N 네트워크 지연 환경에서 저속 이동 로봇 원격주행 모의실험을 통한 성능 분석)

  • Song, Yooseung;Min, Kyoung-wook;Choi, Jeong Dan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.3
    • /
    • pp.18-29
    • /
    • 2022
  • Recently, cooperative intelligent transport systems (C-ITS) testbeds have been deployed in great numbers, and advanced autonomous driving research using V2X communication technology has been conducted actively worldwide. In particular, the broadcasting services in their beginning days, giving warning messages, basic safety messages, traffic information, etc., gradually developed into advanced network services, such as platooning, remote driving, and sensor sharing, that need to perform real-time. In addition, technologies improving these advanced network services' throughput and latency are being developed on many fronts to support these services. Notably, this research analyzed the network latency requirements of the advanced network services to develop a remote driving service for the droid type low-speed robot based on the 3GPP C-V2X communication technology. Subsequently, this remote driving service's performance was evaluated using system modeling (that included the operator behavior) and simulation. This evaluation showed that a respective core and access network latency of less than 30 ms was required to meet more than 90 % of the remote driving service's performance requirements under the given test conditions.

A Study on the Establishment of Entropy Source Model Using Quantum Characteristic-Based Chips (양자 특성 기반 칩을 활용한 엔트로피 소스 모델 수립 방법에 관한 연구)

  • Kim, Dae-Hyung;Kim, Jubin;Ji, Dong-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.140-142
    • /
    • 2021
  • Mobile communication technology after 5th generation requires high speed, hyper-connection, and low latency communication. In order to meet technical requirements for secure hyper-connectivity, low-spec IoT devices that are considered the end of IoT services must also be able to provide the same level of security as high-spec servers. For the purpose of performing these security functions, it is required for cryptographic keys to have the necessary degree of stability in cryptographic algorithms. Cryptographic keys are usually generated from cryptographic random number generators. At this time, good noise sources are needed to generate random numbers, and hardware random number generators such as TRNG are used because it is difficult for the low-spec device environment to obtain sufficient noise sources. In this paper we used the chip which is based on quantum characteristics where the decay of radioactive isotopes is unpredictable, and we presented a variety of methods (TRNG) obtaining an entropy source in the form of binary-bit series. In addition, we conducted the NIST SP 800-90B test for the entropy of output values generated by each TRNG to compare the amount of entropy with each method.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A Partial Encryption Method for the Efficiency and the Security Enhancement of Massive Data Transmission in the Cloud Environment (클라우드 환경에서의 대용량 데이터 전송의 효율성과 보안성 강화를 위한 부분 암호화 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.9
    • /
    • pp.397-406
    • /
    • 2017
  • In case of using the existing encrypted algorithm for massive data encryption service under the cloud environment, the problem that requires much time in data encryption come to the fore. To make up for this weakness, a partial encryption method is used generally. However, the existing partial encryption method has a disadvantage that the encrypted data can be inferred due to the remaining area that is not encrypted. This study proposes a partial encryption method of increasing the encryption speed and complying with the security standard in order to solve this demerit. The proposed method consists of 3 processes such as header formation, partial encryption and block shuffle. In step 1 Header formation process, header data necessary for the algorithm are generated. In step 2 Partial encryption process, a part of data is encrypted, using LEA (Lightweight Encryption Algorithm), and all data are transformed with XOR of data in the unencrypted part and the block generated in the encryption process. In step 3 Block shuffle process, the blocks are mixed, using the shuffle data stored with the random arrangement form in the header to carry out encryption by transforming the data into an unrecognizable form. As a result of the implementation of the proposed method, applying it to a mobile device, all the encrypted data were transformed into an unrecognizable form, so the data could not be inferred, and the data could not be restored without the encryption key. It was confirmed that the proposed method could make prompt treatment possible in encrypting mass data since the encryption speed is improved by approximately 273% or so compared to LEA which is Lightweight Encryption Algorithm.

Building an SNS Crawling System Using Python (Python을 이용한 SNS 크롤링 시스템 구축)

  • Lee, Jong-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.5
    • /
    • pp.61-76
    • /
    • 2018
  • Everything is coming into the world of network where modern people are living. The Internet of Things that attach sensors to objects allows real-time data transfer to and from the network. Mobile devices, essential for modern humans, play an important role in keeping all traces of everyday life in real time. Through the social network services, information acquisition activities and communication activities are left in a huge network in real time. From the business point of view, customer needs analysis begins with SNS data. In this research, we want to build an automatic collection system of SNS contents of web environment in real time using Python. We want to help customers' needs analysis through the typical data collection system of Instagram, Twitter, and YouTube, which has a large number of users worldwide. It is stored in database through the exploitation process and NLP process by using the virtual web browser in the Python web server environment. According to the results of this study, we want to conduct service through the site, the desired data is automatically collected by the search function and the netizen's response can be confirmed in real time. Through time series data analysis. Also, since the search was performed within 5 seconds of the execution result, the advantage of the proposed algorithm is confirmed.

The Current Status and Development Direction of Mixed Reality Content (혼합현실 콘텐츠의 현황과 발전방향)

  • Kim, Hee-young
    • Cartoon and Animation Studies
    • /
    • s.46
    • /
    • pp.181-206
    • /
    • 2017
  • In the near future, we are expected to live in a Mixed Reality environment where reality and virtuality coexist as today we live using the Internet and smartphones in our daily lives. The relevant content based on the idea of Mixed Reality crystallizing is currently expanding, and it is time for research on it. This study examines the current situation and the development direction of mixed reality contents. Typical mixed reality contents can be classify by wearability. We analyzed HoloLens, a mixed reality wearable device that is worn on a head, which is a example of wearable device. As an example of unwearable device, we also analyzed the Room2Room which is a communication system that combines video with augmented reality-based telepresence avatar. Mixed Reality content will develop in the direction of implementing expanded use of information and more natural realism through the interactive combination of Reality, Virtual Reality, and Augmented Reality. As head-mounted wearable technology develops, Mixed Reality content is expected to become popular by increasing the number of Mixed Reality device users if convenience and price competitiveness are secured. The way of unifying Mixed Reality wearable devices must be established in order to increase convenience, and the environment based on Mixed Reality will be created through diversifying leisure activity content. Telepresence Avatar is expected to develop into Mobile Hologram Avar as Mixed Reality content accessible anywhere and at anytime beyond space limits. Another potential for development of Telepresence Avatar is the combination of Avatar moving on user's thought, Augmented Human technology and Mixed Reality.

A Study on the SAR Measurement System Validation at 150 MHz Band (150 MHz 대역에서의 SAR 측정시스템의 유효성 연구)

  • Choi, Donggeun;Kim, Kihwea;Choi, Jaehoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.10
    • /
    • pp.1008-1016
    • /
    • 2013
  • SAR measurement which was applied only to the mobile phone has been expanded in the Korean radio regulation law to the portable wireless communication equipments within 20 cm from the human body since Jan. 2012. The two-way radio operating at 150 MHz frequency band was newly included following the revised radio regulation in the target equipment of measurement. SAR measurement system at 150 MHz satisfying this regulation is necessary accordingly for SAR conformity assessment. The international SAR measurement standard(IEC 62209-2) includes the evaluation method on frequencies above 300 MHz, and the commercial SAR measurement system can measure SAR above 300 MHz only. The size of the reference dipole antenna(760 mm, return loss: -27.57 dB) and flat phantom ($1,300 mm(L){\times}900 mm(W){\times}200 mm(H)$), targeted SAR values for numerical analysis(1 g: 1.08 W/kg, 10 g: 0.77 W/kg) for SAR validation evaluation at 150 MHz frequency are proposed in this paper. The suggested dipole antenna and flat phantom are assembled and used to verify the conformity assessment of commercial SAR measurement system. The measured SAR values of 1 g and 10 g were obtained respectively to be 1.13 W/kg, 0.81 W/kg, and they satisfied the effective range(within ${\pm}10$ %) of IEC international standard. The standards based on this study are expected to be used for the domestic SAR measurement standard and IEC(International Electrotechnical Commission) international standard.

Design of IoT Gateway based Event-Driven Architecture for Intelligent Buildings. (IoT 게이트웨이 기반 지능형 건물의 이벤트 중심 아키텍쳐 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.256-259
    • /
    • 2016
  • The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The home server receives the command, then controls for instance the light system. The gateway based RESTful technology responsible for handling clients' requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. In the procedure of designing tasks, concurrency is best understood by employing multiple levels of abstraction. The way that is eminently to accomplish concurrency is to build an object-oriented environment with support for messages passing between concurrent objects. We also investigate the performance of event-driven architecture for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub. The Node.JS is 40% faster than the traditional web server side features thread-based approach. The use of Node.js server-side handles a large number of clients' requests, then therefore, reduces delay in performing predefined actions automatically in intelligent building IoT environment.

  • PDF

Fabrication of Portable Self-Powered Wireless Data Transmitting and Receiving System for User Environment Monitoring (사용자 환경 모니터링을 위한 소형 자가발전 무선 데이터 송수신 시스템 개발)

  • Jang, Sunmin;Cho, Sumin;Joung, Yoonsu;Kim, Jaehyoung;Kim, Hyeonsu;Jang, Dayeon;Ra, Yoonsang;Lee, Donghan;La, Moonwoo;Choi, Dongwhi
    • Korean Chemical Engineering Research
    • /
    • v.60 no.2
    • /
    • pp.249-254
    • /
    • 2022
  • With the rapid advance of the semiconductor and Information and communication technologies, remote environment monitoring technology, which can detect and analyze surrounding environmental conditions with various types of sensors and wireless communication technologies, is also drawing attention. However, since the conventional remote environmental monitoring systems require external power supplies, it causes time and space limitations on comfortable usage. In this study, we proposed the concept of the self-powered remote environmental monitoring system by supplying the power with the levitation-electromagnetic generator (L-EMG), which is rationally designed to effectively harvest biomechanical energy in consideration of the mechanical characteristics of biomechanical energy. In this regard, the proposed L-EMG is designed to effectively respond to the external vibration with the movable center magnet considering the mechanical characteristics of the biomechanical energy, such as relatively low-frequency and high amplitude of vibration. Hence the L-EMG based on the fragile force equilibrium can generate high-quality electrical energy to supply power. Additionally, the environmental detective sensor and wireless transmission module are composed of the micro control unit (MCU) to minimize the required power for electronic device operation by applying the sleep mode, resulting in the extension of operation time. Finally, in order to maximize user convenience, a mobile phone application was built to enable easy monitoring of the surrounding environment. Thus, the proposed concept not only verifies the possibility of establishing the self-powered remote environmental monitoring system using biomechanical energy but further suggests a design guideline.