• 제목/요약/키워드: the objects of the connection

검색결과 184건 처리시간 0.024초

IoT에서 게이트웨이에 대한 인증 프로토콜에 관한 연구 (A Study on gateway authentication protocol in IoT)

  • 이재영
    • 융합정보논문지
    • /
    • 제7권3호
    • /
    • pp.91-96
    • /
    • 2017
  • 사람과 사람, 사물과 사물이 유 무선 네트워크로 연결되어 서비스를 제공하는 것이 IoT이다. 인터넷을 통해 각 디바이스가 직접 연결되는 IoT의 특성으로 인해 보안에 대한 중요성이 더욱 강조되고 있다. 때문에 IoT 환경에서 발생할 수 있는 다양한 보안 문제를 해결하기 위한 인증 프로토콜을 비롯한 보안 모듈이 계속적으로 개발되어 왔으나 여전히 취약점이 발견되고 있다. 이에 본 논문에서 제안한 인증 프로토콜에는 기존의 인증 프로토콜에서 생략되어 있는 게이트웨이에 대한 인증 절차와 디바이스와 게이트웨이 상호간의 인증 절차를 추가하였다. 인증 절차가 추가된 프로토콜은 공격자의 위장 공격에 대응할 수 있다. 또한, 인증에 이용되는 메시지에 중요한 정보는 암호키로 암호화하거나 해시 함수를 이용하여 보호함으로써 도청 공격에 대응할 수 있게 하였다.

A Study on the Transparency Appearing in Modern Furniture - Focused on the Characteristics of Materials and Spaces -

  • Kim, Jong-Seo
    • 한국가구학회지
    • /
    • 제19권2호
    • /
    • pp.97-105
    • /
    • 2008
  • Expressing transparency has various significances in modem society because modern people want transparent objects and space due to the complication, numerous unreasonable facts and the lack of honesty in the society. It is necessary to summarize the processes of changes in transparent materials that have been substantially emerging in the areas of indoor spaces and furniture since the 1960s by organizing the concepts such as the characteristics of materials, the processes of development and the methods of shaping centering on representative artists and works. And the concept of transparency in terms of space enabled the expansion, overlapping and connection of spaces. It can be said that these factors express the openness, purity and non-materiality of spaces. It can also be connected to the thought of minimal ism and this concept could be confirmed by analyzing the works of the famous designers leading the times.

  • PDF

행렬 Decomposition 방법에 기초한 다중협동 로봇의 동적 조작도 해석 (Analysis of dynamic manipulability for multiple cooperating robot system based on matrix decomposition)

  • 이지홍;조복기
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2003년도 하계종합학술대회 논문집 V
    • /
    • pp.2705-2708
    • /
    • 2003
  • In this paper, we propose a method that applies matrix decomposition technique to the connection of actuator capabilities of each robot to object acceleration limits for multiple cooperative robot systems. The robot systems under consideration are composed of several robot manipulators and each robot contacts a single object to carry the object while satisfying the constraints described in kinematics as well as dynamics. By manipulating kinematic and dynamic equations of both robots and objects, we at first derive a matrix relating joint torques with object acceleration, manipulate the null space of the matrix, and then we decompose the matrix into three parts representing indeterminancy, connectivity, and redundancy. With the decomposed matrix we derive the boundaries of object accelerations from given joint actuators. To show the validity of the proposed method some examples are given in which the results can be expected by intuitive observation.

  • PDF

Agent-Based Load Balancing Method for Web GIS Services; Web-Based Forest Fire Management System

  • Jo, Yun-Won;Jo, Myung-Hee;Oh, Jeong-Soo
    • 대한원격탐사학회지
    • /
    • 제17권4호
    • /
    • pp.359-368
    • /
    • 2001
  • The prototype of forest fire management system on Web was studied. In the architecture of this system, one of the most important concerns is to handle load upcoming to Web Server so that it provides Web service without any delay or failure. In order to solve this problem, the agent is designed on dispatcher in a Web server cluster and implemented to distribute load dynamically by considering the information related to load coming to the Web Server such as the number of connection to the Map Server. The proposed forest fire management system has user-friendly interface with the GIS mapping functionality by selecting Map Objects Internet Map Server (MO IMS) as Map Server and is implemented using Java as programming language.

Siame-FPN기반 객체 특징 추적 알고리즘 (Object Feature Tracking Algorithm based on Siame-FPN)

  • 김종찬;임수창
    • 한국멀티미디어학회논문지
    • /
    • 제25권2호
    • /
    • pp.247-256
    • /
    • 2022
  • Visual tracking of selected target objects is fundamental challenging problems in computer vision. Object tracking localize the region of target object with bounding box in the video. We propose a Siam-FPN based custom fully CNN to solve visual tracking problems by regressing the target area in an end-to-end manner. A method of preserving the feature information flow using a feature map connection structure was applied. In this way, information is preserved and emphasized across the network. To regress object region and to classify object, the region proposal network was connected with the Siamese network. The performance of the tracking algorithm was evaluated using the OTB-100 dataset. Success Plot and Precision Plot were used as evaluation matrix. As a result of the experiment, 0.621 in Success Plot and 0.838 in Precision Plot were achieved.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

Survey of Trust Management System in Internet of Things

  • Meghana P.Lokhande;Dipti Durgesh Patil;Sonali Tidke
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.53-58
    • /
    • 2024
  • The Internet of Things (IoT) enables the connection of millions of disparate devices to the World Wide Web. To perform the task, a lot of smart gadgets must work together. The gadgets recognize other devices as part of their network service. Keeping participating devices safe is a crucial component of the internet of things. When gadgets communicate with one another, they require a promise of confidence. Trust provides certainty that the gadgets or objects will function as expected. Trust management is more difficult than security management. This review includes a thorough examination of trust management in a variety of situations.

ON THE HOLONOMIZATION OF SEMIHOLONOMIC JETS

  • MIKULSKI, WLODZIMIERZ M.
    • 대한수학회보
    • /
    • 제52권4호
    • /
    • pp.1365-1373
    • /
    • 2015
  • We find all ${\mathcal{F}}{\mathcal{M}}_m$-natural operators A transforming torsion free classical linear connections ${\nabla}$ on m-manifolds M into base preserving fibred maps $A({\nabla}):{\bar{J}}^rY{\rightarrow}J^rY$ for ${\mathcal{F}}{\mathcal{M}}_m$-objects Y with bases M, where ${\bar{J}}^r$, $J^r$ are the semiholonomic and holonomic jet functors of order r on the category ${\mathcal{F}}{\mathcal{M}}_m$ of fibred manifolds with m-dimensional bases and their fibred maps with embeddings as base maps.

위협 모델링을 이용한 자율 주행 환경 분석 (Analysis of Self-driving Environment Using Threat Modeling)

  • 박민주;이지은;박효정;임연섭
    • 융합보안논문지
    • /
    • 제22권2호
    • /
    • pp.77-90
    • /
    • 2022
  • 현재 국내외 자동차 기업들은 꾸준한 기술 개발을 통해 자율 주행 자동차 산업을 선도하고자 경쟁하고 있다. 이러한 자율 주행 기술은 자동차와 주행 도로 환경과 같이 사물 간의 다양한 연결 의존성을 가지면서 발전하고 있다. 따라서 자동차를 포함한 전체 자율 주행 환경 내에서 사이버 보안 취약점이 발생하기 쉬워지고 있으며, 이에 대한 대비책의 중요성이 커지고 있다. 본 논문에서는 자율 주행 자동차에서 발생할 수 있는 위협을 모델링하고, 자율 주행 자동차의 안전한 보안을 위해 점검이 필요한 요소들을 체크리스트로써 제안한다.

보안성을 고려한 스마트 의료기기 관리(Secure-MEMP) 방법에 관한 연구 (A Study on the Smart Medical Equipment Management Program (Secure-MEMP) Method Considering Security)

  • 김동원
    • 융합보안논문지
    • /
    • 제21권1호
    • /
    • pp.63-72
    • /
    • 2021
  • 병원의 Biomedical engineering team은 의료기기가 안전하고 신뢰할 수 있도록 의료기기 관리 프로그램(MEMP, Medical Equipment Management Program)을 수립하고 규제할 책임이 있다. 기술의 발전으로 인공지능, 정밀의료 등 의료기기는 언제 어디서나 사물들 간 연결이 가능한 형태로 발전하고 있으며 다양한 기술의 융합에 따라 내외·부 보안위협이 지속적으로 증가하고 있다. 본 논문에서는 기술의 발전으로 지속적으로 증가하는 의료기기의 보안위협을 고려하여 안전한 의료기기 관리 프로그램(Secure-MEMP) 방법을 연구 제시한다.