• Title/Summary/Keyword: the objects of the connection

Search Result 183, Processing Time 0.026 seconds

A Study on gateway authentication protocol in IoT (IoT에서 게이트웨이에 대한 인증 프로토콜에 관한 연구)

  • Lee, Jae-Young
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.91-96
    • /
    • 2017
  • IoT which is an abbreviation of Internet of Things refers to the communication network service among various objects such as people-people, objects-objects interconnection. The characteristic of IoT that enables direct connection among each device makes security to be considered as more emphasized factor. Though a security module such as an authentication protocol for resolving various security problems that may occur in the IoT environment has been developed, some weak points in security are still being revealed. Therefore, this paper proposes a method for including a protocol including gateway authentication procedure and mutual authentication between the devices and gateways. Protocols with additional authentication procedures can appropriately respond to attackers' spoofing attacks. In addition, important information in the message used for authentication process is protected by encryption or hash function so that it can respond to wiretapping attacks.

A Study on the Transparency Appearing in Modern Furniture - Focused on the Characteristics of Materials and Spaces -

  • Kim, Jong-Seo
    • Journal of the Korea Furniture Society
    • /
    • v.19 no.2
    • /
    • pp.97-105
    • /
    • 2008
  • Expressing transparency has various significances in modem society because modern people want transparent objects and space due to the complication, numerous unreasonable facts and the lack of honesty in the society. It is necessary to summarize the processes of changes in transparent materials that have been substantially emerging in the areas of indoor spaces and furniture since the 1960s by organizing the concepts such as the characteristics of materials, the processes of development and the methods of shaping centering on representative artists and works. And the concept of transparency in terms of space enabled the expansion, overlapping and connection of spaces. It can be said that these factors express the openness, purity and non-materiality of spaces. It can also be connected to the thought of minimal ism and this concept could be confirmed by analyzing the works of the famous designers leading the times.

  • PDF

Analysis of dynamic manipulability for multiple cooperating robot system based on matrix decomposition (행렬 Decomposition 방법에 기초한 다중협동 로봇의 동적 조작도 해석)

  • 이지홍;조복기
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2705-2708
    • /
    • 2003
  • In this paper, we propose a method that applies matrix decomposition technique to the connection of actuator capabilities of each robot to object acceleration limits for multiple cooperative robot systems. The robot systems under consideration are composed of several robot manipulators and each robot contacts a single object to carry the object while satisfying the constraints described in kinematics as well as dynamics. By manipulating kinematic and dynamic equations of both robots and objects, we at first derive a matrix relating joint torques with object acceleration, manipulate the null space of the matrix, and then we decompose the matrix into three parts representing indeterminancy, connectivity, and redundancy. With the decomposed matrix we derive the boundaries of object accelerations from given joint actuators. To show the validity of the proposed method some examples are given in which the results can be expected by intuitive observation.

  • PDF

Agent-Based Load Balancing Method for Web GIS Services; Web-Based Forest Fire Management System

  • Jo, Yun-Won;Jo, Myung-Hee;Oh, Jeong-Soo
    • Korean Journal of Remote Sensing
    • /
    • v.17 no.4
    • /
    • pp.359-368
    • /
    • 2001
  • The prototype of forest fire management system on Web was studied. In the architecture of this system, one of the most important concerns is to handle load upcoming to Web Server so that it provides Web service without any delay or failure. In order to solve this problem, the agent is designed on dispatcher in a Web server cluster and implemented to distribute load dynamically by considering the information related to load coming to the Web Server such as the number of connection to the Map Server. The proposed forest fire management system has user-friendly interface with the GIS mapping functionality by selecting Map Objects Internet Map Server (MO IMS) as Map Server and is implemented using Java as programming language.

Object Feature Tracking Algorithm based on Siame-FPN (Siame-FPN기반 객체 특징 추적 알고리즘)

  • Kim, Jong-Chan;Lim, Su-Chang
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.247-256
    • /
    • 2022
  • Visual tracking of selected target objects is fundamental challenging problems in computer vision. Object tracking localize the region of target object with bounding box in the video. We propose a Siam-FPN based custom fully CNN to solve visual tracking problems by regressing the target area in an end-to-end manner. A method of preserving the feature information flow using a feature map connection structure was applied. In this way, information is preserved and emphasized across the network. To regress object region and to classify object, the region proposal network was connected with the Siamese network. The performance of the tracking algorithm was evaluated using the OTB-100 dataset. Success Plot and Precision Plot were used as evaluation matrix. As a result of the experiment, 0.621 in Success Plot and 0.838 in Precision Plot were achieved.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

Survey of Trust Management System in Internet of Things

  • Meghana P.Lokhande;Dipti Durgesh Patil;Sonali Tidke
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.53-58
    • /
    • 2024
  • The Internet of Things (IoT) enables the connection of millions of disparate devices to the World Wide Web. To perform the task, a lot of smart gadgets must work together. The gadgets recognize other devices as part of their network service. Keeping participating devices safe is a crucial component of the internet of things. When gadgets communicate with one another, they require a promise of confidence. Trust provides certainty that the gadgets or objects will function as expected. Trust management is more difficult than security management. This review includes a thorough examination of trust management in a variety of situations.

ON THE HOLONOMIZATION OF SEMIHOLONOMIC JETS

  • MIKULSKI, WLODZIMIERZ M.
    • Bulletin of the Korean Mathematical Society
    • /
    • v.52 no.4
    • /
    • pp.1365-1373
    • /
    • 2015
  • We find all ${\mathcal{F}}{\mathcal{M}}_m$-natural operators A transforming torsion free classical linear connections ${\nabla}$ on m-manifolds M into base preserving fibred maps $A({\nabla}):{\bar{J}}^rY{\rightarrow}J^rY$ for ${\mathcal{F}}{\mathcal{M}}_m$-objects Y with bases M, where ${\bar{J}}^r$, $J^r$ are the semiholonomic and holonomic jet functors of order r on the category ${\mathcal{F}}{\mathcal{M}}_m$ of fibred manifolds with m-dimensional bases and their fibred maps with embeddings as base maps.

Analysis of Self-driving Environment Using Threat Modeling (위협 모델링을 이용한 자율 주행 환경 분석)

  • Min-Ju Park;Ji-Eun Lee;Hyo-Jeong Park;Yeon-sup Lim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.77-90
    • /
    • 2022
  • Domestic and foreign automakers compete to lead the autonomous vehicle industry through continuously developing self-driving technologies. These self-driving technologies are evolving with dependencies on the connection between vehicles and other objects such as the environment of cars and roads. Therefore, cyber security vulnerabilities become more likely to occur in the self-driving environment, so it is necessary to prepare for them carefully. In this paper, we model the threats in autonomous vehicles and make the checklist to securely countermeasure them.

A Study on the Smart Medical Equipment Management Program (Secure-MEMP) Method Considering Security (보안성을 고려한 스마트 의료기기 관리(Secure-MEMP) 방법에 관한 연구)

  • Kim, Dong-Won
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.63-72
    • /
    • 2021
  • The hospital biomedical engineering team is responsible for establishing and regulating the Medical Device Management Program (MEMP) to ensure that medical devices are safe and reliable. As technology advances, medical devices such as artificial intelligence and precision medicine are developing into a form that allows connection between objects anytime, anywhere, and as various technologies converge, internal and external security threats continue to increase. In this paper, we present a study of the Medical Device Management Program (Secure-MEMP) method, considering that the security threat of medical devices continues to increase due to advances in technology.