• Title/Summary/Keyword: ubiquitous Computing

Search Result 1,432, Processing Time 0.03 seconds

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

The Study on the Status and Development of International Ubiquitous Computing (유비쿼터스 컴퓨팅의 실태와 발전에 관한 연구)

  • Kim Kyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.221-231
    • /
    • 2004
  • Ubiquitous computing is not radical as Mark Weiser argues and includes things. The status of each nation is as follows. Project of America or Europe are practice for computing infra. intelligence of things and space and man-computer co-relation study, otherwise Japan centers the studying of network ubiquity utilizing computing competence. In this thesis I analyzed real status on the ubiquitous computing case study of each nation. and I proposed computing development model. factor, structured value system. five type business and technology model.

  • PDF

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

Design and Implement Ubiquitous System on Chip for IEEE 802.15.4 WPAN Standard

  • Doo, Kyoung;Kim, Young-Sam;Kim, Sun-Kuk;Lee, Kang-Whan
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.697-698
    • /
    • 2008
  • Ubiquitous Computing System is available anytime, anywhere communications and computing systems, and information sharing and mutual cooperation between computing systems. in addition, For Ubiquitous Computing System, it is need the sensor technology to detect information of users and surrounding environment. For these reason, this paper proposed CRS(Context Recognition Switch) and DOS(Dynamic and Optimal Standard) based Context-awareness system architecture.

  • PDF

Ubiquitous Computing & Network Security Analysis (유비쿼터스 컴퓨팅 & 트워크 보안분석)

  • 정상일;송원덕;이원찬;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.35-42
    • /
    • 2004
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this situation we must analytics that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.struction.

  • PDF

An Empirical Analysis on the u-Business's Environments and Conditions in the Ubiquitous Era (유비쿼터스 시대의 비즈니스 인식에 대한 실증분석)

  • Lee, Chan-Do;Jian, Jiao
    • International Commerce and Information Review
    • /
    • v.7 no.4
    • /
    • pp.37-57
    • /
    • 2005
  • The business in the Ubiquitous era has to be developed by combing a traditional marketing concept with a new concept system on Chip. The objective of this paper is researching on the attention or interest, understanding, positive effects, etc., for Ubiquitous Computing to realize u-Korea and u-Business. The paper result which is the stepwise developing scheme of u-Business could be useful in the policy, publicity and education, strategic implementation of the Ubiquitous Computing. And the proposed new services for u-Commerce can be applied to new business model of future IT industry. Actually, the awareness and understanding about Ubiquitous are low, But, We can't overemphasize the value of Ubiquitous. First of all, The publicity and education about It's may have to be emphasized.

  • PDF

TOPAZ;A Shared Infrastructure for Ubiquitous Services (TOPAZ;유비쿼터스 서비스를 위한 공용 인프라스트럭처)

  • Bae, Ju-Hee;Kang, Jong-Hyun;Lee, Ji-Wan;Pae, Young-Woo;Lee, Won-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.05a
    • /
    • pp.385-390
    • /
    • 2007
  • 유비쿼터스 서비스는 운전자, 헬스케어 관련 종사자, 일반 시민 등 모바일 사용자를 위한 서비스를 포괄하고 있다. 이러한 서비스들은 단말 장치로부터 발생하는 다양한 정보들을 수집, 가공하여 개인들에게 제공할 수 있도록 한다. 최근에 진행되고 있는 u-City 에서는 건강과 교육, 가정 환경에서 일어나는 다양한 이벤트들을 기반으로 상황에 따라 개인화된 서비스를 거주지, 거리, 빌딩, 공공 장소 같은 다양한 환경에 제공하려 하고 있다. 최근의 표준화 논의에서는 다양한 공공 서비스와 상용/민간 서비스를 지원하기 위해 공유할 수 있는 단말, 네트워크, 센터, 소프트웨어 인프라스트럭처가 필요하다는 공감대가 형성되어 표준화 논의가 활성화되고 있다. 본 논문에서 소개하는 TOPAZ는 서비스 기반의 유비쿼터스 컴퓨팅 인프라스트럭처로 다양한 유비쿼터스 서비스들이 웹 서비스를 통해 인프라스트럭처를 사용하여 쉽게 개발, 배포, 운용될 수 있게 해준다. 본 논문에서는 TOPAZ의 필요성과 서비스 컴포넌트들에 대해 서술하고 유틸리티 컴퓨팅의 입장에서 본 서비스의 질, 서비스 미터링, 자원 관리, Scalability 등의 고려 사항과 해결 방법을 제시하고 TOPAZ의 성능, 적용 결과 등을 소개한다.

  • PDF

Study on Application Fields and Basic Characteristics of Ubiquitous Computing Technologies in a Ship (유비쿼터스 기술의 선박 적용 분야 개발 및 기초 특성 연구)

  • Cho, Seong-Rak;Paik, Bu-Geun;Park, Beom-Jin;Lee, Dong-Kon
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.44 no.6
    • /
    • pp.657-665
    • /
    • 2007
  • The object of this paper is to describe the ubiquitous computing technologies for ship, which is produced and assembled by many steel blocks. It includes the testing of a 2.4GHz wireless communications platforms and radio-frequency identification technology with the blocks disturbing the wireless communication. The power line communication that is established in a ship already is also experimented for some data transfer. Also, possible application areas of the ubiquitous computing technology to ships are discussed. At last, the test bed copied from an actual vessel was installed and data acquisition tests were established using wire and wireless communication. In this paper, we implemented some ubiquitous computing technologies in the test bed simulating a ship environment and investigated the basic characteristics of ubiquitous computing technologies.

A Connection of Information in the Ubiquitous Space (유비쿼터스 공간에서의 정보 연결)

  • Ko Sung-Bum
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.1-15
    • /
    • 2004
  • The current Internet space is evolving to the so called Ubiquitous space. Unlike the Internet space, the information in the Ubiquitous space is distributed evenly in the places like computer's memory, human's brain and physical machine. The 'hypertext', the connection model of the information, which is originally designed for the Internet space doesn't suit well to the Ubiquitous space. From this point of view, we proposed the CPM model in this paper. The CPM model is designed for comprising the such three computing mechanism as analog computing, digital computing and human computing. In this paper, we showed that the characteristics of the CPM model might answer the such purpose as the connection of information in the Ubiquitous space.

  • PDF