• Title/Summary/Keyword: ubiquitous computing technology

Search Result 585, Processing Time 0.029 seconds

A Study on the Aspects and Counter Systems of the Cyber Terrorism in the Era of Changing Information Circumstances (정보환경변화시대의 사이버테러 양상 및 대응체계에 관한 연구)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.237-260
    • /
    • 2005
  • Development of IT technology as well as arrival of information-oriented society raise the curtain of 'the era of Ubiquitous Computing', implying accessing computers beyond boundary of time and space. In this era, it is expected that IT paradigms and life-styles would be transformed immensely above the experiences of 20th century. However, improvement of technology summons a new risk of cyber terrorism which have not been in the past. Thus, it is urgent to prepare for the threats in the national level. This paper point out five major threats relating to 'the security in the era of Ubiquitous Computing'. : First, spread of threats in connection with BcN establishment, second, vulnerable information-security for wireless communication, third, leakage of private information, fourth, cyber terror and deterioration of security, fifth, security problems of Korea including the drain of military information and solutions in the views of organization, personnel, technology and budget, comparing with other countries.

  • PDF

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.

A Study on the Permeability through Concrete using RF Wireless Module for Reinforced Concrete Structure (철근콘크리트 구조물에 내제된 RF 무선송수신 모듈의 콘크리트 투과성 실험 연구)

  • Jo, Byung-Wan;Park, Jung-Hoon;Yoon, Kwang-Won;Kim, Heoun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.2D
    • /
    • pp.295-302
    • /
    • 2011
  • Ubiquitous is an information communication environment which peoples could connect on network without being conscious of the network and computer condition at anytime and anywhere. Presently, advanced technology, digital cities and eco-friendly cities using Ubiquitous technology are being focused through out the world. As recent information industry and communication technology have developed remarkably, studies on intelligent structures and structural maintenance methods by combining a general idea of connecting all objects on network by interpolating computers which is called Ubiquitous Computing, and USN(Ubiquitous Sensor Network) are being attempted. In this paper, a basic experiment on penetration of RF(Radio Frequency) sensor nodes using an experimental sample setting concrete and reinforcing bar as variables is studied to estimate the possibility of applying wireless sensor networks in structures. The spring of reinforcing bars, concrete thickness, intensity of radio frequency were set up as variables, transmitting and receiving distance were checked vertically and horizontally. Moreover, Spectrum Analyzer was used for checking the magnitude of the frequency used in order to measure the reduction of radio wave exactly. The radio wave reduction was numerically analyzed, and the influence of the wavelength was analysed as well. As a result, the penetration depth in concrete without reinforcing bars was 45cm, and in reinforced concretes which reinforcing bars placed at spacing of 5cm and 15cm, the penetration depth were 37cm and 45cm each. No influence on radio wave penetration depth were found when the spacing of reinforcing bars in the reinforced concrete structures becomes over 15cm.

Home Network Security Requirements and Response for Ubiquitous Environment (유비쿼터스 환경에 적합한 홈네트워크 보안요구사항 및 대응 방안)

  • Ryu Woo-Kwon;Lee Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.947-950
    • /
    • 2006
  • 최근 들어 언제 어디서나 컴퓨팅이 가능한 유비쿼터스 컴퓨팅(Ubiquitous Computing) 사회가 되면서 개인의 컴퓨팅 환경 의존도가 증가되었고, 따라서 사이버공격으로 인한 개인생활의 위협도 증가할 수밖에 없게 되었다. 더욱이 향후에는 원격진료와 같이 개인의 생명과 직결된 유비쿼터스 서비스가 활성화될 것이므로 사이버공격으로 인해 재산뿐 아니라 생명까지 위험에 처하는 경우가 늘어나게 될 것이다. 이로 인해 유비쿼터스 환경에 적합한 홈네트워크 보안(Home Network Secutity)의 중요성이 부각되게 되었다. 본 논문에서는 안전한 U-홈네트워크(Ubiquitous-Home Network) 구축에 필요한 기술들을 유 무선 기준으로 구분하고, U-홈네트워크 환경에서 발생할 수 있는 다양한 침해유형을 분석하여, 이를 막아낼 수 있는 대응방안을 수립하고, 안전한 U-홈네트워크 구축을 위해 필요한 기존의 보안요구사항들을 살펴본 후에 U-홈네트워크에 적합한 추가적 보안사항을 제안하고자 한다.

  • PDF

A Study on the Current Situation and Promotion Plans of the Mobile Industry (모바일 산업의 현황과 활성화 방안에 관한 연구)

  • Kim, Jang-Ho
    • International Commerce and Information Review
    • /
    • v.5 no.2
    • /
    • pp.47-69
    • /
    • 2003
  • The computer was only used to calculate and solve the mathematical problems, to send the simple data, and to exchange the text based informations in the early 1990's. But nowadays, computer technology give us the chance to exchange digital goods and services, etc. And more, computer and computer based systems can be applied everywhere, for example, it can be used at office, at home, and at school. Most of all, one of the remarkable changes is the development of mobile industry, which can be applied anywhere and anytime. So, this study focused on the current situation and promotion plans of the mobile industry. Mobile is based on the IT, IT and mobile technology are the foundation stone of ubiquitous computing environments. Accordingly, this thesis analysis the meaning of ubiquitous, the meaning and roll of mobile industry. With the analysis of this, the conclusion is that to develop and success the new business model at home and overseas, the cooperation of government section and industry section is the most import thing to make it out.

  • PDF

An Evaluation Method for Business Model Feasibility of Geographic Information Service in Ubiquitous Environment (유비쿼터스 환경에서의 공간정보서비스 사업타당성 평가 방안에 관한 연구)

  • Kim, Jae-Gyu;Kim, Byeong-Geon;Im, Chun-Seong;Hwang, Yong-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2007.11a
    • /
    • pp.448-452
    • /
    • 2007
  • This study suggests how to evaluate the business model feasibility of Geographic Information Service(GIS) before they are commercialized in Ubiquitous Environments. It suggests the evaluation framework for business feasibility in order to provide a successful method. The framework is consisted of various evaluation dimensions and Indices like technology, marketability, business ability, customer satisfaction and business risk. From this research, we will anticipate a high rate of successful GIS business in respect to various elements related in the commercialization of the former business in ubiquitous environments.

  • PDF

u-Manufacturing needs M2M (Machine to Machine) for Ubiquitous Computing World

  • Cha, Suk-Keun;Song, Jun-Yeob;Choi, Jin-Seok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1112-1114
    • /
    • 2005
  • Core position of the M2M (Machine to Machine) is device integration fusion using an emerging wireless and next internet technologies as well as IEEE 802.x, Bluetooth, Zigbee, DMB, Wibro etc. for ubiquitous environment that is complementary with IT839 strategy from Ministry of Information & Communication. This paper define and deploy about major functional requirements of M2M devices and middleware for how to it works, worldwide M2M technology trend & activities with its current & future application in manufacturing area that is called u-Manufacturing (Ubiquitous Manufacturing).

  • PDF

A Model Driven Architecture and Product Line Engineering Technique for Adaptable Contents Service of Ubiquitous Computing : Applying to Vessel U-Safety Monitoring (유비쿼터스 환경에서 적응적 컨텐츠 서비스를 위한 모델기반 아키텍처와 프로덕트라인 기법 : 선발 U-안전모니터링 시스템응용)

  • Lee, Seo-Jeong;Choi, Mi-Sook
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.32 no.4
    • /
    • pp.611-617
    • /
    • 2008
  • In ubiquitous environments, the content adaptable services can be dynamically provided to adapt the frequent changes of contexts. These services have common things that the kinds of context factors are limited to ubiquitous environment, though the contexts are flexible. To reuse service architecture can be reasonable for effective adaptable service. In this paper, we design a software architecture with product line techniques for content adaptable applications in ubiquitous environment. Description of product line is to define variation points and their variants, to find out the dependencies between them and to keep the model based architecture, their alternatives.

An Application of Ubiquitous Information Technology for Integrated Management of National Park (국립공원 통합관리를 위한 유비쿼터스 정보기술 활용방안)

  • Bae, Min-Ki
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.10 no.3
    • /
    • pp.134-148
    • /
    • 2007
  • There is not enough knowledge on how to use, build, and apply ubiquitous technologies such as the ubiquitous sensor network, GIS, statistic analysis system, mobile GPS system etc. Also there are other questions such as, how should the knowledge information resources be managed and web decision making system developed for national park management. The purpose of this study is to propose a framework for the national park integrated management system based on ubiquitous information technology. This study will include followings: 1) this study explores what ubiquitous information technologies are needed for national park management, 2) this study proposes building strategies about the spatial and attribute database using ubiquitous information technologies, and links methods among geographic information system, analysis program, sensor network, etc. The results of this study will contribute towards deciding a direction for national park policy in preparation for the ubiquitous computing oriented society.

  • PDF