• Title/Summary/Keyword: ubiquitous security

Search Result 522, Processing Time 0.024 seconds

Policy-based Authentication Framework in Ubiquitous Computing Environment

  • Lee Ji-In;cho young bok;lee Sang Ho
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.95-98
    • /
    • 2004
  • In this paper, we propose policy-based authentication framework which consists of policy server, CA and a policy language designed for ubiquitous environments. Using policies allows the security functionality to be modified without changing the implementation of the entities involved. Policy-based authentication framework needs to be very expressive but lightweight and easily extensible. We propose the feasibility of our policy language and policy-based authentication framework in ubiquitous-environment through a prototype and solve the problem that traditional framework have a simple registration and authentication to provide dynamic service.

  • PDF

Development of a LonRF Intelligent Device-based Ubiquitous Home Network Testbed (LonRF 지능형 디바이스 기반의 유비쿼터스 홈네트워크 테스트베드 개발)

  • 이병복;박애순;김대식;노광현
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.6
    • /
    • pp.566-573
    • /
    • 2004
  • This paper describes the ubiquitous home network (uHome-net) testbed and LonRF intelligent devices based on LonWorks technology. These devices consist of Neuron Chip, RF transceiver, sensor, and other peripheral components. Using LonRF devices, a home control network can be simplified and most devices can be operated on LonWorks control network. Also, Indoor Positioning System (IPS) that can serve various location based services was implemented in uHome-net. Smart Badge of IPS, that is a special LonRF device, can measure the 3D location of objects in the indoor environment. In the uHome-net testbed, remote control service, cooking help service, wireless remote metering service, baby monitoring service and security & fire prevention service were realized. This research shows the vision of the ubiquitous home network that will be emerged in the near future.

Adaptive Wireless Sensor Network Technology for Ubiquitous Container Logistics Development

  • Chai, Bee-Lie;Yeoh, Chee-Min;Kwon, Tae-Hong;Lee, Ki-Won;Lim, Hyotaek;Kwark, Gwang-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.317-320
    • /
    • 2009
  • At the present day, the use of containers crisscrossing seven seas and intercontinental transport has significantly increased and bringing the change on the shape of the world economy which we cannot be neglected. Additionally, with the recent technological advances in wireless sensor network (WSN) technologies, has providing an economically feasible monitoring solution to diverse application that allow us to envision the intelligent containers represent the next evolutionary development step in order to increase the efficiency, productivity, utilities, security and safe of containerized cargo shipping. This paper we present a comprehensive containerized cargo monitoring system which has adaptively embedded WSN technology into cargo logistic technology. We share the basic requirement for an autonomous logistic network that could provide optimum performance and a suite of algorithms for self-organization and bi-directional communication of a scalable large number of sensor node apply on container regardless inland and maritime transportation.

  • PDF

A Quantitative Assessment Modeling Technique for Survivality Improvement of Ubiquitous Computing System (유비쿼터스 컴퓨팅 시스템의 생존성 개선을 위한 정량적 분석 모델링 기법)

  • Choi, Chang-Yeol;Kim, Sung-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.633-642
    • /
    • 2005
  • Ubiquitous computing system is about networked processors, which is constructed with one or more computers interconnected by the networks. However, traditional security solution lacks a Proactive maintenance technique because of its focusing on developing the qualitative detection and countermeasure after attack. Thus, in this paper, we propose a quantitative assessment modeling technique, by which the general infrastructure can be improved and the attacks on a specific infrastructure be detected and protected. First of all, we develop the definition of survivality and modeling technique for quantitative assessment modeling with the static information on the system random information, and attack-type modeling. in addition, the survivality analysis on TCP-SYN attack and code-Red worm attack is performed for validating the proposed technique.

Development of the OSGi-based USB Terminal System for U-learning (U-learning을 위한 OSGi에 기반한 USB 단말기 시스템 개발)

  • Kim, Hee-Sun;Kim, Jee-Hong;Lee, Chang-Goo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.12
    • /
    • pp.1252-1256
    • /
    • 2007
  • U-learning (ubiquitous learning) systems, which deliver learning materials anytime and anywhere, allow learners to watch live lectures on PDAs, tablet PCs and notebook computers via broadband and wireless Internet. These systems have various problems; first, terminal devices are expensive, and it is difficult to maintain their efficiencies. Secondly, Internet does not guarantee quality of service (QoS), and in general it does not provide real-time services. Finally, the security of these systems is weaker in a local network than in an external network. The USB-based terminal system based on the OSGi service platform was designed as a ubiquitous system, in order to solve those problems. The USB terminals, used in this system, are inexpensive, and it is easy to maintain their performances. Also, this system solves the problems of security in a local network and provides guaranteed QoS. To accomplish this, the number of USB terminals connected to the system has to be limited according to the formula proposed in our paper. This system uses the OSGi specification as a middleware. It supports the discovery mechanism of the USB terminals, maintenance and administration of the system. Finally, this paper shows a driver's license testing system as an example u-learning application1.

Spatial Data Stream Processing Platform for Ubiquitous Application Services (유비쿼터스 응용 서비스를 위한 공간 데이터 스트림 처리 플랫폼)

  • Chung, Weon-Il;Kim, Hwan-Koo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.906-913
    • /
    • 2010
  • Sensors related to the geographic information are gathering strength as core technologies for various ubiquitous services like u-City project for the new town of the future to provide total information services by the high IT infrastructure. These sensors generate the very large real-time streaming data because these are set up and controlled with wide areas of the geographical distribution. On this, we propose an efficient spatial data stream processing system to support various u-GIS services based on geographic sensors.

POS System Integrated with Cross-Platform for Supervision of Restaurant's

  • Alisha Farman;Hira Farman;Saad Ahmed;Anees Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.205-213
    • /
    • 2024
  • As the Restaurant industry is growing rapidly. The demand for an effortless POS (Point Of Sale) system which can make management easy is increasing. So, the purpose of this study is to digitalise the growing industry of restaurants and its consumers by utilizing cross-platform development. Crossplatform development frameworks provide great opportunities to solve the issues of handling ubiquitous devices with minimum efforts to reduce the cost and increase the stability, accessibility of the end consumers. By availing those opportunities, an Integrated POS system with cross platform is proposed. This integrated cross-platform POS system is originally designed for a single restaurant managed by its own private cloud server. This research solves the 2 major problems. One of them is the accessibility of the system on modern devices without even writing platform-specific code with the help of cross-platform development. This included web, mobile, desktops & tablets at the same time with the same codebase. Second one is handling data consistency with ubiquitous devices with the help of cloud infrastructure to make data safe and consistent more than ever. In the Development of this system Dart will be used as the primary programming language for cross-platform development. On the Cloud server system apache will be used as the web server and PHP as server side language. System will be using MySQL as the database server.

u-Middleware for Mobile Device & Security Management based on Ubiquitous Evironment (유비쿼터스 환경에서 이동단말 및 서비스 보안관리를 위한 u-Middleware)

  • Bae Hyun-Chul;Kim Sang-Wook
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.97-100
    • /
    • 2006
  • 본 논문에서는 유비쿼터스 환경에서 네트워크와 이동단말, 서비스 보안관리 연구를 진행하는데 도움이 되고자 이러한 보안관리를 통합적으로 할 수 있는 미들웨어을 만들게 되었으며 플러그인 형태로 무한한 확장성을 포함하여 정보 수집에서 분석, 정책 설정 및 관리, 위치정보 등의 다양한 기능을 제공한다. 또한 도메인 서버간에 협동을 통해 이동단말의 이동에 대한 다양한 보안관리 연구가 가능하도록 한다.

  • PDF

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

A Study on Performance Evaluation and Security Methods of u-IT Electrical Safety Integrated Management System's Module (u-IT 전기안전통합관리시스템의 모듈별 성능평가와 보안방법 연구)

  • Park, Dae-Woo;Kim, Eung-Sik;Choi, Choung-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1447-1452
    • /
    • 2010
  • Ubiquitous society to build basic infrastructure in the power supply and power equipment safety is important. u-City in order to prevent the disaster of u-IT Power Equipment Performance Module and the security for the safety of the u-City is necessary. In this paper, the power unit of u-IT module, temperature sensor, humidity sensor, equipped with sensors arranged throughout the fire, and home distribution boards, Home Network Wall-Pad, Blocker, MPNP black boxes, arc detection, arc safety equipment, outlet of the modular performance evaluation methods and security methods will be studied. u-IT power devices and sensors to analyze the information conveyed by proactive risk and ensure safety, access control, authentication, security safeguards, such as u-IT integrated management system for electrical safety and strengthen the security, safety and security with a u-City will contribute to the construction and operation.