• Title/Summary/Keyword: wireless application

Search Result 1,722, Processing Time 0.036 seconds

A DEVELOPMENT OF RFID/USN-BASED INTELLIGENT EQUIPMENT FOR CONSTRUCTION SUPPLY CHAIN MANAGEMENT

  • Tae-Hong Shin;Su-Won Yoon;Sangyoon Chin;Soon-Wook Kwon;Yea-Sang Kim;Cheolho Choi
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.472-478
    • /
    • 2009
  • The scopes of the supply chain management in construction projects has expanded from the field management focusing on field storage, transportation, and lifting to the whole supply chain from the materials to field. The expansion of the supply chain management can raise the possibilities of leaner production, which enables shortened lead time of the difficult-to-operate materials, and prevents the work interference or delay. However, the expanded management range requires more information and management than an existing management style currently used for factory production of iron frame, curtain wall, PC, etc. In addition, there are limitations that expand the existing management style into the new supply chain management in construction projects and therefore it is required to automate the existing management style in order to extend the management range. The objective of this study is to propose the process and equipment that can manage the supply chain of the materials which range from the factory production to the field storage based on RFID/USN techniques, introducing small-sized transportation equipment(intelligent pallet), the vehicle tool kit(intelligent trailer), and in-and-out management equipment(Gate Sensor) as a prototype to effectively develop the appliances for operating the proposed process, and present the application possibility of the appliances. The full paper will present then the test results that the proposed appliances for the supply chain management automatically transmit and receive the generated information between the appliances or the appliance and sever under various wireless network circumstances such as zigbee, wibro, Wi-Fi, and CDMA.

  • PDF

A Key Redistribution Method for Enhancing Energy Efficiency in Dynamic Filtering based Sensor Networks (동적 여과 기법 기반 센서 네트워크의 에너지 효율을 높이기 위한 키 재분배 결정 방법)

  • Sun, Chung-Il;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.125-131
    • /
    • 2010
  • In wireless sensor networks application, sensor nodes are randomly deployed in wide and opened environment typically. Since sensor networks have these features, it is vulnerable to physical attacks in which an adversary can capture deployed nodes and use them to inject a fabricated report into the network. This threats of network security deplete the limited energy resource of the entire network using injected fabricated reports. A dynamic en-route filtering scheme is proposed to detect and drop the injected fabricated report. In this scheme, node executes the key redistribution to increases the detection power. It is very important to decide the authentication key redistribution because a frequent key redistribution can cause the much energy consumption of nodes. In this paper, we propose a key redistribution determining method to enhance the energy efficiency and maintain the detection power of network. Each node decides the authentication key redistribution using a fuzzy system in a definite period. The proposed method can provide early detection of fabricated reports, which results in energy-efficiency against the massive fabricated report injection attacks.

An Encryption Algorithm Based on Light-Weight SEED for Accessing Multiple Objects in RFID System (RFID 시스템에서 다중 객체를 지원하기 위한 경량화된 SEED 기반의 암호화 알고리즘)

  • Kim, Ji-Yeon;Jung, Jong-Jin
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.3
    • /
    • pp.41-49
    • /
    • 2010
  • Recently, RFID systems are spreading in various industrial areas faster but cause some serious problems of information security because of its unstable wireless communication. Moreover, traditional RFID systems have a restriction that one tag per each application object. This restriction deteriorates their usability because it is difficult to distinguish many tags without some kind of effort. Therefore, efficient information sharing of objects based on information security has to be studied for more spreading of RFID technologies. In this paper, we design a new RFID tag structure for supporting multiple objects which can be shared by many different RFID applications. We also design an encryption/decryption algorithm to protect the identifying information of objects stored in our tag structure. This algorithm is a light revision of the existing SEED algorithm which can be operated in RFID tag environment. To evaluate the performance of our algorithm, we measure the encryption and decryption times of this algorithm and compare the results with those of the original SEED algorithm.

A Life time improvement Method of SVM application LEACH protocol in Wireless Sensor Networks (SVM을 적용한 LEACH 프로토콜 기반 무선센서네트워크의 수명 개선 방법)

  • Pyo, Se Jun;Jo, Yong-Ok;Ok, Tae-Seong;Bang, Jong-Dae;Keshav, Tushar;Lee, Seong-Ho;Ryu, Hui-Eun;Lee, Yeonwoo;Bae, Jinsoo;Lee, Seong-Ro
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.606-608
    • /
    • 2011
  • 무선 센서 네트워크는 특정지역에 센서 노드를 설치하여 주변 정보 또는 특정 목적의 데이터를 수집하고, 그 정보를 수집하는 싱크(Sink)로 구성되어 있다. 무선 센서 네트워크의 수명은 망을 구성하는 센서 노드의 베터리 소비에 따라 수명이 결정 되고 하나의 노드가 죽기 시작하면서부터 급격하게 센서 노드의 베터리 소비가 커져 빠르게 죽는다. 무선 센서 네트워크를 구성하는 센서노드는 라우팅, 센싱을 수행하기 때문에 베터리 소비에 많은 부담을 가지고 있다. 본 논문은 무선 센서 네트워크의 대표적 클러스터링 기반 라우팅 기법인 LEACH(Low - Energy Adaptive Clustering Hierarchy)프로토콜에 SVM(Support Vector Machine)을 적용하여 센서노드의 균형적인 베터리 소비로 망을 효율적으로 관리하고 망의 수명을 개선 할 수 있는 방법을 제안 한다. 이러한 센서 노드의 균형적인 베터리 소비로 무선센서 네트워크의 수명을 개선 한다. 실험결과 기존의 LEACH 프로토콜보다 우수한 성능을 보인다.

Assessing Efficiency of Handoff Techniques for Acquiring Maximum Throughput into WLAN

  • Mohsin Shaikha;Irfan Tunio;Baqir Zardari;Abdul Aziz;Ahmed Ali;Muhammad Abrar Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.172-178
    • /
    • 2023
  • When the mobile device moves from the coverage of one access point to the radio coverage of another access point it needs to maintain its connection with the current access point before it successfully discovers the new access point, this process is known as handoff. During handoff the acceptable delay a voice over IP application can bear is of 50ms whereas the delay on medium access control layer is high enough that goes up to 350-500ms. This research provides a suitable methodology on medium access control layer of the IEEE 802.11 network. The medium access control layer comprises of three phases, namely discovery, reauthentication and re-association. The discovery phase on medium access control layer takes up to 90% of the total handoff latency. The objective is to effectively reduce the delay for discovery phase to ensure a seamless handoff. The research proposes a scheme that reduces the handoff latency effectively by scanning channels prior to the actual handoff process starts and scans only the neighboring access points. Further, the proposed scheme enables the mobile device to scan first the channel on which it is currently operating so that the mobile device has to perform minimum number of channel switches. The results show that the mobile device finds out the new potential access point prior to the handoff execution hence the delay during discovery of a new access point is minimized effectively.

A Study of Vehicle Diagnostic Data Processing using Diagnostic Communications (진단 통신을 활용한 차량 진단데이터 처리 연구)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.267-270
    • /
    • 2021
  • In order to diagnose a vehicle, it is achieved by collecting diagnostic data within the ECU or between ECUs and managing the diagnostic data by utilizing various communication methods through an electronic device composed of an ECU(Electronic Control Unit), which is an automotive electronic device. As communication methods, LIN, CAN, FlexRay are mainly used. Recently, wired/wireless communication is being used based on Ethernet. In order to perform vehicle diagnosis, it is necessary to know the diagnosis code generated by the ECU and to collect diagnosis data using diagnosis communication. In addition, diagnostic data can be managed from the ECU only when the application software required for vehicle diagnosis is configured. If many automobile manufacturers are manufacturing ECUs based on the AUTOSAR standard, which is an automotive electronic standard, the software structure is also configured to be applied according to the standard. In this paper, we understand the vehicle diagnosis communication method of the AUTUSAR standard, study the configuration and processing method of diagnosis data, and study the contents of software components, diagnosis communication, and diagnosis event processing.

  • PDF

A Design of Industrial Safety Service using LoRa Gateway Networks (LoRa 게이트웨이 네트워크를 활용한 산업안전서비스 설계)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.313-316
    • /
    • 2021
  • In the IoT(IoT: Internet of Things) environment, network configuration is essential to collect data generated from objects. Various communication methods are used to process data of objects, and wireless communication methods such as Bluetooth and WiFi are mainly used. In order to collect data of objects, a communication module must be installed to collect data generated from sensors or edge devices in real time. And in order to deliver data to the database, a software architecture must be configured. Data generated from objects can be stored and managed in a database in real time, and data necessary for industrial safety can be extracted and utilized for industrial safety service applications. In this paper, a network environment was constructed using a LoRa(LoRa: Long Range) gateway to collect object data, and a client/server data collection model was designed to collect object data transmitted from the LoRa module. In order to secure the resources necessary for data collection and storage management without data leakage, data collection should be possible in real time. As an application service, location data required for industrial safety can be stored and managed in a database in real time.

  • PDF

A Study on the Causes of Security Vulnerability in 'Wall Pads' ('월패드'의 보안 취약 원인에 관한 고찰)

  • Kim Sang Choon;Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • Recently, smart home technology has been developed with a great response due to the convenience of home automation. Smart home technology provides various services by connecting various Internet of Things (IoT) and sensors to a home network through wired/wireless networks. In addition, the smart home service easily and conveniently controls lighting, energy, environment, and door cameras through a wall pad. However, while it has become a social issue due to the recent hacking accident of wall pads, personal information leakage and privacy infringement are expected. Accordingly, it is necessary to prepare preventive and countermeasures against security vulnerability factors of wall pads. Therefore, this study expects that it can be used as basic data for future smart home application and response technology development by examining the weak causes and countermeasures related to wall pads.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.