• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.025 seconds

The Implementation of Remote Health Monitoring System using a Mobile Platform (모바일 플랫폼을 이용한 원격 건강 감시 시스템 구현)

  • Ryu, Geun Taek;Kim, Chang Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.379-385
    • /
    • 2012
  • This paper suggests U-healthcare system for individual health management realizing the gateway, client, and Java-based network server by using the vital signal measuring system and android-based mobile platform. This study realized the vital signal measuring system based on the technology to measure the ECG, oxygen saturation, blood pressure, and respiration, etc. And all the information of measurement was transmitted to the mobile gateway using the 3-bite transmission protocol consisting of headers and data. The data transmitted to the mobile gateway was used to examine the mobile client's personal health indexes through the network server. This paper realized and tested the android-based gateway, client, and the broadcasting network server and verified their validity with simulations and actual humans. As a result, the U-healthcare system suggested was proved to be effective in managing each individual's health from short distance and long distance. And it could examine each individual's health conditions in real-time and was found to be advantageous in that it could secure the guardian's mobility.

Efficient Buffer Management Scheme for Mitigating Possibility of DDoS Attack (DDoS 공격 가능성 완화를 위한 효율적인 버퍼 관리 기술)

  • Noh, Hee-Kyeong;Kang, Nam-Hi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2012
  • DDoS attack is a malicious attempt to exhaust resources of target system and network capacities using lots of distributed zombi systems. DDoS attack introduced in early 2000 has being evolved over time and presented in a various form of attacks. This paper proposes a scheme to detect DDoS attacks and to reduce possibility of such attacks that are especially based on vulnerabilities presented by using control packets of existing network protocols. To cope with DDoS attacks, the proposed scheme utilizes a buffer management techniques commonly used for congestion control in Internet. Our scheme is not intended to detect DDoS attacks perfectly but to minimize possibility of overloading of internal system and to mitigate possibility of attacks by discarding control packets at the time of detecting DDoS attacks. In addition, the detection module of our scheme can adapt dynamically to instantly increasing traffic unlike previously proposed schemes.

Proposal of a mobility management scheme for sensor nodes in IoT(Internet of Things) (사물인터넷(IoT)환경에서 센서 노드들의 이동성 관리 방안에 관한 제안)

  • Park, Seung-Kyun
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.4
    • /
    • pp.59-64
    • /
    • 2016
  • 6LoWPAN (IPv6 over Low Power Wireless Sensor Network) standardized by IETF does not support the mobility of wireless sensor nodes. Since the wireless sensor node, subject to a lot of constraints in the CPU, memory, a battery is not easy to apply to existing protocols such as Mobile IPv6. In this paper, we propose a novel mobility management architecture and methods to work with 6LoWPAN based on the analysis on FPMIPv6 (Fast PMIPv6) the host is not a handover procedure performed in order to support the mobility of such sensor nodes. It was suggested the use of a dispatch code pattern that is not currently used in 6LoWPAN for inter-working, MAG and MAC, MAC in order to reduce packet loss caused as the authentication delay in the handover process to minimize the power consumption of a sensor node that is caused by the re-transmission the new concept of temporary guarantee (temporary guarantee) and trust relationships (trust relationship) between AAA and introduced.

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.

A Model for Construction Data Integration Based on Growth of Construction Object throughout the Overall Project Phases (프로젝트 단계별 건설객체의 성장에 근거한 건설데이터 통합 모델)

  • Kim Woo-Young
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.143-150
    • /
    • 2003
  • Using integrated construction project data is necessary for efficient management of construction projects. Recently IFC(Industry Foundation Classes) are proposed as integration method based on interoperability and there have been several cases of system integration based on IFC. The concept of interoperability proposes the construction object as data sharing protocol between systems for system integration and independence of each system. This study proposes system development strategy by phases considering work scope and procedure of processes based on the concept of interoperability. This is proposed to overcome tendency of developing system which doesn't support real work processes as result of inclining to the format of IFC instead of properly using IFC's interoperability concept to real work scope and procedure.

  • PDF

Development of Low Latency Secure Communication Device for Legacy SCADA (저지연 Legacy SCADA 보안 통신장치 개발)

  • Choi, Moon-Suk;Kim, Chung-Hyo;Lim, You-Seok;Ju, Seong-Ho;Lim, Yong-Hun;Jeon, Kyung-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.339-346
    • /
    • 2013
  • As the need for security of SCADA systems is increasing, significant progress has been made in research on security of control protocol. However, very few security solutions were adapted to legacy SCADA system. The reasons for non-adoption are latency, cost and key management problem. We propose a low latency, economic security Solution to solve these issues. The proposed solution performs security function in data link layer and has minimum overhead to minimize latency. Furthermore, we try to solve the key management problem by providing systematic security keys and key distribution method.

Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads (패킷 페이로드 내 특정 패턴 탐지 알고리즘들의 성능 분석에 관한 연구)

  • Jung, Ku-Hyun;Lee, Bong-Hwan;Yang, Dongmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.794-804
    • /
    • 2018
  • Various applications running in computers exchange information in the form of packets through the network. Most packets are formatted into UDP/IP or TCP/IP standard. Network management administrators of enterprises and organizations should be able to monitor and manage packets transmitted over the network for Internet traffic measurement & monitoring, network security, and so on. The goal of this paper is to analyze the performance of several algorithms which closely examine and analyze payloads in a DPI(Deep Packet Inspection) system. The main procedure of packet payload analysis is to quickly search for a specific pattern in a payload. In this paper, we introduce several algorithms which detect a specific pattern in payloads, analyze the performance of them from three perspectives, and suggest an application method suitable for requirements of a given DPI system.

An IMS based Architecture Using SDN Controller (SDN 제어기를 사용한 IMS 기반 구조)

  • Liu, Zeqi;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.8
    • /
    • pp.19-24
    • /
    • 2018
  • The IP Multimedia Subsystem(IMS) is an architectural framework for delivering IP multimedia services to mobile users. In order to guarantee the reliability and Quality of Service(QoS) of a variety of multimedia services, we need a new evolutionary approach that maintains the IMS based signaling platform which can perform the processing of flow through distributed controllers. Software Defined Network(SDN) is an architecture purporting to be distributed, dynamic, cost-effectives as well as adapting and seeking to be suitable for the high-bandwidth, dynamic nature of today's applications. It requires some methods for the control plane to communication with the data plane. One of such mechanisms is OpenFlow which is a prominent standard protocol and interface that is responsible for managing the network resources by using the remote SDN controller. In this paper, we propose a straightforward approach for integrating SDN technology together with the IMS architecture. Therefore we propose and construct a combined architecture model that performs flow processing using OpenFlow via the IMS based signaling platform, which maintains the existing telecom call service. Additionally, we describe some relevant experimentation results from the proposed architecture.

Implementation of a Samsulnori Ensemble System using a Touch Interface (터치 인터페이스를 이용한 사물놀이 협주 시스템 구현)

  • Lee, Yong-Woong;Cho, Jong-Sik;Ju, Jong-Gil;Lee, Ho-Chul;Hwang, Jeong-Hwan;Shin, Chang-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.213-221
    • /
    • 2010
  • Recently, as the scale of the cultural content business market is being growed, it required that we should introduce the Korean music culture which is unique and competitive cultural contents to the worldwide. This paper proposes a Samulnori Ensemble System (SES), using a touch interface which plays the Korean traditional musical instruments. A SES consists of the Control Device which supports touch functions, the Performance Manager that detects signals from the Control Device and plays a melody, and the Communication Manager making a ensemble among the possible devices. Also, using the Network Time Protocol which is part of Synchronization Manager can be paly different speed communication environments. We utilized multi-touch functions to operate the system. We also implemented multi-touch interface and multi-play with other player for fun and interesting who are not interested Samulnori.

A Study on the Acquisition of Usage Statistics based on SUSHI Project (SUSHI 기반 학술정보 이용통계 수집 모델 연구)

  • Kim, Sun-Tae;Lim, seok-Jong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.35-39
    • /
    • 2007
  • Recently Usage statistics are widely available from online content providers. However. the statistics are not yet available in a consistent data container and the administrative cost of individual provider-by-provider downloads is high. The Standardized Usage Statistics Harvesting Initiative (SUSHI) is developing an automated request and response protocol for moving Project COUNTER (Counting Online Usage of Networked Electronic Resources) Code of Practice usage statistics from providers to library electronic repositories. SUSHI will help libraries make better decisions by reducing the administrative overhead of using Project COUNTER statistics. Publishers in the recording and exchange of usage statistics for electronic resources, initially journals and databases. By following COUNTER's Code of Practice, vendors can provide library customers with Excel or CSV (comma delimited) files of usage data using COUNTER's standardized formats and data elements. The result is a consistent, credible, and compatible set of usage data from multiple content providers. On this study, We propose the acquisition model of usage data based on SUSHI for KESLI that is overseas electronic journal consortium in korea.

  • PDF