• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.028 seconds

Ontology-based IoT Platform for Improving Interoperability (상호운용성 향상을 위한 온톨로지 기반의 IoT 플랫폼)

  • Lee, Kangjun;Jang, Woolin;Yang, Byeongheon;Lee, Seungyeon;Jeong, Dongwon;Lee, Sukhoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.6-8
    • /
    • 2021
  • Recently, the Internet of Things technologies are continuously advanced, and IoT devices are being used in various domain. IoT platforms should not only collect and manage data by connecting to various devices, but also monitor and control them. However, conventional IoT platforms have different data types and protocols, and have the problem of not monitoring or controlling cross-platform devices. This research proposes an ontology-based IoT platform to resolve this problem. Therefore, this research analyzes the types and characteristics of conventional IoT platforms, and this paper proposes a new platform architecture based on the analysis. The proposed platform is expected to flexible data management and improvement of interoperability between other platforms by utilizing ontology technology.

  • PDF

Smart Healthcare: Enabling AI, Blockchain, VR/AR and Digital Solutions for Future Hospitals (스마트 헬스케어: 미래 병원을 위한 AI, 블록체인, VR/AR 및 디지털 솔루션 구현)

  • Begum, Khadija;Rashid, Md Mamunur;Armand, Tagne Poupi Theodore;Kim, Hee-Cheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.406-409
    • /
    • 2022
  • In recent years, the developments in technologies, such as AI systems, Blockchain, VR/AR, 3D printing, robotics, and nanotechnology, are reshaping the future of healthcare right before our eyes. And also, healthcare has seen a paradigm shift towards prevention-oriented medicine, with a focus on consumers requirements. The spread of infectious diseases such as Covid-19 have altered the definition of healthcare and treatment facilities, necessitating immediate action to redesign hospitals' physical environments, adapt communication models to address social distancing requirements, implement virtual health solutions, and establish new clinical protocols. Hospitals, which have traditionally served as the hub of healthcare systems, are pursuing or being forced to reestablish themselves against this landscape. Rather than only treating ailments, future healthcare is predicted to focus on wellness and prevention. In personalized care, long-term prevention strategies, remote monitoring, early diagnosis, and detection are critical. Given the growing interest in smart healthcare defined by these modern technologies, this study looked into the definitions and service kinds of smart healthcare. The background and technical aspects of smart hospitals were also explored through a literature review.

  • PDF

A Token-Ring-Based MAC Protocol in IEEE 802.11 WLANs (IEEE 802.11 무선 랜에서의 토큰링 기반의 매체 접속 제어 프로토콜)

  • Lee, Eun Guk;Rhee, Seung Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.38-40
    • /
    • 2014
  • In this paper, proposed method achieves delay reduction and throughput improvement by utilizing token-ring method in infrastructure network. Access Point gives token passing effect by successively transmitting ACK frame including a node's Association ID. Not only can this method considerably reduce time for medium access, but also improve throughput. Furthermore, AP offers more frequent medium access opportunity to node having highest data queue among nodes associated by AP. these method can evenly offer medium access opportunity according to Queue's volumes.

Low Overhead System Monitoring Based on SNMP for Embedded Systems (임베디드 시스템들을 위한 SNMP 기반의 저부하 시스템 모니터링)

  • Kim Tae-Su;Kim Dong-Uk;Kim Yong-Seok
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.3 s.309
    • /
    • pp.1-9
    • /
    • 2006
  • SNMP is a standard protocol for management of networking devices. Nowadays, most computer systems have capability to act as SNMP agents. In this paper, we developed a low overhead version of SNMP library for embedded systems, and implemented a monitoring software based on the library for a large number of target systems. The monitoring system consists of a monitoring server, SNMP agents, and client programs. The monitoring server collects status information from SNMP agents running on the monitoring targets, and sends summary information to client programs. We implemented two versions of clients, Java based standalone program and Web based program.

Mutual Authentication and Key Establishment Mechanism for Secure Data Sharing in M2M Environment (M2M 환경에서 안전한 데이터 공유를 위한 상호인증 및 키 교환 기법)

  • Park, JungOh;Kim, Sangkun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.33-41
    • /
    • 2015
  • With rapid rise of virtualization technology from diverse types of cloud computing service, security problems such as data safety and reliability are the issues at stake. Since damage in virtualization layer of cloud service can cause damage on all host (user) tasks, Hypervisor that provides an environment for multiple virtual operating systems can be a target of attackers. This paper propose a security structure for protecting Hypervisor from hacking and malware infection.

Design and Implementation of Flooding based Energy-Efficiency Routing Protocol for Wireless Sensor Network (무선 센서네트워크에서 에너지 효율을 고려한 단층기반 라우팅 프로토콜의 설계와 구현)

  • Lee, Myung-Sub;Park, Chang-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.371-378
    • /
    • 2010
  • In this paper, we propose a new energy-efficient routing algorithm for sensor networks that selects a least energy consuming path among the paths formed by node with highest remaining energy and provides long network lifetime and uniform energy consumption by nodes. The pair distribution of the energy consumption over all the possible routes to the base station is one of the design objectives. Also, an alternate route search mechanism is proposed to cope with the situation in which no routing information is available due to lack of remaining energy of the neighboring nodes. Simulation results show that our algorithm extends the network lifetime and enhances the network reliability by maintaining relatively uniform remaining energy distribution among sensor nodes.

A Distributed Low-cost Dynamic Multicast Routing Algorithm with Delay Constraints (지연시간을 고려한 최소비용의 동적 멀티캐스트 라우팅 알고리즘)

  • Sin, Min-U;Im, Hyeong-Seok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.4
    • /
    • pp.180-187
    • /
    • 2002
  • Many real-time multimedia applications, such as video conferencing have stringent end-to-end delay constraints and consume large amount of network resources. In order to support these applications efficiently, multicast routing algorithms computing least cost multicast trees that satisfy a given end-to-end delay constraint are needed. However, finding such a tree is known to be computationally expensive. Therefore, we propose a heuristic distributed multicast routing algorithm that reduces a “finding multicast tree”that satisfies a given end-to-end delay constraint and minimizes the average resulting tree cost. Also, simulation results show that the proposed algorithm has much better average cost performance than other existing algorithms.

A Study on Repository Construction Scheme for Scholarly Communication (학술정보유통을 위한 레포지터리 적용 방안 연구)

  • Jang Kum-Yeoun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.38 no.4
    • /
    • pp.291-310
    • /
    • 2004
  • Institutional Repository offers integrated capture, management. preservation and access intellectual asset of individual institution and is also considered as a strategy to disseminate and exchange intellectual output as part of global 'Knowledge Bank'. A case of Institutional Repository, 'dCollection,' was introduced in Korea Education & Research Information Service(KERIS) as an institutional repository solution. This paper drew related issues in order to apply institutional repository to domestic universities. The results will bring a paradigm shift in scholarly communications, as a guideline of institutional repositories in the university libraries.

Design and Implementation of an Authentication System for Anti-Forgery using the Smart Card (스마트카드를 이용한 위조방지 인증 시스템 설계 및 구현)

  • Kim, Eun;Lee, Yun-Seok;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.249-257
    • /
    • 2011
  • To protect the market for various products, existing authentication techniques using ID, hologram and RFID have been gradually developed. However, these methods can be easily exposed the authentication information, and also these exposed information easily copy. Thus, production of the counterfeit goods can not completely prevent. In this paper, to solve these problems, we designed JCVM file system for saving and managing the authentication information, user's information and a sales agency information into the smart card. And we designed and implemented an authentication protocol that can authenticate to avoiding exposure using processor of the smart card. Through this, this proposed scheme can prevent occurrences of the counterfeit goods. And also, can be used for authentication as any product that can attach the smart card.

Detection and Location-based Visualization of Anomalous Web Sessions (비정상 웹 세션 탐지 및 지역 기반 시각화)

  • Kim, Sang-Rok;Lee, Jun-Sup;Seo, Jeong-Seok;Cha, Sung-Deok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.616-620
    • /
    • 2006
  • 한 해에도 수많은 해킹 사고가 발생하고 있고, 이 중에서 웹 해킹이 차지하는 비율은 급격하게 증가하고 있다. 또한 최근의 해킹 동향을 분석해 보았을 때 웹 해킹의 비율은 더욱 증가할 것이라고 예상된다. HTTP 프로토콜을 이용한 공격의 특성 상 정상행위와 비정상 행위의 구분이 어렵다. 따라서 웹 서비스에 특화된 침입탐지 시스템이 요구된다. 또한 웹 사이트 관리자는 빠른 탐지와 대응을 위해 이상 행위에 대한 신속하고 정확한 인식을 필요로 한다. 본 논문에서는 이러한 필요성을 기반으로 Location-based Visualization Tool을 제안한다. 웹 사용 현황 및 이상행위에 대해 시각적인 정보를 제공하기 위해 웹 서버의 access log를 분석하여 이상 행위를 탐지하였고, IP정보를 기반으로 지역 정보의 시각화를 구현하였다.

  • PDF