• Title/Summary/Keyword: 데이터 수집 프로토콜

Search Result 311, Processing Time 0.029 seconds

Middleware API Design for CoAP Usage (CoAP 사용을 위한 미들웨어 API 설계)

  • Kwon, Hak;Ra, Younggook;Jo, JaeDeok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2017
  • Developing the TCP/IP standard IBA which is higher organization of IETF decided to attach the TCP/IP protocol stack to small things, such as sensor. This means small object is also considered as on of the communication node, it has symbolic meaning that expand smart object has all five layer. Under this background, IoT/WoT configure the intelligent network between objects based on the internet to communication was introduced. Things has own IP address on IoT environment and are smart object that a lot of people communicate over the internet on Application Layer. In other words, IoT is that smart object are commercialized space. According to the interest of IoT, IETF establish CoAP for use as IoT protocol. CoAP is expected that standard protocols created by things is connected to the Internet protocol that can be used within a constrained environment. Accordingly, in this paper, we proposed Middleware API that can manage and collect the data of objects that connected CoAP network.

An Improved Coverage Efficient Clustering Method based on Time Delay for Wireless Sensor Networks (무선 센서 네트워크에서 시간지연 기반 향상된 커버리지 효율적인 클러스터링 방안)

  • Gong, Ji;Kim, Kwang-Ho;Go, Kwang-Sub;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.1-10
    • /
    • 2009
  • Energy efficient operations are essential to increase the life time of wireless sensor network. A cluster-based protocol is the most common approach to preserve energy during a data aggregation. This paper deals with an energy awareness and autonomous clustering method based on time delay. This method consists of three stages. In the first phase, Candidate Cluster Headers(CCHs) are selected based on a time delay which reflects the remaining energy of a node, with considering coverage efficiency of a cluster. Then, time delay is again applied to declare Cluster Headers(CHs) out of the CCHs. In the last phase, the issue on an orphan node which is not included into a cluster is resolved. The simulation results show that the proposed method increases the life time of the network around triple times longer than LEACH(Low Energy Adaptive Cluster Hierarchy). Moreover, the cluster header frequency is less diverse, and the energy on cluster heads is less spent.

MCUP: Multi-level Code Updata Protocol for Resource-constrained (MCUP: 자원 제약하의 센서 노드를 위한 다중 수준 코드 갱신 기법)

  • Yi, Sang-Ho;Min, Hong;Kim, Seok-Hyun;Cho, Yoo-Kun;Hong, Ji-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.435-440
    • /
    • 2007
  • Wireless sensor networks are sensing, computing, and communication infrastructures that allow us to sense events in the harsh environment. The networks consist of many deployed sensor nodes. Each sensor node senses and transmits the sensed data to the administrator or base station of the networks. The sensor nodes are generally remotely-deployed, and therefore, software update must be done at run-time via communication channel. The software code update protocol should be energy-efficient to maximize lifetime of the sensor nodes. In this paper, we present a MCUP, which is a multi-level code update protocol for resource-constrained sensor nodes. MCUP enables energy-efficient code update by supporting multi-level code management. Our simulation results show that MCUP can reduce energy consumption compared with the existing one-level code update schemes.

  • PDF

Secure and Efficient Database Searching in RFID Systems using Tag-Grouping Based on Hash-Chain (RFID 시스템에서 Hash-Chain기반 Tag-Grouping을 이용한 안전하고 효율적인 데이터베이스 검색)

  • Lee, Byeung-Ju;Song, Chang-Woo;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.9-17
    • /
    • 2009
  • RFID (Radio Frequency Identification) is a next generation technology that will replace barcode. RFID can identify an object by reading ID inside a RFID tag using radio frequency. However, because a RFID tag replies its unique ID to the request of any reader through wireless communication, it is vulnerable to attacks on security or privacy through wiretapping or an illegal reader's request. The RFID authentication protocol has been studied actively in order to solve security and privacy problems, and is used also in tag search. Recently, as the number of tags is increasing in RFTD systems and the cost of data collection is also rising, the importance of effective tag search is increasing. This study proposed an efficient search method that solved through ta9 group the problem of large volume of database computation in Miyako Ohkubo's hash chain mechanism, which meets requirements for security and privacy protection. When we searched first the group of tags with access rate of 5 or higher in a database with 100,000 records, search time decreased by around 30%.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

Analysis of Domestic and Foreign Financial Security Research Activities and Trends through Topic Modeling Analysis (토픽모델링 분석 기법을 활용한 국내외 금융보안 분야 연구동향 분석)

  • Chae, Ho-Geun;Lee, Gi-Hyun;Lee, Joo-Yeoun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.1
    • /
    • pp.83-95
    • /
    • 2021
  • In this study, major research trends at home and abroad were compared and analyzed in order to derive key research fields in the financial security field and to suggest directions. To this end, 689 domestic and 20,736 foreign data were collected from domestic and international academic journal DB, and major research fields related to financial security were extracted through LDA analysis. After that, hot & cold topics were derived through time series linear regression analysis. As a result of the analysis, studies related to government policy issues, personal information, and accredited certification were derived as promising research fields in Korea. In the case of foreign countries, related studies were drawn to develop advanced security systems such as cryptographic protocols and quantum security. Recently, it has become possible to apply various security technologies in Korea through the abolition of public certification. Accordingly, as changes in promising research fields are expected, the results of this study are expected to contribute to the establishment and development of a successful roadmap for domestic financial security.

Smart Centralized Remote Security Service Provisioning Framework for Open ICT Environment (개방형 ICT 환경을 위한 집중식 원격 보안 서비스 프로비저닝 프레임워크 구성 방안)

  • Park, Namje
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.2
    • /
    • pp.81-88
    • /
    • 2016
  • Machine-to-Machine (M2M) communication provides each component (machine) with access to Internet, evolving into the IoT technology. IoT is a trend where numbers of devices provide the communication service, using the Internet protocol. As spreading the concept of IoT(Internet of Things), various objects become home information sources. According to the wide spread of various devices, it is difficult to access data on the devices with unified manners. Under this environment, security is a critical element to create various types of application and service. In this paper propose the inter-device authentication and Centralized Remote Security Provisioning framework in Open M2M environment. The results of previous studies in this task is carried out by protecting it with the latest information on M2M / IoT and designed to provide the ultimate goal of future M2M / IoT optimized platform that can be integrated M2M / IoT service security and security model presents the information.

Design and Implementation of Modbus Communications for Smart Factory PLC Data Collection (스마트팩토리 PLC 데이터 수집을 위한 Modbus 통신 설계 및 구현)

  • Han, Jin-Seok;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.77-87
    • /
    • 2021
  • Smart Factory refers to a factory that can be controlled by itself with an intelligent factory that improves productivity, quality and customer satisfaction by combining the entire process of manufacturing and production with digital automation solutions. The manufacturing industry around the world is rapidly changing, with Germany, Europe, and the United States at the center. In order to cope with such changes, the Korean government is also implementing a policy to spread the supply of smart factories for small and medium-sized companies, and related ministries and agencies such as the Ministry of Commerce, Industry and Energy, the Ministry of SMEs and Venture Business, the Korea Institute of Technology and Information Promotion, and local technoparks, as well as large companies such as Samsung, SK and LG are actively investing in smart manufacturing projects to support smart factories[1]. Factory Automation (FA) construction has many issues regarding the connection of heterogeneous equipment. The most difficult aspect of configuring various communications from various equipment is the reason. Although it may not be known if there are standards or products made up of the same company, it is not easy to build equipment that is old, up-to-date, and different use environments through a series of communications. To solve this problem, we would like to propose a method of communication using Modbus, one of FieldBus, which is one of the many industrial devices of PLC, a representative facility control system, and is used as a communication standard.

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment (스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계)

  • Kim, Jeong-Ho;Heo, Jae-Wook;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.550-558
    • /
    • 2019
  • As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

Determining Ion Collection Efficiency in a Liquid Ionization Chamber in Co-60 Beam (Co-60 빔에서 액체 전리함의 이온 수집 효율 결정 연구)

  • Choi, Sang Hyoun;Kim, Chan Hyeong
    • Progress in Medical Physics
    • /
    • v.25 no.1
    • /
    • pp.46-52
    • /
    • 2014
  • Liquid ionization chamber is filled with liquid equivalent material unlike air filled ionization chamber. The high density material allow very small-volume chamber to be constructed that still have a sufficiently high sensitivity. However liquid ionization chamber should be considered for both initial recombination and general recombination. We, therefore, studied using the Co-60 beam as the continuous beam and the microLion chamber (PTW) for comparing the ion collection efficiency by Greening theory, two-dose rate method and our experiment method. The measurements were carried out using Theratron 780 as the cobalt machine and water phantom and 0.6 cc Farmer type ionization chamber was used with microLion chamber in same condition for measuring the charge of microLion chamber according to the dose rates. Dose rate was in 0.125~0.746 Gy/min and voltages applied to the microLion chamber were +400, +600 and +800 V. As the result, the collection efficiency by three method was generally less than 1%. In particular, our experimental collection efficiency was in good agreement within 0.3% with Greening theory except the lowest two dose rates. The collection efficiency by two-dose rate method also agreed with Greening theory generally less than 1%, but the difference was about 4% when the difference of two dose rates were lower. The ion recombination correction factors by Greening theory, two-dose rate method and our experiment were 1.0233, 1.0239 and 1.0316, respectively, in SSD 80 cm, depth 5 cm recommended by TRS-398 protocol. Therefore we confirmed that the loss by ion recombination was about 3% in this condition. We think that our experiment method for ion recombination correction will be useful tool for radiation dosimetry in continuous beam.