• Title/Summary/Keyword: 사물통신 장치

Search Result 176, Processing Time 0.022 seconds

MACsec Adapter for 2 Layer Security (2계층 보안을 위한 MACsec 어댑터)

  • Jeong, Nahk-Ju;Seo, Jong-Kyoun;Han, Ki-Cheon;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.654-656
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly. Because of today, Becoming the increase in traffic and complex situations to protect the overall traffic, not just certain parts. The MACsec technology has received attention. In this paper, Layer 2 security technology to MACsec. Design the technology MACsec adapter that can easily and readily added to existing Layer 2 network.

  • PDF

Real-Time Eye Detection and Tracking Under Various Light Conditions (다양한 조명하에서 실시간 눈 검출 및 추적)

  • 박호식;배철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.456-463
    • /
    • 2004
  • Non-intrusive methods based on active remote IR illumination for eye tracking is important for many applications of vision-based man-machine interaction. One problem that has plagued those methods is their sensitivity to lighting condition change. This tends to significantly limit their scope of application. In this paper, we present a new real-time eye detection and tacking methodology that works under variable and realistic lighting conditions. Based on combining the bright-Pupil effect resulted from IR light and the conventional appearance-based object recognition technique, our method can robustly track eyes when the pupils ale not very bright due to significant external illumination interferences. The appearance model is incorporated in both eyes detection and tacking via the use of support vector machine and the mean shift tracking. Additional improvement is achieved from modifying the image acquisition apparatus including the illuminator and the camera.

Anomalous Records Detection in Process Data Using Robust Linear Regression (로버스트 선형 회귀를 이용한 공정 데이터의 이상 기록 탐지)

  • Jung, Jin-uk;Jin, Kyo-hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.513-515
    • /
    • 2022
  • Manufacturing data collected using IoT devices in a smart factory environment is generally reliable except for noises caused by external factors. However, unlike manufacturing data that is collected mechanically, process data manually recorded by field-workers can cause problems such as the misspelled entries or the missing entries. Therefore, process data must be validated before being used as training data for artificial intelligence models. In this paper, based on the fact that which is a linear relationship between the power consumption of the MCT machine and the production of the product recorded by the field-workers, we detect anomalous records of the workers using robust linear regression.

  • PDF

Smart Device based ECG Sensing IoT Applications (스마트 디바이스 기반 ECG 감지 IoT 응용 서비스에 관한 연구)

  • Mariappan, Vinayagam;Lee, Seungyoun;Lee, Junghoon;Lee, Juyoung;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.18-23
    • /
    • 2016
  • Internet of things (IoT) is revolutionizing in the patient-Centered medical monitoring and management by authorizing the Smartphone application and data analysis with medical centers. The network connectivity is basic requirement to collect the observed human beings' health information from Smartphone to monitor the health from IoT medical devices in personal healthcare. The IoT environment built in Smartphone is very effective and does not demand infrastructure. This paper presents the smart phone deployed personal IoT architecture for Non-Invasive ECG Capturing. The adaptable IoT medical device cum Gateway is used for personal healthcare with big data storage on cloud configuration. In this approach, the Smartphone camera based imaging technique used to extract the personal ECG waveform and forward it to the cloud based big data storage connectivity using IoT architecture. Elaborated algorithm allows for efficient ECG registration directly from face image captured from Smartphone or Tablet camera. The profound technique may have an exceptional value in monitoring personal healthcare after adequate enhancements are introduced.

An Analysis System Using Big Data based Real Time Monitoring of Vital Sign: Focused on Measuring Baseball Defense Ability (빅데이터 기반의 실시간 생체 신호 모니터링을 이용한 분석시스템: 야구 수비능력 측정을 중심으로)

  • Oh, Young-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.221-228
    • /
    • 2018
  • Big data is an important keyword in World's Fourth Industrial Revolution in public and private division including IoT(Internet of Things), AI(Artificial Intelligence) and Cloud system in the fields of science, technology, industry and society. Big data based on services are available in various fields such as transportation, weather, medical care, and marketing. In particular, in the field of sports, various types of bio-signals can be collected and managed by the appearance of a wearable device that can measure vital signs in training or rehabilitation for daily life rather than a hospital or a rehabilitation center. However, research on big data with vital signs from wearable devices for training and rehabilitation for baseball players have not yet been stimulated. Therefore, in this paper, we propose a system for baseball infield and outfield players, especially which can store and analyze the momentum measurement vital signals based on big data.

Hierarchical Image Processing Method For Context-Awareness On Ubiquitous-Safety(U-Safety) (유비쿼터스 안전관리(U-Safety) 상에서의 상황인지를 위한 계층적 영상 처리 시스템)

  • Lim, Chul-Hoo;Song, Kang-Suk;Jeong, Moo-Il;Lee, Yong-Woog;Moon, SungMo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.553-557
    • /
    • 2009
  • USS(Ubiquitous Smart Space) give services, that fit in with customer's goal, by cognizing various situations that happens in a space and cooperating autonomously objects or services in a space. In USS, U-Safety is a system that cognizes more exact situations with multiple sensors in USS, deals with this and take proper actions. When men reason on situations objectively, it is most ideal that image data among collected data with used various sensors in U-Safety. A senter collects a lot of image data from image input devices equipped in various points and work a multiple situation cognition and inference that are based on this. So, senters spend many resources for processing massive data. This paper proposes hierarchical image processing method that does the first situation cognization in image input devices, blocks only points that situation cognization possibility is high among a total image, and transfers to senters. It improves the efficiency of smooth situation cognization by reducing resources that a senter spends on image processing. So, it reduces proportion of image data in U-Safety.

  • PDF

Lightweight AES-based Whitebox Cryptography for Secure Internet of Things (안전한 사물인터넷을 위한 AES 기반 경량 화이트박스 암호 기법)

  • Lee, Jin-Min;Kim, So-Yeon;Lee, Il-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1382-1391
    • /
    • 2022
  • White-box cryptography can respond to white-box attacks that can access and modify memory by safely hiding keys in the lookup table. However, because the size of lookup tables is large and the speed of encryption is slow, it is difficult to apply them to devices that require real-time while having limited resources, such as IoT(Internet of Things) devices. In this work, we propose a scheme for collecting short-length plaintexts and processing them at once, utilizing the characteristics that white-box ciphers process encryption on a lookup table size basis. As a result of comparing the proposed method, assuming that the table sizes of the Chow and XiaoLai schemes were 720KB(Kilobytes) and 18,000KB, respectively, memory usage reduced by about 29.9% and 1.24% on average in the Chow and XiaoLai schemes. The latency was decreased by about 3.36% and about 2.6% on average in the Chow and XiaoLai schemes, respectively, at a Traffic Load Rate of 15 Mbps(Mega bit per second) or higher.

Lightweight IPsec protocol for IoT communication environments (IoT 통신 환경을 위한 경량 IPsec 프로토콜 연구)

  • Song, In-A;Oh, Jeong-Hyeon;Lee, Doo-Won;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.121-128
    • /
    • 2018
  • Internet of Things architecture connected to the Internet is a technology. However, Many paper research for the lightweight Protocol of IoT Environment. In these Paper excluded secure problem about protocol. So Light weight Protocol has weakness of secure in IoT environment. All of IoT devices need encryption algorithm and authentication message code for certain level of security. However, IoT environment is difficult to using existing security technology. For this reason, Studies for Lightweight IPsec is essential in IoT environment. For Study of Lightweight IPsec, We analyze existing protocols such as IPsec, 6LoWPAN for IEEE 802.15.4 layer and Lightweight IPsec based 6LoWPAN. The result is to be obtained for the lightweight IPsec protocols for IoT environment. This protocol can compatible with Internet network.

Implementation of Ubiquitous Application based on Context-Awareness (상황 인식 기반의 유비쿼터스 어플리케이션 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.744-751
    • /
    • 2008
  • Ubiquitous computing is a new paradigm of telecommunication technology and is embedded with advanced computing technology to process a large amount of data in a normal environment. Generally, ail equipment is embedded with sensors and operating devices to interaction with communication functions. That is why ubiquitous computing must be able to access any devices anywhere at anytime in order to perform appropriate functions. Unfortunately, however, it is difficult to make an optimized design for applications which can effectively interaction with various functions in distributed environment like ubiquitous computing. Therefore, this paper is aimed at deploying interface with server nodules and virtual prototyping by utilizing LabVIEW and embedded application software with additional network function. In addition, given information about sensors collected from context-awareness and location-awareness, it will suggest the ideal ubiquitous application based on context-awareness and apply the advanced application to device control and monitoring through context awareness of lab.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.