• Title/Summary/Keyword: 스마트 워크

Search Result 1,495, Processing Time 0.029 seconds

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

ICT and the Changing Nature of Work: Work Fragmentation (ICT와 업무의 변화 - 일의 파편화 관점에서 -)

  • Lee, Seyoon;Park, Jun-Gi;Lee, Jungwoo
    • Informatization Policy
    • /
    • v.21 no.1
    • /
    • pp.35-56
    • /
    • 2014
  • Information and communication technologies(ICT) allow and force people to work anywhere, anytime using remote databases and application systems available in real-time twenty four hours a day and seven days a week. With the real time nature of ICT, individual work is becoming more and more fragmented. Instead of working on a similar task repeatedly, individuals are required to respond to e-mails and inquiries through social networks, work on planning documents, work on presentation documents, work on spreadsheets, input necessary data on company databases, generate necessary reports from the database, run teleconference, etc., all maybe in a day's work. Work fragmentation may impact negatively on productivity as the flow is interrupted, but it may increase the productivity by allowing people to handle multiple tasks in a shorter time period. This study explores the types of work fragmentation and their characteristics. An online survey was administered to collect data about work fragmentation and work characteristics including autonomy, complexity, flexibility, usage of ICT, etc. 300 cases were used in the analysis. Analysis of k-mean cluster indicated four different types of work fragmentation: concentrated, temporally distributed, spatially distributed, and fully fragmented.

Design for Distributed Simulator using Wired and Wireless Devices (유무선 단말기를 이용한 분산 시뮬레이터 설계)

  • Jo, Soo-Hyun;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.41-48
    • /
    • 2011
  • Wireless communication technology developed, portable wireless devices based on wireless network including the smartphone rapidly developed, and products with functions similar to highly efficient computer are being launched. Therefore, active studies to enable performance of works, which were previously held in computers, on portable wireless terminal are being held. Until now, simulation was undertaken using computers which satisfy high performance computing resource. Such contains a problem that it cannot break away the limit of space. Portable wireless terminal has the merit that it can break away from the limit of space by using wireless network in comparison to wired environment. In this paper, it suggests a simulator based on wireless devices for distributed simulation. For such purpose, the performance time of simulation will be compared in regards to the case of performing nodes control simulation in a single highly efficient computer and the case of performing distributed simulation in many wired and wireless network environments. Through the comparison, the possibility for utility of portable wireless terminal as the object of distributed simulation will be verified, and it will be presented that simulation can be performed in a shorter time by performing distributed simulation under various wired and wireless network environments away from the limit of space.

Packet Off-Loading Scheme Using a Femto-Cell Local Gateway and D2D Communication at Remote Shipyards (원격 조선소의 펨토셀 로컬 게이트웨이와 D2D 통신 기술을 이용한 패킷 오프로드 방식)

  • Han, Kyeongil;Cho, Yongcheon;Lee, Seongro;Min, Sangwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1139-1145
    • /
    • 2014
  • In shipyard site, a ship is constructed by integrating lots of modules that are made in several sites with different capabilities and specifications. Recently, it needs to make a shipyard to be smart communicating various multimedia information with wired and wireless broadband networks between hierarchical shipyards. In this paper, we propose an additional function of an LTE femtocell local gateway at a remote shipyard, an information exchange method between hierarchical shipyards, and an offload method to separate the general traffic. To reduce traffic of duplicated requests in shipyard, we apply a D2D communication scheme for supporting communication between shipyard equipments without IP service network. Hence, it is expected to increase the productivity of shipyard industry with mobile communications, D2D and broadband Internet technologies.

Content Delivery Network Based on MST Algorithm (MST 알고리즘 기반 콘텐츠 전송 네트워크에 관한 연구)

  • Lee, Hyung-ok;Kang, Mi-young;Nam, Ji-seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.178-188
    • /
    • 2016
  • The traffic in the wired and wireless networks has increased exponentially because of increase of smart phone and improvement of PC performance. Multimedia services and file transmission such as Facebook, Youtube occupy a large part of the traffic. CDN is a technique that duplicates the contents on a remote web server of content provider to local CDN servers near clients and chooses the optimal CDN server for providing the content to the client in the event of a content request. In this paper, the content request message between CDN servers and the client used the SCRP algorithm utilizing the MST algorithm and the traffic throughput was optimized. The average response time for the content request is reduced by employing HC_LRU cache algorithm that improves the cache hit ratio. The proposed SCRP and HC_LRU algorithm may build a scalable content delivery network system that efficiently utilizes network resources, achieves traffic localization and prevents bottlenecks.

Design and Implementation of a Multi-Interface Access Point with Inter-interface Dynamic Load Balancing (인터페이스간 동적 부하 분배를 고려한 다중 인터페이스 액세스 포인트 설계 및 구현)

  • Kim, Tae-Keun;Seo, Hyung-Yoon;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5A
    • /
    • pp.348-357
    • /
    • 2012
  • Recently, smartphone, notebook, PC and other supporting wireless LAN device have come into wide use. By increasing user that use wireless LAN device, wireless traffic also increased. If wireless traffic through one AP is increase, it causes throughput decrease. To solve this problem, wireless LAN service provider install more AP where overload occurred. But this is not enough. Because stations can't know AP's load factor, and APs do nothing for load balancing. In this paper, we propose Multi-Interface Access Point(MIAP) to solve this problem. MIAP operate same as multiple APs with multi-interface, and MIAP measure each interface's load periodically. If MIAP detect overloaded interface, MIAP transfer station from overloaded interface to under-loaded interface. We conducted an experiment for verifying existing problem, and we found this problem occurred. We plan an experiment scenario for a comparison between existing AP and MIAP, and excute these experiment. In the result, we show MIAP with load balancing can improve total throughput about 72% and stabilize delay jitter than existing AP.

International Standardization and Implementation of Home Energy Saving System for Smart Grid (스마트 그리드를 위한 홈 에너지 절감 시스템의 IEC 국제표준화 및 구현)

  • Choi, Kwang-Soon;Lee, Sang-Won;Park, Young-Choong;Jung, Kwang-Mo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1222-1229
    • /
    • 2012
  • For the reduction of electric energy consumption and its efficient use at homes or buildings, a new work item proposal for new architecture and functional requirements of Energy Saving System (ESS) was proposed to IEC TC 100 and accepted as a new project, IEC PT 62654 in 2009. Recently, the final ballot for publication passed without negative votes and IEC TS 62654 was finally published in August 2012. For the verification of this standard, Prototype of ESS system composed of an ESS server, ESS clients, and portable ESS terminal were especially implemented in parallel with the standardization. Electric Power Control and Management (EPCM) protocol for the communication between ESS server and clients was also implemented, which supports self-configuration of ESS network, power consumption monitoring, remote power control, and additional functions for intelligent energy saving services.

Performance Analysis of Collaborative Wideband Sensing Scheme based on Energy Detection with User Selection for Cognitive Radio (에너지검출 기반 협력 광대역 센싱에서 사용자 선택에 따른 센싱 성능 분석)

  • Lee, Mi-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.72-77
    • /
    • 2011
  • Spectrum sensing is a critical functionality of CR network; it allow secondary user to detect spectral holes and to opportunistically use under-utilized frequency bands without causing harmful interference to primary use. Recently, wideband service has been increase for processing abundance of data traffic. So CR network needs a realizable implementation design of spectrum sensing for wideband. To get high resolution performance of wideband sensing must precede algorithm processing for reliability signal detection. By the way, the performance of spectrum sensing can be degraded due to fading and shadowing. In order to overcome this problem, we propose system model of wideband sensing scheme on energy detected collaborative technique. we divide wideband into narrowbands and use narrowbands to detect signal excepting some narrowbands including bad channel through the CSI. And we simulate and analyze in terms of detection probability with various SNR.

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.

Trend Analysis of Malwares in Social Information Based Android Market (소셜 기반 안드로이드 마켓에서 악성 앱 경향성 분석)

  • Oh, Hayoung;Goo, EunHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1491-1498
    • /
    • 2017
  • As the use of smartphones and the launch of various apps have increased rapidly, the number of malicious apps has also increased, and the damage is continuing. The Google Market where Android apps are registered is inevitably present at the same time as normal apps and malicious apps even though there are regulations for app registration. Especially, as social networks are activated, users are connected with social networks, and the ratings, downloads and awareness information are reflected in the number of downloaded apps. As a result, when users choose their apps by simply reflecting ratings, popularity, popular comments, and highly-categorized apps, malicious app downloads can sometimes cause significant harm. Therefore, this study first analyzed the tendency of malicious apps by directly crawling and analyzing long-term social information in the currently active Android market.