• Title/Summary/Keyword: 외부 기술 연구개발 정보 네트워크

Search Result 55, Processing Time 0.023 seconds

A Study on the Implementation of WBAN-Based Medical Gateway (WBAN 기반의 의료용 게이트웨이 구현에 관한 연구)

  • Park, Yong-Min
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.640-647
    • /
    • 2014
  • The WBAN technology means a short distance wireless network which provides each device's interactive communication by connecting devices inside and outside of body located within 3 meters. It is necessary to develop core technology that the WBAN middleware and application service for WBAN sensor network. A device for gathering patient's biometric information was used zigbex of Hanbaek electronics and we designed the message structure which is collected the biometric information. The gateway design and implementation for the WBAN environment. The embedded system was HBE-empos II of Hanbaek electronics and the WBAN network is implemented to BNC and BN that used for hbe-ubi-zigbex. It was confirmed that the proposed sensor gateway could be used for the interconnection of the proposed system with other networks.

Unauthorized Software Blocking Techniques in Software Defined Network (SDN) Environments (Software Defined Network(SDN) 환경에서 비인가 소프트웨어 차단 기법)

  • Kang, Nam-Gil;Kwon, TaeWook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.393-399
    • /
    • 2019
  • In a situation where an unauthorized SW brought into the organization without being authorized is emerging as a threat to the network security, the security of the network based on the SDN(Software-Defined Network) can be strengthened through the development of the security application considering the organization's characteristics. Security technology of existing SDN environment has been studied to protect internal network from external networks such as firewalls and Intrusion Detection Systems, but the research for resolving insider threat was insufficient. Therefore, We propose a system that protects the internal network from unauthorized SW, which is one of the insider threats in the SDN environment.

Automotive ECU Biometric Authentication Using Blockchain (블록체인을 이용한 자동차 ECU 생체인증 기법)

  • Hong, Ji-Hoon;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.39-43
    • /
    • 2020
  • The Internet of Things plays a role as an important element technology of the 4th Industrial Revolution. This study is currently developing intelligent cars with IT technology, and is at a time when the development of intelligent cars is active and network data communication is possible. However, security solutions are needed as security is still at a weak stage, which can be threatened by intrusions into the network from outside. In this paper, in order to improve security of intelligent cars without causing security problems, we will apply blockchain technology, propose biometric authentication techniques using users' biometric information, and continue to study them in the future.

Applying Preemptive EDF Scheduling to TinyOS (TinyOS에 선점형 EDF 스케줄링 적용)

  • Yoo, Jong-Sun;Heu, Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06b
    • /
    • pp.313-317
    • /
    • 2008
  • 센서 네트워크는 여러 분야에서 활용할 수 있는 기술이다. 센서 노드가 외부에서 채취한 데이터를 실시간으로 사용자에게 전달하는 것은 매우 중요하다. UC 버클리에서 개발된 TinyOS는 센서 노드에서 동작하는 운영체제 중 가장 많이 사용되고 있다. TinyOS는 Event-driven 방식이며 Component 기반의 센서 네트워크 운영체제이다. 기본적으로 비선점 방식의 스케줄러를 사용함으로써 TinyOS의 실시간성을 보장하기 어렵다. 최근 연구에서 TinyOS의 빠른 반응성을 위해 Priority Level Scheduler라는 선점 기능이 제안되었다. 여기서 본 논문은 TinyOS의 실시간성의 보장을 위해 Priority Level Scheduler에 EDF(Earliest Deadline First)를 적용한 선점형 EDF 스케줄링 방식을 제안하고자 한다.

  • PDF

The Analysis of Knowledge Information Research and Development Activities for the Fourth Industrial Revolution: Focusing on the U.S. Intelligence Advanced Research Projects Activity(IARPA) (4차 산업혁명 시대 대응을 위한 지식정보 연구·개발 활동 분석: 미국 정보고등연구기획국(IARPA)을 중심으로)

  • Jeong, Yong-Il;Chung, Do-Bum;Mun, Hee Jin
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.1-14
    • /
    • 2020
  • Leading the fourth industrial revolution era requires science and technology strategies that establish original research directions at the national level. To this end, it is necessary to look at the research and development activities for the fourth industrial revolution of technology-leading countries. In this study, the research programs of the U.S. Intelligence Advanced Research Projects Activity(IARPA), an organization focusing on cutting edge research on science and technology information such as artificial intelligence, are investigated by using network analysis. The findings show that, resolving around the information identification and forecasting, decision making and cybersecurity clusters, IARPA's research programs largely focus on finding hidden information and predicting specific events, supporting decision making by considering changes in and outside organizations or establishing cybersecurity. Also, this study finds that China and Japan, representative technology-leading Asian countries, refer to the research programs of IARPA to establish their science and technology policies. The results of this study suggest implications for Korea's science and technology policies in response to the fourth industrial revolution era.

Home Gateway-based Home Network Access Control Mechanism (홈게이트웨이 기반 홈네트워크 접근제어 메커니즘)

  • Kim Geon-Woo;Kim Do-Woo;Lee Jun-Ho;Hwang Jin-Beon;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.733-736
    • /
    • 2006
  • As various mobile technologies, sensor technologies, remote control and network infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going. Until now, home network is just beginning, and we are developing home network services necessary to users, incrementing easiness, however we need to research on the safety of home network system guaranteeing the easiness as the services are going actively. So, in this paper, we propose the access control mechanism for protecting the home network system against indoor/outdoor illegal accesses and unauthorized accesses.

  • PDF

스마트미터의 신뢰성 및 안전성 향상을 위한 TPM 관련 평가인증 제도 분석

  • Lee, Kwang-Woo;Won, Dong-Ho;Kim, Seung-Joo
    • Review of KIISC
    • /
    • v.20 no.5
    • /
    • pp.48-55
    • /
    • 2010
  • 최근 들어, 저탄소 녹색성장에 대한 관심이 높아지면서, 전력 시스템과 IT 기술의 융합이 주목받고 있다. 이에 각국 정부에서는 스마트 그리드 사업을 추진하고 있으며, 관련 연구도 활발히 진행되고 있다. 스마트 그리드는 기존의 전력시스템과 IT 기술을 융합한 차세대 지능형 전력시스템으로, 모든 전자 기기들을 네트워크에 연결하고 실시간으로 에너지 사용량을 수집하여 사용자 및 에너지공급업체에 제공한다. 이를 통해 사용자는 에너지 소비를 줄일 수 있으며, 공급업체는 에너지 공급 효율성을 극대화할 수 있다. 이러한 서비스를 제공하기 위해서는 전력을 사용하는 각 사업장 및 가정에 스마트미터라는 장치를 설치해야만 한다. 하지만 스마트미터는 일반적으로 건물 외부에 설치되기 때문에 물리적으로 많은 공격 위협에 노출되어 있다. 따라서 플랫폼 무결성 보장, 신뢰할 수 있는 데이터 암호화 안전한 키 저장 등을 위해 최근 스마트미터에 TPM을 도입하고자 하는 연구가 이루어지고 있다. 이에 본 논문에서는 TPM 지술 및 개발 현황을 살펴보고, TPM과 관련된 평가인증 제도를 비교 분석하고자 한다.

The research regarding an information system risk management process modeling (정보시스템 위험관리 프로세스 모델링에 관한 연구)

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.157-164
    • /
    • 2006
  • From the hazard which it prepares in the hazards increase which it follows in information demand augmentation of information technical development and the consumer from inside systematizing integrity and solubility of information technological resources. inside against a confidentiality. The control against information and a system and a data outside is demanded. From the dissertation which it sees demand function and the structure which do information technical risk management system development it will be able to manage the danger which it infiltrates with the root which is various overview in hazard necessity it investigated the inside and outside of the country instance in the center and it analyzed. And it plans the dangerous civil official integrated process model ultimately as against a hazards it will be able to prepare in the dictionary in order, it put the place objective which it induces.

  • PDF

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.