• Title/Summary/Keyword: 원격서비스

Search Result 1,314, Processing Time 0.03 seconds

A Study On The Design of Patient Monitoring System Using RFID/WSN Based on Complex Event Processing (복합 이벤트 처리기반 RFID/WSN을 이용한 환자모니터링 시스템 설계에 관한 연구)

  • Park, Yong-Min;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.10
    • /
    • pp.1-7
    • /
    • 2009
  • Nowadays there are many studies and there's huge development about RFID and WSN which have great developmental potential to many kinds of applications. In particular, the healthcare field is expected to could be securing international competitive power in u-Healthcare and combined medical treatment industry and service. More and more real time application apply RFID and WSN technology to identify, data collect and locate objects. Wide deployment of RFID and WSN will generate an unprecedented volume of primitive data in a short time. Duplication and redundancy of primitive data will affect real time performance of application. Thus, emerging applications must filter primitive data and correlate them for complex pattern detection and transform them to events that provide meaningful, actionable information to end application. In this paper, we design a complex event processing system. This system will process RFID and WSN primitive data and event and perform data transformation. Integrate RFID and WSN system had applied each now in medical treatment through this study and efficient data transmission and management forecast that is possible.

A Study on Introducing Security Certification for Control Systems (제어시스템 보안인증 도입 방안 연구)

  • Choi, Hoyeol;Kim, Daeyeong;Shin, Hyungjune;Hahn, Changhee;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.725-734
    • /
    • 2016
  • SCADA(Supervisory Control and Data Acquisition) system is widely used for remote monitoring and control throughout the domestic industry. Due to a recent breach of security on SCADA systems, such as Stuxnet, the need of correctly established secure certification of a control system is growing. Currently, EDSA-CRT (Embedded Device Security Assurance-Communication Robustness Test), which tests the ability to provide core services properly in a normal/abnormal network protocol, is only focused on the testing of IP-based protocols such as IP, ARP, TCP, etc. Thus, in this paper, we propose test requirements for DNP3 protocol based on EDSA-CRT. Our analysis show that the specific test cases provide plentiful evidences that DNP3 should follow based on its functional requirements. As a result, we propose 33 specific test case for DNP3 protocol.

A Study on the Implementation of Digital Fishing Network Using Data Communication (데이터 통신을 이용한 디지털 어업통신망 구현에 관한 연구)

  • Seo, Gon;Kim, Jeong-Nyun;Choi, Jo-Chen;Jo, Hag-Hyun;Choi, Byung-Ha
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.288-295
    • /
    • 2002
  • It's about time we had to think an alternative to recover our insufficient fishery market caused by IMF locally as well as the fishery agreement on Japan and China. It's essential that we have to build up the foundation of information-oriented fishery market In order to improve the infrustructure of the market like developed countries. In this paper We present digital data communication network to exchange information for fishery and safety between fishing ship and coast station in cheeper communication fee using SSB(Sing Side Band) in HF(High Frequency) band.

  • PDF

Session Key Agreement Protocol for IoT Home Devices using Shadow Passwords (그림자 패스워드를 사용한 IoT 홈 디바이스 사이의 세션키 공유 프로토콜)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.93-100
    • /
    • 2020
  • Although various home services are developed as increasing the number of home devices with wire and wireless connection, privacy infringement and private information leakage are occurred by unauthorized remote connection. It is almost caused by without of device authentication and protection of transmission data. In this paper, the devices' secret value are stored in a safe memory of a smartphone. A smartphone processes device authentication. In order to prevent leakage of a device's password, a shadow password multiplied a password by the private key is stored in a device. It is proposed mutual authentication between a smartphone and a device, and session key agreement for devices using recovered passwords on SRP. The proposed protocol is resistant to eavesdropping, a reply attack, impersonation attack.

Comparisions of stream activation mechanisms in computer based teleconferencing systems for low delay (지연 축소를 위한 컴퓨터 영상회의 시스템의 시트림 동작 구조 비교)

  • Lee, Gyeong-Hui;Kim, Du-Hyeon;Gang, Min-Gyu;Jeong, Chan-Geun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.363-376
    • /
    • 1997
  • In this paper, we present a hardware architecture and a sofrware architecture for cimputer based teleconferencing systems.And also we analyse stream adtivation mechanisms for them form the viewpoint of delay. MuX that is a multimedia I/O server provides various processing elements for data I/O, synchronization, interleaving and mixing.We describe methods to build teleconferencing systems with the elements and compares the technique using master click with the techniquie using self clock.In the plase of dta input.the technique using self click is berrer than the technique using master clock.When we generate interleved stream from audio and video stream and activate channel objects by periodic audio stream as activation clock, dealy from imput audio stream to imterleved stream is reduced but delay for video stream is not reduced as much as in the case of audio stream.

  • PDF

A Study on Basalization of the Classification in Mountain Ginseng and Plain Ginseng Images in Artificial Intelligence Technology for the Detection of Illegal Mountain Ginseng (불법 산양삼 검출을 위한 인공지능 기술에서의 산양삼과 인삼 이미지의 분류 기저화 연구)

  • Park, Soo-Kyoung;Na, Hojun;Kim, Ji-Hye
    • The Journal of Bigdata
    • /
    • v.5 no.1
    • /
    • pp.209-225
    • /
    • 2020
  • This study tried to establish a base level for the form of ginseng in order to prevent fraud in which novice consumers, who have no information on ginseng and mountain ginseng, regard ginseng as mountain ginseng. To that end, researchers designed a service design in which when a consumer takes a picture of ginseng with an APP dedicated to a smartphone, the photo is sent remotely and the determined results are sent to the consumer based on machine learning data. In order to minimize the difference between the data set in the research process and the background color, location, size, illumination, and color temperature of the mountain ginseng when consumers took pictures through their smartphones, the filming box exclusively for consumers was designed. Accordingly, the collection of mountain ginseng samples was made under the same controlled environment and setting as the designed box. This resulted in a 100% predicted probability from the CNN(VGG16) model using a sample that was about one-tenth less than widley required in machine learning.

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

A Study on Smart Medical Treatment System and Security (스마트 진료시스템과 보안에 관한 연구)

  • Song, Eun-Jee
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.107-113
    • /
    • 2012
  • Due to the development of communications technology, it is now possible to be offered online from remote places. This kind of communications technology can be applied to the medical field. The medical treatment appointments in hospitals can be its typical example. But still, in most of hospitals, patient or guardian have to physically visit or call to the hospital to set up an appointment for the medical treatment. In addition, they have to wait in line in order to pay after receiving the medical treatment. The patient or guardian, after paying, receive a paper prescription and they go to a nearby pharmacy to take the medicines. They must wait in line again there in order to receive the medicine from the pharmacy. In this paper, we would like to suggest a smart medical treatment system in order to solve the problems discussed above. With this proposed system, the user will be able to make an appointment, make payments and receive medication quickly and easily without spending extra time. Also, there will be no need for paper prescriptions with this system. We discuss about the security of medical information for this proposed smart medical treatment system proposed.

A Study of File Format-Aware Fuzzing against Smartphone Media Server Daemons (스마트폰 미디어 서버 데몬에 대한 파일 포맷 인식 기반의 퍼징 연구)

  • Shin, MinSik;Yu, JungBeen;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.541-548
    • /
    • 2017
  • The smartphone operates the media server daemon to handle audio service requests. Media server daemons, running with a high privilege in the background, caused many vulnerabilities to applications most frequently used in smart devices including smartphones. Fuzzing is a popularly used methodology to find software vulnerabilities. Unfortunately, fuzzing itself is not much effective in such format-strict environments as media services. In this paper, we propose a file format-aware fuzzing in order to efficiently detect vulnerabilities of media server daemon. We acquired a remote arbitrary code execution vulnerability on iOS/tvOS/MacOS/watchOS, and we verified the effectiveness by comparing our methodology with the fuzzers FileFuzz and ZZUF.

The Development of Temperature Measurement System using Non-Contact Temperature Sensor Array (비접촉식 온도센서 어레이를 활용한 온도 계측시스템 개발)

  • Kim, Sung-Dae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2087-2092
    • /
    • 2015
  • Recently, use of the heat transferring machine and systems has been increasing in various industrial fields. A key technique for constructing such process is basically to measuring temperature directly to objects established on industrial plants. Particularly, a non-contact temperature measurement is very important to realize advanced heat transferring systems. This paper presents a new measurement methodology for temperature by using USN(ubiquitous sensor networks) technique including the microprocessor unit based ZigBee communication systems. This proposed system is made to be applied in monitoring systems for non-contact temperature measurement. We designed firmware based measurement systems whose main function is to save s series of temperature data sets and send it to main monitoring systems.