• Title/Summary/Keyword: 유비쿼터스시스템

Search Result 2,312, Processing Time 0.031 seconds

Analyses of Security Consideration and Vulnerability based on Internet of Things (사물인터넷 기반의 시스템을 위한 보안 취약성 및 고려사항 분석)

  • Jang, Chang-hwan;Jo, Sung-ho;Lee, Jin-hyup;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.491-494
    • /
    • 2017
  • Recently, IoT has been supported by ICT technology with a variety of ICT powers. In May 2014, Information and Communication Strategy Committee announced the 'Basic plan for Internet of Things'. Also on Febuary 24 this SAME year, KISA(Korea Internet&Security Agency) provides many projects related to IoT, such as announcement of 'K-Global Project' for start-up and venture support related to IoT and ICT companies. In contrast to the various services of Internet of Things, when a connection is made between object-to-object or person-to-object wired and wireless networks, security threats have occurred in the process of communication. We analyzed these kinds of security threats related to Internet of things, and gave a consideration for requirement.

  • PDF

Technical Characteristics and Trends of Capsule Endoscope (캡슐 내시경의 기술적 특징과 동향)

  • Kim, Ki-Yun;Won, Kyung-Hoon;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.329-337
    • /
    • 2012
  • Capsule Endoscope(CE) is a capsule-shaped electronic device which can examine the lesions in digestive tract of human body. Recently the medical procedure using capsule endoscope is receiving great attention to both doctors and patients, since the conventional push-typed endoscope using cables brings great pain and fear to the patients. The technique was firstly available in 2000 and is based on a convergence techniques among BT(Bio Technology), IT(Information Technology), and NT(Nano Technology). The device consists of an optical parts including LEDs(Light Emitting Diodes), an image sensor, a communication module and a power module. Capsule endoscope is the embodiment of the state-of-the art technology and requires key technologies in the various engineering fields. Therefore, in this paper, we introduce the composition of the capsule endoscope system, and compare the communication method between RF(Radio Frequency) communication and HBC(Human Body Communication), which are typically used for data transmission in the capsule endoscope. Furthermore, we analyze the specification of commercialized capsule endoscopes and present the future developments and technical challenges.

Activity Recognition of Workers and Passengers onboard Ships Using Multimodal Sensors in a Smartphone (선박 탑승자를 위한 다중 센서 기반의 스마트폰을 이용한 활동 인식 시스템)

  • Piyare, Rajeev Kumar;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.9
    • /
    • pp.811-819
    • /
    • 2014
  • Activity recognition is a key component in identifying the context of a user for providing services based on the application such as medical, entertainment and tactical scenarios. Instead of applying numerous sensor devices, as observed in many previous investigations, we are proposing the use of smartphone with its built-in multimodal sensors as an unobtrusive sensor device for recognition of six physical daily activities. As an improvement to previous works, accelerometer, gyroscope and magnetometer data are fused to recognize activities more reliably. The evaluation indicates that the IBK classifier using window size of 2s with 50% overlapping yields the highest accuracy (i.e., up to 99.33%). To achieve this peak accuracy, simple time-domain and frequency-domain features were extracted from raw sensor data of the smartphone.

Mobile Context Based User Behavior Pattern Inference and Restaurant Recommendation Model (모바일 컨텍스트 기반 사용자 행동패턴 추론과 음식점 추천 모델)

  • Ahn, Byung-Ik;Jung, Ku-Imm;Choi, Hae-Lim
    • Journal of Digital Contents Society
    • /
    • v.18 no.3
    • /
    • pp.535-542
    • /
    • 2017
  • The ubiquitous computing made it happen to easily take cognizance of context, which includes user's location, status, behavior patterns and surrounding places. And it allows providing the catered service, designed to improve the quality and the interaction between the provider and its customers. The personalized recommendation service needs to obtain logical reasoning to interpret the context information based on user's interests. We researched a model that connects to the practical value to users for their daily life; information about restaurants, based on several mobile contexts that conveys the weather, time, day and location information. We also have made various approaches including the accurate rating data review, the equation of Naïve Bayes to infer user's behavior-patterns, and the recommendable places pre-selected by preference predictive algorithm. This paper joins a vibrant conversation to demonstrate the excellence of this approach that may prevail other previous rating method systems.

Development of Oriental-Western Fusion Patient Monitor by Using the Clip-type Pulsimeter Equipped with a Hall Sensor, the Electrocardiograph, and the Photoplethysmograph (홀센서 집게형 맥진기와 심전도-용적맥파계를 이용한 한양방 융합용 환자감시장치 개발연구)

  • Lee, Dae-Hui;Hong, Yu-Sik;Lee, Sang-Suk
    • Journal of the Korean Magnetics Society
    • /
    • v.23 no.4
    • /
    • pp.135-143
    • /
    • 2013
  • The clip-type pulsimeter equipped with a Hall sensor has a permanent magnet attached in the "Chwan" position to the center of a radial artery. The clip-type pulsimeter is composed of a hardware system measuring voltage signals. These electrical bio-signals display pulse rate, non-invasive blood pressure, respiratory rate, pulse wave velocity (PWV), and spatial pulse wave velocity (SPWV) simultaneously measured by using the radial artery pulsimeter, the electrocardiograph (ECG), and the photoplethysmograph (PPG). The findings of this research may be useful for developing a oriental-western biomedical signal storage device, that is, the new and fusion patient monitor, for a U-health-care system.

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

A study of Technical Reference Model of Intelligent Geospatial Information (지능형 공간정보 기술참조모델에 관한 연구)

  • Park, Dong-Youn;Lee, Yong-Ik;Choi, Hoon-Sung;Park, Jae-Min;Jung, Yeun-J.;Park, Soo-Hong;Kim, Byoun-Guk
    • Spatial Information Research
    • /
    • v.17 no.3
    • /
    • pp.309-317
    • /
    • 2009
  • Recently, convergence phenomena among industries are appeared with the rapid development of information and communication technology and technology convergence also is emerging as a key issue. Especially, geospatial information industry may be expected to conduct a role as a pioneer in this convergence era. In order to do this, all fields of geospatial information should be classified systematically and interoperability and compatibility among geospatial information systems should be acquired. In this paper, a technical reference model of intelligent geospatial information is proposed to show a hierarchical technical system in the field of geospatial information. The model is developed with five core research projects of Korean Land Spatialization Group (KLSG) and includes also the scope and importance of core technology in the system. The model would be helpful to manage and control all projects of KLSG.

  • PDF

TRMA: Two-Round RFID Mutual Authentication Protocol (TRMA: 2-라운드 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.71-78
    • /
    • 2009
  • In RFID system, the communicated data can be easily eavesdropped and tampered with by an attacker because the communication between the reader and the tag is performed in an insecure channel. Therefore, authentication is an important role in RFID applications for providing security and privacy. In 2006, Lee, Asano and Kim proposed an RFID mutual authentication protocol (the LAK protocol) which utilizes a hash function and synchronized secret information. However, Cao and Shen showed that the LAK protocol is vulnerable to replay attack, and therefore an adversary can impersonate the tag. This paper proposes a new simple two-round RFID mutual authentication (TRMA) protocol based on secure one-way hash function. As a result, the proposed TRMA protocol not only can prevent various attacks and but also provides communication efficiency since they mutually authenticate by performing two-round between RFID tag and RFID reader.

A High-Speed Data Processing Algorithm for RFID Input Data Stream Using Multi-Buffer (RFID 입력 데이터 스트림에 대한 다중 버퍼 기반의 고속 데이터 처리 알고리즘)

  • Han, Soo;Park, Sang-Hyun;Shin, Seung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.79-85
    • /
    • 2008
  • The middleware that provides RFID-based ubiquitous application service should process the data inputted constantly in real time, and acquire and deliver the answers of the questions in the application service. Studies for developing a Data Stream Management System(DSMS) has been performed in order to process a large amount of data stream inputted constantly in this way. Previous algorithms on data stream were mostly focused on reducing the average error between the answers of the successive questions and abandon the data according to the priority of them when a load occurs. This article is composed of presenting the necessity of the studies on the DSMS and speedy data processing, suggesting an algorithm to make Possible the speedy data processing using buffers and prompt questions and answers, and testing the performance of the data processing rate and whether a buffer is generated correspondingly to the algorithm suggested, in either a single or a multiple buffer, through simulations.

  • PDF

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF