• Title/Summary/Keyword: 유비쿼터스 시대

Search Result 465, Processing Time 0.029 seconds

A Study on U-Service for Security in U-City Newtown Planning (신도시계획의 계획지표를 반영한 U-City의 U-방범서비스 개선방안 연구)

  • Yoon, Hyo Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.5D
    • /
    • pp.645-654
    • /
    • 2009
  • This study started with necessity of historical spatial planning skills in U-city planning. Though U-city technology and information are very important, U-city development should be considered on the base of various experience of spatial planning. This study explored spatial planning indexes change in the recent newtown plans. In particular, safety and security were intensively analyzed. In addition, many theories on safe urban space, ubiquitous technology, traditional defensible space, and CPTED (Crime Prevention through Environmental Design) are compared. The findings are as follows. First, each planning is not integrated and there is lack of network among each planning. Specifically, from the crime prevention perspective, there is only mechanical monitoring such as CCTV without architectural approach. Even though CCTV is social needs, it is necessary to adopt it with architectural environment in order to improve the synergy effect of spatial planning and non-spatial planning.

A Case Study on Foreign Smart City (해외 스마트 시티 사례 연구)

  • Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.305-310
    • /
    • 2014
  • We called a current society the convergence generation. In information society, digital convergence means a service or new product which appeared through fusion of unit technologies in information and communication regions. The effects of convergence technologies and social phenomenons are visualized in overall regions of society such as economy, society, culture, etc. In 2011, The Government introduced "IT Convergence Technology Prediction Survey 2025". This report includes 10 ICT industries. In this paper, we described a smart city which was leading case in digital convergence and related with our life.

An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID (해쉬된 태그ID와 대칭키 기반의 RFID 인증프로토콜)

  • Park, Yong-Soo;Shin, Ju-Seok;Choi, Myung-Sil;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.669-680
    • /
    • 2009
  • By identifying the unique information of the objects using the RF, the RFID technique which will be able to manage the object is spot-lighted as the main technology in Ubiquitous era. On RFID systems, since the information of RFID may easily be unveiled in air, the secure and privacy problems always exist. In this paper, we propose mutual authentication protocol based on symmetric key. Proposed protocol has been able to minimize the tag's H/W resource by using symmetric key. And we use tag ID which is encrypted with hash function and a shared symmetric key by Challenge-Response pair of PUF(Physically Unclonable Function), thus there is no key disclosure problem in our protocol.

The Improvement of the Representation Scope of ZigBee Semi-Precision Number Data Type (ZigBee 준정밀수 데이터형의 표현 구간 개선 방안)

  • Lee Seung-Jae;Kim Sang-Kyung;Kim Chang-Hwa
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.133-135
    • /
    • 2006
  • 최근 유비쿼터스 컴퓨팅 시대에 가까워지면서, 다양한 형태의 소형센서를 무선네트웍으로 연결하여 일정 범위 내의 다양한 정보를 수집하여 이용할 수 있는 무선센서네트웍시스템에 대한 연구가 활발히 진행중이다. 현재 가장 널리 사용되고 있는 무선센서네트웍 아키텍처는 IEEE 802.15.4에 제안된 MAC과 ZigBee Alliance에서 개발된 ZigBee를 이용한 것이다. ZigBee에는 네트웍계층, 응용프레임웍 등 많은 기능과 규격이 포함되어 있으며, 그 중 응용프레임웍에는 각 센서장치들 간의 통신을 원활하게 하기 위하여 여러 가지 데이터 형이 정의되어 있다. ZigBee 응용프레임웍에 정의되어 있는 여러 데이터형 중 준정밀수형(semi-precision number type)은 수의 절대값이 작은 범위에서는 높은 해상도로 수를 표현할 수 있고 절대값이 큰 범위일수록 상대적으로 낮은 해상도로 수를 표현할 수 있어, 빛의 강도, 소리의 크기 등 그 크기를 표현함에 있어 절대값에 반비례하는 해상도로 표현하여도 무방한 경우 매우 유용하게 사용된다. 그러나 현재 ZigBee에서 정의한 준정밀수형은 높은 해상도로 표현되어야 하는 구간 중 특정 구간에서 해당 값을 표현할 수 없는 구간이 존재한다. 본 논문에서는 이와 같은 준정밀수의 특징과 문제점을 살펴보고, 이러한 문제를 해결할 수 있는 새로운 형식의 준정밀수형을 제안한다.

  • PDF

Research of Wireless A/V System Implementations based on Binary CDMA Technology (Binary CDMA 기반 무선 A/V 감시시스템 구현에 관한 연구)

  • Lee, Jang-Yeon;Kil, Yeong-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.179-185
    • /
    • 2010
  • In ubiquitous society, there have been increasing demands on safety and security issues with infrastructures and services based on wireless technology. In this paper, we first introduce our own developed technology Binary CDMA to meet those demands. Then we present a wireless A/V surveillance system based on the Binary CDMA technology. The implemented wireless A/V surveillance system is composed of wireless terminals, wireless multiple channel processors, and an A/V management server, and the system gives a hint that the Binary CDMA technology can be adopted in practical ubiquitous systems to handle safety and security issues.

Design and Embodiment for Constructing Mobile Medical Information System Combining Bio-sensor and IT Technology (바이오센서 기술과 IT기술을 융합한 휴대용 의료정보 시스템 구축을 위한 설계 및 구현)

  • Kim, Heon;Lee, Sung-Koo
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.27-31
    • /
    • 2008
  • u-Health is a representative realization method of ubiquitous IT and it is being embossed as an industry that can make our lives abundant. Through the u-Health, the diagnosis will go beyond the restriction of space, which is based on hospital, and be positioned as a universal value in a daily life by combining diagnosis and life naturally. The purpose of this study is to suggest systematic, intelligent, mobile medical information system that has the same effect as the assistant of specialist by providing scientific and objective knowledge, which is suitable for u-Health age. Mobile medical information system can provide user with the opinion of specialist by planting the experience, knowledge and decision making process of specialist that are necessary for solving the problem requiring special medical knowledge and passing through an inference process.

  • PDF

Design of an Integrated Internet Data and Digital-Television Receiving System (인터넷 데이터 및 TV 수신 통합 시스템 설계)

  • Nahm, Eui-Seok
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.299-305
    • /
    • 2013
  • Internet Data is hugely increased for high quality multimedia services and the related techniques is also developed rapidly. This paper is aimed to develop integrated internet data and Digital-Television receiving system with high performance and optimization, which is obtained by one-board integration with load control. It is applicable to various devices like computer, set-top box, home multimedia gateway etc. The performance is proved by evaluation test. It shows that the developed device can be TV tuner and internet AP for more robust multimedia services.

RFID Information Protection using Biometric Information (생체정보를 이용한 RFID 정보보호)

  • Ahn, Hyo-Chang;Rhee, Sang-Burm
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.545-554
    • /
    • 2006
  • RFID could be applied in the various fields such as distribution beside, circulation, traffic and environment on information communication outside. So this can speak as point of ubiquitous computing's next generation technology. However, it is discussed problem of RFID security recently, so we must prepare thoroughly about RFID security for secure information. In this paper, we proposed a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. Our method which is improved linear discriminant analysis has reduced dimension of feature information which has large size of data. Therefore, we can sore face feature information in small memory field of RFID tag. Our propose d algorithm has shown 92% recognition rate in experimental results and can be applied to entrance control management system, digital identification card and others.

  • PDF

CCC-NSG : A Security Enhancement of the Bluetooth $E_0$Cipher using a Circular-Clock-Controlled Nonlinear Algorithm (CCC-NSG : 순환 클럭 조절된 비선형 알고리즘을 이용한 블루투스 $E_0$암호화시스템의 안전성 개선)

  • Kim, Hyeong-Rag;Lee, Hoon-Jae;Moon, Sang-Jae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7C
    • /
    • pp.640-648
    • /
    • 2009
  • Summation generator with high period and high linear complexity can be easily implemented by a simple hardware or software and it is proper to apply in mobile security system for ubiquitous environments. However the generator has been some weaknesses from Dawson's divided-and-conquer attack, Golic's correlation attack and Meier's fast correlation attack. In this paper, we propose an improved version($2^{128}$security level) of $E_0$algorithm, CVC-NSG(Circular-Clock-Controlled - Nonlinear Summation Generator), which partially replaces LFSRs with nonlinear FSRs and controls the irregular clock to reinforce it's own weaknesses. Finally, we analyze our proposed design in terms of security and performance.

A Fingerprint_based User Authentication Protocol for Wireless LAN Environment (무선랜 환경에서의 지문을 이용한 사용자 인증 프로토콜)

  • Jung Seung-Hwan;Lee Sung-Ju;Shin Hyun-Sup;Chung Yong-Wha;Kim Tae-Sup;Oh Ryong;Cho Choong-Ho;Lee Nam-Il
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.258-261
    • /
    • 2006
  • 네트워크 기술이 발전함에 따라 유/무선 네트워크가 통합되기 시작하였고, 궁극적으로 언제/어디서나 컴퓨터를 사용한 수 있는 유비쿼터스 컴퓨팅 시대가 도래 할 것으로 예상된다. 최근에는 공공장소에서 고속의 무선 인터넷 접속에 대한 욕구가 커지면서 무선랜에 대한 관심이 많아지고 있다. 무선랜 환경에서 중요한 보안문제 중 하나는 승인된 사용자에게만 접속을 허용하는 것이다. 특히, 유선 네트워크와 다르게 무선 네트워크 환경에서는 Access Point(AP)가 설치되어 있는 곳이면 누구나 깁게 AP를 통해 네트워크를 이용할 수 있기 때문에 접속에 관한 보안의 중요성이 강조되고 있다. 본 논문에서는 무선랜 환경에서 안전하게 사용자를 인증하고 서비스를 제공하기 위해 지문을 이용한 사용자 인증 프로토콜을 제안한다.

  • PDF