• Title/Summary/Keyword: 융합네트워크

Search Result 1,990, Processing Time 0.031 seconds

Wireless Magnetic Sensor Network Protocol for Vehicle Detection (차량검지를 위한 무선 자기센서 네트워크 프로토콜)

  • Yoo, Jae-Jun;Kim, Do-Hyun;Park, Jong-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.587-589
    • /
    • 2011
  • 임의의 공간에 쉽게 설치하여 활용할 수 있는 센서 기술이 발달함에 따라 ITS (Intelligent Transport System) 분야에서도 여러 형태의 센서를 활용하여 차량을 검지하기 위한 연구가 진행되고 있다. 그러한 센서의 대표적인 예는 차량의 이동에 의해 발생되는 지구 자기장의 변화를 파악하여 차량을 검지하는 자기 센서라 할 수 있다. 본 논문에서는 차량 검지를 위해 구축되는 자기 센서 기반 무선 센서 네트워크 시스템에서 정의될 수 있는 응용 서비스 프로토콜을 제안 및 설계 한다. 이러한 응용 서비스 프로토콜에 포함되는 정보들은 크게 차량 검지 정보의 전달, 자기 센서 및 센서 네트워크의 상태정보 전달 및 이들에 대한 관리와 관련된 정보들로써 나뉘어 질 수 있다. 본 논문에서 설명되는 자기 센서 네트워크의 응용 프로토콜은 차량 검지 시스템에 구현되어 실제 테스트베드에 적용되었다.

A Study on Promotion Strategies for Examining Platforms of Convergence Contents (방송.통신 융합 환경에 적합한 다중 플랫폼 융합 콘텐츠 육성 전략)

  • Park, Soo-Ile;Shin, Dong-Pil;Chun, Sang-Kwon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.197-202
    • /
    • 2009
  • 과학기술의 발달로 인한 사회 문화적 트렌드의 변화는 새로운 기회와 가능성을 제공해 주며, 정보통신기술은 통신과 방송, 통신과 콘텐츠 등 영역간의 경계를 허물며 융합을 가능하게 하고, 우리의 감성과 상상력을 자극하여 새로운 문화적 가능성을 열어주고 있다. 이러한 상황들은 방송 통신 융합이라는 이름으로 방송과 통신, TV와 PC 온라인과 오프라인 등의 모든 영역에서 다양한 노력이 진행되고 있다. 방송과 통신의 융합은 마치 역사상 신대륙의 개척 과정처럼 새로운 제품과 새로운 시장을 창출해내는 능력을 가지고 있기 때문에, 국내는 물론 세계의 모든 비즈니스 업체들은 이 기회의 땅을 향해 전력 질주하고 있다. 또한, 이에 따르는 콘텐츠의 융합 역시 괄목할만하며, 게임과 영화, 다큐멘터리와 드라마 등의 콘텐츠 간의 융합은 물론이고, 최근에는 모바일에서 영화를 제작하고, 게임과 소설 네트워크가 결합하고, 심지어는 게임 안에서 음악을 유통시키는 유통의 융합까지도 이뤄지고 있다. 이와 같은 다양한 융합의 확산은 미디어와 플랫폼의 등장뿐만 아니라 플랫폼 간 교차와 연결 및 통합이 가능한 미디어 전경(landscape)을 창출해 내고 있으며, 인터넷과 TV의 결합은 다양한 애플리케이션을 구현할 수 있는 전송 메커니즘을 서로 연결시켜 수많은 형태의 다중 플랫폼을 등장시키고 있다. 이로 인하여 방송 서비스와 인터넷 서비스가 네트워크나 전송 플랫폼의 구별 없이, 그리고 디바이스의 선택과 상관없이 활용되는 통합 플랫폼 환경이 폭 넓게 조성되고 있다. 따라서, 방송 통신 융합 환경에 적합한 다중 플랫폼 융합 콘텐츠는 사용자의 요구 및 새로운 비즈니스 모텔에 대한 요구를 만족할 수 있어야 하며, 일관된 기술로 통선 및 서비스간의 호환성을 유지하는 인터페이스의 표준화가 이루어져야한다. 방송 통신 융합 환경에 적합한 다중 플랫폼 융합 콘텐츠는 초고속 데이터 통신망을 활용하는 멀티미디어 및 IP 멀티캐스트 기능을 활용한 서비스들과 연계하여, 관련된 소재 산업들의 파급효과가 매우 크며, 관련 분야에 미치는 효과가 막대하므로, 이에 대한 적절한 육성전략을 고찰해보도록 한다.

  • PDF

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

A study on Technology for Performance of Network Configuration Management (네트워크 구성관리 성능 향상을 위한 기법 연구)

  • Kang, Hyun Joong;Han, Jeong-Soo
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.47-55
    • /
    • 2004
  • Currently used to manage a whole bunch of networks is the Client/Server Network Management Technique in which a central manager system supports a number of managed ones. Unfortunately it has a big drawback: wasting network resources, most of all bandwidth, which is mainly caused by too much traffic between the central manager system and the managed ones. In a way to overcome this weak point, we have designed a new type of system, a Configuration Management System (CMS), based on code mobility which has been used in distributed network management systems. In this thesis we have compared the CMS with the currently used network management system, identified class to make Mobile Code, and analyzed the techniques of other network management systems in order to verify the validity of the new system.

  • PDF

An Investigation on Security Management Architecture of Home Gateway (홈 게이트웨이 보안 관리 방식에 관한 연구)

  • Kim, Hyun Cheol;An, Seong Jin;Jung, Jin Wook;Kim, Seung Hae;Ryu, Yoon Sik;Jun, Young Il
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.67-74
    • /
    • 2003
  • Home network technologies which interconnect various wire and wireless home appliances, access network technologies and service offer technologies are continuing growth. To provide secure services in the home, home network environment, access network environment, and various service and contents offer technologies are consist organically. Thesis of administration method of systematic and effective groove network is most urgent and important urea to offer safety and authoritativeness of home networking service in home network that strong certification and security function are required among these technologies. In this paper, we propose home gateway security management architecture and the way to use SNMPv3. Also, we propose structure and function of home network management system to support various home networking security scenarios.

  • PDF

Research on Wireless Sensor Networks Security Attack and Countermeasures: Survey (무선 센서 네트워크 보안 위협 및 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.1-6
    • /
    • 2014
  • A wireless sensor network is being actively researched around the world that are connected to the mesh are a plurality of sensor nodes in a wireless manner that span different regions of the techniques. However, wireless communications use the limitation of resources, so it is very weak due to the properties of the network itself secure in comparison to the normal network. Wireless sensor network is divided into tapped-based attacks, forgery based attacks, denial of service attacks based largely by securities laws must defend against various attacks such as insertion of the wrong information being sent eavesdropping or modification of information, which is usually sensor network applications need to do. The countermeasure of sensor network attack is described in this research, and it will contribute to establish a secure sensor network communication.

  • PDF

Design of Wired and Wireless linkage Hybrid Sensor Network Model over CATV network (CATV망을 이용한 유무선 연동의 하이브리드 센서 네트워크 모델 설계)

  • Lee, Kyung-Sook;Kim, Hyun-Deok
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.67-73
    • /
    • 2012
  • In this paper, in order to overcome the disadvantage of wireless-based sensor network, a hybrid sensor network using wired and wireless linkage is proposed. Proposed a wired and wireless linkage hybrid sensor network can compensate the defect of poor transmission at the indoor wireless environment, and can be free from interference between a wireless LAN and Bluetooth of the same frequency bandwidth due to an attribute of low-loss transmission at the CATV network. Also, proposed a wired and wireless linkage hybrid sensor network make use of CATV network which is well-built infrastructure, is more efficient to design network, assure a stability and high reliability of the sensor network as providing a stability for an inaccuracy and a predictable transmission link for the existing wireless network.

Method for Industrial Distributed Network Management using SDN Controller Deployment (SDN Controller 배포를 이용한 산업 분산형 네트워크 관리 기법)

  • Park, Do Gun;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.13-19
    • /
    • 2019
  • SDN is one of the most actively researched topics to solve traffic problems in communication. SDN implements multiple networks in a single physical network by virtualizing network resources through an advanced API. Network Function Virtualized (NFV) distributes network functions from hardware using software instant, virtualization technology to VNF. These features make network management easier and improve performance by virtualizing IP, routers, and so on. In this paper, we propose a method to control the traffic and provide the distributed controller effect of SDN through SDN distribution in the virtualized industrial network. It is expected that SDN distribution will be able to manage traffic more efficiently when using the proposed scheme.

A Method to Find the Core Node Engaged in Malware Propagation in the Malware Distribution Network Hidden in the Web (웹에 숨겨진 악성코드 배포 네트워크에서 악성코드 전파 핵심노드를 찾는 방안)

  • Kim Sung Jin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.3-10
    • /
    • 2023
  • In the malware distribution network existing on the web, there is a central node that plays a key role in distributing malware. If you find and block this node, you can effectively block the propagation of malware. In this study, a centrality search method applied with risk analysis in a complex network is proposed, and a method for finding a core node in a malware distribution network is introduced through this approach. In addition, there is a big difference between a benign network and a malicious network in terms of in-degree and out-degree, and also in terms of network layout. Through these characteristics, we can discriminate between malicious and benign networks.