• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.029 seconds

Remote control of individual modules based on mobile phone and web (모바일 폰과 웹을 연동한 개별모듈 원격제어)

  • Park, Sang-Gug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.780-788
    • /
    • 2011
  • This paper suggests one model, which can be monitor and control target system at anytime and anywhere by a WAP and ME based personal cellular phone(Feature phone) and internet connection. The suggesting model tried to overcome constraints of distance and mobility of conventional methods, TCP/IP based remote data monitoring system, which combine PDA and WLAN technologies. For the experiments of suggesting model, the target systems are constructed with individual modules, which need AC or DC power control. The development software for the control and monitor of local system use NI Labview for the easy-programming and confidence. Also, web server use APM setup for the general user. The mobile connection environments of personal cellular phone are programmed by use WML and mHTML language for the general access. Through the experiments, we have showed that suggesting model can overcome constraints of distance and mobility of conventional system.

Delay based Authentication Model for Flooding of Service Tolerance of Rehabilitation Psychology Analysis System (재활심리분석시스템의 폭주서비스 감내를 위한 지연기반 인증모델)

  • Lim, Ho-Chan;Kim, Young-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2073-2081
    • /
    • 2013
  • Today's rapidly changing society can lead to maladaptive behaviors. In the situations, rehabilitation psychology analysis using the on-line test be needed to solve the problem. However, Internet-based rehabilitation psychology analysis by a malicious attacker may still be vulnerable to denial-of-service attacks. The service flooding attacks render the server incapable of providing its service to legitimate clients. Therefore the importance of implementing systems that prevent denial of service attacks and provide service to legitimate users cannot be overemphasized. In this paper, we propose a puzzle protocol which applies to authentication model. our gradually strengthening authentication model improves the availability and continuity of services and prevent denial of service attacks and we implement flooding of service tolerance system to verify the efficiency of our model. This system is expected to be ensure in the promotion of reliability.

A Comparative Analysis of PKI Authentication and FIDO Authentication (PKI 인증과 FIDO 인증에 대한 비교 분석)

  • Park, Seungchul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1411-1419
    • /
    • 2017
  • The two factor authentication capability, private key possession and key protection password knowledge, and the strong public key cryptography protocol of PKI authentication have largely contributed to the rapid construction of Internet transaction trusted infrastructure. The reusability of a certificate-based identity for every PKI site was another contribution factor of the spread of PKI authentication. Nevertheless, the PKI authentication has been criticised mainly for the cost of PKI construction, inconvenience of individual certificate management, and difficulties of password management. Recently FIDO authentication has received high attention as an alternative of the PKI authentication. The FIDO authentication is also based on the public key cryptography which provides strong authentication services, but it does not require individual certificate issuance and provides user-friendly and secure authentication services by integrating biometric technologies. The purpose of this paper is to concretely compare the PKI-authentication and FIDO-authentication and, based on the analysis result, to propose their corresponding applications.

Development of Bus Notification Systems Based on IoT for Vulnerable Pedestrians (교통약자를 위한 사물인터넷 기반 버스 알림 서비스 시스템 개발)

  • Jang, Won-Chang;Park, Ji-Sang;Lee, Myung-Eui
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.6
    • /
    • pp.588-594
    • /
    • 2016
  • As more populations are getting older, the number of vulnerable pedestrians is increasing, thereby social problems related to transportations also frequently occur in different areas and situations. Many of such problems come from bus drivers who may pass bus stops not recognizing passengers about to board. In this paper, we propose a new IoT bus notification system developed to avoid these situations. Our implementation aims to gain bus service routes using publicly opened data, notify passengers about bus stop locations using GPS information and finally deliver the positions of those passengers to the bus drivers so that they can hardly miss passengers who are willing to board on the right stop. By creating an application, it was conducted by means of a GPS to communicate the location of the vehicle by means of GPS and transfer data to the location of the vehicle. Experimental results show that it is possible to accurately determine the position of passengers even in a crowded race area. The average error distance is 31m, and if the data to be processed as error is excluded, it provides a high reliability as 19m.

An Offloading Decision Scheme Considering the Scheduling Latency of the Cloud in Real-time Applications (실시간 응용에서 클라우드의 스케줄링 지연 시간을 고려한 오프로딩 결정 기법)

  • Min, Hong;Jung, Jinman;Kim, Bongjae;Heo, Junyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.392-396
    • /
    • 2017
  • Although mobile device-related technologies have developed rapidly, many problems arising from resource constraints have not been solved. Computation offloading that uses resources of cloud servers over the Internet was proposed to overcome physical limitations, and many studies have been conducted in terms of energy saving. However, completing tasks within their deadlines is more important than saving energy in real-time applications. In this paper, we proposed an offloading decision scheme considering the scheduling latency in the cloud to support real-time applications. The proposed scheme can improve the reliability of real-time tasks by comparing the estimated laxity of offloading a task with the estimated laxity of executing a task in a mobile device and selecting a more effective way to satisfy the task's deadline.

A Study on the Effect of Block Chain Application and Legal Issue in Logistics Industry (물류산업의 블록체인 적용효과와 법적 과제에 대한 연구)

  • Yang, Jae-Hoon
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.187-199
    • /
    • 2018
  • The purpose of this study is to find out the positive effects of the block chain when applied to the logistics industry and what legal problems should be solved to apply the block chain to the logistics industry. As a result of the study, it was found that the block chain can create the streamlining document work, increasing visibility, improving transaction reliability, activating Internet of things, and expanding smart contract. However, in order to apply the block chain to the logistics industry, have also confirmed that the scope of electronic transactions, international distribution of electronic bill of lading, and legal supplementation related to personal information protection are necessary. It is meaningful to confirm the applicability in the logistics industry, the positive effect and the legal problem, but it is necessary to study the problem from the practical point of view in the hereafter research.

A Study on Measures for Preventing Credit Card Fraud (신용카드 부정사용 방지 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.33-40
    • /
    • 2016
  • Credit card is means of payment used like cash in terms of function and its users have increased consistently. With development of Internet and electronic commerce a role as payment method of credit card has been growing. But as the risk which results from centralized information and online increases, credit card fraud is also growing. Card theft and loss are decreasing due to countermeasure of card companies and financial supervisory authorities, while card forge and identity theft are increasing. Recently because of frequent personal information leakage and deregulation of financial security following easy-to-use payment enforcement, customer's anxiety about card fraud is growing. And the increase of card fraud lowers trust on credit system as well as causes social costs. In this paper, the security problems of card operating system are addressed in depth and the measures such as immediate switch to IC card terminals, introduction of new security technology, supervision reinforcement of the authorities are proposed.

Improvement Research of BLE-based System for Monitoring the cause of Breakdown of Automatic Doors (자동문의 고장원인을 모니터링하기 위한 BLE 기반의 시스템 개선연구)

  • Kim, Gi-Doo;Won, Seo-Yeon;Kim, Hie-Sik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.7
    • /
    • pp.93-102
    • /
    • 2017
  • Recently increasing usage of smartphones makes the Internet of Things (IoT) a leading technology that can collect and share data through sensor networks and wireless communication such as low-power Bluetooth (BLE). BLE-based application can provide operators more precise information on Automatic Door system by remotely diagnosing the system faults through wireless sensor networks and sensors around the Automatic Door. In this paper, a smart device with extended BLE module is implemented which can monitor and Control the system states and faults remotely without on-site diagnostic. while maintaining system integrity so that increase efficiency of time and costs for system management. We can use the results of this research as a basis in evaluating reliability of data between devices, extending communication module in Controller of obsolete Door systems, and establishing centralized monitoring systems in near future with multi-channel Door Controls.

A Genetic Algorithm with a New Encoding Method for Bicriteria Network Designs (2기준 네트워크 설계를 위한 새로운 인코딩 방법을 기반으로 하는 유전자 알고리즘)

  • Kim Jong-Ryul;Lee Jae-Uk;Gen Mituso
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.10
    • /
    • pp.963-973
    • /
    • 2005
  • Increasing attention is being recently devoted to various problems inherent in the topological design of networks systems. The topological structure of these networks can be based on service centers, terminals (users), and connection cable. Lately, these network systems are well designed with tiber optic cable, because the requirements from users become increased. But considering the high cost of the fiber optic cable, it is more desirable that the network architecture is composed of a spanning tree. In this paper, we present a GA (Genetic Algorithm) for solving bicriteria network topology design problems of wide-band communication networks connected with fiber optic cable, considering the connection cost, average message delay, and the network reliability We also employ the $Pr\ddot{u}fer$ number (PN) and cluster string in order to represent chromosomes. Finally, we get some experiments in order to certify that the proposed GA is the more effective and efficient method in terms of the computation time as well as the Pareto optimality.

An Internet Gateway Based Link State Routing for Infrastructure-Based Mobile Ad Hoc Networks (인프라구조 기반의 이동 애드혹 네트워크를 위한 인터넷 게이트웨이 중심의 링크상태 라우팅 프로토콜)

  • Lee, Sung Uk;Ngo, Chi-Trung;Han, Trung-Dinh;Kim, Je-Wook;Oh, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.859-876
    • /
    • 2012
  • Since the existing protocols separated mobility management part and routing protocol part in their design and used a flooding, they suffer from the high control overhead, thereby limiting performance. In this paper, we use a tree-based mobility management method and present a simple and efficient routing protocol that exploits the topology information which is built additionally through mobility management. Thus, the mobility management and the routing protocol closely cooperate to optimize control overhead. Furthermore, we use a progressive path discovery method to alleviate traffic congestion around IG and a unicast-based broadcast method to increase the reliability of message delivery and to judge link validity promptly. The proposed protocol reduces control overhead greatly and works in a stable manner even with the large number of nodes and high mobility. This was proven by comparing with the AODV protocol that employs the hybrid mobility management protocol.