• 제목/요약/키워드: 초연결성 통신

Search Result 10, Processing Time 0.023 seconds

5G 서비스와 방송 미디어의 진화

  • Seo, Yeong-U
    • Broadcasting and Media Magazine
    • /
    • v.24 no.3
    • /
    • pp.76-81
    • /
    • 2019
  • 지상파 UHD 방송의 주요 특징 중 하나는 IP기반의 양방향 서비스이다. 데이터 전송 측면에서 보면 고화질 영상을 많은 사람들이 동시에 수신할 수 있는 브로드캐스트 서비스이면서도 통신망과의 연결을 통해 콘텐츠를 확장할 수 있는 확장형 서비스라고 할 수 있다. 초고속, 초저지연, 초연결 등 세가지 중요한 특징의 5G 서비스는 이러한 지상파 UHD 방송과 어떻게 접목될 수 있을까? 초고화질로 연결되는 현장 상황은 실시간 방송의 품질을 높일 것이며, 초저지연은 무선라이브 제작환경의 혁신을 가져올 것이다. 또한 초연결성은 고품질 미디어 서비스 단말기의 무한 확장을 가져올 것이다. 이처럼 통신 기술의 혁신적인 발전은 연결형 서비스로 거듭난 지상파 방송 서비스의 진화에도 많은 영향을 미칠 것이다. 본 고에서는 5G에서 달라진 기술 혁신의 내용과 미디어 소비 환경의 변화가 지상파 방송 미디어 서비스를 어떻게 변화시키는지 논의해 보고자 한다.

eRPL : An Enhanced RPL Based Light-Weight Routing Protocol in a IoT Capable Infra-Less Wireless Networks (사물 인터넷 기반 기기 간 통신 무선 환경에서 향상된 RPL 기반 경량화 라우팅 프로토콜)

  • Oh, Hayoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.357-364
    • /
    • 2014
  • The first mission for the IoT based hyper-connectivity communication is developing a device-to-device communication technique in infra-less low-power and lossy networks. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

Research of UT utilized the services for a disaster response system as role of u-Government (전자정부 역할로서 재난재해 대응체계를 위한 UT 활용서비스 연구)

  • Choung, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.251-257
    • /
    • 2015
  • Rationality only based on human experience and visuals takes huge toll on nation at the time of disasters. Accordingly, it is required to convert its system into national disaster-managing system based on governmental departments effective cooperation against catastrophic emergencies. Thus, this manuscript rejects empirical model of calamity measures and provides substituting prototype based on u-Gov which utilizes UT service from the developed countries' cases. Moreover, in order to provide nation's administrative services, the paper suggests alternative for politic issues which realizes a new incorporated control towel reflecting policies.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

The Study on the Design and Development of Childre's free choice activities Monitoring System Based on Open Source Hardware (오픈소스 하드웨어를 이용한 유아의 자유선택활동 관찰시스템의 설계 및 개발 연구)

  • Kim, Kyung Min
    • Smart Media Journal
    • /
    • v.7 no.2
    • /
    • pp.47-53
    • /
    • 2018
  • Along with the development of information and communication technology, smart education that can learn without restrictions of time, place and equipment is activated even in the field of education. Although smart education is provided with content-based training solutions, construction of a system that grasps individual characteristics of learners and provides personalized learning is relatively weak. The activity of free choice is an important play activity of early childhood education, but it is not implemented efficiently by relying on the clinical observation of the teacher. If the IoT(Internet of Things) technology based on Hyper-Connected is applied to free-choice activities, it is possible to provide the child's personalized activity type and play-form analysis based on objective and stylized data. In this paper, we design and implement a system to monitor the child's activity of free choice by building an IoT environment that is based on open source hardware. The proposed system provides children's activity information as objective data and will be used as teacher's work mitigation and custom training material for each child.

A Study on The Network Design of Smart Village to Provide Wired and Wireless Convergence Services on IoT (IoT기반의 유무선 융복합 서비스 제공을 위한 스마트빌리지의 네트워크 구성방안에 관한 연구)

  • Kim, Yun-ha;Jeong, Jae-woong;Kim, Young-sung;Choi, Hyun-ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.296-299
    • /
    • 2022
  • The rapid urban expansion and the increase in natural disasters due to the increase of population after industrialization and climate change are causing numerous urban management problems. The IP based hyper-connectivity caused by the initiation of the 4th industrial revolution enables a variety of technologies and services that produce vast amounts of data and solve urban management problems based on this. Especially, the quality of life is improved by providing the necessary information for life that are produced through a sensor network on wired and wireless communication. In this study, we intend to propose the method of optimal communcation network composition for innovative and futuristic city management technology through the case of K-water Smart Village Communication System

  • PDF

The Grammar of Female Exploitation In a Digital Matrix: Analysis of the Mechanism of Digital Sexual Violence and Counter-Discourses on it (디지털 매트릭스의 여성착취문법: 디지털 성폭력의 작동방식과 대항담론)

  • YUN, Ji-Yeong
    • Journal of Korean Philosophical Society
    • /
    • no.122
    • /
    • pp.85-134
    • /
    • 2018
  • In this article, I will provide a philosophical discourse on digital sexual violence that is a technological version of male violence. First, critical analysis of the mechanism of the spatiality and the temporality of the hidden and illicit camera is developed to focus on the immeasurable damage of this violence. I elaborate a notional division between digital sexual violence and cyber sexual violence. Secondly, the ease of taking images of women's bodies and the rapid transmission of these images through the advancement of digital communication technology and hyperconnectivity, lead to use these images as a new digital monet for men. They consolidate their male solidarity by reaffirming female inferiority and humiliating women. Thirdly, the invention of the structure of the new affect to resist to digital sexual violence is crucial. For that, it would be necessary to pass from the sexual shame to the sexual displeasure and to the socio-political indignation. These would create another opportunity to resist to digital sexual violence.

Trend Analysis of Intelligent Cyber Attacks on Power Systems (전력시스템 대상 지능형 사이버공격 동향 분석)

  • Soon-Min Hong;Jung-ho Eom;Jae-Kyung Lee
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.21-28
    • /
    • 2023
  • The development of information and communication technology in the 21st century has increased operational efficiency by providing hyper-connectivity and hyper-intelligence in the control systems of major infrastructure, but is also increasing security vulnerabilities, exposing it to hacking threats. Among them, the electric power system that supplies electric power essential for daily life has become a major target of cyber-attacks as a national critical infrastructure system. Recently, in order to protect these power systems, various security systems have been developed and the stability of the power systems has been maintained through practical cyber battle training. However, as cyber-attacks are combined with advanced ICT technologies such as artificial intelligence and big data, it is not easy to defend cyber-attacks that are becoming more intelligent with existing security systems. In order to defend against such intelligent cyber-attacks, it is necessary to know the types and aspects of intelligent cyber-attacks in advance. In this study, we analyzed the evolution of cyber attacks combined with advanced ICT technology.

5G Network Resource Allocation and Traffic Prediction based on DDPG and Federated Learning (DDPG 및 연합학습 기반 5G 네트워크 자원 할당과 트래픽 예측)

  • Seok-Woo Park;Oh-Sung Lee;In-Ho Ra
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.33-48
    • /
    • 2024
  • With the advent of 5G, characterized by Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), efficient network management and service provision are becoming increasingly critical. This paper proposes a novel approach to address key challenges of 5G networks, namely ultra-high speed, ultra-low latency, and ultra-reliability, while dynamically optimizing network slicing and resource allocation using machine learning (ML) and deep learning (DL) techniques. The proposed methodology utilizes prediction models for network traffic and resource allocation, and employs Federated Learning (FL) techniques to simultaneously optimize network bandwidth, latency, and enhance privacy and security. Specifically, this paper extensively covers the implementation methods of various algorithms and models such as Random Forest and LSTM, thereby presenting methodologies for the automation and intelligence of 5G network operations. Finally, the performance enhancement effects achievable by applying ML and DL to 5G networks are validated through performance evaluation and analysis, and solutions for network slicing and resource management optimization are proposed for various industrial applications.