• Title/Summary/Keyword: 초연결 네트워크

Search Result 58, Processing Time 0.029 seconds

Dynamic Analysis via Keyword Mapping for Internet of Things (사물 인터넷에 대한 키워드 매핑을 통한 동태적 분석)

  • Shon, Young-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.7
    • /
    • pp.813-818
    • /
    • 2015
  • IoT is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator or other connected devices. Until now many researches have been studied for centering keyword for detecting emerging technology of future and scientometric analysis among the papers. This paper propose searching method of emerging technology for the IOT (internet of things) which is recently interesting area via dynamic analysis for keyword mapping.

A Study on Indoor Resource Control Based on IETF CoAP Protocol for Hyper Connectivity IoT (초연결 사물 네트워크를 위한 IETF CoAP 프로토콜 기반의 실내 자원 제어에 관한 연구)

  • Jin, Wenquan;Kim, Do-Hyeun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.569-571
    • /
    • 2015
  • 본 논문에서는 IoT(Internet of Things) 표준 프로토콜인 IETF(Internet Engineering Task Force) CoAP(Constrained Application Protocol)을 이용한 실내 자원 제어 구조를 제시한다. 제안한 웹 기반 실내 환경 제어 구조에서는 웹 서버에 프록시(proxy)와 자원 디렉토리(RD : Resource Directory) 기능을 포함하고 있다. 이를 통해 CoAP 프로토콜을 통해 저전력, 소규모의 노드를 웹 서버에 등록하고, 프록시의 HTTP과 CoAP 메시지 변환 기능을 이용하여 사용자가 웹브라우즈를 이용하여 실내 환경을 제어할 수 있다.

A Study on CoAP Protocol Based on Resource Directory for Hyper Connectivity IoT in Mobile Environments (초연결 사물 네트워크를 위한 모바일 환경에서 자원 디렉토리 기반의 CoAP 프로토콜에 관한 연구)

  • Hang, Lei;Jin, Wenquan;Kim, Do-Hyeun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.566-568
    • /
    • 2015
  • 최근 IETF(Internet Engineering Task Force) CoRE(Constrained RESTful Environment) 워킹그룹에서 IoT 프로토콜로 CoAP(Constrained Application Protocol)을 표준으로 채택하였다. 본 논문에서는 모바일 환경에서 CoAP 프로토콜을 이용한 자원 디렉토리 기반의 IoT 노드와 스마트폰 연결 구조를 제시한다. 스마트폰과 IoT(Internet of Things) 노드 사이에 자원 디렉토리를 두고, 이를 통해 스마트폰은 IoT 노드를 검색하고 상황 정보를 습득할 수 있도록 하고 있다.

스마트 항만 IoT 인프라 및 정보수집 제공 장치 개발 계획

  • Park, Jong-Won;Im, Chang-Hwi;Lee, Jeong-Hui;Choe, Yeong-Cheol
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.109-111
    • /
    • 2019
  • 스마트 항만 IoT 인프라 및 정보수집 제공 장치 개발 과제는 항만 IoT 인프라와 정보수집 및 제공 장치 개발을 통해 항만물류자원들의 상호 간 초연결 네트워크를 구축하고, 이를 기반으로 실시간으로 정보를 수집 분석하여 제공함으로써 화물, 사람, 장비, 시설 등을 포함하는 항만 내 모든 자원의 연결성을 90% 이상 확보하고, 더불어 선박, 외부트럭, 교량, 교통 등을 포함한 항만 외 외부자원과의 연결성을 강화하는 것을 목적으로 한다.

  • PDF

Scenario-based Future Infantry Brigade Information Distribution Capability Analysis (시나리오 기반의 미래 보병여단 정보유통능력 분석 연구)

  • Junseob Kim;Sangjun Park;Yiju You;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • The ROK Army is promoting cutting-edge, future-oriented military development such as a mobile, intelligent, and hyper-connected Army TIGER system. The future infantry brigade plans to increase mobility with squad-level tactical vehicles to enable combat in multi-domain operations and to deploy various weapon systems such as surveillance and reconnaissance drones. In addition, it will be developed into an intelligent unit that transmits and receives data collected through the weapon system through a hyper-connected network. Accordingly, the future infantry brigade will transmit and receive more data. However, the Army's tactical information communication system has limitations in operating as a tactical communication system for future units, such as low transmission speed and bandwidth and restrictions on communication support. Therefore, in this paper, the information distribution capability of the future infantry brigade is presented through the offensive operation scenario and M&S.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

Future Tactical Communication System Development Plan (미래 전술통신체계의 발전 방안)

  • Kim, Junseob;Park, Sangjun;Cha, Jinho;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.14-23
    • /
    • 2021
  • The Army is making efforts to increase combat power by incorporating technologies related to the Fourth Industrial Revolution into the field of defense. In order to utilize these technologies, it is necessary to develop a military tactical communication system that enables transmission and reception of data between command and control system and weapon systems. Therefore, in this paper, we analyze the tactical communication systems of the other countries, derive the limitations of the tactical communication system currently operating in the military. And, a multi-layered integrated operation structure centered on satellites and plans to provide communication on the move to small units are reviewed. Then, we present the necessity of a large-capacity transmission speed by predicting the amount of data that will be generated from weapon systems of the future, and a plan to efficiently manage the network using intelligent network technology.

Cyber Threat Military Response Strategy Using Information Security Risk Management (정보보안 위험관리를 활용한 사이버 위협 군사 대응 전략)

  • Jincheol Yoo
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.173-179
    • /
    • 2023
  • The 4th Industrial Revolution technology has emerged as a solution to build a hyper-connected, super-intelligent network-oriented operational environment, overcoming the obstacles of reducing troops and defense budgets facing the current military. However, the overall risk management, including the increase in complexity of the latest inform ation technology and the verification of the impact with the existing information system, is insufficient, leading to serious threats to system integrity and availability, or negatively affecting interoperability between systems. It can be inhibited. In this paper, we suggest cyber threat response strategies for our military to prepare for cyber threats by examining information security risk management in the United States in order to protect military information assets from cyber threats that may arise due to the advancement of information technology.

Analysis of Artificial Intelligence's Technology Innovation and Diffusion Pattern: Focusing on USPTO Patent Data (인공지능의 기술 혁신 및 확산 패턴 분석: USPTO 특허 데이터를 중심으로)

  • Baek, Seoin;Lee, Hyunjin;Kim, Heetae
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.86-98
    • /
    • 2020
  • The artificial intelligence (AI) is a technology that will lead the future connective and intelligent era by combining with almost all industries in manufacturing and service industry. Although Korea is one of the world's leading artificial intelligence group with the United States, Japan, and Germany, but its competitiveness in terms of artificial intelligence patent is relatively low compared to others. Therefore, it is necessary to carry out quantitative analysis of artificial intelligence patents in various aspects in order to examine national competitiveness, major industries and future development directions in artificial intelligence technology. In this study, we use the IPC technology classification code to estimate the overall life cycle and the speed of development of the artificial intelligence technology. We collected patents related to artificial intelligence from 2008 to 2018, and analyze patent trends through one-dimensional statistical analysis, two-dimensional statistical analysis and network analysis. We expect that the technological trends of the artificial intelligence industry discovered from this study will be exploited to the strategies of the artificial intelligence technology and the policy making of the government.