• 제목/요약/키워드: 초연함

Search Result 359, Processing Time 0.026 seconds

Research about Security Attack Methods to Arduino Boards Using Temporary Files Data Manipulation (임시파일 데이터 조작을 통한 아두이노 보드 공격 기법에 관한 연구)

  • Lee, Woo Ho;Jung, Hyun Mi;Jeong, Kimoon
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.21-27
    • /
    • 2017
  • Internet of Things(IoT), which is developing for the hyper connection society, is based on OSHW (Open Source Hardware) such as Arduino and various small products are emerging. Because of the limitation of low performance and low memory, the IoT is causing serious information security problem that it is difficult to apply strong security technology. In this paper, we analyze the vulnerability that can occur as a result of compiling and loading the application program of Arduino on the host computer. And we propose a new attack method that allows an attacker to arbitrarily change the value input from the sensor of the arduino board. Such as a proposed attack method may cause the arduino board to misinterpret environmental information and render it inoperable. By understanding these attack techniques, it is possible to consider how to build a secure development environment and cope with these attacks.

Research on MUJI's Design Features from Chinese Zen Thought (중국의 선(禪)사상으로 본 무인양품디자인의 특성에 관한 연구)

  • Fan, Yan-Ni;Song, Man-Yong
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.135-145
    • /
    • 2020
  • In the era of the fourth industrial revolution, design has developed into a fusion of diversified culture and media. The integration of traditional culture and brand design concepts has become a hot research topic. Chinese Zen thought integrates the thoughts of Laozi and Zhuangzi, and takes" Wu Xiang as the appearance, Wu Nian as the foundation, Wu Zhu as the purpose" as the main purpose to construct a unique Zen thought system that integrates Taoism, Confucian philosophy and aesthetics. From this point of view, the MUJI design that combines Chinese Zen thought and design has attracted much attention. As a traditional culture, how is Chinese Zen Thought reflected in the design of MUJI? Starting from the awareness of this question, this study takes the daily necessities of MUJI as an example to investigate the design features of MUJI that reflect Chinese Zen thought. The conclusion shows that the design features of MUJI with Chinese Zen thoughts are showed in four ways-minimalist style, unitary color, ecological material, and humanized experience.

Design of Smart Service based on Reverse-proxy for the Internet of Things (리버스 프록시 기반 IoT 서비스 도메인 설계)

  • Park, Jiye;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.1-6
    • /
    • 2014
  • The IoT (Internet of Things) is considered as a core technology to realize interconnected world. At this, companies composing ICT industry and standard organizations make efforts to accelerate it. IETF CoRE(Constrained RESTful Environment) working group standardized CoAP (Constrained Application Protocol) for the constrained device. CoAP has RESTful architecture and CoAP option is provided to use forward-proxy. The forward-proxy is used to translate protocol and perform requests on behalf of the client. However, communication between Internet based client and LLN(Low-power and Lossy Network) based CoAP server architecture has limitations to deploy real IoT service. In this architecture, problems like response delay, URI assignment and DoS attack can be occurred. To solve these problems, we propose the reverse-proxy based system. We consider both of static IoT and mobility IoT environments. Finally, our proposed system is expected to provide efficient IoT service.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.

Big Data Governance Model for Effective Operation in Cyberspace (효과적인 사이버공간 작전수행을 위한 빅데이터 거버넌스 모델)

  • Jang, Won-gu;Lee, Kyung-ho
    • The Journal of Bigdata
    • /
    • v.4 no.1
    • /
    • pp.39-51
    • /
    • 2019
  • With the advent of the fourth industrial revolution characterized by hyperconnectivity and superintelligence and the emerging cyber physical systems, enormous volumes of data are being generated in the cyberspace every day ranging from the records about human life and activities to the communication records of computers, information and communication devices, and the Internet of things. Big data represented by 3Vs (volume, velocity, and variety) are actively used in the defence field as well. This paper proposes a big data governance model to support effective military operations in the cyberspace. Cyberspace operation missions and big data types that can be collected in the cyberspace are classified and integrated with big data governance issues to build a big data governance framework model. Then the effectiveness of the constructed model is verified through examples. The result of this study will be able to assist big data utilization planning in the defence sector.

  • PDF

Future Warfare for Hyper Connected Era (초 연결시대의 미래전 양상)

  • Lee, Chang-In;Jung, Min-Sub;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.99-103
    • /
    • 2020
  • The warfare caused a dramatic change when new technology was introduced to the battlefield or when the technology was matured to change the concept of operation. Thus, the rapid development of science since the 19th century is also rapidly changing the aspect and speed of war, and the recent speed of change is making it more difficult to predict future warfare than in the past In particular, in the past, it was difficult to predict the future warfare based on the latest science and technology, because it was difficult to spread and seize advanced science and technology. But global human exchange, technology hijacking by internet, and developing of asymmetric skills and methods caused more complex to technology based warfare prediction. In other words, the nature and principles of war, together with the development of science and technology, should be considered togther to predict future warfare. Therefore this study is based on the thory and principles of war and the latest science and technology to predict the future warfare situation that the military will face.

Characteristics of Settlement for Non-woven Geotextile through Cyclic Loading Model Test (보강재의 강성도를 고려한 연약지반 표층처리공법 지지력 산정방법에 관한 연구)

  • Ham, Tae-Gew;Seo, Se-Gwan;Cho, Sam-Deok;Yang, Kee-Sok;You, Seung-Kyong
    • Journal of the Korean Geosynthetics Society
    • /
    • v.8 no.2
    • /
    • pp.11-20
    • /
    • 2009
  • This study, as basic research which was intended to develope the surface reinforcement method using reinforcement material which is applicable to very soft ground in Korea, was aimed at proposing the design parameter for the surface ground improvement method. To that end, a wide width tensile test using geotextile, geogrid and steel bar (substitute for bamboo) and 21 kinds of the laboratory model tests with the end restraint conditions of the reinforcement that comprises the constrained and partially constrained (3 types) conditions were conducted. Moreover, a new procedure was proposed to take into account the effect of the stiffness of Reinforce materials on bearing capacity theory of Surface Reinforcement Method for Soft Ground.

  • PDF

MPEG-I Immersive Audio Standardization Trend (MPEG-I Immersive Audio 표준화 동향)

  • Kang, Kyeongok;Lee, Misuk;Lee, Yong Ju;Yoo, Jae-hyoun;Jang, Daeyoung;Lee, Taejin
    • Journal of Broadcast Engineering
    • /
    • v.25 no.5
    • /
    • pp.723-733
    • /
    • 2020
  • In this paper, MPEG-I Immersive Audio Standardization and related trends are presented. MPEG-I Immersive Audio, which is under the development of standard documents at the exploration stage, can make a user interact with a virtual scene in 6 DoF manner and perceive sounds realistic and matching the user's spatial audio experience in the real world, in VR/AR environments that are expected as killer applications in hyper-connected environments such as 5G/6G. In order to do this, MPEG Audio Working Group has discussed the system architecture and related requirements for the spatial audio experience in VR/AR, audio evaluation platform (AEP) and encoder input format (EIF) for assessing the performance of submitted proponent technologies, and evaluation procedures.

The study of the field customized SW training course design based on the analysis of the field suitability of the university SW education (대학 SW 교육의 현장 적합도 분석에 기반한 현장 맞춤형 SW 교육 과정 설계에 대한 연구)

  • Cha, Joon Seub
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.86-92
    • /
    • 2015
  • Recently, it is entering the hyper connectivity age due to the development of sensor and communication technology. In particular, it is emerging new industries such as the IoT, bigdata, cloud by convergence with the ICT and other industries. Because these industries are high the gravity of the software, the demand for software manpower is increasing rapidly. But university curriculum don't deviate from the traditional curriculum, and lack of positive response to these changes is occurring a mismatch with the industry demand. In this paper, investigate a software curriculums of the four-year university, and will attempt to investigate the perception about the university software course of the corporate perspective. Also, we draw a on-site fitness of universities training course by analysis of importance on software training courses between universities and businesses. Finally, we propose a strategy model for software training course design appropriate for the field.

Research of Semantic Considered Tree Mining Method for an Intelligent Knowledge-Services Platform

  • Paik, Juryon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.27-36
    • /
    • 2020
  • In this paper, we propose a method to derive valuable but hidden infromation from the data which is the core foundation in the 4th Industrial Revolution to pursue knowledge-based service fusion. The hyper-connected societies characterized by IoT inevitably produce big data, and with the data in order to derive optimal services for trouble situations it is first processed by discovering valuable information. A data-centric IoT platform is a platform to collect, store, manage, and integrate the data from variable devices, which is actually a type of middleware platforms. Its purpose is to provide suitable solutions for challenged problems after processing and analyzing the data, that depends on efficient and accurate algorithms performing the work of data analysis. To this end, we propose specially designed structures to store IoT data without losing the semantics and provide algorithms to discover the useful information with several definitions and proofs to show the soundness.