• Title/Summary/Keyword: 한국컴퓨터

Search Result 36,246, Processing Time 0.061 seconds

eRPL : An Enhanced RPL Based Light-Weight Routing Protocol in a IoT Capable Infra-Less Wireless Networks (사물 인터넷 기반 기기 간 통신 무선 환경에서 향상된 RPL 기반 경량화 라우팅 프로토콜)

  • Oh, Hayoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.357-364
    • /
    • 2014
  • The first mission for the IoT based hyper-connectivity communication is developing a device-to-device communication technique in infra-less low-power and lossy networks. In a low-power and lossy wireless network, IoT devices and routers cannot keep the original path toward the destination since they have the limited memory. Different from the previous light-weight routing protocols focusing on the reduction of the control messages, the proposed scheme provides the light-weight IPv6 address auto-configuration, IPv6 neighbor discovery and routing protocol in a IoT capable infra-less wireless networks with the bloom filer and enhanced rank concepts. And for the first time we evaluate our proposed scheme based on the modeling of various probability distributions in the IoT environments with the lossy wireless link. Specifically, the proposed enhanced RPL based light-weight routing protocol improves the robustness with the multi-paths locally established based on the enhanced rank concepts even though lossy wireless links are existed. We showed the improvements of the proposed scheme up to 40% than the RPL based protocol.

Unconventional Issues and Solutions in Developing IoT Applications (IoT 애플리케이션 개발에서 비전형적 이슈 및 솔루션)

  • Ra, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.337-350
    • /
    • 2014
  • Internet-of-Things(IoT) is the computing paradigm converged with different technologies, where diverse devices are connected via the wireless network, acquire environmental information from their equipped sensors, and are actuated. IoT applications provide smart services to users by interacting with multiple devices connected to the network. IoT devices provide the simple set of the information and also offer smart services by collaborating with other devices. That is, IoT applications always interact with IoT devices which are becoming very popular at a fast pace. However, due to this fact, developing IoT application results in unconventional technical challenges which have not been observed in typical software applications. Moreover, since IoT computing has its own characteristics which are distinguished from other former paradigms such as embedded computing and mobile computing, IoT applications also reveal their own technical challenges. Therefore, we analyze technical challenges occurring in developing IoT applications and present effective solutions to overcome the challenges. To verify identified issues and presented solutions, we present the result of performing a case study of developing an IoT application. Through the case study, we verify how the unconventional technical issues are raised in a real domain and analyze effectiveness of applying the solutions to the application.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

A Wireless AP Power Saving Algorithm by Applying Sleep Mode and Transmission Power Coordination in IoT Environments (사물 인터넷 환경에서 무선 AP의 수면 모드 운영 및 송출 전력 조절을 통한 전력 소비 절감 알고리즘)

  • Jeong, Kyeong Chae;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.393-402
    • /
    • 2014
  • We have experienced an explosive increase of the IoT(Internet of Things) technology based devices including smart phones and the wireless communications. Also the growing power consumption in IEEE 802.11 WLANs(Wireless LANs) driven by these dramatic increases in not only mobile users and but also wireless APs(Access Points). To reduce the power consumption, this paper proposes a wireless AP power saving algorithm, which minimizes the transmission power without decrease the transmission and carrier sense ranges. A wireless AP which is use in our algorithm checks its own original coverage periodically for whether there is a new STA(Station) or not when its transmission power is decreased. Moreover, if there are no signaling message to connect the wireless AP, it changes its operation mode Wake-up to sleep. A Result shows that the proposed AP algorithm can reduce the total power consumption of the wireless AP approximated 18% and 35% compared to the conventional wireless AP with and without the existing power saving algorithm, respectively.

A Study on the Diffusion of Emergency Situation Information in Association with Beacon Positioning Technology and Administrative Address (Beacon 위치측위 기술과 행정주소를 연계한 재난재해 상황 전파 연구)

  • Mo, Eunsu;Lee, Jeakwang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.211-216
    • /
    • 2016
  • Worldwide casualties caused by earthquakes, floods, fire or other disaster has been increasing. So many researchers are being actively done technical studies to ensure golden-time. In this paper if a disaster occurs, use the IoT technologies in order to secure golden-time and transmits the message after to find the user of the accident area first. When the previous job is finished, gradually finds a user of the surrounding area and transmits the message. For national emergency information, OPEN API of Korea Meteorological Administration was used. To collect detailed information on a relevant area in real time, this study established the system that connects and integrates Crowd Sensing technology with BLE (Bluetooth Low Energy) Beacon technology. Up to now, the CBS based on base station has been applied. However, this study designed and mapped DB in the integration of Beacon based user positioning and national administrative address system in order to estimate local users. In this experiment, the accuracy and speed of information dif6fusion algorithm were measured with a rise in the number of users. The experiments were conducted in a manner that increases the number of users by one thousand and was measured the accuracy and speed of the message spread transfer algorithm. Finally, became operational in less than one second in 20,000 users, it was confirmed that the notification message is sent.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

Quantitative Cyber Security Scoring System Based on Risk Assessment Model (위험 평가 모델 기반의 정량적 사이버 보안 평가 체계)

  • Kim, Inkyung;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1179-1189
    • /
    • 2019
  • Cyber security evaluation is a series of processes that estimate the level of risk of assets and systems through asset analysis, threat analysis and vulnerability analysis and apply appropriate security measures. In order to prepare for increasing cyber attacks, systematic cyber security evaluation is required. Various indicators for measuring cyber security level such as CWSS and CVSS have been developed, but the quantitative method to apply appropriate security measures according to the risk priority through the standardized security evaluation result is insufficient. It is needed that an Scoring system taking into consideration the characteristics of the target assets, the applied environment, and the impact on the assets. In this paper, we propose a quantitative risk assessment model based on the analysis of existing cyber security scoring system and a method for quantification of assessment factors to apply to the established model. The level of qualitative attribute elements required for cyber security evaluation is expressed as a value through security requirement weight by AHP, threat influence, and vulnerability element applying probability. It is expected that the standardized cyber security evaluation system will be established by supplementing the limitations of the quantitative method of applying the statistical data through the proposed method.

Elementary Pre-service Teachers' Perception and Readiness for Future-oriented Human Resource Development Policies (미래지향적 인재양성 정책에 대한 초등예비교사의 인식과 준비도)

  • Jo, Miheon
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.5
    • /
    • pp.451-459
    • /
    • 2019
  • Various policies have been implemented for human resources development in preparation for future society. Among the policies, STEAM education, SMART education and SW education are representative examples. In order for these policies to be implemented effectively in the school setting, teachers' positive perception and teaching competency are required. In consideration of the importance of pre-service teacher education, this study analyzed the current status of elementary pre-service teachers' perception and teaching readiness on STEAM education, SMART education and SW education, and sought implications that can be reflected in pre-service teacher education. The results of the study showed that the pre-service teachers' perception on the necessity of each policy was very high, and the understanding level of each policy was relatively high. Compared with this, it was found that pre-service teachers lacked training experience related to each policy, and the level of readiness for teaching was very low. As the most important task to be solved, many pre-service teachers selected the implementation of teacher education and seminars, and the distribution of instructional programs and materials. As the result of analyzing the difference according to pre-service teachers' individual characteristics, differences were found according to the level of their ICT utilization ability. Based on the results of this study, implications to be reflected in pre-service teacher training processes were suggested.

A Study on the Measures to Activate Education Field of Maker Movement in Korea (국내 메이커 운동의 교육 분야 활성화 방안 연구)

  • Oh, Soo-Jin;Baek, Yun-Cheol;Kwon, Ji-Eun
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.483-492
    • /
    • 2019
  • The culture and education are very active with the active policy and support to form the government's Maker Movement. The purpose of this study is to grasp the current status of the education sector of the domestic maker movement, which is increasing recently, and to propose a plan for activating maker education for the development of a positive direction. To this end, first, the current status and problems of domestic maker training are derived through in-depth interviews with existing maker training operators and participants. Second, based on the contents of the interview script, keyword analysis and its characteristics through the qualitative survey analysis program (NVIVO) are identified. Third, based on the analysis results, we propose a plan and development direction for domestic maker education. Based on the educators who performed maker training and the students involved, professional maker teachers were required for the professionalism of education, and the expansion of maker channels and professional networking of participating students was required. In addition, there was a need for specialized programs and appropriate policy support that reflected the characteristics of maker training. This study aims at contributing to the activation of maker education, which is a major field of maker movement, by helping to improve concrete support methods, training related educators, and educational environment for maker education.