• Title/Summary/Keyword: Connected service

Search Result 917, Processing Time 0.028 seconds

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network (무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법)

  • Chung, Jin Hee;Cho, Tae Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.661-666
    • /
    • 2016
  • The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.

Introduction of IPv6 Autoconfiguration technology and Standardization trends (IPv6 자동네트워킹 기술 및 표준화 동향)

  • 홍용근;인민교;박정수;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.97-100
    • /
    • 2001
  • For the auto-configuration of diverse hosts and automation of network management as many electronic machines and industrial components are becoming connected to Internet, it is possible to use autoconfiguration using DHCP and network management protocol such as SNMP, CMIP. But these technologies are not developed maturely and lack various standardizations yet because these are designed for restrictive purposes in the past. The new working group "Zeroconf" is made in IETF at March, 2000, it is aimed for making standards of autoconfiguration which is applied to impromptu ad-hoc networks in automobiles, trains, planes and home network or mobile networks. In this paper, we introduce the IPv6 based autoconfiguration technologies such as IP interface configuration, translation between host name and IP address, IP multicast address allocation and service discovery. Finally, trends of standardization in Zeroconf working group will be shown. be shown.

  • PDF

Study on Intelligent Service Gateweay platform designed for IoT (IoT서비스플랫폼을 위한 지능형 Gateway 설계에 관한 연구)

  • Lee, So-Haeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.244-247
    • /
    • 2016
  • Internet of Things spotlighted by the recent growth of the country: the interest in (IoT Internet pf Things) is being maximized. According to the scale of the 2013 Machina Research 2022 yireundago IoT market it is predicting about $ 1.2 trillion. Also the number of IoT devices connected simultaneously to the 2020 worldwide reached about 2.1 billion, and is expected to require about 200 million communications link. Many of these devices in order to manage and operate them efficiently IEEE 802.15.4e, D2D, Beacon, supporting protocols such as Zigbee gateway and network Connectivity to the urgent need for a proactive response to M2M -based operating convert it to a standard protocol being. This paper supports a variety of devices with different protocols and propose the design of intelligent Gateway with integrated features to manage operations.

  • PDF

A Study on Automatic Generation Method of DDS Communication Class to Improve the Efficiency of Development of DDS-based Application Software (DDS 기반 응용 SW 개발의 효율성 향상을 위한 DDS 통신 클래스 자동생성 방법 연구)

  • Kim, Keun-hee;Kim, Ho-nyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.93-96
    • /
    • 2017
  • DDS (Data Distribution Serivce) communication middleware is spreading to various private sector as well as the defense sector because it can obtain a very high application effect in a complex system environment in which a plurality of data producers and data consumers are connected by a network. However, application development using DDS middleware is an inefficient structure with a lot of repetitive codes because most users perform 1: 1 mapping with the message they want to exchange. Accordingly, the user has to perform unnecessary repetitive tasks as the topic increases. Therefore, a development support tool that identifies a series of processes required for using DDS middleware and automatically generates the classes that are repeated by Topic is required. In this paper, we propose a method for DDS communication by automatically generating a common class for efficient use of DDS middleware.

  • PDF

Resource Sharing System Base on Context-Awareness for Construction of Mobile Ubiquitous Internet (모바일 유비쿼터스 인터넷 구축을 위한 상황인식 기반 자원공유 시스템)

  • Na Seung Won;Oh Se Man
    • The KIPS Transactions:PartA
    • /
    • v.11A no.6
    • /
    • pp.419-424
    • /
    • 2004
  • Mobile Internet using mobile devices provides Portability to users and is Spreading throughout out lives. But Practical use of the mobile Internet is insufficient due to it's fundamental limitations. Especially, mobile resources are not sufficient because they are not closely connected under current mobile Internet services which are provided with pre-designed structure. For these reasons it will take a lot more time and effort for mobile Internet to grow as a popular service. In this paper, we are focusing to overcome the local limitation and to enhance the 'Sharing of Mobile Resources' by expanding mutual connectivity between resource objects scattered over the mobile Internet environment. To archive this, we propose the MRSS(Mobile Resources Sharing System). MRSS automatically converts single request from user to multiple instructions based on 'Context-Awareness' to search for proper information. Using MRSS, we can expect 'Mobile Ubiquitous Computing' environment which users can reach to information anywhere, anytime.

Network Search Algorithm for Fast Comeback to Home Network in Roaming Environment (이동통신 로밍 환경에서 빠른 홈망 복귀를 위한 망탐색 알고리즘)

  • Ha, Won-Ki;Koh, Seok-Joo
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.149-152
    • /
    • 2012
  • In the roaming case, the cost of using the visited network is larger than that of home network. So, if a mobile terminal is connected to the visited network, even though it actually came back to the home network, the user may unduly pay for communication. Such a problem frequently occurs when many networks are overlapped in the same region, as shown in the case of Poland. In this paper, we propose a network search algorithm to support the fast comeback to home network in the roaming environment. In the proposed scheme, which is based on the 3GPP specification, the mobile terminal tries to search the home network by using a database of network information, as fast as possible. For performance evaluation, we construct a virtual testbed with real terminal and network equipment to emulate the service providers in Poland. From the experimental results, we can see that the proposed scheme can reduce the time of comeback to the home network by 3~60 minutes, compared the existing 3GPP scheme.

Factors Affecting Successful Aging in Rural Elderly People (농촌 노인의 성공적 노화 영향요인 분석)

  • Ahn, Okhee;Cha, Hye Gyeong;Chang, Soo Jung;Kim, Hee Sun;Jang, Eun Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.499-508
    • /
    • 2013
  • This study was done to examine the affecting factors of successful aging to provide basic information for developing intervention program for the rural elderly. Methods: A cross-sectional descriptive design was used. Data was collected through questionnaire from 208 people with age over 65 residing in an rural community. They were recruited by convenience sampling. Collected data were analyzed by independent t-test, one-way ANOVA, Pearson's correlation coefficients, and multiple regression through SPSS/WIN 21.0 program. Results: Explanatory factors affecting the rural elderly's successful aging were social support, depression, cognitive function, productive activity and Activities of daily living, respectively, and these five factors accounted for 42.1% of the variance in successful aging. Conclusion: The rural elderly's successful aging requires establishment of social support system such as health medical service supply and social activities by being connected with social communities, and for this, this study suggests that there be a necessity of developing customized nursing intervention program.

Teacher Training Strategies for Improvement Technological Pedagogy Knowledge(TPK) connected with Problem Solving (문제해결 기반 디지털역량교수지식(TPK) 함양을 위한 교사연수 전략)

  • Shin, Soobum;Kim, Chul;Jeong, Youngsik
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.1
    • /
    • pp.23-32
    • /
    • 2018
  • This study is about in-service training structure combined digital competence and pedagogical knowledge in order to improve digital tools skill of a teacher in the school. Meanwhile domestic teacher training has been revealed low-level of applying into a teaching in the k12 school. Thus this study proposed teacher training system with focus on TPK sub-categories of TPACK. The core contents of TPK is to select appropriate digital tool for its teaching & learning. Additionally it is to select elements of teaching & learning associated with an attribute of digital tool. And this study presented modularize of 3 step such as teaching objective, teaching contents, assessment. Also we proposed that this training system should be operated with problem solving method which trainee itself compose TPK elements. And we committed quality investigation about picking up Strategies of TPK elements and the teacher training frame. The Participants concluded having a validity about TPK strategies, teacher training framework.

Development of Management System for Feature Change Information using Bid Information (입찰정보를 이용한 지형지물변화정보 관리시스템 개발)

  • Heo, Min;Lee, Yong-Wook;Bae, Kyoung-Ho;Ryu, Keun-Hong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.2
    • /
    • pp.195-202
    • /
    • 2009
  • As the generation and application of spatial information is gradually expanded not only in traditional surveying fields but also a CNS and an ITS recently. The Accuracy and the newest of data grow to be an important element. But digital map is updated with system based tile. So, it is hard to get the newest of data and to be satisfied with user requirements. In this study, management system is developed to manage feature change efficiently using bid informations from NaraJangter which service the bid informations. A construction works with change possibility of feature from bid informations are classified and are made DB. And the DB is used as the feature change forecast informations. Also, It is converted from bid information of text form to positioning informations connected to spatial information data. If this system is made successfully, this system contributes to reduce the cost for the update of digital map and to take the newest date of spatial informations.

A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service (블루투스 v4.1 비콘 기반 쿠폰 융합서비스에서의 보안위협 연구)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2015
  • As the new technologies like IoT and Fintech appear which have not existed before, security threat ranges in existing system are increasing. Especially, IoT has increasing ranges to cause malicious behaviors in specific systems because related IT infrastructure ranges are increasing. Fintech also requires the innovation of traditional security system because it has new structure which didn't exist in the past. As IoT and Fintech technologies are commercialized and related markets are developing in the future, structural security threats could be connected to actual attacks and secondary attacks by the attackers' imbedding of back door in IoT internet devices through remote access. Customer's device cannot be compulsively controlled for security in new system where these various security threats exist. Therefore, these services should minimize the collected information, and now is the time to politically control the utilizing methods of the collected information. In this thesis, security threats are to be suggested which could occur in newly appearing mobile services like IoT and Fintech.