• Title/Summary/Keyword: Device Network

Search Result 2,413, Processing Time 0.028 seconds

The Public Choice Analysis of Korean Mobile Telecom Policy (이동통신 정책의 공공 선택 분석)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.917-920
    • /
    • 2014
  • In Korea mobile phone subscribers exceeded 1 million people in 1995, and ten million people in 1998. Prevalence of the mobile phone increased dramatically over 110% compared to the population. And all family members including children and students use one or two mobile terminal. Mobile phone is obviously necessary good more than washer, vacuum cleaner, passenger car. Our daily life with mobile communication are conveniently positioned, but communication related costs including the price of the device has become a big burden on the household. But the government does not seem to do the right role at the right time to prevent the failure of the market to further maximize consumer welfare and social welfare through fair competition. This principal-agent problems exist especially in perspective of joint use of the mobile communication network, number portability, separation of phone distribution and phone service and network neutrality among in mobile communication policies since the early 1990s up to now.

  • PDF

An Exploratory Study on Block chain based IoT Edge Devices for Plant Operations & Maintenance(O&M) (플랜트 O&M을 위한 블록체인 기반 IoT Edge 장치의 적용에 관한 탐색적 연구)

  • Ryu, Yangsun;Park, Changwoo;Lim, Yongtaek
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.1
    • /
    • pp.34-42
    • /
    • 2019
  • Receiving great attention of IoT and 4th industrial revolution, the necessity comes to the fore of the plant system which aims making it smart and effective. Smart Factory is the key realm of IoT to apply with the concept to optimize the entire process and it presents a new and flexible production paradigm based on the collected data from numerous sensors installed in a plant. Especially, the wireless sensor network technology is receiving attention as the key technology of Smart Factory, researches to interface those technology is actively in progress. In addition, IoT devices for plant industry security and high reliable network protocols are under development to cope with high-risk plant facilities. In the meanwhile, Blockchain can support high security and reliability because of the hash and hash algorithm in its core structure and transaction as well as the shared ledger among all nodes and immutability of data. With the reason, this research presents Blockchain as a method to preserve security and reliability of the wireless communication technology. In regard to that, it establishes some of key concepts of the possibility on the blockchain based IoT Edge devices for Plant O&M (Operations and Maintenance), and fulfills performance verification with test devices to present key indicator data such as transaction elapsed time and CPU consumption rate.

The Security Vulnerabilities of 5G-AKA and PUF-based Security Improvement (5G 인증 및 키합의 프로토콜(5G-AKA)의 보안취약점과 PUF 기반의 보안성 향상 방안)

  • Jung, Jin Woo;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.3-10
    • /
    • 2019
  • The 5G network is a next-generation converged network that combines various ICT technologies to realize the need for high speed, hyper connection and ultra low delay, and various efforts have been made to address the security vulnerabilities of the previous generation mobile networks. However, the standards released so far still have potential security vulnerabilities, such as USIM deception and replication attack, message re-transmission attack, and race-condition attack. In order to solve these security problems, this paper proposes a new 5G-AKA protocol with PUF technology, which is a physical unclonable function. The proposed PUF-based 5G-AKA improves the security vulnerabilities identified so far using the device-specific response for a specific challenge and hash function. This approach enables a strong white-list policy through the addition of inexpensive PUF circuits when utilizing 5G networks in areas where security is critical. In addition, since additional cryptographic algorithms are not applied to existing protocols, there is relatively little burden on increasing computational costs or increasing authentication parameter storage.

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.

Development of Wireless Communication Educational Equipment for Internet of Things (IoT) (사물인터넷(IoT)을 위한 무선통신 교육장비 개발)

  • Kim, Han-jong
    • Journal of Practical Engineering Education
    • /
    • v.13 no.2
    • /
    • pp.321-326
    • /
    • 2021
  • Wireless communication is a core technology constituting the Internet of Things (IoT), but there is no suitable educational equipment to learn various wireless communication technologies used in the Internet of Things through practice. This paper deals with the development of advanced education and training equipment that can perform various IoT wireless communication practices. It uses an Arduino mega board as a device to control various sensors. As wireless network technologies to send and receive the sensing date wirelessly, it makes use of RFID/NFC and Bluetooth among WPAN technologies, WiFi among WLAN technologies and LoRa and 2.4GHz wireless transceiver among WWAN technologies. In addition, GPS, infrared communication, I2C communication, and SPI communication are organized so that various IoT wireless communication technologies can be learned through practice. In addition, since the educational equipment developed in this paper is equipped with two devices, it is designed to perform transmission and reception experiments for wireless network technology within the equipment.

Cloud of Things (CoTs): Security Threats and Attacks

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.229-237
    • /
    • 2021
  • Cloud of things (CoTs) is a newer idea which combines cloud computing (CC) with the Internet of Things (IoT). IoT capable of comprehensively producing data, and cloud computing can be presented pathways that allow for the progression towards specific destinations. Integrating these technologies leads to the formation of a separate element referred to as the Cloud of Things (CoTs). It helps implement ideas that make businesses more efficient. This technology is useful for monitoring a device or a machine and managing or connecting them. Since there are a substantial amount of machines that can run the IoT, there is now more data available from the IoT that would have to be stored on a local basis for a provisional period, and this is impossible. CoTs is used to help manage and analyze data to additionally create usable information by permitting and applying the development of advanced technology. However, combining these elements has a few drawbacks in terms of how secure the process is. This investigation aims to recent study literature from the past 3 years that talk about how secure the technology is in terms of protecting by authentication, reliability, availability, confidentiality, and access control. Additionally, this investigation includes a discussion regarding some kinds of potential attacks when using Cloud of Things. It will also cover what the various authors recommend and conclude with as well as how the situation can be approached to prevent an attack.

Implementation of Smart Shoes for Dementia Patients using Embedded Board and Low Power Wide Area Technology (저전력장거리 기술과 임베디드 보드를 이용한 치매 돌봄 스마트 신발 구현)

  • Lee, Sung-Jin;Choi, Jun-Hyeong;Seo, Chang-Sung;Park, Byung-Kwon;Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.100-106
    • /
    • 2020
  • In this paper smart shoes for dementia care using embedded boards and Low Power Wide Area technology and their application software are implemented. The communication board composed of Cortex-M3 board and LoRa module is embedded into groove made in outsole of smart shoes. Including the mold, the shoe outsole was manufactured by hand. By using application software and embedded board, caregiver can track the position of dementia patient using GPS and LoRa network. The location tracking and data transmission operations of smart shoes have been successfully verified in the outdoor environment. The smart shoes of this paper are applicable to a safety device to prevent the disappearance of demented patients through results of experiments and if bigdata is collected and analyzed by deep-learning, it may be helpful to analyze the predictive path of dementia patients or the pattern of dementia.

Deep Learning based Raw Audio Signal Bandwidth Extension System (딥러닝 기반 음향 신호 대역 확장 시스템)

  • Kim, Yun-Su;Seok, Jong-Won
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1122-1128
    • /
    • 2020
  • Bandwidth Extension refers to restoring and expanding a narrow band signal(NB) that is damaged or damaged in the encoding and decoding process due to the lack of channel capacity or the characteristics of the codec installed in the mobile communication device. It means converting to a wideband signal(WB). Bandwidth extension research mainly focuses on voice signals and converts high bands into frequency domains, such as SBR (Spectral Band Replication) and IGF (Intelligent Gap Filling), and restores disappeared or damaged high bands based on complex feature extraction processes. In this paper, we propose a model that outputs an bandwidth extended signal based on an autoencoder among deep learning models, using the residual connection of one-dimensional convolutional neural networks (CNN), the bandwidth is extended by inputting a time domain signal of a certain length without complicated pre-processing. In addition, it was confirmed that the damaged high band can be restored even by training on a dataset containing various types of sound sources including music that is not limited to the speech.

Design and Implementation of the CDMA2000 1x EV-DO Security Layer to which applies 3GPP2 C.S0024-A v.2.0 Standard (3GPP2 C.S0024-A v.2.0 표준을 적용한 CDMA2000 1x EV-DO 보안 계층 설계 및 구현)

  • Yang, Jong-Won;Cho, Jin-Man;Lee, Tae-Hoon;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.59-65
    • /
    • 2008
  • In security layer in the CDMA2000 1x EV-DO, a standard - C.S0024-a v2.0 is being accomplished under the project of 3GPP2(3rd Generation Partnership Project2). Therefore, a security device is needed to implement the security layer which is defined on the standard document for data transfer security between AT(Access Terminal) and AN(Access Network) on CDMA2000 1x EV-DO environment. This paper realizes the security layer system that can make safe and fast transfer of data between AT and AN. It could be applied to various platform environments by designing and implementing the Security Layer in the CDMA2000 1x EV-DO Security Layer to which applies C.S0024-A v2.0 of 3GPP2.

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.