• Title/Summary/Keyword: Device Network

Search Result 2,407, Processing Time 0.036 seconds

Design of Smart Service based on Reverse-proxy for the Internet of Things (리버스 프록시 기반 IoT 서비스 도메인 설계)

  • Park, Jiye;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.1-6
    • /
    • 2014
  • The IoT (Internet of Things) is considered as a core technology to realize interconnected world. At this, companies composing ICT industry and standard organizations make efforts to accelerate it. IETF CoRE(Constrained RESTful Environment) working group standardized CoAP (Constrained Application Protocol) for the constrained device. CoAP has RESTful architecture and CoAP option is provided to use forward-proxy. The forward-proxy is used to translate protocol and perform requests on behalf of the client. However, communication between Internet based client and LLN(Low-power and Lossy Network) based CoAP server architecture has limitations to deploy real IoT service. In this architecture, problems like response delay, URI assignment and DoS attack can be occurred. To solve these problems, we propose the reverse-proxy based system. We consider both of static IoT and mobility IoT environments. Finally, our proposed system is expected to provide efficient IoT service.

Real-time Intelligent Exit Path Indicator Using BLE Beacon Enabled Emergency Exit Sign Controller

  • Jung, Joonseok;Kwon, Jongman;Jung, Soonho;Lee, Minwoo;Mariappan, Vinayagam;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.82-88
    • /
    • 2017
  • Emergency lights and exit signs are an indispensable part of safety precautions for effective evacuation in case of emergency in public buildings. These emergency sign indicates safe escape routes and emergency doors, using an internationally recognizable sign. However visibility of those signs drops drastically in case of emergency situations like fire smoke, etc. and loss of visibility causes serious problems for safety evacuation. This paper propose a novel emergency light and exit sign built-in with Bluetooth Low Energy (BLE) Beacon to assist the emergency self-guiding evacuation using devices for crisis and emergency management to avoid panic condition inside the buildings. In this approach, the emergency light and exit sign with the BLE beacons deployed in the indoor environments and the smart devices detect their indoor positions, direction to move, and next exit sign position from beacon messages and interact with map server in the Internet / Intranet over the available LTE and/or Wi-Fi network connectivity. The map server generate an optimal emergency exit path according to the nearest emergency exit based on a novel graph generation method for less route computation for each smart device. All emergency exit path data interfaces among three system components, the emergency exit signs, map server, and smart devices, have been defined for modular implementation of our emergency evacuation system. The proposed exit sign experimental system has been deployed and evaluated in real-time building environment thoroughly and gives a good evidence that the modular design of the proposed exit sign system and a novel approach to compute emergency exit path route based on the BLE beacon message, map server, and smart devices is competitive and viable.

Development of Intrusion Detection System for GOOSE Protocol Based on the Snort (GOOSE 프로토콜 환경에서 Snort 기반의 침입 탐지 시스템 개발)

  • Kim, Hyeong-Dong;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1181-1190
    • /
    • 2013
  • The GOOSE(Generic Object Oriented Substation Event) is used as a network protocol to communicate between IEDs(Intelligent Electronic Devices) in international standard IEC 61850 of substation automation system. Nevertheless, the GOOSE protocol is facing many similar threats used in TCP/IP protocol due to ethernet-based operation. In this paper, we develop a IDS(Intrusion Detection System) for secure GOOSE Protocol using open software-based IDS Snort. In this IDS, two security functions for keyword search and DoS attack detection are implemented through improvement of decoding and preprocessing component modules. And we also implement the GOOSE IDS and verify its accuracy using GOOSE packet generation and communication experiment.

Security Scheme for Prevent malicious Nodes in WiMAX Environment (WiMAX 환경에서 악의적 노드 예방을 위한 보안 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.382-389
    • /
    • 2009
  • As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.

USN-based Water Treatment Plant Facilities Data Management Techniques and Reliability (USN 기반 수직형 정수처리시설 데이터 최적관리 및 신뢰성 검증연구)

  • Jang, Sang-Bok;Shin, Gang-Wook;Hong, Sung-Taek;Lee, An-Kyu;Park, Hye-Mi;Chun, Myung-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2736-2744
    • /
    • 2013
  • In this paper, we present a Smart Water Treatment Plant using Zigbee USN devices and a real-time monitoring system in K-water Flow Meter Calibration Center Building. For verification, the data of vertical type WTP such as flow rate, pressure, water level and water temperature are obtained by the Zigbee USN devices, operating in 2.45 GHz band, and be wirelessly surveilled by the real-time monitoring system. The received data from the sensor is transmitted to the data processing device, and then the processed data can be monitored on a smart phone. Consequently, the pilot plant based on the low-cost and high-efficiency USN has been developed with the performance analysis for the communication network and remote monitoring system on mobile devices.

The design of Smart flowerpot management system (스마트 화분관리 시스템 설계)

  • Jeon, Pil-kyeong;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.133-135
    • /
    • 2015
  • This paper is about the design of flowerpot management system which allows you to manage the flowerpot more efficiently and conveniently using Internet of Things when you start to grow plants. IoT connects all things to the network to provide various services to users, it has recently been focused on the center of the IT convergence techniques. So by using the realization sensor based IoT technology the need for research and development of IoT technologies were designed for the system. Basically, Device is using soil humidity sensor and Arduino, Android smart phone and smart light bulb. Transmit the humidity value of the flowerpot that measured by the sensor in a wireless communication, by controlling the state according to the value of the humidity, users can be provided a visual information and set up a flowerpot management and plan.

  • PDF

An Effective Frequency Sharing Method using Spectrum Etiquette and Genetic Algorithm for the Coexistence of WRAN and WLAN in TV White Space (TVWS에서 스펙트럼 에티켓 및 GA를 사용한 WRAN과 WLAN의 효율적 주파수 공유기법)

  • Jeong, Won-Sik;Jang, Sung-Jeen;Yong, Seulbaro;Kim, Jae-Moung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2A
    • /
    • pp.83-94
    • /
    • 2012
  • Various wireless communication devices or network such as WRAN and WLAN will coexist in the TVWS(TV White Space). Because of this coexistence, the wireless devices which use the TVWS have to avoid interfering to not only licensed TV receiver and wireless microphone but also homogeneous or heterogeneous TVBD(TV Band Device)s. In this paper, we propose two frequency sharing methods for the coexistence of WLAN and WRAN in terms of interference reduction and throughput enhancement in both homogeneous and heterogeneous networks. One is the WRAN spectrum etiquette to provide more wide bandwidth for WLAN users and the other is the WLAN frequency selection methods to improve the throughput performance. The simulation results have confirmed the throughput improvement of the proposed methods. Moreover, the proposed methods is also applicable to improve the throughput performance and reduce interference of similar systems working in a cognitive manner.

Dynamic Allocation of Channel Times based on Link Quality of HR-WPAN (HR-WPAN에서 링크 상태에 따른 동적 채널 타임 할당 기법)

  • Kang, Jae-Eun;Byun, Sung-Won;Lee, Jong-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.264-273
    • /
    • 2009
  • For IEEE 802.15.3 HR-WPAN, we propose the DABL algorithm that PNC can allocate the channel times to the DEV in super frame in order that system frame throughput is increased and the delay is decreased. In detail, the DABL algorithm allows to dynamically allocate channel time as well as to adaptively apply the modulation and coding scheme based on the link quality of the DEV. In addition, due to the facts that QoS is quite different depending on service types, we provide the DABL algorithm taking into account RT(Real Time) traffic and Non-RT traffic respectively. Finally, we show simulation results of the DABL algorithm compared to the conventional algorithm that the PNC equally allocates channel times to the DEV regardless of the link quality of the DEV.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

The Development of Hemodialysis System Based on Embedded System (임베디드 시스템 기반의 혈액 투석기 시스템의 개발)

  • Ji, Jung-Ho;Lee, Kyoung-Joung;Kim, Young-Ho;Park, Kwang-Li
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.11
    • /
    • pp.521-527
    • /
    • 2002
  • The Hemodialysis system is the device for the patients who have suffered from end stage renal failure as the kidney which removes the waste products in a human body. The existing hemodialysis is based on a 8-bit micro-controller and it is not a touch-screen type but a manual type. This paper is focused on hemodialysis system based on high control and expension embedded system. The whole system consists of main control unit and sub control unit(dialysis control unit, blood control unit, monitoring control unit, networking unit). The dialysis control unit, blood control unit, monitoring control unit are processed by 3 microcontrollers and network unit is for monitoring a renal failure patient's condition. For the evaluation of the system performance, the saline was pured into blood unit and then water removal rate, conductivity and temperature of hemodialysis liquid were measured 10 times in an each state suing the UF pump in the fluid unit varing the quantity of saline to 1000cc, 2000cc, 3000cc and 4000cc. As a result, the rates of water removal are 98.6% in condition of 000cc saline, 96.9% in 2000cc, 98.9% in 3000cc and 98.3% in 4000cc. The conductivities of hemodialysis liquid are 99.6% in the first to third condition and 99.7% in the forth condition. The temperatures of hemodialysis liquid are 99.8% in the first to third condition and 99.6% in th forth condition.