• Title/Summary/Keyword: Embedded Devices

Search Result 889, Processing Time 0.023 seconds

The new ICP state for the embedded network agent (내장형 Network Agent를 위한 새로운 TCP state의 제안)

  • 정진규;안광혁;진선일;홍석교;유영동
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.379-382
    • /
    • 2002
  • This paper describes an experiment on the embedded network agent. The embedded network agent is the device that will enable other devices to communicate over the Internet. Many devices have no way to communicate with other devices over the Internet The embedded network agent extends the stand-alone devices that have no TCP/IP protocol suite to the Internet, the global networks, without any hardware and software. To support the better efficiency, this parer proffers new TCP state diagram of the embedded network agent. This TCP state on the embedded network agent considers the status of the common devices behind the embedded network agent. Because of this consideration, the embedded network agent tenders an improved result to user.

  • PDF

Recent Trends in Implementing Cryptography with Embedded Microprocessors (임베디드 마이크로 프로세서 상에서의 최신 암호 구현 동향)

  • Seo, Hwa-Jeong;Kim, Howon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.815-824
    • /
    • 2013
  • Traditionally embedded microprocessors is considered as a device for low- and simple-computations because of its limited computing power and constrained resources. However high-end embedded devices have been developed and many applications are getting feasible in the embedded devices. To provide secure and robust service environments, security on embedded devices are in order. Recently many research results on embedded devices have been proposed. In this paper, we explore various cryptography implementation results on representative 8-, 16- and 32-bit embedded processors including AVR, MSP and ARM. This report would be helpful for following researchers who are interested in cryptography implementation techniques on resource constrained devices.

Implementation of UPnP Device based on Embedded Linux using ARM9 Platform (ARM9 Platform을 이용한 Embedded Linux 기반의 UPnP Device의 구현)

  • Lee, Hui-Jeong;Jeong, Jin-Gyu;Jin, Seon-Il;Hong, Seok-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.754-757
    • /
    • 2003
  • The implementation of home network systems In ubiquitous computing environments requires middleware that provides a method to control and operate home appliance devices. The Universal Plug and Play (UPnP), which is based on the IPv4 protocol and running on a PC, consists of UPnP devices that provide relevant services and control points that control the devices. However, It is inappropriate to Implement UPnP devices on a PC, since the implementation on a PC requires much space and electrical power. In this paper, a small embedded home network device equipped with UPnP middleware is implemented on an embedded GNU/Linux system running on an ARM9 platform, in order to deal with such problems.

  • PDF

An Effective Pre-refresh Mechanism for Embedded Web Browser of Mobile Handheld Devices

  • Li Huaqiang;Kim Young-Hak;Kim Tae-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.12
    • /
    • pp.1754-1764
    • /
    • 2004
  • Lately mobile handheld devices such as Personal Digital Assistant (PDA) and cellular phones are getting more popular for personal web surfing. However, today most mobile handheld devices have relatively poor web browsing capability due to their low performance so their users have to suffer longer communication latency than those of desktop Personal Computers (PCs). In this paper, we propose an effective pre-refresh mechanism for embedded web browser of mobile handheld devices to reduce this problem. The proposed mechanism uses the idle time to pre-refresh the expired web objects in an embedded web browser's cache memory. It increases the utilization of Central Processing Unit (CPU) power and network bandwidth during the idle time and consequently reduces the client's latency and web browsing cost. An experiment was done using a simulator designed by us to evaluate the efficacy of the proposed mechanism. The experiment result demonstrates that it has a good performance to make web surfing faster.

  • PDF

Performance Evaluation of Efficient Vision Transformers on Embedded Edge Platforms (임베디드 엣지 플랫폼에서의 경량 비전 트랜스포머 성능 평가)

  • Minha Lee;Seongjae Lee;Taehyoun Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.3
    • /
    • pp.89-100
    • /
    • 2023
  • Recently, on-device artificial intelligence (AI) solutions using mobile devices and embedded edge devices have emerged in various fields, such as computer vision, to address network traffic burdens, low-energy operations, and security problems. Although vision transformer deep learning models have outperformed conventional convolutional neural network (CNN) models in computer vision, they require more computations and parameters than CNN models. Thus, they are not directly applicable to embedded edge devices with limited hardware resources. Many researchers have proposed various model compression methods or lightweight architectures for vision transformers; however, there are only a few studies evaluating the effects of model compression techniques of vision transformers on performance. Regarding this problem, this paper presents a performance evaluation of vision transformers on embedded platforms. We investigated the behaviors of three vision transformers: DeiT, LeViT, and MobileViT. Each model performance was evaluated by accuracy and inference time on edge devices using the ImageNet dataset. We assessed the effects of the quantization method applied to the models on latency enhancement and accuracy degradation by profiling the proportion of response time occupied by major operations. In addition, we evaluated the performance of each model on GPU and EdgeTPU-based edge devices. In our experimental results, LeViT showed the best performance in CPU-based edge devices, and DeiT-small showed the highest performance improvement in GPU-based edge devices. In addition, only MobileViT models showed performance improvement on EdgeTPU. Summarizing the analysis results through profiling, the degree of performance improvement of each vision transformer model was highly dependent on the proportion of parts that could be optimized in the target edge device. In summary, to apply vision transformers to on-device AI solutions, either proper operation composition and optimizations specific to target edge devices must be considered.

Study on the Low Power Service with User State Recognition Algorithm Using Sensors (센서 기반 사용자 상태 인식 알고리즘을 이용한 저전력 서비스에 관한 연구)

  • Lee, Do-Kyeong;Hong, Won-Kee;Cha, Kyung-Ae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.2
    • /
    • pp.91-99
    • /
    • 2015
  • The electric power consumed by the embedded devices has become a critical issue because the reduction of power consumption is an important factor to prolong the battery-operated devices' lifetime. Many researches and techniques to reduce the power consumption have been proposed and developed but any power method cannot guarantee optimal power consumption of an embedded device - it would be faced with numerous situation - in all ways. Specifically, power researches for embedded devices deployed in the industry field have hardly been done. In this paper, low power service is proposed to minimize power reduction with the several usage status of embedded devices in the industry field. The usage status is basically classified according to the distance between the device and the user which is obtained by the ultrasonic and PIR sensor. The performance evaluation shows that the proposed scheme can reduce the power consumption by up to 45.3% compared to the device with no power reduction scheme. It also shows that the power consumption of the proposed scheme is 5.2% ~ 16.8% lower than that of the timeout scheme.

Design and Implementation of Flash Cryptographic File System Based on YAFFS (YAFFS 기반의 암호화 플래시 파일 시스템의 설계 및 구현)

  • Kim, Seok-Hyun;Cho, Yoo-Kun
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.15-21
    • /
    • 2007
  • As the amount of flash memory being used in embedded device is increased and embedded devices become more important in many computing environments, embedded file system security becomes more important issue. Moreover embedded devices can be easily stolen or lost because of it's high portability. If the lost embedded device has very important information, there's no means to protect it except data encryption. For improving embedded devices' security this paper propose design and implementation of flash cryptographic file system. For this purpose YAFFS is used. By the modified YAFFS cryptographic file system, the security of embedded devices can be improved.

  • PDF

Middleware Test Framework for Mobile Devices (이동단말용 미들웨어 테스트 프레임워크)

  • Shin, Seok-Kyoo;Lee, Sang-Soo;Yang, Hae-Sool
    • Journal of Information Technology Services
    • /
    • v.6 no.2
    • /
    • pp.153-160
    • /
    • 2007
  • Middleware for mobile devices, embedded middleware, is used for mobile devices, cellular phone and DMB related services. It is essential for middleware providers to provide high quality middleware in conformity with its standard and interoperability on hardware platforms. The standard conformance and interoperability of embedded middleware are the key factors to make service providers succeed in their business. The quality of embedded middleware could be secured when Tests for the standard conformance and interoperability of embedded middleware are performed with well established test framework. In this paper, we describe middleware testing methodology of standard conformance, interoperability and middleware test framework for mobile devices.

Considerations for Applying SDN to Embedded Device Security (임베디드 디바이스 보안을 위한 SDN 적용 시 고려사항)

  • Koo, GeumSeo;Sim, Gabsig
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.51-61
    • /
    • 2021
  • In the era of the 4th industrial revolution symbolized by the Internet of Things, big data and artificial intelligence, various embedded devices are increasing exponentially. These devices have communication functions despite their low specifications, so the possibility of personal information leakage is increasing, and security threats are also increasing. Embedded devices can have security issues at most levels, from hardware to services over the network. In addition, it is difficult to apply general security techniques because it has characteristics of resource constraints such as low specifications and low power, and the related technology has not been standardized. In this study, we present vulnerabilities and possible problems and considerations in applying SDN to embedded devices in consideration of structural characteristics and real-world discovered cases. This study presents vulnerabilities and possible problems and considerations when applying SDN to embedded devices. From a hardware perspective, we consider the problems of Wi-Fi chips and Bluetooth, the problems of open flow implementation, SDN controllers, and examples of structural properties. SDN separates the data plane and the control plane, and provides a standardized interface between the two, enabling efficient communication control. It can respond to the security limitations of existing network technologies that are difficult to respond to rapid changes.

Preventing ELF(Executable and Linking Format)-File-Infecting Malware using Signature Verification for Embedded Linux (임베디드 리눅스에서 서명 검증 방식을 이용한 악성 프로그램 차단 시스템)

  • Lee, Jong-Seok;Jung, Ki-Young;Jung, Daniel;Kim, Tae-Hyung;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.589-593
    • /
    • 2008
  • These days, as a side effect of the growth of the mobile devices, malwares for the mobile devices also tend to increase and become more dangerous. Because embedded Linux is one of the advanced OSes on mobile devices, a solution to preventing malwares from infecting and destroying embedded Linux will be needed. We present a scheme using signature verification for embedded Linux that prevents executallle-Infecting malwares. The proposed scheme works under collaboration between mobile devices and a server. Malware detection is delegated to the server. In a mobile device, only integrity of all executables and dynamic libraries is checked at kernel level every time by kernel modules using LSM hooks just prior to loading of executables and dynamic libraries. All procedures in the mobile devices are performed only at kernel level. In experiments with a mobile embedded device, we confirmed that the scheme is able to prevent all executable-Infecting malwares while minimizing damage caused by execution of malwares or infected files, power consumption and performance overheads caused by malware check routines.