• Title/Summary/Keyword: Location정보

Search Result 5,606, Processing Time 0.034 seconds

A Study on the Efficiency Method of Location-Based Control Function Applied to MDM Applications (MDM 앱에 적용되는 위치 기반 통제 기능의 효율화 방법에 관한 연구)

  • ChangIk Oh;SuGil Hwang;Hyun Son;Dongho Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.171-177
    • /
    • 2023
  • When configuring MDM services only with applications without a central control server, a method that allows security control to be released based on GPS signals in areas sufficiently far from the security area of the workplace is generally applied by embedding and distributing location information of workplaces in MDM applications. This study proposed a method in which each individual directly enters the location information of the security control area needed for them in the distributed app and maintains it as setting information without embedding location information of a specific area such as work in the MDM applications. The method proposed in this study can improve universality, compatibility and the security control level of MDM services, and minimize deployment costs.

Analysis and Demonstration of GPS Spoofing Attack: Based on Commercial Drones (GPS 스푸핑 공격 취약점 분석 및 실증: 상용 드론을 대상으로)

  • Jinseo Yun;Minjae Kim;Kyungroul Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.431-437
    • /
    • 2024
  • Drones in the contemporary landscape have transcended their initial public utility, expanding into various industries and making significant inroads into the private sector. The majority of commercially available drones are presently equipped with GPS receivers to relay location signals from artificial satellites, aiming to inform users about the drone's whereabouts. However, a notable drawback arises from the considerable distance over which these location signals travel, resulting in a weakened signal intensity. This limitation introduces vulnerabilities, allowing for the possibility of location manipulation and jamming attacks if the drone receives a stronger signal than the intended location signal from satellites. Thus, this paper focuses on the safety assessment of drones relying on GPS-based location acquisition and addresses potential vulnerabilities in wireless communication scenarios. Targeting commercial drones, the paper analyzes and empirically demonstrates the feasibility of GPS spoofing attacks. The outcomes of this study are anticipated to serve as foundational experiments for conducting more realistic vulnerability analysis and safety evaluations.

Development of a Location Data Management System for Mass Moving Objects (대용량 이동 객체 위치 데이타 관리 시스템의 개발)

  • Kim, Dong-Oh;Ju, Sung-Wan;Jang, In-Sung;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.1 s.13
    • /
    • pp.63-76
    • /
    • 2005
  • Recently, the wireless positioning techniques and mobile computing techniques were developed with rapidly to use location data of moving objects. Also, the demand for LBS(Location Based Services) which uses location data of moving objects is increasing rapidly. In order to support various LBS, a system that can store and retrieve location data of moving objects efficiently is required necessarily. The more the number of moving objects is numerous and the more periodical sampling of locations is frequent, the more location data of moving objects become very large. Hence the system should be able to efficiently manage mass location data, support various spatio-temporal queries for LBS, and solve the uncertainty problem of moving objects. Therefore, in this paper, we presented a hash technique, a clustering technique and a trajectory search technique to manage location data of moving objects efficiently And, we have developed a Mass Moving Object Location Data Management System, which is a disk-based system, that can store and retrieve location data of mass moving objects efficiently and support the query for spatio-temporal data and the past location data with uncertainty. By analying the performance of the Mass Moving Object Locations Management system and the SQL-Server, we can find that the performance of our system for storing and retrieving location data of moving objects was about 5% and 300% better than the SQL-Server, repectively.

  • PDF

A Study on a utilizing Mobile Mapping System for establishing the High Speed Outdoor Positioning DB based on Field Check Data (정위치 기반 고속 실외 측위 DB 구축을 위한 MMS활용 방안에 관한 연구)

  • Lee, Ha Dong;Lee, Yun;Choi, Yun Soo;Jeong, In Hun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.25 no.2
    • /
    • pp.31-37
    • /
    • 2017
  • Recently, governmental authority and local government are looking for a method of utilizing location information of smart phone for urgent rescue in fire and kidnap situation. Under this background, in this study, a method of rapidly collecting, constructing location determination based Wi-Fi AP data utilizing location information of smart phone and mobile mapping system was suggested in order to construct precise positioning information that could be utilized under urgent situation. By performing compensation work for GPS/INS/DMI through collected outcome, position of collected vehicle was acquired. In addition, source data integrating Wi-Fi information and collected position by coupling based on Wi-Fi AP collector and GPS time was constructed and Wi-Fi radiomap was constructed by removing Wi-Fi signal noise that reduces precise position performance. As a result of performing location determination performance assess ment by selecting 10 test positions by each local government, result value of 25.46cm for total local government average and 27.76m for SD could be obtained. It is considered that this result could be utilized as a technology of being able to supplement or substituting GPS location determination technology that is impossible in plocation determination of mobile communication company's base station (200m~2km) and indoor being used at present.

Three Dimensional Indoor Location Tracking Viewer

  • Yang, Chi-Shian;Jung, Sang-Joong;Chung, Wan-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.108-118
    • /
    • 2009
  • In this paper we develop an indoor location tracking system and its 3D tracking monitoring viewer, viz., 3D Navigation Viewer (3DNV). We focus on the integration of an indoor location tracking system with the Virtual Reality Modeling Language (VRML), to facilitate a representation of the user's spatial information in virtual indoor environments that is synchronized with the physical location environment. The developed indoor location tracking system employs beacons as active transmitters, and a listener as a passive receiver. The distance information calculated from the difference speeds of RF and Ultrasonic signals is exploited, to determine the user's physical location. This is essential in supporting third parties like doctors and caregivers in identifying the activities and status of a particular individual via 3DNV. 3DNV serves as a unified user interface for an indoor location tracking system, showing the viewpoint and position of the target in virtual indoor environments. It was implemented using VRML, to provide an actual real time visualization of the target's spatial information.

IEEE 802.15.4 MAC-based Location-ID Exchange Protocol for Realizing Micro-Cell Connectionless Location- Awareness Services

  • Kim, Baek-Gyu;Kang, Soon-Ju
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.4
    • /
    • pp.412-427
    • /
    • 2008
  • We propose ID-exchange protocol for Connectionless Location-Awareness Service (CLAS) to locate mobile nodes in indoor sensor network. When adapting location-awareness service to sensor network, the target system must be designed in accordance with various metrics which reflect the system requirement. We especially consider sustainability of the existing service which has been provided for its original purpose, such as environmental monitoring. The detailed meaning of sustainability here is that, even if location-awareness service is newly added to the existing service, the system must be assured to retain a stable network condition, and to deal with newly caused traffic properly. The CLAS ID-exchange protocol is especially designed for fixture and mobile nodes communication to achieve these properties. The protocol operates on 802.15.4 MAC layer to make mobile node work independently of the procedure to build routing table of fixture node, so a stable routing condition can be achieved even if there are many mobile nodes. Moreover, the dedicated frequency channel is assigned only for this protocol, so that traffic caused by location-awareness service can be distributed to another channel. A real system adapting the protocol was implemented to monitor fire and authorities' positions. We verified the overhead and elapsed time for location-awareness. The result shows the proposed protocol has a high performance in detecting speed, traffic distribution, and stability of overall network.

Location Privacy Enhanced Routing for Sensor Networks in the Presence of Dormant Sources (휴면 소오스들이 존재하는 환경의 센서 네트워크를 위한 위치 보호 강화 라우팅)

  • Yang, Gi-Won;Lim, Hwa-Jung;Tscha, Yeong-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.12-23
    • /
    • 2009
  • Sensor networks deployed in battlefields to support military operations or deployed in natural habitats to monitor the rare wildlifes must take account of protection of the location of valuable assets(i.e., soldiers or wildlifes) from an adversary or malicious tracing as well as the security of messages in transit. In this paper we propose a routing protocol GSLP(GPSR-based Source-Location Privacy) that is capable of enhancing the location privacy of an active source node(i.e., message-originating node) in the presence of multiple dormant sources(i.e., nodes lying nearby an asset whose location needs to be secured). Extended is a simple, yet scalable, routing scheme GPSR(greedy perimeter stateless routing) to select randomly a next-hop node with a certain probability for randomizing paths and to perform perimeter routing for detouring dormant sources so that the privacy strength of the active source, defined as safety period, keeps enhanced. The simulation results obtained by increasing the number of dormant sources up to 1.0% of the total number of nodes show that GSLP yields increased and nearly invariant safety periods, while those of PR-SP(Phantom Routing, Single Path), a notable existing protocol for source-location privacy, rapidly drop off as the number of dormant sources increases. It turns out that delivery latencies of GSLP are roughly less than two-fold of the shortest path length between the active source and the destination.

Design of Location Based Social Network Service Model Centering around Smart Phone (스마트 폰 중심의 위치 기반 소셜 네트워크 서비스 모델 설계)

  • Ahn, Byung-Ik;Joo, Young-Do
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.55-62
    • /
    • 2011
  • Recently, LBS(Location Based Service) is expanding its service areas with the spread of smart phones and the contents of the service are more individualized according to the customer's needs. Specially, LBSNS(Location Based Social Network Service) is emerging as the most promising service of LBS. This paper introduces a LBSNS model to form a community to share common contents dynamically centering around the place of user's smart phone. The methodology suitable for implementing the effective management and the automatic update of the community of social network is presented in this paper. In addition, we describe the significant future researches of LBSNS under the upcoming mobile environment.

A Study on the Analysis of Location Potential of Commercial Use using GIS Database (GIS DB를 이용한 상업·업무시설의 입지 포텐셜 분석)

  • Baek, Tae-Kyung;Choi, Jung-Mi
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.1
    • /
    • pp.149-157
    • /
    • 2006
  • The purpose of this study is to search for location potential in Busan metropolitan city and to support decision-making in land use policy. As basis work for the analysis of the location potential, we build rank-map database by using the 11 index. And then by using rank-map, we carried out the location potential ($P_i$) analysis. As a result, we found that many commercial use located in Rank 1 to 2. Also, Rank 4-7 must be made an un-commercial use in assignment of land use zone. These data can be effectively used for land use plan in Busan metropolitan city as the basis data.

  • PDF

Cluster-Based Mobile Sink Location Management Scheme for Solar-Powered Wireless Sensor Networks

  • Oh, Eomji;Kang, Minjae;Yoon, Ikjune;Noh, Dong Kun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.33-40
    • /
    • 2017
  • In this paper, we propose a sink-location management and data-routing scheme to effectively support the mobile sink in solar-powered WSN. Battery-based wireless sensor networks (WSNs) have a limited lifetime due to their limited energy, but solar energy-based WSNs can be supplied with energy periodically and can operate forever. On the other hand, introduction of mobile sink in WSNs can solve some energy unbalance problem between sink-neighboring nodes and outer nodes which is one of the major challenges in WSNs. However, there is a problem that additional energy should be consumed to notify each sensor node of the location of the randomly moving mobile sink. In the proposed scheme, one of the nodes that harvests enough energy in each cluster are selected as the cluster head, and the location information of the mobile sink is shared only among the cluster heads, thereby reducing the location management overhead. In addition, the overhead for setting the routing path can be removed by transferring data in the opposite direction to the path where the sink-position information is transferred among the heads. Lastly, the access node is introduced to transmit data to the sink more reliably when the sink moves frequently.