• Title/Summary/Keyword: Location tracking service

Search Result 167, Processing Time 0.032 seconds

RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number (시프트 연산과 난수를 이용한 가변적 대칭키 기반의 RFID 상호인증 프로토콜)

  • Lee, Jae-Kang;Oh, Se-Jin;Chung, Kyung-Ho;Lee, Chang-Hee;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.377-384
    • /
    • 2012
  • RFID system is a technique to obtain information of tag using radio frequency. Specificity of RFID systems using radio frequency has many problems that is eavesdropping, location tracking, spoofing attack, replay attack, denial of service attack. So, RFID protocol should be used cryptographic methods and mutual authentication for security and privacy. In this paper, we explain the problem of past protocol and propose the nonfixed symmetric key-based RFID mutual authentication protocol using shift computation and random number. Proposed protocol is secure from various attacks. Because it use shift operation and non-fixed symmetric key.

RFID Tag's Security Level Based RFID Authentication Protocol (전자 태그의 보안 레벨을 기반으로 하는 RFID 인증 프로토콜)

  • Oh Soo-hyun;kwak Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.593-600
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments. Because RFID system that is an automatic identification technology using radio frequency is a system to read and write the data of the entity. Therefore, many companies are interested in RFID system to reduce supply chain management and inventory control cost. However, for providing secure service, RFID authentication technology secure against tracking by an adversary is researched first. In this paper, we proposed security level based RFID authentication protocol providing reduce computational and communicational workload in the back-end database. The proposed protocol is secure against reply attack, spoofing attack, traffic analysis, and location privacy, since the proposed protocol based on the security of the hash function.

BIG DATA ANALYSIS ROLE IN ADVANCING THE VARIOUS ACTIVITIES OF DIGITAL LIBRARIES: TAIBAH UNIVERSITY CASE STUDY- SAUDI ARABIA

  • Alotaibi, Saqar Moisan F
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.297-307
    • /
    • 2021
  • In the vibrant environment, documentation and managing systems are maintained autonomously through education foundations, book materials and libraries at the same time as information are not voluntarily accessible in a centralized location. At the moment Libraries are providing online resources and services for education activities. Moreover, libraries are applying outlets of social media such as Facebook as well as Instagrams to preview their services and procedures. Librarians with the assistance of promising tools and technology like analytics software are capable to accumulate more online information, analyse them for incorporating worth to their services. Thus Libraries can employ big data to construct enhanced decisions concerning collection developments, updating public spaces and tracking the purpose of library book materials. Big data is being produced due to library digitations and this has forced restrictions to academicians, researchers and policy creator's efforts in enhancing the quality and effectiveness. Accordingly, helping the library clients with research articles and book materials that are in line with the users interest is a big challenge and dispute based on Taibah university in Saudi Arabia. The issues of this domain brings the numerous sources of data from various institutions and sources into single place in real time which can be time consuming. The most important aim is to reduce the time that lapses among the authentic book reading and searching the specific study material.

Identification of Contaminant Injection in Water Distribution Network

  • Marlim, Malvin Samuel;Kang, Doosun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.114-114
    • /
    • 2020
  • Water contamination in a water distribution network (WDN) is harmful since it directly induces the consumer's health problem and suspends water service in a wide area. Actions need to be taken rapidly to countermeasure a contamination event. A contaminant source ident ification (CSI) is an important initial step to mitigate the harmful event. Here, a CSI approach focused on determining the contaminant intrusion possible location and time (PLoT) is introduced. One of the methods to discover the PLoT is an inverse calculation to connect all the paths leading to the report specification of a sensor. A filtering procedure is then applied to narrow down the PLoT using the results from individual sensors. First, we spatially reduce the suspect intrusion points by locating the highly suspicious nodes that have similar intrusion time. Then, we narrow the possible intrusion time by matching the suspicious intrusion time to the reported information. Finally, a likelihood-score is estimated for each suspect. Another important aspect that needs to be considered in CSI is that there are inherent uncertainties, such as the variations in user demand and inaccuracy of sensor data. The uncertainties can lead to overlooking the real intrusion point and time. To reflect the uncertainties in the CSI process, the Monte-Carlo Simulation (MCS) is conducted to explore the ranges of PLoT. By analyzing all the accumulated scores through the random sets, a spread of contaminant intrusion PLoT can then be identified in the network.

  • PDF

Performance Analysis of Improved ZMHB Algorithms for Wireless Networks (무선망에서 개선된 ZMHB 알고리즘의 성능 평가)

  • Kwon, Se-Dong;Park, Hyun-Min;Lee, Kang-Sun
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.659-670
    • /
    • 2004
  • Handoff is one of the most important features for the user's mobility in a wireless cellular communication system. It is related to resource reservation at nearby cells. Resource reservation to the new connection point should occur prior to handoff to enable the user to receive the data or services at the new location, at the same level of service as at the previous location. For the efficient resource reservation, mobility prediction has been reported as an effective means to decrease the call dropping probability and to shorten the handoff latency in a wireless cellular environment. A recently proposed algorithm, ZMHB, makes use of the history of the user's positions within the current cell to predict the next cell. But, the prediction of the ZMHB algorithm is found to be 80∼85% accurate for regular and random movements. In this paper, we propose a new improved ZMHB mobility prediction algorithm, which is called Detailed-ZMHB that uses detailed-zone-based tracking of mo-bile users to predict user movements. The effectiveness of the proposed algorithm is then demonstrated through a simulation.

Precise Position Monitoring System for Infant Interaction Analysis (영유아 상호작용 분석을 위한 정밀위치 모니터링 시스템)

  • Park, Hyoung-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.21-26
    • /
    • 2019
  • This paper constructs a real-time monitoring system that can identify the individual positions of infants and their proximity to other infants using an Internet of Things (IoT)-based nameplate. The system consists of a precision location tracking module, a data transmission system for calculating gateway location information, a service platform server, and a data analysis processing module considering the development of infants and young children. The purpose of this study is to extract information about how infants interact with each other. The information gathered through this system can be used as important information to improve the peer relations of all infants and toddlers, from neglected infants to infants with no social development problems, to more popular infants. It is possible, based on the proximity information between infants and toddlers, that the teacher can identify positive interactions or negative interactions, and can educate infants on how to improve their peer relationships. These results can be used for consultation with parents, and the information collected through this system can be used as a database to establish a system for improving the relationships between infants and toddlers.

Reefer Container Monitoring System using Trajectory Information (궤적 정보를 이용한 냉동 컨테이너 모니터링 시스템)

  • Lee, Myung-Jin;Lee, Eung-Jae;Ha, Deok-Cheon;Ryu, Keun-Ho;Baek, Seung-Jae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.1
    • /
    • pp.23-39
    • /
    • 2005
  • As developing satellite communication, the tracking range of the moving objects which move in local area is expanded to the whole world. However previous logistics management system is able to monitor freight which transporting in local area using mobile communication system. In this paper, we propose the reefer container management system that manages the location information and other related information such as temperature, humidity of container using the satellite system. The proposed system consists of three parts; data collector, satellite communication manager, reefer container information manager. And the proposed system uses the moving object index for managing the trajectory of container and tracing the location of container or vessel that is transporting the container, and supports various services such as reefer container and vessel tracking, container control and container statistics to logistic companies like shipper and forwarding agent. And the system can be increasing the quality of container transportation service to the shipper, and it makes the efficient management of reefer container to the shipping company.

  • PDF

Handover Scheme Considering Moving Velocity and Traffic Characteristics in IMT-2000 Networks (IMT-2000망에서 이동체의 속도와 트래픽 특성을 고려한 핸드오버 기법)

  • Han, Jeong-An;Park, Sang-Jun;Jo, Jae-Jun;Kim, Byeong-Gi
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1504-1515
    • /
    • 1999
  • 무선 이동 통신망은 기존의 음성위주로 제공되던 단일 미디어 서비스의 제공으로부터 발전되어 2000년대 초까지 이동 사용자에게 고품질의 멀티미디어 데이타 서비스를 제공하고, 장소에 제한을 받지 않고 서비스를 제공받을 수 있도록 하는 IMT-2000을 실현을 목표로 발전하고 있다. 또한 다수의 서비스 사용자와 광대역의 데이타를 전송하기 위해서 셀의 반경은 점차로 축소되고 있다. 이에 따라서, 사용자의 위치등록과 핸드오버와 같은 처리에 대한 부하가 커지게 되었다. 그러므로 무선 이동통신에서 서비스 이용자에게 일정 수준 이상의 QoS를 보장해 주기 위해서 효율적인 핸드오버 알고리즘의 도입은 매우 중요한 문제가 되고 있다. 본 논문에서는 IMT-2000환경에서 보다 효율적인 QoS를 서비스 사용자에게 제공해 줄 수 있도록 하기 위해 다양한 이동체의 속도와 멀티미디어 트래픽 특성을 동시에 고려하여 신뢰성 있는 핸드오버를 제공하는 H-PS(Hybrid-Priority Scheme)알고리즘을 제안하고 시뮬레이션을 통해 성능을 분석한다.Abstract Wireless mobile communications is developed from the only single voice traffic sevice to multimedia sevices. And mobile communications will evolve IMT-2000, which is provide users with high quality multimedia services. A radius of cell is gradually reduced to accept many service users and transport the multimedia traffics. Therefore, a overhead of location tracking and handover processing are increased. Then to guarantee high QoS to service users in wireless mobile communications, efficient handover algorithm is very important issue.In this study, we propose a H-PS(Hybrid-Priority Scheme) handover scheme considering mobility and traffic characteristics in IMT-2000 networks. And performance evaluate using simulation.

Quality Enhancement of 3D Volumetric Contents Based on 6DoF for 5G Telepresence Service

  • Byung-Seo Park;Woosuk Kim;Jin-Kyum Kim;Dong-Wook Kim;Young-Ho Seo
    • Journal of Web Engineering
    • /
    • v.21 no.3
    • /
    • pp.729-750
    • /
    • 2022
  • In general, the importance of 6DoF (degree of freedom) 3D (dimension) volumetric contents technology is emerging in 5G (generation) telepresence service, Web-based (WebGL) graphics, computer vision, robotics, and next-generation augmented reality. Since it is possible to acquire RGB images and depth images in real-time through depth sensors that use various depth acquisition methods such as time of flight (ToF) and lidar, many changes have been made in object detection, tracking, and recognition research. In this paper, we propose a method to improve the quality of 3D models for 5G telepresence by processing images acquired through depth and RGB cameras on a multi-view camera system. In this paper, the quality is improved in two major ways. The first concerns the shape of the 3D model. A method of removing noise outside the object by applying a mask obtained from a color image and a combined filtering operation to obtain the difference in depth information between pixels inside the object were proposed. Second, we propose an illumination compensation method for images acquired through a multi-view camera system for photo-realistic 3D model generation. It is assumed that the three-dimensional volumetric shooting is done indoors, and the location and intensity of illumination according to time are constant. Since the multi-view camera uses a total of 8 pairs and converges toward the center of space, the intensity and angle of light incident on each camera are different even if the illumination is constant. Therefore, all cameras take a color correction chart and use a color optimization function to obtain a color conversion matrix that defines the relationship between the eight acquired images. Using this, the image input from all cameras is corrected based on the color correction chart. It was confirmed that the quality of the 3D model could be improved by effectively removing noise due to the proposed method when acquiring images of a 3D volumetric object using eight cameras. It has been experimentally proven that the color difference between images is reduced.

A Wireless Sensor Network Systems to Identify User and Detect Location Transition for Smart Home (지능형 주택을 위한 구성원 식별 및 위치 이동 감지 센서 네트워크 시스템)

  • Lee, Seon-Woo;Yang, Seung-Yong
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.396-402
    • /
    • 2010
  • The tracking of current location of residents is an essential requirement for context-aware service of smart houses. This paper presents a wireless sensor network system which could detect location transition such as entrance and exit to a room and also identify the user who passed the room, without duty of wearing any sort of tag. We designed new sensor node to solve the problem of short operation lifetime of previous work[1] which has two pyroelectric infrared (PIR) sensors and an ultrasonic sensor, as well as a 2.4 GHz radio frequency wireless transceiver. The proposed user identification method is to discriminate a person based on his/her height by using an ultrasonic sensor. The detection idea of entering/exiting behavior is based on order of triggering of two PIR sensors. The topology of the developed wireless sensor network system is simple star structure in which each sensor node is connected to one sink node directly. We evaluated the proposed sensing system with a set of experiments for three subjects in a model house. The experimental result shows that the averaged recognition rate of user identification is 81.3% for three persons. and perfect entering/exiting behavior detection performance.