• Title/Summary/Keyword: Machine-to-machine (M2M)

Search Result 1,081, Processing Time 0.031 seconds

Knowledge- Evolutionary Intelligent Machine-Tools - Part 1 : Design of Dialogue Agent based on Standard Platform

  • Kim, Dong-Hoon;Song, Jun-Yeob
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.11
    • /
    • pp.1863-1872
    • /
    • 2006
  • In FMS (Flexible Manufacturing System) and CIM (Computer Integrated Manufacturing), machine-tools have been the target of integration in the last three decades. The conventional concept of integration is being changed into the autonomous manufacturing device based on the knowledge evolution by applying advanced information technology in which an open architecture controller, high-speed network and internet technology are included. In the advanced environment, the machine-tools is not the target of integration anymore, but has been the key subject of cooperation. In the near future, machine-tools will be more improved in the form of a knowledge-evolutionary intelligent device. The final goal of this study is to develop an intelligent machine having knowledge-evolution capability and a management system based on internet operability. The knowledge-evolutionary intelligent machine-tools is expected to gather knowledge autonomically, by producing knowledge, understanding knowledge, reasoning knowledge, making a new decision, dialoguing with other machines, etc. The concept of the knowledge-evolutionary intelligent machine is originated from the machine control being operated by human experts' sense, dialogue and decision. The structure of knowledge evolution in M2M (Machine to Machine) and the scheme for a dialogue agent among agent-based modules such as a sensory agent, a dialogue agent and an expert system (decision support agent) are presented in this paper, with intent to develop the knowledge-evolutionary machine-tools. The dialogue agent functions as an interface for inter-machine cooperation. To design the dialogue agent module in an M2M environment, FIPA (Foundation of Intelligent Physical Agent) standard platform and the ping agent based on FIPA are analyzed in this study. In addition, the dialogue agent is designed and applied to recommend cutting conditions and thermal error compensation in a tapping machine. The knowledge-evolutionary machine-tools are expected easily implemented on the basis of this study and shows a good assistance to sensory and decision support agents.

Sparse DTMNs routihg protocol for the M2M environment (Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.11-18
    • /
    • 2014
  • Recently, ICT technology has been evolving towards an M2M (Machine to Machine) environment that allows communication between machine and machine from the communication between person and person, and now the IoT (Internet of Things) technology that connects all things without human intervention is receiving great attention. In such a network environment, the communication network between object and object as well as between person and person, and person and object is available which leads to the sharing of information between all objects, which is the essential technical element for us to move forward to the information service society of the era of future ubiquitous computing. On this paper, the protocol related to DTMNs in a Sparse M2M environment was applied and the improved routing protocol was applied by using the azimuth and density of the moving node in order to support a more efficient network environment to deliver the message between nodes in an M2M environment. This paper intends to verify the continuity of the study related to efficient routing protocols to provide an efficient network environment in the IoT and IoE (Internet of Everything) environment which is as of recently in the spotlight.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

Minimizing Machine-to-Machine Data losses on the Offshore Moored Buoy with Software Approach (소프트웨어방식을 이용한 근해 정박 부이의 기계간의 데이터손실의 최소화)

  • Young, Tan She;Park, Soo-Hong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1003-1010
    • /
    • 2013
  • In this paper, TCP/IP based Machine-to-Machine (M2M) communication uses CDMA/GSM network for data communication. This communication method is widely used by offshore moored buoy for data transmission back to the system server. Due to weather and signal coverage, the TCP/IP M2M communication often experiences transmission failure and causing data losses in the server. Data losses are undesired especially for meteorological and oceanographic analysis. This paper discusses a software approach to minimize M2M data losses by handling transmission failure and re-attempt which meant to transmit the data for recovery. This implementation was tested for its performance on a meteorological buoy placed offshore.

Technical Trend and Improvement of Congestion Control for Machine-to-Machine Communications in 3GPP LTE-A Systems (3GPP LTE-A 시스템에서의 M2M 통신을 위한 혼잡 제어 기술 동향 및 개선 방안)

  • Kim, Jae-Hyun;Kim, Seog-Gyu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.11
    • /
    • pp.487-494
    • /
    • 2014
  • This paper focuses on an advanced congestion control scheme for M2M(Machine-to-Machine) communications in 3GPP LTE-A standard. A large number of MTC(Machine-type-Communication) devices try to access to LTE-A networks and send data to the networks all at once. In this characteristics, M2M communications will bring the serious network congestion problems into LTE-A cellular networks. To solve this critical problem, a congestion control mechanism will be required and it has been studied since Rel-10 LTE-A systems based on backoff mechanism for mobility management and session management. In this paper, we briefly introduce the main concept and operation about the congestion control scheme in 3GPP LTE-A standard. Also, simulation results for the basic congestion control and advanced congestion control scheme in MTC communication environment are provided and the improvement direction is considered in future 3GPP LTE-A standard.

Analysis of Security Threat in Machine to Machine Communication (M2M(Machine to Machine) 통신에서의 보안 위협 분석)

  • Lee, Keun-Ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.416-419
    • /
    • 2010
  • IT관련 제품(데스크톱, 노트북, 스마트폰 등)과 자동차, 선박, 자판기 등 기계(Machine)관련 제품과의 융합이 이뤄지고 있으며 각 장비간의 통합 융합으로 변화됨에 따라 네트워크 시스템과 S/W에 대한 보호가 더욱 어려워지고 있는 상황이다. 이러한 문제는 산업계 내에서 다양한 그룹의 사용자들이 다양한 장비를 사용하므로 더 복잡해지며, 결국에는 수많은 기계장치의 사용자 수준에 따라 다른 수준의 보안이 필요하게 된다. 본 논문에서는 차세대 이동통신의 한분야인 M2M(Mahcine to Machine) 통신에 대한 동향 소개와 M2M의 보안 위협요소 분석을 통한 키관리 기법과 Threshold 암호 기법을 소개한다.

  • PDF

Security Issues on Machine to Machine Communications

  • Lai, Chengzhe;Li, Hui;Zhang, Yueyu;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.498-514
    • /
    • 2012
  • Machine to machine (M2M) communications is the hottest issue in the standardization and industry area, it is also defined as machine-type communication (MTC) in release 10 of the 3rd Generation Partnership Project (3GPP). Recently, most research have focused on congestion control, sensing, computing, and controlling technologies and resource management etc., but there are few studies on security aspects. In this paper, we first introduce the threats that exist in M2M system and corresponding solutions according to 3GPP. In addition, we present several new security issues including group access authentication, multiparty authentication and data authentication, and propose corresponding solutions through modifying existing authentication protocols and cryptographic algorithms, such as group authentication and key agreement protocol used to solve group access authentication of M2M, proxy signature for M2M system to tackle authentication issue among multiple entities and aggregate signature used to resolve security of small data transmission in M2M communications.

Maximum Delay-Aware Admission Control for Machine-to-Machine Communications in LTE-Advanced Systems (LTE-Advanced 시스템에서 M2M 통신의 최대 지연시간을 고려한 호 수락 방법)

  • Jun, Kyungkoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1113-1118
    • /
    • 2012
  • Smart grid and intelligent transportation system draw significant interest since they are considered as one of the green technologies. These systems require a large number of sensors, actuators, and controllers. Also, machine-to-machine (M2M) communications is important because of the automatic control. The LTE-Advanced networks is preparing a set of functions that facilitate the M2M communications, and particularly the development of an efficient call admission control mechanism is critical. A method that groups MTC devices according to QoS constraints and determines the admission depending on the QoS satisfaction is limitedly applied only if the data transmission period and the maximum delay are identical. This paper proposed a call admission control that is free from such limitation and also optimizes the admission process under the certain condition of the transmission period and maximum delay. The theorems regarding the proposed method are presented with the proofs. The simulations confirms its validity and shows it is better in call admission probability than existing works.

Advanced Paper Machine Concepts for the Production of Packaging Papers

  • Kruska, D.;Mirsberger, P.
    • Journal of Korea Technical Association of The Pulp and Paper Industry
    • /
    • v.29 no.3
    • /
    • pp.69-81
    • /
    • 1997
  • Up to now 5 Voith Sulzer paper machines with multi-layer headbox and Gapfor-mer are sucessfully running on papckaging papers. Linerboard, testliner and corugating medium is produced in the basis weight range from 105 to 275 $g/m^2$ at machine speeds up to 900 m/min. The nest one, starting up in Oct. `96 in Germany, will be the world's fastest paper machine for packaging papers. The 5.6 m wide machine is designed for a maximum operating speed of 1200 m/min. Approx. 220.000 tons of corrugating medium and testliner based on 100% waste paper in the basis weight range from 90 to 160 $g/m^2$ will be produced each year. An expansion stage planned for the future is intended to increase annual output to 280.000 tons. This machine will not only be the fastest one for packaging papers, it also comprises all described innovative key components which are available today in order to fulfill growing demands of the future with regard to quality and productivity. The concept of this advanced machine is shown in Fig. 9.

  • PDF

An Error Control in a Whiteboard for M2M Environment (사물 통신 환경을 위한 화이트보드에서의 오류 처리)

  • Bae, Cheol-Soo;Ko, Eung-Nam
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.109-113
    • /
    • 2016
  • The necessity of M2M(Machine to Machine) and Multimedia CSCW is described, and error control for multimedia CSCW(Computer Supported Cooperated Works) based on M2M is suggested. The relationship of information collection and utility is relationship of man to man, but is developed object to object by information communication and control system. This paper describes an error control and a white board in multimedia CSCW for M2M environment.