• Title/Summary/Keyword: Machine-to-machine communications

Search Result 350, Processing Time 0.029 seconds

Design and implementation of simulator for fault coverage analysis of commuication protocol test case (통신 프로토콜 시험항목의 오류 발견 능력 분석을 위한 시뮬레이터의 설계 및 구현)

  • 김광현;허기택;이동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1823-1832
    • /
    • 1997
  • In this ppaer, fault coverage analysis of a conformance test case for communication protocols, specified as a deterministic finite state machine(DFSM) is presented. The fault coverage analysis of a test case is defined by measuring the extent of the faults detected using a generated test case. The method that evaluates fault coverage analysis for a test case, has been researched by arithmetic analysis and simulation. In this paper, we designed and implemented a simulator for fault coverage analysis of a communication protocol teat case. With this result for Inres protocol, output fault and state merge and split fault have a high fault coverage of 100%. This simulator can be widely used with new fault coverage analysis tools by applying it to various protocols.

  • PDF

A Study on Device to Device Direct Communication in Mobile Communication Networks (이동통신네트워크에서 디바이스간 직접 통신에 관한 시나리오 연구)

  • Youn, JooSang;Hong, Yong-Geun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.818-821
    • /
    • 2012
  • M2M 서비스 지원을 위한 이동통신 인프라 기술은 3GPP에서 MTC(Machine Typer Communications)라 부른다. 최근 3GPP SA1, SA2 에서는 MTC 디바이스와 MTC 서버 통신 모델 기반의 서비스 모델 및 지원에 관한 네트워크 구조 기술표준이 추진되었다. 이 후 후속 작업으로 3GPP SA1에서는 TR 22.888(MTCe: Study on Enhancements for MTC) 문서를 통해 MTC 디바이스 간 통신 시나리오 및 use case 개발이 추진 중이다. TR 22.888 문서에는 MTC 디바이스 간 통신 접속 시나리오 및 use case를 정의하고 이에 대한 3GPP 네트워크 요구사항을 개발하고 있다. 현재 TR 22.888v0.7 에서는 5가지의 MTC 디바이스 간 통신 시나리오가 개발되었다. 각 시나리오는 MTC 디바이스가 접속을 원하는 원격 MTC 디바이스와 연결 설정 과정에서 직접연결, MTC 서버를 통한 연결, 네트워크/MTC 서버 내에 이름 분석 기능(name resolution function) 지원을 통한 연결, 그룹 통신 내 MTC 디바이스 간 연결, 네트워크 코디네이션(network Coordination) 지원을 통한 연결 등으로 구분된다. 본 논문에서는 이와 같은 M2M에서 디바이스간 직접 통신에 관한 시나리오 및 usecase를 분석한다.

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.

Common Services Platform for M2M Supporting Security Standards (보안 표준 지원 M2M 공통 서비스 플랫폼)

  • Vakkosov, Sardorjon;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.76-88
    • /
    • 2016
  • Machine to Machine (M2M) is a technology that presents communication between two or more devices with or without human intervention. M2M communications can be applied for various use cases such as environmental monitoring, health care, smart metering and etc. In most use cases, M2M utilizes sensor nodes to collect data from the intended environment and the data is transmitted back to M2M application through other devices (gateways, sink nodes). In some use cases, M2M devices are being designed to store and process sensor data for improving the reliability of the service; Gateways and sink nodes are also intended to store and process the gathered data from sensor nodes. This kind of approach is very challenging for both academy and industry. In order to enhance the performance of this approach, in this paper, we propose our Common Service Security Platform (CSSP) for M2M devices and gateways. CSSP platform presents solutions for the devices and gateways by making them operate more accurately and efficiently. Besides, we present a comparative analysis of communication protocols and present their performance in accordance with selected metrics.

Estimating Human Size in 2D Image for Improvement of Detection Speed in Indoor Environments (실내 환경에서 검출 속도 개선을 위한 2D 영상에서의 사람 크기 예측)

  • Gil, Jong In;Kim, Manbae
    • Journal of Broadcast Engineering
    • /
    • v.21 no.2
    • /
    • pp.252-260
    • /
    • 2016
  • The performance of human detection system is affected by camera location and view angle. In 2D image acquired from such camera settings, humans are displayed in different sizes. Detecting all the humans with diverse sizes poses a difficulty in realizing a real-time system. However, if the size of a human in an image can be predicted, the processing time of human detection would be greatly reduced. In this paper, we propose a method that estimates human size by constructing an indoor scene in 3D space. Since the human has constant size everywhere in 3D space, it is possible to estimate accurate human size in 2D image by projecting 3D human into the image space. Experimental results validate that a human size can be predicted from the proposed method and that machine-learning based detection methods can yield the reduction of the processing time.

Smart Ship Container With M2M Technology (M2M 기술을 이용한 스마트 선박 컨테이너)

  • Sharma, Ronesh;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.278-287
    • /
    • 2013
  • Modern information technologies continue to provide industries with new and improved methods. With the rapid development of Machine to Machine (M2M) communication, a smart container supply chain management is formed based on high performance sensors, computer vision, Global Positioning System (GPS) satellites, and Globle System for Mobile (GSM) communication. Existing supply chain management has limitation to real time container tracking. This paper focuses on the studies and implementation of real time container chain management with the development of the container identification system and automatic alert system for interrupts and for normal periodical alerts. The concept and methods of smart container modeling are introduced together with the structure explained prior to the implementation of smart container tracking alert system. Firstly, the paper introduces the container code identification and recognition algorithm implemented in visual studio 2010 with Opencv (computer vision library) and Tesseract (OCR engine) for real time operation. Secondly it discusses the current automatic alert system provided for real time container tracking and the limitations of those systems. Finally the paper summarizes the challenges and the possibilities for the future work for real time container tracking solutions with the ubiquitous mobile and satellite network together with the high performance sensors and computer vision. All of those components combine to provide an excellent delivery of supply chain management with outstanding operation and security.

An Analysis of the Economic Effects for the IoT Industry (사물인터넷 산업의 경제적 파급효과 분석)

  • Jeong, Woo-Soo;Kim, Sa-Hyuk;Min, Kyoung-Sik
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.119-128
    • /
    • 2013
  • As ICT technology becomes advanced, the importance of future internet is emphasized and in part of that, M2M (Machine-to Machine communications) is magnified in terms of importance and usage in public and private sector. M2M is emerging as a next generation strategic industry but there is no existing analyzed data or market classification, so it disrupts establishing policies on the M2M industry. As the technology is progressing, the evolution from M2M to IoT (Internet of Things) has started and many countries actively try to find technological trend through market analysis in order to develop new growth engine. Therefore, in order to strengthen competitiveness, we should secure differentiated capabilities in industry and service. This article examines Korea's domestic market and international market trends in IoT and analyses the economic impact of the IoT industry using quantitative methodology and evaluates relations between the IoT industry and other relevant industries. As a result, the effect of IoT industry on production inducement is KRW474.6 billion; the effect on value-added inducement is KRW314.7 billion; and it is measured that 3,628 jobs will be created by the IoT industry.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

Algebraic Formal Specification and Formal Validation of the Standard and an Implementation of the OSPF Protocol (OSPF Protocol 표준 및 구현의 대수 정형적 명세 및 정형적 검증)

  • 박재현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.360-374
    • /
    • 2004
  • The OSPF protocol is the most widely used Interior Gateway Routing Protocol. Therefore, for the reliability of behavior of gigabit swiching routers, it is essential to guarantee the interoperability and the safety of the OSPF protocol. In this paper, we analyze the standard document of the OSPF protocol, so that we provide a formal specification that specifies the protocol behaviors by detailed design level using the algebraic formal method. By referring available source codes of the OSPF protocol, we supplement the formal specification to express more detailed behaviors that is not specified definitely in the standard. We also formally verify the interoperability and the safety of the protocol state machine of the specification. By showing that the formal specification specify all of the states and the transition events that appear in the standard document of the OSPF protocol, we prove that the state machine has the completeness, and prove it has the interoperability. To prove that the specification of the protocol has the safety, we formally verify the reachability, the liveness, the livelock-free property, and the deadlock-free property. As a result, we prove the protocol has the consistency. The specification and the validation are also effective to the OSPF Version 3 that inherit the protocol mechanism of the OSPF Version 2.

Artificial Intelligence and College Mathematics Education (인공지능(Artificial Intelligence)과 대학수학교육)

  • Lee, Sang-Gu;Lee, Jae Hwa;Ham, Yoonmee
    • Communications of Mathematical Education
    • /
    • v.34 no.1
    • /
    • pp.1-15
    • /
    • 2020
  • Today's healthcare, intelligent robots, smart home systems, and car sharing are already innovating with cutting-edge information and communication technologies such as Artificial Intelligence (AI), the Internet of Things, the Internet of Intelligent Things, and Big data. It is deeply affecting our lives. In the factory, robots have been working for humans more than several decades (FA, OA), AI doctors are also working in hospitals (Dr. Watson), AI speakers (Giga Genie) and AI assistants (Siri, Bixby, Google Assistant) are working to improve Natural Language Process. Now, in order to understand AI, knowledge of mathematics becomes essential, not a choice. Thus, mathematicians have been given a role in explaining such mathematics that make these things possible behind AI. Therefore, the authors wrote a textbook 'Basic Mathematics for Artificial Intelligence' by arranging the mathematics concepts and tools needed to understand AI and machine learning in one or two semesters, and organized lectures for undergraduate and graduate students of various majors to explore careers in artificial intelligence. In this paper, we share our experience of conducting this class with the full contents in http://matrix.skku.ac.kr/math4ai/.