• Title/Summary/Keyword: Mobile IoT

Search Result 478, Processing Time 0.036 seconds

A Study on the Improvement Legal System for Next-generation Records Management (차세대 기록관리를 위한 법체계 개선방안 연구)

  • Lee, Jin Ryong;Ju, Hyun Mi;Yim, Jin Hee
    • The Korean Journal of Archival Studies
    • /
    • no.55
    • /
    • pp.275-305
    • /
    • 2018
  • The advent of e-government following the information revolution has affected public records systems. Records management should now be changed into an environment for establishing a national records management system based on the Internet of things (IoT), cloud, big data, and mobile (ICBM), and it is time to make a fresh start toward a next-generation records management system that responds to changes in the environment. Ultimately, it is time for a records management system that ensures a proper way of dealing with new environmental changes. It has been nearly 20 years since the Public Records Management Act was enacted in 1999, and its complete amendment was made in 2006 so that electronic records could be efficiently managed. When recompliance management needs to be rechecked, a full redesign is required to enable the current legal system to respond to the new circumstances in the present day. Therefore, this study is intended to suggest ways to improve the new records management legal system as the environment changes over the next generation and lay the legal groundwork for innovation in the national records management system.

Development of Vending Machine for Electricity Based on Z-Wave Mesh Network (Z-Wave 메쉬 네트워크 기반의 전기 자판기 개발)

  • Kang, Ki-beom;Ahn, Hyun-kwon;Kim, Han-soo;Lee, Seung-hyun;Jwa, Jeong-woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1256-1262
    • /
    • 2016
  • As the population of camping is increased in campsites and auto camp sites, the electrical equipment can safely supply electricity to users in a variety of electricity bill policy is required in the campsite. In this paper, we develop the vending machine for electricity that can control the outdoor electrical outlet from the management server using the Z-Wave WPAN and android mobile application. The developed vending machine for electricity consists of the management server, the controller, the outdoor outlet box, and the mobile application. The management server provides reservation and electricity bill payment to users. The management server controls the electrical outlet box through the controller to safely supply electricity to users. The controller that is a relay device between the management server and the switch controls switches based on Z-Wave mesh network. Outdoor electrical outlet box has 2 meter switches. We receive the relevant authorization to provide commercial electricity services using the outdoor electrical outlet box in the campsite.

Study on Effective 5G Network Deployment Method for 5G Mobile Communication Services (5G 이동통신 서비스를 위한 효율적인 5G 망구축 방안에 관한 연구)

  • CHUNG, Woo-Ghee
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.29 no.5
    • /
    • pp.353-358
    • /
    • 2018
  • We herein analyze the service traffic characteristics and spectrum of the 5G mobile communication and suggest the effective 5G network deployment method for 5G mobile communication services. The data rates of the 5G mobile communication are from several kbps (voice and IoT) up to 1 Gbps (hologram, among others). The 5G mobile communication services show the diverse cell coverage environments owing to the use of diverse service data rates and multiple spectrum bands. To effectively support the 5G mobile communication services, the network deployment requires the optimization of the service coverages for new service environments and multiple spectrum bands. Considering the 5G spectrum bandwidth debated at present, if the 5G services of 100 Mbps can be supported in the 200 m cell edge using the 3.5 GHz spectrum bands, the 5G services of the 1 Gbps hologram and 500-Mbps 4k UHD can be supported in the cell edges of 50 m and 100 m using the 28 GHz spectrum bands. Therefore, the 5G services can be supported effectively by the 5G network deployment using spectrum portfolio configurations to match the diverse 5G services and multiple bands.

A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery (위·변조에서 사용되는 암호알고리즘 성능 비교에 대한 연구)

  • Lee, Jun Yeong;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.250-256
    • /
    • 2017
  • Recently, the use of mobile devices has increased in order to provide a variety of services, and thus there has been a surge in the number of application malicious attacks on the Android platform. To resolve the problem, the domestic financial sector has been introducing the app anti-tamper solution based on cryptographic algorithms. However, since the capacity of apps installed in smartphones continues to increase and environments with limited resources as wearables and IoTs spread, there are limitations to the processing speed of the anti-tamper solutions. In this paper, we propose a novel anti-tamper solution by using lightweight hash function LEA and LSH. We also present the test results of a simulation program that implements this method and compare the performance with anti-tamper solutions based on the previous cryptographic algorithms.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Analysis of Emerging Geo-technologies and Markets Focusing on Digital Twin and Environmental Monitoring in Response to Digital and Green New Deal (디지털 트윈, 환경 모니터링 등 디지털·그린 뉴딜 정책 관련 지질자원 유망기술·시장 분석)

  • Ahn, Eun-Young;Lee, Jaewook;Bae, Junhee;Kim, Jung-Min
    • Economic and Environmental Geology
    • /
    • v.53 no.5
    • /
    • pp.609-617
    • /
    • 2020
  • After introducing the industry 4.0 policy, Korean government announced 'Digital New Deal' and 'Green New Deal' as 'Korean New Deal' in 2020. We analyzed Korea Institute of Geoscience and Mineral Resources (KIGAM)'s research projects related to that policy and conducted markets analysis focused on Digital Twin and environmental monitoring technologies. Regarding 'Data Dam' policy, we suggested the digital geo-contents with Augmented Reality (AR) & Virtual Reality (VR) and the public geo-data collection & sharing system. It is necessary to expand and support the smart mining and digital oil fields research for '5th generation mobile communication (5G) and artificial intelligence (AI) convergence into all industries' policy. Korean government is suggesting downtown 3D maps for 'Digital Twin' policy. KIGAM can provide 3D geological maps and Internet of Things (IoT) systems for social overhead capital (SOC) management. 'Green New Deal' proposed developing technologies for green industries including resource circulation, Carbon Capture Utilization and Storage (CCUS), and electric & hydrogen vehicles. KIGAM has carried out related research projects and currently conducts research on domestic energy storage minerals. Oil and gas industries are presented as representative applications of digital twin. Many progress is made in mining automation and digital mapping and Digital Twin Earth (DTE) is a emerging research subject. The emerging research subjects are deeply related to data analysis, simulation, AI, and the IoT, therefore KIGAM should collaborate with sensors and computing software & system companies.

Demonstration of Disaster Information and Evacuation Support Model for the Safety Vulnerable Groups (안전취약계층을 위한 재난정보 및 대피지원 모델 실증)

  • Son, Min Ho;Kweon, Il Ryong;Jung, Tae Ho;Lee, Han Jun
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.465-486
    • /
    • 2021
  • Purpose: Since most disaster information systems are centered on non-disabled people, the reality is that there is a lack of disaster information delivery systems for the vulnerable, such as the disabled, the elderly, and children, who are relatively vulnerable to disasters. The purpose of the service is to improve the safety of the disabled and the elderly by eliminating blind spots of informatization and establishing customized disaster information services to respond to disasters through IoT-based integrated control technology. Method: The model at the core of this study is the disaster alert propagation model and evacuation support model, and it shall be developed by reflecting the behavioral characteristics of the disabled and the elderly in the event of a disaster. The disaster alert propagation model spreads disaster situations collected using IoT technology, and the evacuation support model uses geomagnetic field-based measuring technology to identify the user's indoor location and help the disabled and the elderly evacuate safely. Results: Demonstration model demonstration resulted in an efficient qualitative evaluation of indoor location accuracy, such as the suitability of evacuation route guidance and satisfaction of services from the user's perspective. Conclusion: Disaster information and evacuation support services were established for the safety vulnerable groups of mobile app for model verification. The disaster situation was demonstrated through experts in the related fields and the disabled by limiting it to the fire situation. It was evaluated as "satisfaction" in the adequacy of disaster information delivery and evacuation support, and its functional satisfaction and user UI were evaluated as "normal" due to the nature of the pilot model. Through this, the disaster information and evacuation support services presented in this study were evaluated to support the safety vulnerable groups to a faster disaster evacuation without missing the golden time of disaster evacuation.

Implementation and Evaluation of ECG Authentication System Using Wearable Device (웨어러블 디바이스를 활용한 ECG 인증 시스템 구현 및 평가)

  • Heo, Jae-Wook;Jin, Sun-Woo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.1-6
    • /
    • 2019
  • As mobile technologies such as Internet of Things (IoT)-based smart homes and financial technologies (FinTech) are developed, authentication by smart devices is used everywhere. As a result, presence-based biometric authentication using smart devices has become a new mainstream in knowledge-based authentication methods like the existing passwords. The electrocardiogram (ECG) is less prone to forgery, and high-level personal identification is its unique feature from among various biometric authentication methods, such as the pulse, fingerprints, the face, and the iris. Biometric authentication using an ECG is receiving a great deal of attention due to its uses in healthcare and FinTech. In this study, we implemented an ECG authentication system that allows users to easily measure and authenticate their ECG waveforms using a miniaturized wearable device, rather than a large and expensive measurement device. The implemented ECG authentication system identifies ECG features through P-Q-R-S-T feature point identification, and was user-certified under the proposed authentication protocols. Finally, assessment of measurements in a majority of adult males showed a relatively low false acceptance rate of 1.73%, and a low false rejection rate of 4.14%, in a stable normal state. In a high-activity state, the false acceptance rate was 13.72%, and the false rejection rate was 21.68%. In a high-heart rate state, the false acceptance rate was 10.48%, and the false rejection rate was 11.21%.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

Adaptive Power Saving Protocol Based on Traffic Estimation for Wi-Fi Direct Networks (Wi-Fi Direct 망을 위한 부하량 예측 기반의 전력 절감 기법)

  • Yoo, Hongseok;Park, Yang-Woo;Lee, Chae-Soo;Yun, Tae-Jin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.207-212
    • /
    • 2015
  • Wi-Fi Direct allows battery powered mobile devices to form a wireless ad hoc network. Since one member of the network called Group Owner (GO) takes the role of managing the network, the network lifetime is mainly affected by the energy efficiency of GO. Hence, Wi-Fi Direct defines power saving schemes that allow GO to save the energy by turning off its radio interface during the periods called absence periods. However, the Wi-Fi Direct specification does not specify how to set parameters (denoted by PS parameters) determining the schedule of the absence periods. In this paper, we therefore propose a novel traffic-aware power saving scheme for Wi-Fi Direct networks. In particular, the proposed scheme estimates the application-level traffic load and adaptively tunes the PS parameters according to the estimated value.