• Title/Summary/Keyword: Network communication area

Search Result 1,318, Processing Time 0.032 seconds

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.

Development of Fuzzy Network Performance Manager for Token Bus Networks in Automated Factories (공장자동화용 토큰버스 네트워크의 퍼지 성능관리기 개발)

  • Lee, Sang-Ho;Son, Joon-Woo;Lee, Suk
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.20 no.8
    • /
    • pp.2436-2448
    • /
    • 1996
  • This paper presents the development of three types of network performance manager for IEEE 802.4 token bus networks that are a part of Manufacturing Automation Protocol(MAP). The performance managers attempt to keep the average data latency below a certain level specified for each priority class. All of the three performance managers are based on a set of fuzzy rules incorporating the knowledge on the relationship between data latency and parameters of the priority mechanism. These Fuzzy Network Performance Managers(FNPMs) have been evaluated via discrete event simulation to demonstrate their efficacy.

Supporting Web-Based I/O Service by Extending Network Communication to Native Client (Native Client 네트워크 기능 확장을 통한 웹기반 I/O 서비스 지원)

  • Sung, Baegjae;Park, Sejin;Park, Chanik
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.4
    • /
    • pp.249-254
    • /
    • 2011
  • A user desktop service can be made available on internet or local area network with the help of virtualization and cloud technologies. The service is usually called a virtual desktop or a desktop cloud. However, a user interface is limited to I/O capabilities of a user's mobile terminal. In order to enhance a user interface on a remote virtual desktop, it is important to connect full-featured I/O devices which are founded locally. Our previous work called SoD (System-on- Demand) has proposed a technique to associate local full-featured I/O devices with a remote virtual desktop in Xen. On the technique, it is required to install a SoD client agent in a user's mobile terminal for connecting a remote virtual desktop. In this paper, we propose a new framework called Web-SoD that does not require any explicit installation to make SoD service available. The SoD client agent is provided by the web technology so that the agent can be installed transparently, and the platform independency is also achieved. Due to insufficient network socket performance of current web technologies, we extend Native Client (NaCl) proposed by Google to support a network functionality by modifying a NaCl library and a service runtime. With conducted experiment, we show that the network extension supports a full socket functionality over the compromised overhead on the web environment.

An Efficient Detection and Management Technique of Misbehavior nodes in Ad-hoc Networks (Ad-hoc 네트워크에서의 효율적인 비정상행위 노드 탐지 및 관리 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.71-80
    • /
    • 2009
  • Ad-hoc network consists f mobile nodes, which they are together in the communication. However, if some misbehaving nodes are in network, it is faced to many threats. Therefore, detection and management of misbehaving node are necessary to make confident in Ad-hoc networks. To solve this problem, we use Node Weight Management Server(NWMS), which it manage each node's weight in local area. When NWMS detect misbehaving node, it adds the node's weight and if the node's weight exceeds threshold then NWMS broadcasts the node's information to isolate in network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.

Measurement of the Crowd Density in Outdoor Using Neural Network (신경망을 이용한 실외 군중 밀도 측정)

  • Song, Jae-Won;An, Tae-Ki;Kim, Moon-Hyun;Hong, You-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.103-110
    • /
    • 2012
  • The population growth along with the urbanization, has caused more problems in many public areas, such as subway airport terminals, hospital, etc. Many surveillance systems have been installed in the public areas, but not all of those can be monitored in real-time, because the operators that observe the monitors are very small compared with the number of the monitors. For example, the observer can miss some crucial accidents or detect after considerable delays. Thus, intelligent surveillance system for preventing the accidents are needed, such as Intelligent Surveillance Systems. in this paper, we propose a new crowd density estimation method which aims at estimating moving crowd using images from surveillance cameras situated in outdoor locations. The moving crowd is estimated from the area where using optical flow. The edge information is also used as feature to measure the crowd density, so we improve the accuracy of estimation of crowd density. A multilayer neural network is designed to classify crowd density into 5 classes. Finally the proposed method is experimented with PETS 2009 images.

The Student Safety Network Service System Using the Smart Device (스마트 디바이스를 이용한 학생안전 네트워크 서비스 시스템)

  • Ryu, Chang-Su;Hur, Chang-Wu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2213-2218
    • /
    • 2013
  • Smart devices such as smart phone, smart TV, tablet, game consoles embrace all categories of Intelligent Communication Device, which enables intelligent applications to be developed, by up loading Context-aware Computing technology that recognizes and reacts nearby diverse phenomena and composing these information, as well as their basic functions. This paper, after saving pre-registered students' movement course and business places harmful to them into students safety network service system, by using location-based service and searching students' movement, considering the degree of breaking away from their regular course, the access to and their stay in crime-crone area, provides the comparative analysis of the system and suggests the ways for safe students guidance.

Optimized Design of Mobile Communication Antenna In the Underground Area (지하공간에서의 이동통신 셀 설계에 관한 연구)

  • Oh, Sung-Kyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.27-32
    • /
    • 2008
  • In the signals-shadowed areas, In order to providing the suitable signals reception level repeaters are used for relay the signals. Repeater receives the weak signals and amplifies it up to required power level, The amplified signals get radiated by the various methods. Both antenna distribution and LCX(Leakage Coaxial Cable) are typical methods in the repeater and BTS signals radiation. Their applications are depended on the environment condition and frequency band. Generally the antenna distribution are used for the mobile telecommunication networks which use the higher frequency band than 500MHz. On the other side, LCX distribution is suitable to the frequency band under 500MHz. The network plan of repeater in FM, T-DMB, Fire Radio and Internal subway communication network are the typical LCX application fields. Cell planning with repeaters are based on the free space loss, LCX connection loss and actual field data. The actual field data can be the most important factor to design the network planning.

Design of Location and User Status Awareness Service Architecture Based on Opportunistic Computing with Ad-hoc Nodes (Ad-hoc 통신 노드를 이용한 기회 컴퓨팅형 위치인식 및 상황인지 서비스 구조 설계)

  • Kim, Tae-Hyon;Jo, Hyeong-Gon;Jeong, Seol-Young;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12B
    • /
    • pp.1199-1210
    • /
    • 2010
  • In recent years opportunistic computing has gained popularity in Ad-hoc network research area and it is highly required to research for actual services and related requirements. In this paper we summarized a virtual opportunistic service that is named "Children Care System" and proposed an Ad-hoc communication node (uMobile) that is connected with cellular phone and a sensor node (uClo) which is embedding into clothes. uMobile can support cellular phone communication and Ad-hoc communication and uClo can be embedded into clothes and recognize the user status using multiple sensors. In this paper we implemented the location awareness and user status awareness services using uMobile and uClo. We also tested them in indoor situation and showed the result. We expect that our research can play a significant role to inspire another various opportunistic computing services.

Cluster-head Decision Method for Cognitive Radio Based on Wireless Ad-hoc Network (인지 무선 기반 애드 혹 네트워크에서의 클러스터 헤드 선정기법)

  • Lee, Kyung-Sun;Kim, Yoon-Hyun;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.91-96
    • /
    • 2012
  • Ad-hoc networks can be used various environment, which it is difficult to construct infrastructures, such as shadowing areas, disaster areas, war area, and so on. In order to support to considerable and various wireless services, more spectrum resources are needed. However, efficient utilization of the frequency resource is difficult because of spectrum scarcity and the conventional frequency regulation. Ad-hoc networks employing cognitive radio (CR) system that guarantee high spectrum utilization provide effective way to increase the network capacity. In CR based wireless ad-hoc networks, cluster-head decides the existence of primary user using sensing information of primary user from each ad-hoc device. However, it is still defective research to decide cluster head among the a lot of ad-hoc devices. So, in this paper, we show the decision method of cluster head in CR based wireless and detection probabilities of primary user based on decision method of cluster head.

A Study on Movement Control of Drone using Reference Posture Mapping (기준 자세 맵핑을 이용한 드론의 동작 제어에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.6
    • /
    • pp.461-466
    • /
    • 2021
  • Drone can be controlled by the method such as Bluetooth communication for close distance and can be controlled through network communication for long distance. Especially, the coordinate is set using GPS and drone is controlled using network communication and video communication when the activity range is long distance. However, the drone should be controlled by receiving control authority accordingly in response about it appropriately when the drone leaves the control area after arriving at the destination if there is a problem with network communication and video communication. So, this study proposes a method to control a drone with a simple mutually promised simple gesture and the drone can be controlled in the proposed method even if the drone leaves from the control authority in above situation. The reference posture was established for mutually promised simple gesture algorithm and automatically handed over the control authority of drone to a person who takes the reference posture when the drone recognizes it to implement this. And all the movements of the drone could be controlled by starting the beginning of all commands from the reference posture (The hovering posture of the drone). Lastly, the control authority of the drone should be returned after achieving the purpose, and the algorithm was implemented to make the drone can perform next action of its own, and it was confirmed that the drone was operating normally by the mapped instruction.