• Title/Summary/Keyword: Portable Internet

Search Result 259, Processing Time 0.021 seconds

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

A Study on Design of the Image Retrieval System Using Embedded System (임베디드 시스템을 이용한 이미지 검색 시스템 설계에 관한 연구)

  • Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.49-53
    • /
    • 2010
  • Recently multimedia has been formed, provided, and shared enough not to compare with the past, due to the proliferation of Internet and the development of hardware relating to multimedia. Accordingly to internationally give a proper expression to metadata of multimedia, the standard of MPEG-7 has been established, and researches for image search among various data of multimedia using MPEG-7 are going on. Thus there are meaning-based search. In the former there is a merit that search speed is fast, but technology and accuracy by technical knowledge on the image. In the latter the accuracy of search is decreasing because of not understanding the meaning about image and the internet of users. In this study to solve these problems a search system has been designed by combining the two methods. Also the search and manage image data by handheld devices such as portable PDA or smart phone, a system. Once this is used, multimedia data can be efficiently searched and utilized by handheld devices.

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

Research of Distributed Computing with REST Open API Web Services (REST 웹서비스 Open API를 사용한 분산처리 기법 연구)

  • Choi, Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2473-2481
    • /
    • 2014
  • The majority of next generation information systems will be working on portable mobile devices such as smartphones. REST Open API web services have quickly become popular among mobile application development. The use of REST web services are not only growing in popularity but totally changing the way of mobile applications development. This is because REST web services could be used in application development as a form of building blocks, which is completely independent, compatible, to any platforms. With this strength, REST web services encourage third party application to build add-on functionality. This research proposes the use of REST web service to replace the use of socket APIs into major internet communication APIs. To this end, this paper also provide performance evaluation of the REST web services compared to the conventional socket APIs, focusing on scalability by analytical and experimental evaluations. Finally, we summarize the possibility whether REST Open API web services have enough performance as future major internet communication primitive APIs.

Accuracy Urinalysis Discrimination Method based on high performance CNN (고성능 CNN 기반 정밀 요검사 판별 기법)

  • Baek, Seung-Hyeok;Choi, Hong-Rak;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.77-82
    • /
    • 2021
  • There are three types of urinalysis: physical test, chemical test, and microscopic test. Among these, the chemical urinalysis is an easily accessible method of the general public to compare the chemical reaction of urinalysis strip with a standard colorimetric table by sight or purchase the portable urinalysis machine separately. Currently, with the popularization of smartphone, research on the urinalysis service using smartphone is increasing. The urinalysis screening application is one of the urinalysis services using a smartphone. However, the RGB values of the urinalysis pad taken by the urinalysis screening application have large deviations due to the effect of lighting. Deviation of RGB value debases the accuracy of urinalysis discrimination. Therefore, in this paper, the accuracy of urinaylsis pad image discrimination is improved through CNN after classifying urinalysis strips taken by the urinalysis screening application based on smartphone by urinalysis pad items. Urinalysis strip was taken from various backgrounds to generate CNN image, and urinalysis discrimination was analyzed using the ResNet-50 CNN model.

Designing a Healthcare Service Model for IoB Environments (IoB 환경을 위한 헬스케어 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Digital Policy
    • /
    • v.1 no.1
    • /
    • pp.15-20
    • /
    • 2022
  • Recently, the healthcare field is trying to develop a model that can improve service quality by reflecting the requirements of various industrial fields. In this paper, we propose an Internet of Behavior (IoB) environment model that can process users' healthcare information in real time in a 5G environment to improve healthcare services. The purpose of the proposed model is to analyze the user's healthcare information through deep learning and then check the health status in real time. In this case, the biometric information of the user is transmitted through communication equipment attached to the portable medical equipment, and user authentication is performed through information previously input to the attached IoB device. The difference from the existing IoT healthcare service is that it analyzes the user's habits and behavior patterns and converts them into digital data, and it can induce user-specific behaviors to improve the user's healthcare service based on the collected data.

Self-diagnosis Algorithm for Water Quality Sensors Based on Water Quality Monitoring Data (수질 모니터링 데이터 기반의 수질센서 자가진단 알고리즘)

  • HongJoong Kim;Jong-Min Kim;Tae-Hyung Kang;Gab-Sang Ryu
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.41-47
    • /
    • 2023
  • Today, due to the increase in global population growth, the international community is discussing solving the food problem. The aquaculture industry is emerging as an alternative to solving the food problem. For the innovative growth of the aquaculture industry, smart fish farms that combine the fourth industrial technology are recently being distributed, and full-cycle digitalization is being promoted. Water quality sensors, which are important in the aquaculture industry, are electrochemical portable sensors that check water quality individually and intermittently, making it impossible to analyze and manage water quality in real time. Recently, optically-based monitoring sensors have been developed and applied, but the reliability of monitoring data cannot be guaranteed because the state information of the water quality sensor is unknown. Therefore, this paper proposes an algorithm representing self-diagnosis status such as Failure, Out of Specification, Maintenance Required, and Check Function based on monitoring data collected by water quality sensors to ensure data reliability.

Characteristics of Lithium-ion(Li-ion) Batteries according to Charging and Discharging by Scenario (시나리오별 충방전에 따른 리튬이온(Li-ion) 배터리 특성)

  • Yongho Yoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.171-176
    • /
    • 2023
  • In the modern society of the 21st century, portable electronic products using secondary batteries are continuously becoming lightweight and miniaturized. And along with this trend, we are active in the era of the Fourth Industrial Revolution, where we collect and share information in our daily lives using wearable electronic devices. Therefore, the role of secondary batteries that can be recharged while using small home appliances and digital devices is increasingly important. Along with this increase, secondary battery performance tests require various test methods such as characteristics, lifespan, failure diagnosis, and recycling. In addition, the construction of a battery test system to ensure the safety and proper functioning of the battery, along with guidelines and correct basic knowledge are being considered. Therefore, in this paper, we will examine the characteristics of the secondary battery Li-ion battery according to the charging and discharging scenarios directly connected to the performance of the battery.

Characteristic Analysis of Lithium-ion Battery and Lead-acid Battery using Battery Simulator (배터리 시뮬레이터를 이용한 리튬이온 배터리와 납축전지 특성분석)

  • Yongho Yoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.127-132
    • /
    • 2024
  • Recently, secondary batteries, commonly known as rechargeable batteries, find widespread applications across various industries. Particularly valued for their compact and lightweight characteristics, they play a crucial role in diverse portable electronic devices such as smartphones, laptops, and tablets, offering high energy density and efficient charge-discharge capabilities. Moreover, they serve as vital components in electric vehicles and contribute significantly to the field of renewable energy as part of Energy Storage Systems(ESS). However, despite advancements in this technology, issues such as reduced lifespan, cracking, damage, and even the risk of fire can arise due to excessive charging and discharging of secondary batteries. To address these challenges, Battery Management System(BMS) are employed to protect against overcharging and improve overall performance. Nevertheless, understanding the protective range settings of BMS using lithium-ion batteries, the most commonly used secondary batteries, and lead-acid batteries can be challenging. Therefore, this paper aims to utilize a battery charge-discharge tester and simulator to investigate the charging and discharging characteristics of lithium-ion batteries and lead-acid batteries, addressing the associated challenges of reduced lifespan, cracking, damage, and fire hazards in secondary batteries.

Design and Implementation of Java-based Spatial Web Database System (자바기반 공간 웹 데이터베이스 시스템의 설계 및 구현)

  • Kim, Sang-Ho;Nam, Kwang-Woo;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.1-10
    • /
    • 2004
  • According to the evolution of the Internet and wireless mobile communication technology, techniques for mobile databases and wireless web services are issued for them. Recently, these changes of geographic application environment increase the needs for development of new GIS database system for the web services and embedded system. In this paper, we proposed a Jana-based web database systems that can be used in the web-based GIS and mobile databases. This proposed system has been implemented using the Java to be displayed easily into the portable computing devices and Java-based web application servers and using OpenGIS for web data interoperability. Also, it can efficiently process web-based spatial queries by developing a spatial query processor including schema manager and a spatial object storage module.