• Title/Summary/Keyword: Premises device

Search Result 8, Processing Time 0.022 seconds

Implementation of UPnP Protocol on the Linux System for Controlling Premises Equipment (구내외 정보통신기기 제어를 위한 Linux System상에서의 UPnP프로토콜 구현)

  • Choi, Dong-Jin
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.5
    • /
    • pp.103-108
    • /
    • 2005
  • In this article, it has been shown that penises devices such as illumination facilities, heating/cooling systems and security equipment can be controlled even outside premises using UPnP (Universal Plug and Play) applicable to the Internet or cellular phone services. To load UPnP protocol into each device, current manufacturers will be required to port flexible OS (Operating System), that is, Windows or Linux to these premises devices. Furthermore, prospective users want to experience a variety of specific functions based on more standardized and stable network. This study aims to provide application by implementing these functions on the Linux system.

Design of Portal System Architecture for Large Consumers and Its Prototype Implementation (대수용가 포털 시스템 아키텍처 설계 및 프로토타입 구현)

  • Yang, Il-Kwon;Kim, Sun-Ic;Song, Jae-Ju;Oh, Do-Eun;Lee, Sang-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.11
    • /
    • pp.2117-2123
    • /
    • 2008
  • This paper describes the portal system architecture of large consumers for ESP(Energy Service Provider) to provide customers with various value added services such as monitoring and controlling a wide variety of electric devices in consumer's premises for optimal energy management from both consumer side and ESP side, and the prototype implementation of 2 kinds of value added services. The architecture is composed of the device portal which gathers the information from electric devices and controls them and the consumer portal which can make ESP operate the optimal energy management with two-way communications. The demand side management and energy management functions was chosen and implemented for the prototype system as value added services. The prototype was designed to create, manage, and trace the events about services between ESP and customers.

Power Quality Monitoring with Electronic Watt-hour meter and Wireless communication module (전자식 전력량계와 무선모듈을 이용한 전력품질 표시 및 모니터링)

  • Jung, Deug-Il;Son, Young-Dae
    • Proceedings of the KIEE Conference
    • /
    • 2007.10c
    • /
    • pp.172-174
    • /
    • 2007
  • An electronic watt-hour meter with high-precision measurement technology can provide many valuable metering data of a real-time system measurements, such as per-phase voltage, ampere, active power, reactive power, apparent power, power factor, and system frequency. Also many of accumulated metering data such as active energy, reactive energy, apparent energy, and load profile can be gettable from an electronic watt-hour meter[1]. This paper presents an approach of the small-sized AMR (Automatic Meter Reading) that provides customers with a very valuable electrical service. This AMR service transmits lots of a valuable metering data by using ZigBee communication module, so that users resided in their premises can use the information to audit a power quality and improve their electrical conditions by using the PQ monitoring device equipped with ZigBee receiver. This PQ monitoring device shows metering data on LCD and transmits to the PC through an internal network. Also, the device can keep the valuable meter data into a built-in non-volatile memory. The final goal of this paper is to better understand the power quality of electrical systems and offer the power qualify information for the convenience of all power consumers.

  • PDF

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.

Laboratory Environment Monitoring: Implementation Experience and Field Study in a Tertiary General Hospital

  • Kang, Seungjin;Baek, Hyunyoung;Jun, Sunhee;Choi, Soonhee;Hwang, Hee;Yoo, Sooyoung
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.371-375
    • /
    • 2018
  • Objectives: To successfully introduce an Internet of Things (IoT) system in the hospital environment, this study aimed to identify issues that should be considered while implementing an IoT based on a user demand survey and practical experiences in implementing IoT environment monitoring systems. Methods: In a field test, two types of IoT monitoring systems (on-premises and cloud) were used in Department of Laboratory Medicine and tested for approximately 10 months from June 16, 2016 to April 30, 2017. Information was collected regarding the issues that arose during the implementation process. Results: A total of five issues were identified: sensing and measuring, transmission method, power supply, sensor module shape, and accessibility. Conclusions: It is expected that, with sufficient consideration of the various issues derived from this study, IoT monitoring systems can be applied to other areas, such as device interconnection, remote patient monitoring, and equipment/environmental monitoring.

Design of Safety Management System for IoT based in SIP (SIP기반 임베디드 IoT 안전관리 시스템 설계)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.69-74
    • /
    • 2018
  • IP and SIP public broadcasting systems developed in Korea and abroad are developed in a Windows or Linux server environments and are installed in a server-rack structure, have high power consumption, and are difficult to remotely respond to system failures. In this paper, IoT platform is designed to connect IoT device and gateway to IoT service server by using internet service structure. We also designed a server based on embedded OS that can provide a variety of public safety management services according to the order of the server with built-in call processing and broadcasting function that can handle emergency calls and emergency broadcasts in public places using this structure. This server is interoperable with a variety of SIP-based call and broadcast devices that support the standard SIP and can be integrated with an in-house phone and on-premises system.

Morphological Theory and Design in Modern and Contemporary Architecture -Focused on the Romantic Educational Thoughts as a Dualistic Monism- (근현대건축의 모폴로지 이론과 건축설계)

  • Kim, Sung-Hong
    • Journal of architectural history
    • /
    • v.13 no.4 s.40
    • /
    • pp.89-105
    • /
    • 2004
  • This paper investigates morphological theory as an intellectual framework for research and design. The first part of the paper will review morphological studies in the fields of urban geography, urban planning and architecture, particularly in England from the 1940s to the 1980s. While urban geographers and planners were concerned primarily with town plans, building forms and land use, architectural theoreticians were more interested in the topological relationship between urban and architectural space. The underlying premises and principles of these two approaches will be reviewed. The second part of the paper will focus on typology in Europe and North America. The reinterpretation of typology by Italian architects helped to bridge the gap between individual elements of architecture and the overall form of the city. However, typological theory became less accessible in post-war England and the United States. After 1980, the debate on typology became muted by the onset of vague notions such as functionalism, bio-technical determinism, and contextualism. This paper will propose a redefinition of morphology as a heuristic device, in contrast with the dichotomic view of urban morphology and architectural typology. Morphology will be shown to combine the geometrical and topological; the intentional and accidental; the real and abstract; and a priori and a posteriori. The last part of the paper discusses the lack of comparative theories and methods surrounding the physical form of architecture and the city by Korea commentators. Empirically rooted facility planning, non-comparative historical studies, and iconographic criticism emerged as a central preoccupation of architectural culture between the 1960s and 1980s, a time when international debate on architecture and urbanism was most intense. This paper will give consideration to the built environment as a dynamic physical entity and space as an epiphenomenon of daily urban life, such that collaboration between urban designers, architects, and landscape architects is seen as both beneficial and necessary.

  • PDF

Proxy-Based Scalable Server Access Management Framework Using Reverse Webshell Protocol (웹쉘 기술을 통한 프록시 기반의 확장 가능한 서버 관리 프레임워크)

  • Daeun Kim;Sangwook Bae;Seongmin Kim;Eunyoung Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.661-670
    • /
    • 2023
  • With the emergence of serverless computing paradigm and the innovations of cloud technology, the structure of backend server infrastructure has evolved from on-premises to container-based serverless computing. However, an access control on the server still heavily relies on the traditional SSH protocol, which poses limitations in terms of security and scalability. This hampers user convenience and productivity in managing server infrastructure. A web shell is an interface that allows easy access to servers and execution of commands from any device with a web browser. While hackers often use it to exploit vulnerabilities in servers, we pay attention to the high portability of web shell technology for server management. This study proposes a novel proxy-based server management framework utilizing web shell technology. Our evaluation demonstrates that the proposed framework addresses the drawbacks of SSH without additional overhead, and efficiently operates large-scale infrastructures in diverse computing environments.