• 제목/요약/키워드: Security Light Control System

검색결과 45건 처리시간 0.023초

저대역 센서 네트워크 기반의 양방향 보안등 관제 시스템 개발 (Development of a Bi-Directional Security Light Control System based on Low-Bandwidth Wireless Sensor Network)

  • 이호근;이상호;이석규;최정원
    • 조명전기설비학회논문지
    • /
    • 제24권10호
    • /
    • pp.58-66
    • /
    • 2010
  • This paper shows an implementation and management result of wireless networks based security light control system, which performs a great role in protection of pedestrians and prevention of crime. Conventional security light units have severe limits in confirmation and inspection of security light unit failure, like wilful damage by someone or failure by influence of other equipment or failure by spontaneous heat-increase, and so on. In addition, local government offices are responsible for maintenance of security light units and as a matter of fact, most of civil complaints are about security light units. It is an obvious that the existing security light maintenance system reaches the limit and the security light maintenance problem is a difficulty of local government. Therefore, efficient security light control system is needed, which enables central control and intelligent maintenance. Moreover, the system has to be easy to control and has to be stable. In this study, wireless sensor network based security light control system is implemented, which is independent of programming language and platform, and which is simple to control and extend the system. The proven protocols, HTTP and SOAP, are utilized in order to improve the system reliability. This paper shows the excellence of our proposed system by implementing and operating it in real environment.

Smartphone Color-Code based Gate Security Control

  • Han, Sukyoung;Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Lee, Seungyoun;Lee, Juyoung;Kim, Jintae;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • 제5권3호
    • /
    • pp.66-71
    • /
    • 2016
  • Smart building gate security control system using smartphone integrated with near field communication (NFC) has become part of daily life usage these days. The technology change in replacing RF NFC device using visible light communication technology based approach growing faster in recent days. This paper propose a design and development of gate security control system using color code based user authentication ID generation as part of an intelligent access control system to control automatic door open and close. In this approach gate security access control use the recent visible light communication technology trends to transfer the user specific authentication code to door access control system using color code on smartphone screen. Using a camera in the door access control system (ACS), color codes on smartphone screens are detected and matched to the database of authenticated user to open the door automatically in gate security system. We measure the visual light communication technology efficiency as a part of the research and the experiments have revealed that more than 95% users authenticated correctly at the suggested experiment environment on gate security control system.

50W급 LED 보안등용 조명광학계 개발 (Development of Optical System for 50W LED Security Lamp)

  • 정병조;장성환;노용기
    • 한국산학기술학회논문지
    • /
    • 제13권1호
    • /
    • pp.296-305
    • /
    • 2012
  • 본 연구에서는 기존 LED 보안등의 LED 광원 직진성에 의한 눈부심 현상을 개선하고, 조도 균제도를 높게 유지하며, 회전 대칭이 아닌 편축으로 긴 배광 분포를 가지도록 하여 LED 보안등 간에 생기는 광 공핍현상을 해결할 수 있는 보안등용 LED 2차 렌즈를 개발하였다. 개발 광학계는 보안등용 조명 기준에 만족하도록 설계하였으며, 렌즈의 형태는 단일 렌즈로 조명 설계 및 해석 프로그램을 이용한 설계와 분석을 통해 최적화를 하였다. Mock-up을 제작하여 실제 측정을 통해 조도 측정 데이터와 조도 균제도 데이터를 확보하였다.

지그비 통신망을 이용한 보안등 관제 시스템에 관한 연구 (A study on the street security light management system using Zigbee network)

  • 전중성
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제38권4호
    • /
    • pp.430-436
    • /
    • 2014
  • 무선통신망을 이용하여 도로 보안등에 대한 상태관리와 원격제어를 통제하는 시스템은 보안등제어기, 중계기, 관제서버 등의 3개의 기능으로 구성되며 보안등간의 통신망은 메쉬 형태를 지원하는 지그비 네트워크를 채택하고 중앙의 관제센타는 CDMA 방식의 무선통신망을 사용하였다. 이를 연동하기 위하여 지그비와 CDMA를 모두 수용하는 게이트웨이인 중계기는 저전력의 32-bit 마이크로콘트롤러인 Cortex M3로 설계 제작하였다. 관제서버와 중계기간의 전송방식을 단문메시지 방식과 소켓 방식을 모두 사용하여 원격제어 시스템을 구축함으로써 공중통신망의 이용료를 최소화하면서 보안등의 상태관리가 실시간으로 관리 가능함을 확인하였다. 실험에서는 95개의 보안등에 2개월간의 실시간을 통하여 확인하여 일일 9회 데이터를 취득하여 결과를 분석하였다.

Key Phase Mask Updating Scheme with Spatial Light Modulator for Secure Double Random Phase Encryption

  • Kwon, Seok-Chul;Lee, In-Ho
    • Journal of information and communication convergence engineering
    • /
    • 제13권4호
    • /
    • pp.280-285
    • /
    • 2015
  • Double random phase encryption (DRPE) is one of the well-known optical encryption techniques, and many techniques with DRPE have been developed for information security. However, most of these techniques may not solve the fundamental security problem caused by using fixed phase masks for DRPE. Therefore, in this paper, we propose a key phase mask updating scheme for DRPE to improve its security, where a spatial light modulator (SLM) is used to implement key phase mask updating. In the proposed scheme, updated key data are obtained by using previous image data and the first phase mask used in encryption. The SLM with the updated key is used as the second phase mask for encryption. We provide a detailed description of the method of encryption and decryption for a DRPE system using the proposed key updating scheme, and simulation results are also shown to verify that the proposed key updating scheme can enhance the security of the original DRPE.

Design and implementation of optical identification system using visible light and infrared

  • Lee, Seong-Ho
    • 센서학회지
    • /
    • 제30권4호
    • /
    • pp.196-203
    • /
    • 2021
  • In this study, an optical identification system was developed, wherein visible light is used to transmit the interrogating signal, and infrared is used to send the response signal. In the reader, visible light from a light emitting diode (LED) array was modulated via modified pulse width modulation for flicker-free illumination and dimming control. Moreover, the duty factor of the dimming control time was employed to control the illumination from the LED. In the transponder, the spike signal in the output of the high-pass filter was utilized to recover the interrogating signal while preventing interference from the 120-Hz noise from adjacent lighting lamps. The illumination was controlled in 26-86% range of the constant wave LED illumination by changing the duty factor from 20% to 90%. This configuration is advantageous for the construction of optical identification systems for automatic security check and car fare calculation at toll gates or parking facilities.

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권2호
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.

Web Based Smart Home Automation Control System Design

  • Hwang, Eui-Chul
    • International Journal of Contents
    • /
    • 제11권4호
    • /
    • pp.70-76
    • /
    • 2015
  • The development of technology provides and increases security as well as convenience for humans. The development of new technology directly affects the standard of life thanks to smart home automatic control systems. This paper describes a door control, automatic curtain, home security (CCTV, fire, gas, safe, etc.), home control (energy, light, ventilation, etc.) and web-based smart home automatic controller. It also describes the use of ARM (Advanced RISC Machines) for automatic control of home equipment, a Multi-Axes Servo Controller using FPGA (Field Programmable Gate Array) and PLC (programmable logic controller). Additionally, it describes the development of a HTML editor using web auto control software. The tab loading time (7 seconds) is faster when using ARM-based web browser software instead of Chrome and Firefox is used because the browser has a small memory footprint (300M). This system is realized by web auto controller language which controls and uses PLCs that are easier than existing devices. This smart home automatic control technology can control smart home equipment anywhere and anytime and provides a remote interface through mobile equipment.

Secure sharing method for a secret binary image and its reconstruction system

  • Lee, Sang-Su;Han, Jong-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1240-1243
    • /
    • 2003
  • In this paper, an encryption method to share a secret binary image is proposed. It divides the image to be encrypted into an arbitrary number of images and encrypts them using XOR process with different binary random images which was prepared by the means of the XOR process, too. Each encrypted slice image can be distributed to the authenticated ones. However, we transfer the encrypted images to the binary phase masks to strengthen the security power, that means phase masks can not be copied with general light-intensity sensitive tools such as CCDs or cameras. For decryption, we used the Mach-Zehnder interferometer in which linearly polarized two light beams in orthogonal direction, respectively. The experimental result proved the efficiency of the proposed method.

  • PDF

Shadow IT를 고려한 새로운 관리체계 도입에 관한 연구 (A Study on the New Management System Considering Shadow IT)

  • 유지연;정나영
    • 한국IT서비스학회지
    • /
    • 제15권3호
    • /
    • pp.33-50
    • /
    • 2016
  • In a dynamic IT environment, employees often utilize external IT resources to work more efficiently and flexibly. However, the use of external IT resources beyond its control may cause difficulties in the company. This is known as "Shadow IT." In spite of efficiency gains or cost savings, Shadow IT presents problems for companies such as the outflow of enterprise data. To address these problems, appropriate measures are required to maintain a balance between flexibility and control. Therefore, in this study, we developed a new information security management system called AIIMS (Advanced IT service & Information security Management System) and the Shadow IT Evaluation Model. The proposed model reflects a Shadow IT's attributes such as innovativeness, effectiveness, and ripple effect. AIIMS consists of five fields: current analysis; Shadow IT management plans; management process; education and training; and internal audit. There are additional management items and sub-items within these five fields. Using AIIMS, we expect to not only mitigate the potential risks of Shadow IT but also create successful business outcomes. Now is the time to draw to the Light in the Shadow IT.