• Title/Summary/Keyword: Sensor Security

Search Result 900, Processing Time 0.023 seconds

A Study on The Network Design of Smart Village to Provide Wired and Wireless Convergence Services on IoT (IoT기반의 유무선 융복합 서비스 제공을 위한 스마트빌리지의 네트워크 구성방안에 관한 연구)

  • Kim, Yun-ha;Jeong, Jae-woong;Kim, Young-sung;Choi, Hyun-ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.296-299
    • /
    • 2022
  • The rapid urban expansion and the increase in natural disasters due to the increase of population after industrialization and climate change are causing numerous urban management problems. The IP based hyper-connectivity caused by the initiation of the 4th industrial revolution enables a variety of technologies and services that produce vast amounts of data and solve urban management problems based on this. Especially, the quality of life is improved by providing the necessary information for life that are produced through a sensor network on wired and wireless communication. In this study, we intend to propose the method of optimal communcation network composition for innovative and futuristic city management technology through the case of K-water Smart Village Communication System

  • PDF

Designing Bigdata Platform for Multi-Source Maritime Information

  • Junsang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.111-119
    • /
    • 2024
  • In this paper, we propose a big data platform that can collect information from various sources collected at ocean. Currently operating ocean-related big data platforms are focused on storing and sharing created data, and each data provider is responsible for data collection and preprocessing. There are high costs and inefficiencies in collecting and integrating data in a marine environment using communication networks that are poor compared to those on land, making it difficult to implement related infrastructure. In particular, in fields that require real-time data collection and analysis, such as weather information, radar and sensor data, a number of issues must be considered compared to land-based systems, such as data security, characteristics of organizations and ships, and data collection costs, in addition to communication network issues. First, this paper defines these problems and presents solutions. In order to design a big data platform that reflects this, we first propose a data source, hierarchical MEC, and data flow structure, and then present an overall platform structure that integrates them all.

A Study on Preprocessing Method in Deep Learning for ICS Cyber Attack Detection (ICS 사이버 공격 탐지를 위한 딥러닝 전처리 방법 연구)

  • Seonghwan Park;Minseok Kim;Eunseo Baek;Junghoon Park
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.36-47
    • /
    • 2023
  • Industrial Control System(ICS), which controls facilities at major industrial sites, is increasingly connected to other systems through networks. With this integration and the development of intelligent attacks that can lead to a single external intrusion as a whole system paralysis, the risk and impact of security on industrial control systems are increasing. As a result, research on how to protect and detect cyber attacks is actively underway, and deep learning models in the form of unsupervised learning have achieved a lot, and many abnormal detection technologies based on deep learning are being introduced. In this study, we emphasize the application of preprocessing methodologies to enhance the anomaly detection performance of deep learning models on time series data. The results demonstrate the effectiveness of a Wavelet Transform (WT)-based noise reduction methodology as a preprocessing technique for deep learning-based anomaly detection. Particularly, by incorporating sensor characteristics through clustering, the differential application of the Dual-Tree Complex Wavelet Transform proves to be the most effective approach in improving the detection performance of cyber attacks.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Monitoring Method Using Moving CCTV in Common Duct (이동형 CCTV 장치를 이용한 공동구 모니터링 방법)

  • Kang, Jin-A;Kim, Tae-Hoon;Oh, Yoon-Seuk;Choi, Hyun-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.4
    • /
    • pp.1-12
    • /
    • 2011
  • There has been the increasing concern with the safety of seven major urban infrastructure such as road, electricity, water supply, sewerage and so on due to urban expansion and new town development. However, high technology development for the common duct which can be an alternative for the safety issue has not been completed due to the law of the national security area. Existing management method of the common duct by people could not respond to the urgent accidents adequately and immediately since it is impossible for us to get access to that in case of fire or gas leak. This study suggests to the method of installing monitoring devices and processing CCTV images with a water supply in a TestLab(a variety of the USN(Ubiquitous Sensor Network) equipment was tested in the TestLab in KICT). The suggested management method of common duct facilities make it possible to do real-time monitoring and prompt access and response to an accident inside the common duct.

An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City (유시티 진화 지도를 통한 유시티 진화 특성 분석)

  • JO, Sung-Soo;LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.75-91
    • /
    • 2015
  • This study aims to analyse the U-City characteristics through the U-City historical mapping. The U-City characteristics were analysed by building the U-City historical map in terms of STIM model which consists of service, technology, infrastructure and management. The data for analysis is the National Informatization White Paper published by the NIA (National Information Society Agency) from 2002 to 2013. As a result, first, the U-City service were evolved from administration informatization, enterprise informatization, administration/living informatization and administration/space/private informatization through the intelligence facilities and space. Second, the U-City technology were changed through wire network, sensor/network, processing/super-highway network, convergence of network/security. Third, the U-City infrastructure have had evolutionary process such as wire computer network, wire/wireless network, intellectualization facility and intelligent facility space. Forth, the U-City management were carried out with making the unit network/infrastructure management, information connection/operating management and information integration/participation management. Therefore, the history of U-City has been making rapid development in government computerization, computer oriented society, information city and ubiquitous city.

Adoption of the Use of Smart Technology by Health-care Workers in Nursing Homes: an Exploratory Study (노인요양시설의 스마트 기술 도입에 대한 탐색적 연구 -요양시설 종사자 답변을 중심으로-)

  • Lee, Sunhyung;Ahn, Joonhee
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.8
    • /
    • pp.156-171
    • /
    • 2014
  • The purpose of this exploratory study is to examine if the application of smart technology(ST) would assist adjustment to the nursing home facilities in the elderly. Since there is not much previous research on this subject, we generated survey questionnaires on our own. Data were collected from the survey of 127 employees at 6 nursing homes including geriatric care workers, social workers and nurses who provide direct as well as indirect care services. Results showed that the utilization of ST would benefit the areas of family relationship support, health support, leisure support, and physical environment adjustment. As for physical environment adjustment, study participants reported that ST would help elders familiarize employees and find directions for specific space the most. As for health support, ST would be best utilized as a security sensor and program alarm system. As for support for family relationship, ST was expected to be utilized as looking at family pictures and playing with self pictures/videos. As for leisure support, ST was expected to assist elders to listen to music and watch movies/TV. These results were different according to the characteristics of the participants and the smartifacts. These results of the study will show the direction for more in-depth studies on application of smart technology for the elderly in the future.

A Service Identification Scheme for the Convergence of Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 융합을 위한 서비스 식별 체계)

  • Uhm, Huy-Jung;Eun, Seong-Bae;Jun, Jung-Ho;Kang, Gwon-U;Ju, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.104-113
    • /
    • 2011
  • While converging USN Services, a single physical infrastructure can be used in several services and in several physical infrastructures can make up a single service. Therefore the physical infrastructure and service have to manage separately for effective convergence of USN Services. However, established Identification Scheme is not suitable to distinguish various services that USN provides. This paper suggests USN Service Identification Scheme that can be separated and managed. Through USN Service Identification Scheme suggested, firstly, it is possible to obtain Service Identification Scheme utilizing various technology such as RFID TAG, QR Code, radio broadcasting, etc. because it is possible to process USN Service Identification Scheme. Secondly, it is easy to mange the service, develope the user application program and interlock with established USN Standard technique as view from service provider. Thirdly, it is possible to manage systematically USN Service. Fourthly, users can search USN Service easily, so it can contribute actively for invigoration of USN service. This thesis, firstly, has analyzed about standard related USN Service and USN Identification Scheme. Secondly, this has suggested brand-new USN Service Identification Scheme based on established USN Identification Scheme.

A Study on Apparatus of Smart Wearable for Mine Detection (스마트 웨어러블 지뢰탐지 장치 연구)

  • Kim, Chi-Wook;Koo, Kyong-Wan;Cha, Jae-Sang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.263-267
    • /
    • 2015
  • current mine detector can't division the section if it is conducted and it needs too much labor force and time. in addition to, if the user don't move the head of sensor in regular speed or move it too fast, it is hard to detect a mine exactly. according to this, to improve the problem using one direction ultrasonic wave sensing signal, that is made up of human body antenna part, main micro processor unit part, smart glasses part, body equipped LCD monitor part, wireless data transmit part, belt type power supply part, black box type camera, Security Communication headset. the user can equip this at head, body, arm, waist and leg in removable type. so it is able to detect the powder in a 360-degree on(under) the ground whether it is metal or nonmetal and it can express the 2D or 3D film about distance, form and material of the mine. so the battle combats can avoid the mine and move fast. also, through the portable battery and twin self power supply system of the power supply part, combat troops can fight without extra recharge and we can monitoring the battle situation of distant place at the command center server on real-time. and then, it makes able to sharing the information of battle among battle combats one on one. as a result, the purpose of this study is researching a smart wearable mine detector which can establish a smart battle system as if the commander is in the site of the battle.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.