• Title/Summary/Keyword: Smart server

Search Result 821, Processing Time 0.029 seconds

Distributed Server based Data Management and Device Control Scheme for Efficient IoT Service in Smart Building (스마트 빌딩에서의 효율적인 사물인터넷 서비스를 위한 분산 서버 기반 데이터 관리 및 제어 기법)

  • Choi, Sang-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.547-550
    • /
    • 2017
  • With the deployment of Internet of Things (IoT) services, the interest of smart building management system is rapidly increased. However, existing smart building management system has some limitations such as single point of failure, scalability, processing delay by using the centralized service platform server. To overcome these limitations, in this paper, the distributed server based smart building management scheme is proposed. In the proposed scheme, it is possible to provide fast and efficient IoT services, regardless of the scale of smart building, by using the distributed server of each floor. From the numerical analysis, it is shown that the proposed scheme provides better performance than the existing centralized scheme in terms of stability of database and service processing delay.

  • PDF

The Smart Contract based Conference Key Distribution Scheme (스마트계약 기반 회의용 키 분배 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.1-6
    • /
    • 2020
  • Recently, epidemic of covid-19 causes rapid increase in demand for untact video conferences. In existing server-client based video conference systems such as Zoom, Google Meet, etc., the server generates the conference key and controls the access rights of meeting members and their contents with it. In this case, the server can fabricate or repudiate the meeting. So, the privacy of the meeting members is not guaranteed. It's necessary to make the conference key distribution scheme where all participants can verify the trustfulness without help of the server. The smart contract is the program stored to the blockchain. Its contents cannot be altered due to the property of the blockchain, and everybody can verify the execution results of it. In this study, we propose the smart contract based conference key distribution scheme. The proposed scheme is consisted of smart contract deployment, conference key generation and verification stages. The smart contract replaces the role of existing trustful server and the meeting members can generate the conference key according to the protocols implemented on it. The proposed scheme can be applied to the video conference systems and only the meeting members can access the conference key.

Two-Stage Multichannel Architecture for Oyster Product Management System

  • Yang, Yeong-Yil
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.96-103
    • /
    • 2019
  • In this paper, we propose two-stage multichannel architecture for oyster product management system, called cloud stage and agent stage. There are two communication channels at each stage. In cloud stage, the embedded system in the smart scale communicates with the server through two channels, Ethernet or 3G/LTE mobile communication. In agent stage, PCs and smart phones called agents communicate with the server also through Internet and 3G/LTE mobile communication. Compared with previous system in which the amount of the oyster produced in oyster workplaces could be monitored only at the console of only one oyster main server, developed system makes it possible to monitor the amount of produced oyster at several PCs (or smart phones). In addition to the amount of oysters produced at all oyster workplaces the environment of oyster workplaces such as temperature and humidity can be monitored on agents to judge the freshness. Two-stage architecture with multiple channels makes it possible to monitor the amount of oyster product and environment of the oyster workplace at any place in real time.

The development of localization server system for location-awareness in smart home (지능형 홈에서 위치인지를 위한 localization server system 기술 개발)

  • Lim, Ho-Jung;Kang, Jeong-Hoon;Lee, Min-Goo;Yoo, June-Jae;Yoon, Myung-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.606-608
    • /
    • 2005
  • In this paper, we introduce localization server system calculated real location of objects using raw data of location-awareness from sensor node gateway. The software architecture of localization server system consists of location calculation and actuator control based on location. Also, this system supports for collecting raw data, calculating location of real objects using raw data, correcting error from outer environment, and server for applications based on location.

  • PDF

국민은행 Smart eCRM 개발사례

  • 이채영
    • Proceedings of the Korea Database Society Conference
    • /
    • 2001.06a
    • /
    • pp.213-234
    • /
    • 2001
  • 1. Brokat Server Technologies (Channel 통합 Messging Server) 복잡한 메시지 교환을 유연하게 제어함으로써 Front-End/Back-End각각에 존재하는 다양한 채널을 RealTime으로, 유연하게 통합관리하여 채널간의 Messaging을 Smart하게 컨트롤 2. Brokat Advisor (Rulebase Management System) 복잡한 비즈니스 룰의 적용과 Non-Programming/다이나믹한 관리를 동시에 가능하게 하는 Large E Business Engine (중략)

  • PDF

Security Analysis of a Biometric-Based User Authentication Scheme (Biometric 정보를 기반으로 하는 사용자 인증 스킴의 안전성 분석)

  • Lee, Young Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.81-87
    • /
    • 2014
  • Password-based authentication using smart card provides two factor authentications, namely a successful login requires the client to have a valid smart card and a correct password. While it provides stronger security guarantees than only password authentication, it could also fail if both authentication factors are compromised ((1) the user's smart card was stolen and (2) the user's password was exposed). In this case, there is no way to prevent the adversary from impersonating the user. Now, the new technology of biometrics is becoming a popular method for designing a more secure authentication scheme. In terms of physiological and behavior human characteristics, biometric information is used as a form of authentication factor. Biometric information, such as fingerprints, faces, voice, irises, hand geometry, and palmprints can be used to verify their identities. In this article, we review the biometric-based authentication scheme by Cheng et al. and provide a security analysis on the scheme. Our analysis shows that Cheng et al.'s scheme does not guarantee any kind of authentication, either server-to-user authentication or user-to-server authentication. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, on Cheng et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Cheng et al.'s scheme.

A Novle Method for Efficient Mobile AR Service in Edge Mesh Network

  • Choi, Seyun;Shim, Woosung;Hong, Sukjun;Kim, Hoijun;Lee, Seunghyun;Kwon, Soonchul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.22-29
    • /
    • 2022
  • Recently, with the development of mobile computing power, mobile-based VR and AR services are being developed. Due to network performance and computing power constraints, VR and AR services using large-capacity 3D content have limitations. A study on an efficient 3D content load method for a mobile device is required. The conventional method downloads all 3D content used for AR services at the same time. In this paper, we propose an active 3D content load according to the user's track. The proposed method is a partitioned 3D object load. Edge servers were installed for each area and connected through the MESH network. Partitioned load the required 3D object in the area referring to the user's location. The location is identified through the edge server information of the connected AP. The performance of the proposed method and the conventional method was compared. As a result of the comparison, the proposed method showed a stable Mobile AR Service. The results of this study, it is expected to contribute to the activation of edge server-based AR mobile services.

A Study to Apply A Fog Computing Platform (포그 컴퓨팅 플랫폼 적용성 연구)

  • Lee, Kyeong-Min;Lee, Hoo-Myeong;Jo, Min-Sung;Choi, Hoon
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.6
    • /
    • pp.60-71
    • /
    • 2019
  • As IoT systems such as smart farms and smart cities become popular, a large amount of data collected from many sensor nodes is sent to a server in the Internet, which causes network traffic explosion, delay in delivery, and increase of server's workload. To solve these problems, the concept of fog computing has been proposed to store data between IoT systems and servers. In this study, we implemented a software platform of the fog node and applied it to the prototype smart farm system in order to check whether the problems listed above can be solved when using the fog node. When the fog node is used, the time taken to control an IoT device is lower than the response time of the existing IoT device-server case. We confirmed that it can also solve the problem of the Internet traffic explosion and the workload increase in the server. We also showed that the intelligent control of IoT system is feasible by having the data visualization in the server and real time remote control, emergency notification in the fog node as well as data storage which is the basic capability of the fog node.

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

Smart Home Control based on Raspberry Pi Server & SEN Remote HMI App (라즈베리파이 서버 & SEN Remote HMI 앱 기반의 스마트 홈 제어)

  • Kim, Nam-sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.533-536
    • /
    • 2016
  • In this paper, we take advantage of the SEN Remote HMI App as a tool based on Raspberry Pi server for the smart home control. This is a smart home control system built in an open and a low-cost Raspberry Pi as a server, and take advantage of Android-based graphical programming software SEN Remote HMI. If you build it based system expansion and additional works interface via the Raspberry Pi and Arduino, it is expected to be extended to the Internet of Things (IoT) enabling environment for the implementation of smart home.

  • PDF