• Title/Summary/Keyword: Ubiquitous IT techniques

Search Result 110, Processing Time 0.025 seconds

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 익명성을 보장하는 사용자 인증 및 키 동의 프로토콜 설계)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.3-12
    • /
    • 2006
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'smart space' augmented with intelligence and enhanced with services. However, unless privacy concerns are taken into account early in the design process of various ubiquitous devices(e.g. mobile devices, PDAs, sensors, etc.). we will end up crating ubiquitous surveillance infrastructure. Also, it may inappropriate to use public key techniques for computational constrained devices in ubiquitous computing environment. In this paper, we propose efficient user authentication and ky agreement protocol not only to preserve anonymity for protecting personal privacy but also to be suitable for computational constrained devices in ubiquitous computing environments.

A Study on the Construction Process of u-City IT Infrastructure (u-City IT인프라 구축 절차에 관한 연구)

  • Kim, Jeong-Uk;Kim, Il-Jung
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.58 no.3
    • /
    • pp.291-296
    • /
    • 2009
  • "The Act on Ubiquitous City Construction and etc." stipulates the regulations on the planning, construction and management of the u-City. As its national-level law system is about to take its effects, future new city developments are expected to have its legal basis to be built to meet u-City requirements. Also, it is anticipated that such needs would require much more planning techniques and strategies. In reaction to those upcoming needs, this study is to search for new IT infrastructure construction process of the u-City in reality. It is also to supply with the each step framework to execute the u-City projects in more structuralize and systemize manner. Therefore, with the u-City IT infra construction guide line v1.0, purpose of the establishment of comprehensive IT infrastructure construction process.

An Integrated Approach for Position Estimation using RSSI in Wireless Sensor Network

  • Pu, Chuan-Chin;Chung, Wan-Young
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.2
    • /
    • pp.78-87
    • /
    • 2008
  • Received signal strength indicator (RSSI) is used as one of the ranging techniques to locate dynamic sensor nodes in wireless sensor network. Before it can be used for position estimation, RSSI values must be converted to distances using path loss model. These distances among sensor nodes are combined using trilateration method to find position. This paper presents an idea which attempts to integrate both path loss model and trilateration as one algorithm without going through RSSI-distance conversion. This means it is not simply formulas combination but a whole new model was developed. Several advantages were found after integration: it is able to reduce processing load, and ensure that all values do not exceed the maximum range of 16-bit signed or unsigned numbers due to antilog operation in path loss model. The results also show that this method is able to reduce estimation error while inaccurate environmental parameters are used for RSSI-distance conversion.

  • PDF

EXCEL Tools for Geotechnical Reliability Analysis

  • Phoon, Kok-Kwang
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.10a
    • /
    • pp.375-394
    • /
    • 2008
  • This paper discusses two user-friendly reliability techniques that could be implemented easily using the ubiquitous EXCEL. The techniques are First-Order Reliability Method with non-Gaussian random variables expressed using Hermite polynomials and collocation-based stochastic response surface method. It is believed that ease of implementation would popularize use of reliability-based design in practice.

  • PDF

Strategies for the Establishment of u-City Planning System in the Ubiquitous Computing Age (유비쿼터스 시대를 대비한 u-City 계획체계 정립방안)

  • Kim, Jung-Hoon;Cho, Chun-Man
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.129-144
    • /
    • 2008
  • Last February, $\ulcorner$The Act on Ubiquitous City Construction and etc.$\lrcorner$ was approved by the National Assembly. The law stipulates the regulations on the planning, construction and management of the Ubiquitous City. As its national-level law system is about to take its effects, future new city developments are expected to have its legal basis to be built to meet ubiquitous city requirements. Also, it is anticipated that such needs would require much more planning techniques and strategies. In reaction to those upcoming needs, this study is to search for new planning approaches to realize the u-City in reality. It is also to supply with the framework to execute the u-City projects in more structuralize and systemize manner. Therefore, with the purpose of the establishment of comprehensive planning system, the theoretical bases were sought in relation to planning u-City, pre-existing u-City development cases and regarding regulations were analyzed, and then basic concepts, features, and constituent factors were set up.

  • PDF

Ultrafine Particle Toxicities, Current Measurement Techniques and Controls (Ultrafine Particle의 독성, 측정방법 및 관리)

  • Lee, Su-Gil;Kim, Seong-Soo
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.20 no.3
    • /
    • pp.203-215
    • /
    • 2010
  • This study is an overview of toxicities and measurement techniques of ultrafine particles (UFPs), and their exposure controls. UFPs are ubiquitous in many working situations. Exposure to UFPs is possibly causing adverse health symptoms including cardio-respiratory disease to humans. In order to measure exposure levels of airborne UFPs, there are current available measurement guidelines, instruments and other techniques (i.e. contour mapping, control banding). However, these risk assessment techniques including measurement techniques, controls and guidelines are dependent on background levels, metrics (e.g. size, mass, number, surface area, composition), environmental conditions and controls. There are no standardized measurement methods available and no generic and specific occupational exposure standards for UFPs. It is thought that there needs to be more effort to develop Regulations and Exposure Standards for generic UFPs should be based on more exposure data, health surveys, toxicological data and epidemiological data. A carefully considered hierarchy of controls can also reduce the maximum amount of airborne UFPs being emitted from diverse sources in industries.

Development of Structural Health Monitoring System based USN for a Huge Infrastructure (USN 기반의 대형 사회 기반 시설물 계측 시스템 개발)

  • Kim, Tae-Bong
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.1
    • /
    • pp.7-12
    • /
    • 2016
  • With due to the recent development of USN (Ubiquitous Sensor Network) technology, a monitoring system has been developing for assuring the structural integrity of infrastructure through normal or long term measurements during their lifetime. An accident such as a collapse of infrastructure may cause not only loss of life but also damage to the economy of the nation. In order to enhance the availability of infrastructure and to be able to maintain their lifetime, it is necessary to monitor and to evaluate continuously the structural integrity throughout their entire lifetime. The purpose of this paper is to develop a monitoring system integrated with evaluation function based on the ubiquitous technology. The most essential part of this study is focusing more on developing a specific module convertible to A/D, which is to enhance the applicability of sensors that had not been applied to existing monitoring systems. Conclusively it has been successfully enhanced to make more diverse the number of sensors and measuring techniques for the monitoring system.

A Site Application verification of technology and Equipment for Construction Application of Construction CALS System (건설 CALS 시스템 건설공사 활용을 위한 요소기술 및 장비의 현장 적용성 검증)

  • Choi, Sang-Yong;Shin, Tae-Hong;Kim, Byung-Kon;Kim, Tea-Hak;Kwon, Soon-Wook;Chin, Sang-Yoon
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2008.11a
    • /
    • pp.767-771
    • /
    • 2008
  • From industrial field spearhead IT and new create an added value and market with fusion of traditional industry composition researches actively to be in the process of advancing. The application possibility of high-tech IT technique is coming to be high in construction industry. Currently, the user requirements that upgrade existing system to high-tech construction project information system combined construction CALS system applying in road/river business management service with high-tech IT such as ubiquitous and mobile techniques are increasing. Therefore, the objective of this study is to verify site application of RFID and mobile equipment for applying in high-tech field with ubiquitous and mobile techniques so that construction CALS system gets advanced increasingly.

  • PDF

Handover Protocol for Mobility Support in Ubiquitous Sensor Network (USN에서의 이동성을 위한 핸드오버 인증 프로토콜)

  • Bruce, Ndibanje;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.203-206
    • /
    • 2012
  • The System of communication with wireless devices is experiencing a huge growth. While traditional communication paradigms deal with fixed networks, mobility raises a new set of questions, techniques, and solutions. In order to realize service mobility, there is a need of protocol that can support mobility while nodes are communicating without any disruption of their connection status. This paper proposes a handover authentication protocol for mobility support. Careful considerations must be taken in priority to security issues since many unreliable public and private resources; both networks and devices are involved. The protocol is based on public key cryptography with Diffie-Hellman algorithm which provides security against both leakage-resilience of private keys on untrustworthy devices and forward secrecy.

  • PDF

Implementation of the Intelligent MUX System for Green USN (녹색 유비쿼터스 지능형 다중화장비의 구현)

  • Kang, Jeong-Jin;Chang, Hark-Sin;Lee, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently emphasizing the importance of security such as national major institutions' facilities or major industrial facilities for the maintenance of security/crime prevention due to specialization of the Green Information Technology(G-IT) and Green Ubiquitous Technology(G-UT) industry fields, The Security System Building linked high technology within the government-related organization, enterprise and army the military is urgently required. This paper is about the green USN intelligent an unmanned guard MUX system that receive the signals, from alarm device within surveillance area, with various ways of communication techniques and then transmit to local control center and remote control server trough TCP/IP network. This study enables the mutual senergy effect by realizing a total solution of an unmanned guard system and also significantly contributes to the global/domestic market expansion. That can be applied to the crime prevention/security fields in the Green Ubiquitous Environment Implemented Business(survalance-Home, Gu-City, Gu-Health, etc.), and will contribute to expand companies with international competitiveness that can provide the Green Ubiquitous Vision(Gu-Vision).