• Title/Summary/Keyword: Ubiquitous Information Network

Search Result 1,232, Processing Time 0.022 seconds

A Study on the Improvement Alternatives using USN Technology on Bicycle and Infrastructures (USN 융합기술을 활용한 자전거 시설물의 안전향상에 관한 연구)

  • Chung, Sung-Hak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.173-180
    • /
    • 2010
  • This research aims to enhance the security and safety of bicycle facilities by utilizing convergence technology of ubiquitous sensor network in the transportation system. To achieve the aim, U-bike system has developed by utilizing sensor network technology, and the serviceability and safety function of public facilities in the system have enhanced. This research also presents a plan for the construction of U-bike using ubiquitous sensor network and safety infrastructure of facilities by analyzing bicycle traffic reports and characteristics of service through studying the literature on the security of bicycles and the safety of facilities on bicycle lanes. The result of this research will contribute to the enhancement of safety function of bicycle lanes and facilities around National 4 major rivers bicycle lanes in the future.

A Study on Functions and Services of a Library Based on Ubiquitous Life (유비쿼터스 사회환경에서의 도서관 기능 및 서비스에 관한 연구)

  • Kim, Yong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.3
    • /
    • pp.97-114
    • /
    • 2009
  • The roles and services of a library have historically been influenced and developed by the change of information technologies. The ubiquitous technologies have been widely studied for medical area, construction, commerce, broadcasting, telecommunication and so on. The ubiquitous technologies have extended to the roles and services in a library. The development of ubiquitous IT, the roles and functions of a library and information center should be changed. To adjust evolving environment, this study focuses on concept and definition of ubiquitous computing and networks. Especially, with requirements and essential technologies which can be a technological infrastructure for ubiquitous life, library services and roles in ubiquitous life are discussed by literature review, case analysis and expert interview. With the results, this study proposes that library services and roles in ubiquitous life should be considered in two ways which are network and physical spaces. Also, roles of a library in ubiquitous life will be extended to culture and education center including traditional information center. To perform those roles and services, a library should develop various service programs relating culture and education such as personalized service and educational program.

Energy Harvesting System for Underground Facility Sensor (지하시설물용 센서 네트워크를 위한 에너지 획득 장치)

  • Kwon, Young-Min;Lee, Hyung-Su
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.136-137
    • /
    • 2009
  • In this paper, we introduce UFSN(Underground Facility Sensor Network) in order to build the intelligent management system for the underground facility and drainage in convergence with ubiquitous technologies and propose the energy harvesting system for UFSN.

  • PDF

Be study technical information protection in ubiqutious home networks (유비쿼터스 홈 네트워크에서의 정보보호 기술 연구)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.65-75
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at these papers, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS, DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding an external denial of service attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack like DoS, DDoS, IP Spoofing, and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

UFSN : Underground Facility Sensor Network (도시 지하시설물 관리를 위한 USN 기술 연구)

  • Kwon, Young-Min;Lee, Hyung-Su;Song, Byung-Hun
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.9 no.3
    • /
    • pp.86-91
    • /
    • 2010
  • In this paper, we introduce UFSN (Underground Facility Sensor Network) in order to build the intelligent management system for the underground facility and drainage in convergence with ubiquitous technologies. and propose the three type of UFSN.

  • PDF

An ECG Monitoring and Analysis Method for Ubiquitous Healthcare System in WSN

  • Bhardwaj, Sachin;Lee, Dae-Seok;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.7-11
    • /
    • 2007
  • The aim of this paper is to design and implement a new ECG signal monitoring and analysis method for the home care of elderly persons or patients, using wireless sensor network (WSN) technology. The wireless technology for home-care purpose gives new possibilities for monitoring of vital parameter with wearable biomedical sensors and will give the patient freedom to be mobile and still be under continuously monitoring. Developed platform for portable real-time analysis of ECG signals can be used as an advanced diagnosis and alarming system. The ECG features are used to detect life-threatening arrhythmias, with an emphasis on the software for analyzing the P-wave, QRS complex, and T-wave in ECG signals at server after receiving data from base station. Based on abnormal ECG activity, the server transfer diagnostic results and alarm conditions to a doctor's PDA. Doctor can diagnose the patients who have survived from arrhythmia diseases.

R3: A Lightweight Reactive Ring based Routing Protocol for Wireless Sensor Networks with Mobile Sinks

  • Yu, Sheng;Zhang, Baoxian;Yao, Zheng;Li, Cheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5442-5463
    • /
    • 2016
  • Designing efficient routing protocols for a wireless sensor network with mobile sinks (mWSN) is a challenging task since the network topology and data paths change frequently as sink nodes move. In this paper, we design a novel lightweight reactive ring based routing protocol called R3, which removes the need of proactively maintaining data paths to mobile sinks as they move in the network. To achieve high packet delivery ratio and low transmission cost, R3 combines ring based forwarding and trail based forwarding together. To support efficient ring based forwarding, we build a ring based structure for a network in a way such that each node in the network can easily obtain its ring ID and virtual angle information. For this purpose, we artificially create a virtual hole in the central area of the network and accordingly find a shortest cycled path enclosing the hole, which serves as base ring and is used for generating the remaining ring based structure. We accordingly present the detailed design description for R3, which only requires each node to keep very limited routing information. We derive the communication overhead by ring based forwarding. Extensive simulation results show that R3 can achieve high routing performance as compared with existing work.

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher

  • Marpaung, Jonathan A.P.;Ndibanje, Bruce;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.237-245
    • /
    • 2014
  • In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv's Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the algorithm, and introducing a key refreshment scheme. Our contribution brings improvements to previous countermeasures making the implementation resistant to higher-order attacks. Four functional metrics, namely resiliency, robustness, resistance, and scalability, were used for the assessment. Finally, performance costs were measured using memory usage and execution time. In this work, it was demonstrated that although attacks can be feasibly carried out on unprotected systems, the proposed countermeasures can also be feasibly developed and deployed on resource-constrained devices, such as wireless sensors.

A Qualitative Research on the Structure and Determinants of Personal Device Network in the Ubiquitous Computing Context (유비쿼터스 컴퓨팅 환경에서 PDN의 구조와 결정 요인에 대한 정성적 연구)

  • Jeon Seok-Won;Jang Youn-Sun;Kim Jin-Woo
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.3
    • /
    • pp.1-28
    • /
    • 2006
  • In the ubiquitous computing environments. people usually carry multiple information technology devices with them. Personal device network (PDN) refers to the way how people connect multiple IT devices for their personal as well as professional purposes. Even though it has been Quite popular to construct the PDN in ubiquitous computing context, not much research has been conducted on how people actually connected multiple devices and what influences their methods of connection. In this paper we conducted a content analysis on community bulletin boards of IT devices and a contextual inquiry with expert users of PDN for investigating the configurations with which users connect multiple IT devices. Base on the results of two related studies, we identified three major types of PDN configurations, and key factors that influence the configurations of PDN. We conclude this research with guidelines to design a set of devices for each of the three configuration types.

  • PDF

Multi Event Server Architecture for Hierarchical Event Service under Ubiquitous Network Environment (유비쿼터스 네트웍 환경에서 계층적 이벤트 서비스를 위한 다중 이벤트 서버 아키텍처)

  • 신준헌;박준호;강순주;최준용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4B
    • /
    • pp.424-434
    • /
    • 2004
  • Ubiquitous network consists of various devices using several heterogeneous protocols and requires seamless communication between devices. This paper proposes a new hierarchical event service and multiple event server architecture to implement the service under ubiquitous environment. The proposed event service classifies devices by logical and physical location to abstract the idiosyncrasy of used protocols, and reduces network load. Due to the design consideration, the proposed architecture removes transfer of duplicated event data effectively. As a result, we can guarantee the reliable event delivery. The prototype multiple event server architecture was implemented according to the proposed idea and evaluated its performance under a home network test bed.