• Title/Summary/Keyword: Ubiquitous Protect

Search Result 81, Processing Time 0.025 seconds

Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States (유비쿼터스 서비스 상태지속을 지원하는 안전한 Jini 서비스 구조)

  • Kim, Sung-Ki;Jung, Jin-Chul;Park, Kyung-No;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.157-166
    • /
    • 2008
  • The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.

A study of ubiquitous-RTLS system for worker safety (작업자 안전관리를 위한 유비쿼터스-실시간 위치추적시스템 연구)

  • Kim, Young-Baig
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.1-7
    • /
    • 2012
  • At the industrial work site, the manufacturing process is being automated to improve work efficiency. However, it is often difficult to automate the entire manufacturing process, and there are spaces in which workers there are constantly exposed to danger. To protect such workers from the danger, this paper studied a worker safety management system for the industrial work site which uses a location recognition system and which is based on the Ubiquitous-Wireless Sensor Network (U-WSN). Using wireless signals, the distance between two devices can be measured and the location of a worker can be calculated using triangularization in 3-D. But at the industrial work sites where there are a lot of steel and structures, errors occur due to signal reflection and multi-path, etc., which makes it difficult to get the accurate location. To address this problem the following was done: first, a circular polarization patch antenna appropriate to the work site was used to reduce the degree of error that may occur from the antenna emission pattern and the particular Line of Sight (LOS); second, a 3-D localization technique and a filtering algorithm were used to improve the accuracy of location determination. The developed system was tested by using it on a wharf crane to validate its accuracy and effectiveness. The proposed location recognition system is expected to contribute greatly in ensuring the safety of workers at industrial work sites.

RFID Information Protection using Biometric Information (생체정보를 이용한 RFID 정보보호)

  • Ahn, Hyo-Chang;Rhee, Sang-Burm
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.545-554
    • /
    • 2006
  • RFID could be applied in the various fields such as distribution beside, circulation, traffic and environment on information communication outside. So this can speak as point of ubiquitous computing's next generation technology. However, it is discussed problem of RFID security recently, so we must prepare thoroughly about RFID security for secure information. In this paper, we proposed a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. Our method which is improved linear discriminant analysis has reduced dimension of feature information which has large size of data. Therefore, we can sore face feature information in small memory field of RFID tag. Our propose d algorithm has shown 92% recognition rate in experimental results and can be applied to entrance control management system, digital identification card and others.

  • PDF

A Study on MD5 Security Routing based on MANET (MANET 기반 MD5 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.797-803
    • /
    • 2012
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

Landslide prediction system by wireless sensor network (무선센서 네트워크를 이용한 산사태 모니터링 기초기술 연구)

  • Kim, Hyung-Woo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.191-195
    • /
    • 2007
  • Recently, landslides frequently happen at a natural slope during period of intensive rainfall. With rapidly increasing population of steep terrain in Korea, landslides have become one of the most significant natural hazards. Thus, it is necessary to protect people from landslides and to minimize the damage of houses, roads and other facilities. To accomplish this goal, many landslide prediction methods have been developed in the world. In this study, a simple landslide prediction system that enables people to escape the endangered area is developed. The system is focused to debris flows which happen frequently during periods of intensive rainfall at steep slopes in Kangwondo. This system is based on the wireless sensor network that is composed of sensor nodes, gateway, and server system. Sensor nodes that are composed of sensing part and communication part are newly developed to detect sensitive ground movement. Sensing part is designed to measure tilt angle and acceleration accurately, and communication part is deployed with Bluetooth (IEEE 802.15. I) module to transmit the data to the gateway. To verify the feasibility of this landslide prediction system, a series of laboratory tests is performed at a small-scale earth slope supplying rainfall by artificial rainfall dropping device. It is found that sensing nodes installed at slope can detect the ground motion when the slope failure starts. It is expected that the landslide prediction system by wireless senor network can provide early warnings when landslides such as debris flow occurs, and can be applied to ubiquitous computing city (U-City) that is characterized by disaster free.

  • PDF

A License Audit Model for Secure DRM System in Home Network Environment (홈네트워크 환경에서의 안전한 DRM 시스템을 위한 라이센스 감사 모델)

  • Jang, Ui-Jin;Jung, Byung-Ok;Yeo, Sang-Soo;Shin, Yong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.438-447
    • /
    • 2009
  • Digital home devices aims at providing the multimedia service which is not limited at time and space in home network environment. However, it is incapable of the fair use of consumers who legally buys contents, and causes damage to the contents providers owing to the indiscriminate distribution and use of illegal contents. DRM system appeared to solve this problem cannot protect the license stored on digital home devices and manage license by redistribution. This paper proposes a license audit model which makes an inspection of illegal access, modification and redistribution and reports alert logs to server.

  • PDF

The Study of Models for Multimeia Digital rights Managements in Home Network (홈네트워크 환경에서의 멀티미디어 디지털 컨텐트 권한 관리 모델에 관한 연구)

  • Jung, Jong-Jin;Kim, Yun-Sang;Lim, Tae-Bum;Lee, Suk-Pil
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.518-520
    • /
    • 2006
  • Due to the rapid popularization of mobile multimedia devices and the Internet as well as the realization of high-speed data transmission and large-volume data recording media, high quality content distribution and ubiquitous information services are making progress and a new type of information distribution and network sharing service has gradually emerged into the market. It is capable of utilizing terabyte sized home servers also in private homes. Under these circumstances, in distribution of content over shared networks, it is crucial to establish DRM (Digital Rights Management) technologies to protect the content from illegal copying and usage. A truly successful DRM system must be built on open worldwide specifications and provide maximum interoperability and user acceptance. An open interoperability of DRM is able to construct highly expandable PKI based DRM, targeting usage between systems, considering the expansion of recent content distribution services and clients This document gives protocol specifications for the exchange of rights information between the DRM module, description of specifications for rights information and encrypted content formats.

  • PDF

A Monitoring System for Telecommunication Tower Using Wireless Sensor Network (무선 센서 네트워크를 이용한 통신 철탑 모니터링 시스템에 관한 연구)

  • Roh, Sang Bong;Park, Sang Kyu
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.2
    • /
    • pp.136-143
    • /
    • 2013
  • In this paper, a monitoring system for telecommunication tower using wireless sensor network is presented. Although safety inspection could be judged by eyesight and calculating original design from now, not only this system can protect perils, estimating data exactly, but also it is effective to management. It is also economic because the system costs cheaper expenses for telecommunication tower of setting it once than for the tower of inspecting its safety regularly. This paper proves that the structure can be managed scientifically and efficiently, and the system contributes not only stabilized telecommunication services for users but reducing damages.

Characterization of a novel methionine sulfoxide reductase A from tomato (Solanum lycopersicum), and its protecting role in Escherichia coli

  • Dai, Changbo;Singh, Naresh Kumar;Park, Myung-Ho
    • BMB Reports
    • /
    • v.44 no.12
    • /
    • pp.805-810
    • /
    • 2011
  • Methionine sulfoxide reductase A (MSRA) is a ubiquitous enzyme that has been demonstrated to reduce the S enantiomer of methionine sulfoxide (MetSO) to methionine (Met) and can protect cells against oxidative damage. In this study, we isolated a novel MSRA (SlMSRA2) from Micro-Tom (Solanum lycopersicum L. cv. Micro-Tom) and characterized it by subcloning the coding sequence into a pET expression system. Purified recombinant protein was assayed by HPLC after expression and refolding. This analysis revealed the absolute specificity for methionine-S-sulfoxide and the enzyme was able to convert both free and protein-bound MetSO to Met in the presence of DTT. In addition, the optimal pH, appropriate temperature, and $K_m$ and $K_{cat}$ values for MSRA2 were observed as 8.5, $25^{\circ}C$, $352{\pm}25\;{\mu}M$, and $0.066{\pm}0.009\;S^{-1}$, respectively. Disk inhibition and growth rate assays indicated that SlMSRA2 may play an essential function in protecting E. coli against oxidative damage.

Environmental Source of Arsenic Exposure

  • Chung, Jin-Yong;Yu, Seung-Do;Hong, Young-Seoub
    • Journal of Preventive Medicine and Public Health
    • /
    • v.47 no.5
    • /
    • pp.253-257
    • /
    • 2014
  • Arsenic is a ubiquitous, naturally occurring metalloid that may be a significant risk factor for cancer after exposure to contaminated drinking water, cigarettes, foods, industry, occupational environment, and air. Among the various routes of arsenic exposure, drinking water is the largest source of arsenic poisoning worldwide. Arsenic exposure from ingested foods usually comes from food crops grown in arsenic-contaminated soil and/or irrigated with arsenic-contaminated water. According to a recent World Health Organization report, arsenic from contaminated water can be quickly and easily absorbed and depending on its metabolic form, may adversely affect human health. Recently, the US Food and Drug Administration regulations for metals found in cosmetics to protect consumers against contaminations deemed deleterious to health; some cosmetics were found to contain a variety of chemicals including heavy metals, which are sometimes used as preservatives. Moreover, developing countries tend to have a growing number of industrial factories that unfortunately, harm the environment, especially in cities where industrial and vehicle emissions, as well as household activities, cause serious air pollution. Air is also an important source of arsenic exposure in areas with industrial activity. The presence of arsenic in airborne particulate matter is considered a risk for certain diseases. Taken together, various potential pathways of arsenic exposure seem to affect humans adversely, and future efforts to reduce arsenic exposure caused by environmental factors should be made.