• Title/Summary/Keyword: Ubiquitous network

Search Result 1,670, Processing Time 0.021 seconds

Developing Trend of an Ubiquitous Interface Technologies (유비쿼터스 인터페이스 기술의 개발 동향)

  • Lee, Hyeon-Jae;O, Chang-Heon
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.299-311
    • /
    • 2005
  • This article introduces developing trends of an "Ubiquitous Interface" as an access method for use of various network resources, such as public wireless networks and un-licensed wireless networks in ubiquitous sensor network environments, without troublesome settings or operations by users. "Ubiquitous Interface" is include a relatively wide sense meaning not only physical interface of specified device or between processors, but anything method for access USN. These "Ubiquitous Interface" able to provide seamless services that adapt autonomously to the user's movements and changes in the state of wireless resources. Recently, strongly recommended candidates are RFID, NFC, Multi-mode mobile terminal, Wearable computer and OSGi for integrated digital home networking system as a future ubiquitous interface. These candidates are have to have flexibility and multiple physical communication channel for seamless service hand over and serve easy connection at huge USN to user. And, must have flexible software structure and multi-functional middleware. Consequently, for more enhance performance of an ubiquitous interface and developing, need more structured and integrated future plan.

  • PDF

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

Ubiquitous Computing & Network Security Analysis (유비쿼터스 컴퓨팅 & 트워크 보안분석)

  • 정상일;송원덕;이원찬;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.35-42
    • /
    • 2004
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this situation we must analytics that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.struction.

  • PDF

Response and Threat of Home Network System in Ubiquitous Environment (유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안)

  • Oh, Dae-Gyun;Jeong, Jin-Young
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2005
  • Recently The social interest regarding is coming to be high about Home Network accordong to intelligence anger of diffusions and the family home appliance machineries and tools of the superhigh speed Internet In the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases in the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases Beacaues of Home network is starting point to go ubiquitous computing enviorment, The Increase of Cyber attack through Internet will raise its head with the obstacle to disrupt the activation of the groove network. So there is a possibility of saying that the counter-measure preparation is urgent, In the various environment like this, It means the threat which present time than is complicated will exist. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment.

  • PDF

Factors Affecting User Acceptance of Ubiquitous Computing based on Mobile Services (모바일 서비스에 기반한 유비쿼터스 컴퓨팅의 사용자 수용에 영향을 미치는 요인)

  • No, Mi-Jin;Kim, Byung-Gon;Park, Soon-Chang
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.55-74
    • /
    • 2011
  • The growth in the use of ubiquitous computing based on mobile services as an enabler to conduct business more effectively has been phenomenal. Technology acceptance model (TAM) has been applied in different contexts to examine a wide range of information technologies (IT). As more and more companies are finding ways to utilize ubiquitous computing based on mobile services, an important issue is to understand what factors will impact the decisions of consumers in adopting the services. Based on TAM with three additional groups of external factors, i.e., service-related factors (ubiquitous access, context awareness) and technology-related factors (perceived security risk, network connectivity) that are theoretically justified as having influence on both perceived usefulness and perceived ease of use which are additionally considered, a research model for the investigated technology acceptance was developed and empirically examined, using responses from more than intended users of ubiquitous computing based on mobile services. The specific purposes of this study are as follows. Firstly, this study is to identify service beliefs considering unique characteristics for ubiquitous services such as perceived ubiquitous access and perceived context awareness. Secondly, this study is to investigate network characteristics beliefs such as perceived security and perceived connectivity. Thirdly, this paper investigates the relationship among variables such as ubiquitous characteristics, network characteristics, behavioral beliefs, and intention to use ubiquitous web services. This study uses a structural equation model to test the research model. The major results of this study are as follows. Firstly, ubiquitous access has a influence on perceived usefulness and perceived ease of use. Context awareness has an influence on perceived usefulness. Secondly, User familiarity has an influence on perceived usefulness and perceived ease of use, and intention to use. User innovativeness has an influence on perceived ease of use. Thirdly, perceived security risk has an influence on perceived usefulness and perceived ease of use. Network connectivity has an influence on perceived usefulness and perceived ease of use. Fourth, there exist differential effects among factors in structural model among information, transaction, and entertainment services.

A Fundamental Study on the Planning of Classroom Space in the Ubiquitous Environments (유비쿼터스 환경의 교실 공간 계획에 관한 기초적 연구)

  • Cho, Hyun-Ho;Lee, Jae-Hoon
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.14 no.4
    • /
    • pp.4-13
    • /
    • 2007
  • In 21st century, mankind greets an era of ubiquitous computing where physical and virtual space are merged through the innovation of digital and IT(Information Technology), meanwhile ubiquitous computing and network paradigm suggest a new direction which our future educational system should head for. A society where people, computers, and objects can be connected with each other anytime and anywhere, that is, a society of ubiquitous computing where everything in our living space are interconnected by a immense network system may bring a variety of changes into our educational environment in schools. In this study I analysed the forecast of school educational orientation and ubiquitous educational environment and facilities in developed countries, and on the basis of the result, I performed a fundamental work for formation of a ubiquitous classroom environment which is feasible in Korea. In the section of conclusion, I present a model of ubiquitous classroom as a scenario based on ubiquitous computing technology applicable to future classroom environment.

Development of a LonRF Intelligent Device-based Ubiquitous Home Network Testbed (LonRF 지능형 디바이스 기반의 유비쿼터스 홈네트워크 테스트베드 개발)

  • 이병복;박애순;김대식;노광현
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.6
    • /
    • pp.566-573
    • /
    • 2004
  • This paper describes the ubiquitous home network (uHome-net) testbed and LonRF intelligent devices based on LonWorks technology. These devices consist of Neuron Chip, RF transceiver, sensor, and other peripheral components. Using LonRF devices, a home control network can be simplified and most devices can be operated on LonWorks control network. Also, Indoor Positioning System (IPS) that can serve various location based services was implemented in uHome-net. Smart Badge of IPS, that is a special LonRF device, can measure the 3D location of objects in the indoor environment. In the uHome-net testbed, remote control service, cooking help service, wireless remote metering service, baby monitoring service and security & fire prevention service were realized. This research shows the vision of the ubiquitous home network that will be emerged in the near future.

Current Developments of Biomedical Mobile Devices for Ubiquitous Healthcare (u-Healthcare를 위한 바이오 단말기의 개발 현황)

  • Lee, Tae-Soo;Hong, Joo-Hyun
    • Journal of Biomedical Engineering Research
    • /
    • v.30 no.3
    • /
    • pp.185-190
    • /
    • 2009
  • Biomedical mobile devices for ubiquitous healthcare consist of biomedical sensors and communication terminal. They have two types of configuration. One is the sensor-network type device using wired or wireless communication with intelligent sensors to acquire biomedical data. The other is the sensor embedded type device, where the data can be acquired directly by itself. There are many examples of sensor network type, such as, fall detection sensor, blood glucose sensor, and ECG sensors networked with commercial PDA phone and commercial phone terminal for ubiquitous healthcare. On the other hand, sensor embedded type mounts blood glucose sensor, accelerometer, and etc. on commercial phone. However, to enable true ubiquitous healthcare, motion sensing is essential, because users go around anywhere and their signals should be measured and monitored, when they are affected by the motion. Therefore, in this paper, two biomedical mobile devices with motion monitoring function were addressed. One is sensor-network type with motion monitoring function, which uses Zigbee communication to measure the ECG, PPG and acceleration. The other is sensor-embedded type with motion monitoring function, which also can measure the data and uses the built-in cellular phone network modem for remote connection. These devices are expected to be useful for ubiquitous healthcare in coming aged society in Korea.

Information Protection against The Hacker's Attack of Ubiquitous Home Networks (해커의 유비쿼터스 홈 네트워크 공격에 대한 정보보호 기술)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.145-154
    • /
    • 2007
  • Analyzed about a matter and requirements to intimidate security of ubiquitous and home network threatening various security for personal information protection in ubiquitous home networks at this paper, and studied. Got authentication procedures and verification procedures acid user approach to be reasonable through designs to the home security gateway which strengthened a security function in the outsides, and strengthened protection of a home network. Also, execute a DoS. DDoS, IP Spoofing attack protective at home network security gateways proved, and security regarding against the Hacker's attack was performed, and confirmed. Strengthen appliances and security regarding a user, and confirm a defense regarding an external attack and present a home network security model of this paper to the plans that can strengthen personal information protection in ubiquitous home networks in ubiquitous home networks through experiment.

  • PDF

Information Security Policy in Ubiquitous-Ecological City (u-Eco City에서의 정보보호 정책)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.43-48
    • /
    • 2012
  • In this paper, the requirements for information security are presented in the ubiquitous ecological(u-Eco) city. The various definition of ubiquitous city is analyzed first, the concept of the u-Eco City, services and major projects are then presented. The framework of the integrated operating center for u-Eco city is proposed, the privacy, data security and network facility protection in the center are analyzed. Unlike to previously proposed security algorithms, the light-weight encoding algorithms(such as block/stream encoding, pseudo-random generator, hash function, and public key encoding) in the u-Eco city center are required to communicate the information in the ubiquitous sensor network. Furthermore, the principal policies guaranteeing the secrecy and authentication for the private information are also presented.