• Title/Summary/Keyword: connectivity management

Search Result 399, Processing Time 0.031 seconds

Applying Asymmetric Key Encryption to Secure Internet based SCADA

  • Robles, Rosslin John;Kim, Tai-hoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.4 no.2
    • /
    • pp.17-21
    • /
    • 2012
  • As an acronym for Supervisory Control and Data Acquisition, SCADA is a concept that is used to refer to the management and procurement of data that can be used in developing process management criteria. The use of the term SCADA varies, depending on location. Conventionally, SCADA is connected only in a limited private network. In current times, there are also demands of connecting SCADA through the internet. The internet SCADA facility has brought a lot of advantages in terms of control, data generation and viewing. With these advantages, come the security issues regarding web SCADA. In this paper, we discuss web SCADA and its connectivity along with the issues regarding security and suggests a web SCADA security solution using asymmetric-key encryption.

Things Recommendation Method using Social Relationship in Social Internet of Things (소셜 사물인터넷에서 소셜 관계를 이용한 사물 추천 기법)

  • Kim, Sung Rim;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.49-59
    • /
    • 2014
  • The Internet of Things(IoT) is a new promising technology made from a variety of technology. The IoT links the objects or people, then enabling anytime, anywhere connectivity for anything and not only for anyone. Social networking services have changed the way people communicate. Recently, new research challenges in many areas of Internet of things and social networking services are fired. In this paper, we propose things recommendation method using social relationship in social Internet of Things. We study previous researches about social network service, IoT, and social IoT. We proposed SIoT_FW(Social IoT Friendship Weight) using static and a dynamic social friendship weight. Also, our method considers four social relationships (Ownership Object Relationship, Co-Location Object Relationship, Social Object Relationship, Parental Object Relationship). We presents a music device scenario using our proposed method.

A Layered Network Flow Algorithm for the Tunnel Design Problem in Virtual Private Networks with QoS Guarantee

  • Song, Sang-Hwa;Sung, Chang-Sup
    • Management Science and Financial Engineering
    • /
    • v.12 no.2
    • /
    • pp.37-62
    • /
    • 2006
  • This paper considers the problem of designing logical tunnels in virtual private networks considering QoS guarantee which restricts the number of tunnel hops for each traffic routing. The previous researches focused on the design of logical tunnel itself and Steiner-tree based solution algorithms were proposed. However, we show that for some objective settings it is not sufficient and is necessary to consider both physical and logical connectivity at the same time. Thereupon, the concept of the layered network is applied to the logical tunnel design problem in virtual private networks. The layered network approach considers the design of logical tunnel as well as its physical routing and we propose a modified branch-and-price algorithm which is known to solve layered network design problems effectively. To show the performance of the proposed algorithm, computational experiments have been done and the results show that the proposed algorithm solves the given problem efficiently and effectively.

Point-of-care Testing Device Interface in Hospital Information System Standard Connectivity - Using of case ASTM protocol of ABGA application POCT1-A2 - (현장형 임상검사장비와 병원정보시스템의 접속표준 - ASTM protocol을 사용하는 ABGA의 POCT1-A2적용사례 중심으로 -)

  • Kim, Seon-Chil
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.2
    • /
    • pp.33-37
    • /
    • 2008
  • To keep the online medical records available to anyone without constraint of time and space, introducing EMR (Electronic medical record), which is a clinical support management system. The purpose of this study is to develop interface standard of clinical test device. Integration and sharing of medical information is faced with enormous obstacles because medical organizations and associated companies are separately developing the interface. I hope that multi-function management system with workstation concept is operated to efficiently transmit clinical device result data based on this study. Transfer of precise medical result data available for decision making will improve quality of health care service.

  • PDF

Analysis of Worldwide Review on Cloud Computing (클라우드 컴퓨팅에 대한 국내외 동향 분석)

  • Leem, Young-Moon;Hwang, Young-Seob
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2009.11a
    • /
    • pp.411-415
    • /
    • 2009
  • There are some definitions of cloud computing but it can be defined as utilization of personal computers, servers and softwares in one cluster for approaches to the use of shared computing resources. Nowadays the applications of cloud computing are rapidly increasing because of its merits on economic aspect, connectivity convenience, storage space and so on. The main objective of this paper is to find an effective methodology as an initial stage for applications of cloud computing in a real life. Therefore this paper addresses worldwide reviews on cloud computing.

  • PDF

A Reliable Transport Supporting Method for a DTMNs (DTMNs를 위한 신뢰성 있는 데이터 전송 지원 방법)

  • Seo, Doo Ok;Lee, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.151-160
    • /
    • 2009
  • While portable and wireless devices are pouring, a new network technology is needed as a breakthrough. The new network technology features large delays, intermittent connectivity, and absence of an end-to-end path from sources to destinations. A network which has one of those characteristics is called DTNs(Delay Tolerant Networks). The main 4 routing methods have been researched so far in extream environment. In this paper, we look into the reliability of DTMNs(Delay Tolerant Mobile Networks) in several different situations, and propose an algorithm that selects a positive routine by sending the only information of its position when making a connection to a detected node. We simulate the proposed algorithm here in DTN using ONE simulator. As a result, it shows that the algorithm reduces the number of message transmission each node.

A Study on the Influence of R&D Organizational Culture to Organizational Commitment and Organizational Citizenship Behavior In Small and Medium Enterprises. (중소기업의 R&D조직문화가 조직몰입과 조직시민행동에 미치는 영향에 관한 연구)

  • Lee, Sun-Kyu;Lee, Da-Jung;Lee, Sang-Rok;Jung, Jae-Kyu
    • Journal of Digital Convergence
    • /
    • v.7 no.4
    • /
    • pp.101-115
    • /
    • 2009
  • This paper aims to examine the impact of R&D organization culture(diversity, autonomy, redundancy and connectivity) to Organizational Commitment and Organizational Citizenship Behavior in Information Technology Companys. Hypotheses were tested by surveying 250 employees at R&D Gumi Industrial Complex. The findings of research are as follows : First, three factors of R&D organizational culture had a significant positive effect on the organizational commitment except redundancy. Second, two factors of organizational culture in R&D organizational culture had a significant positive effect on the organizational citizenship behavior except autonomy and redundancy. it is shown reliable criterion to effective organizational management in small and medium enterprises.

  • PDF

A Study on Factors Affecting Social Network Service e-Service Quality (소셜네트워크서비스(SNS) 만족에 미치는 서비스 품질요인에 관한 연구)

  • Kim, Duk-Hee
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.225-233
    • /
    • 2011
  • To determine factors affecting social network service e-service quality, this research is to investigate factors of social network service e-service quality, and analyze how these factors influencing on social network service e-service satisfactions. As a results, three dimensions were identified namely, fulfillment, ease of use and playfulness. But two dimensions were rejected namely connectivity, security. It indicates that the qualitative aspect is becoming more important than quantitative in social network service management.

Smart Power Management Using RTOS-based Uninterruptable Generator Supply

  • Lee, Chulju;Kang, Kyungtae;Noh, Dong Kun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.1-7
    • /
    • 2016
  • An uninterruptible power supply (UPS) allows small companies and domestic users to cope with power outages; but existing designs lack flexibility of control and require expensive battery maintenance, with a cost proportional to the outage compensation time. We combine a compact synchronous generator with a battery, with 10% of the capacity that would otherwise be required, to obtain a UPS with reduced maintenance costs for the same performance. Any UPS must respond immediately to a power loss, and our uninterruptible generator supply (UGS) is therefore built around real-time scheduling of its internal operations; this also makes it suitable for integration into the industrial gateway. The UGS is based on a real-time operating system, with an integrated wireless module providing connectivity to a web server, for monitoring and management, which can be performed remotely on a mobile device.

A Design for a Zigbee Security System in the Customer Side Environment of Jeju Smart Grid Field Test (제주 스마트그리드 실증단지 수용가 환경에서 Zigbee 보안 체계 설계)

  • Lee, Myung-Hoon;Son, Sung-Yong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.8
    • /
    • pp.1186-1192
    • /
    • 2012
  • In Jeju Smart Grid field test, Zigbee technology is being used as one of customer side solutions for AMI. Although Zigbee networks that provides effective connectivity and control among devices are advantages in ease of implementation and use, the data can be exposed to cyber attacks such as eavesdrop, unauthorized data dissemination and forgery. Currently authentication and confidentiality services are provided with the network and link keys generated based on public key pairs that are pre-installed in offline. However, the network is vulnerable once a hacker intrudes into a local network because operation and management policies for the generated keys are not well-established yet. In this paper, the vulnerability of the Zigbee security system in the customer side environment of Jeju Smart Grid field test is analyzed. Then, two-way authentication with the unique identifiers of devices and user-specific group management policies are proposed to resolve the vulnerability.