• Title/Summary/Keyword: home device

Search Result 665, Processing Time 0.027 seconds

Home Network Security Description Language

  • Kim Geon-Woo;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.741-744
    • /
    • 2006
  • There are a lot of on-going researches on various security technologies for guaranteeing the safety of home network systems. Until now, a few security technologies such as device authentication mechanism, user authentication mechanism, access control mechanism and firewall are generally deployed, and they are just simple. However, we need some representation skills in order to efficiently define the home network and describe the security for managing and performing these security mechanisms. So, in this paper, we define the xHDL language to define and describe the security components of home network and analyze the semantics of each components.

  • PDF

A Study on Security Requirments Analysis through Security Threat Modeling of Home IoT Appliance (Home IoT 가전의 보안위협모델링을 통한 보안요구사항 분석에 관한 연구)

  • Yun, Suk-Jin;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • Today many companies are offering IoT-enabled products and place emphasis on security from the planning stage to protect their products and user information from external threats. The present security levels, however, remain low because the time and resources invested in developing security requirements for each device are far from enough to meet the needs of a wide range of IoT products. Nevertheless, vulnerabilities of IoT devices have been reported continuously, which calls for more detailed security requirements for home IoT devices. In this context, this research identified threats of home IoT systems by using Microsoft Threat Modeling Tool. It then suggested measures to enhance the security of home IoT devices by developing security assessment items through comparative analysis of the identified threats, domestic and global vulnerability assessment standards and related research. It also verified the effectiveness of the developed security requirements by testing them against the existing ones, and the results revealed the security requirements developed in this research proved to be more effective in identifying vulnerabilities.

Control System of a Remote Robot using PDA (PDA를 이용한 원격 로봇 제어 시스템)

  • Han, Jong-Hye;Lee, Kee-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.206-208
    • /
    • 2004
  • A new method to control a remote robot with PDA and wireless network is presented. The needs of remote control systems using a home network environments are increased in these days. To solve the shortage of IP address in network, authorized TCP/IP and unauthorized TCP/IP address are used. The unauthorized TCP/IP is obtained by using MAC Address in the system and Network Layer. The model in the system is similar to Sever&Client in structure. Using this system, it is very easy to combine one network device with other network system. A robot system and PDA are used to show the effectiveness of the control system in home network environments.

  • PDF

Implementation of an Integrated Messaging Gateway Based on OSGi

  • Kang, Kyu-Chang;Kang, Dong-Oh;Lee, Hyung-Jik
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.296-299
    • /
    • 2003
  • This paper presents the implementation of an integrated messaging gateway (IMG) based on the open services gateway initiative (OSGi) specification to deliver home messages between home and some telecommunication devices. The IMG has four service agents to support a diverse communication channel. In this paper, we describe a software architecture for a seamless messaging and device layouts in the IMG. And then, we detail each components allowing users to be notified automatically through a cellular phone, a telephone, and the Internet.

  • PDF

Comparative Study on the Facilities for the Elderle Care (노인케어시설의 정책개발을 위한 국제비교연구)

  • 김기훈
    • Health Policy and Management
    • /
    • v.8 no.1
    • /
    • pp.203-230
    • /
    • 1998
  • This purposes of this study is to develope policies on the facilities for the elderly care in Korea. Methodology of this study adopts comparative analysis on the facilities for the elderly care in 6 countries which have experienced various problems on the elderly. These 6 countries are Japan, Sweden, America, Australian, England and Germany. Major issues for comparative analysis are the standard of care facilities, residence condition, finance of facilities establishment and expense, operating system, management, and the law and administrative structure about the facilities for the elderly care. The elderly people need various kinds of welfare services such as medical care facilities, nursing home facilities, home care facilities etc.. Thus the public policies for the aging population nations are compose of income maintenance program, health and medical care services and social welfare services. The policies of facilities for elderly care are very important since these policies include the characteristics of income maintenance, me\ulcorner미 care program and welfare program. This study willsupply basic data for the development of facilities for the elderly care in Korea, especially conceming the system and institutional device of the facilities.

  • PDF

Relative Measurement of Differential Electrode Impedance for Home Healthcare Device (Home Healthcare 장치를 위한 차동 전극 임피던스의 상대적인 측정)

  • Woo, Y.J.;Yoo, S.K.
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.469-470
    • /
    • 2007
  • In this paper, we propose a simple and relative electrode contact monitoring method. By exploiting the power line interference, which is regarded as one of the worst noise sources for bio-potential measurement, the relative difference in electrode impedance can be measured without a current or voltage source. Substantial benefits, including no extra circuit components, no degradation of the body potential driving circuit, and no electrical safety problem, can be achieved using this method. Furthermore, this method can be applied to multi-channel isolated bio-potential measurement systems and home health care devices under a steady measuring environment.

  • PDF

A Study on Smart Household Housing Module - Focused on the Application of smart technology - (지능형 주거 공간 모듈화에 관한 연구 - 스마트 기술 적용을 중심으로 -)

  • Moon, Min-Ho;Jung, Chul-Oh;Kim, Yong-Seong
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2005.05a
    • /
    • pp.98-101
    • /
    • 2005
  • The study applied to a smart technology for every filed in the various countries of world is actively progressing. In the field of construction, a home-network market based on the smart technology is getting to occupy a position as a social issue. and lots of construction companies are taking part in the home-network market to take possession of a market and is investing for a marketing and a technical study in abundance. as a result, the concern for Household Housing of a future and for how to apply the material technology is getting increase. In this study, it has a understanding of such a necessity and suggests the research of the room-space Module to apply the smart technology and a prototype of a house as a building device. and it predicts not only the development of the technology but also about how to change the home-space that we live.

  • PDF

Design of WLAN-based A/V System for Multimedia Home Networks (멀티미디어 홈 네트워크 실현을 위한 WLAN 기반의 A/V 전송용 변복조 모뎀 설계)

  • Lee, Youn-Sung;Kim, Hyun-Sik;Wee, Jung-Wook;Paik, Jong-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.327-330
    • /
    • 2008
  • This paper shows an implementation of WLAN-based Audio/Video(A/V) system for multimedia home networks. Proposed WLAN-based A/V system can transmit multimedia data of high quality. The entire system consists of a 16-bit RISC controller, a program ROM, a SRAM, timers, an interrupt controller, a DART, GPIOs, an I2C and the OFDM modem supporting for the IEEE 802.11g standard. The simple MAC functions are implemented by firmware on an embedded 16-bit RISC controller. The OFDM modem supports a complete set of data rates up to 54Mbps. Proposed the system is implemented by an Altera FPGA EP1S60F1020C6 device, a 10-bit 2-ch DAC, a 10-bit 2-ch ADC and RF/IF chips.

  • PDF

Development of Obesity Management Application Based on Android -Focused on BMI and Calculate Momentum- (안드로이드 기반 비만 관리 애플리케이션 개발 - BMI 및 운동량 산출을 중심으로 -)

  • Hyun, Dong-Lim;Song, Kyung-Chul;Kim, Eun-Gil;Kim, Jong-Hoon
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.23 no.4
    • /
    • pp.568-581
    • /
    • 2011
  • This thesis is the study about application development for management obesity and personal health matters systematically based on Android smart phone system. Growing obesity problem for students organized by the lack of a device or program to manage at home has been favored as a serious problem. Currently developed smart phones has come into wide use by portable features and many applications. And to support populations of these features smart phones will be available for obesity management in your home without any equipment using. Accordingly, this paper is the study about application development for management obesity for growing students at home based on the latest smart phone platform Android.

Device Authentication System in IoT environment (IoT 환경의 단말 인증 시스템)

  • Dong-Yeon, Kang;Ji-Soo, Jeon;Sung-Hwa, Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.97-102
    • /
    • 2023
  • IoT is being used in a lot of industry domain such as smart home, smart ocean, smart energy, and smart farm, as well as legacy information services. For a server, an IoT device using the same protocol is a trusted object. Therefore, a malicious attacker can use an unauthorized IoT device to access IoT-based information services and access unauthorized important information, and then modify or extract it to the outside. In this study, to improve these problems, we propose an IoT device authentication system used in IoT-based information service. The IoT device authentication system proposed in this study applies identifier-based authentication such as MAC address. If the IoT device authentication function proposed in this study is used, only the authenticated IoT device can access the server. Since this study applies a method of terminating the session of an unauthorized IoT device, additional research on the access deny method, which is a more secure authentication method, is needed.