• Title/Summary/Keyword: ubiquitous home

Search Result 376, Processing Time 0.037 seconds

A Study on the Development Site Security for Embedded Software (임베디드 소프트웨어 개발현장보안에 관한 연구)

  • Yeo, Sang-Soo;Kim, Tai-Hoon;Cho, Sung-Eon;Kouich, Sakurai
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.259-265
    • /
    • 2007
  • Systematic components for implementing ubiquitous computing, for example, electronic devices, electric home appliances, and controllers, etc, are consist of not only circuits but also softwares expected to do some special system-controlling functions, and these softwares used to be called like as embedded software. Because embedded software is a core component controlling systems, the codes or control flows should be protected from being opened to the public or modified. Embedded software security can be divided into 2 parts: first is the unauthorized access to development site and embedded software, second is the unauthorized disclosure or modification. And this research is related to the first aspect of them.This paper proposes some security check requirements related to embedded software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827. By applying this research, we expect to protect unauthorized modification of embedded software indirectly.

  • PDF

Differentiated QoS Provisioning of WBAN Traffic in WUSB Services based on IEEE 802.15.6 (IEEE 802.15.6 표준 기반 무선 USB 서비스의 차등화된 WBAN 트래픽 QoS 제공 방안)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1087-1095
    • /
    • 2014
  • A recent major development in computer technology is the advent of the wearable computer system that is based on human-centric interface technology trends and ubiquitous computing environments. Wearable computer systems can use the wireless universal serial bus (WUSB) that refers to USB technology that is merged with WiMedia PHY/MAC technical specifications. In this paper, we focus on an integrated system of the wireless USB over the IEEE 802.15.6 wireless body area networks (WBAN) for wireless wearable computer systems supporting U-health services. And a communication structure that can differentiate QoS of U-health WBAN and WUSB traffic with different priorities is proposed for WUSB over IEEE 802.15.6 hierarchical protocol. In our proposal and performance evaluation, throughputs of U-health WBAN and WUSB traffic are analyzed under single and multiple QoS classes to evaluate the effectiveness of proposed QoS differentiating structure in WUSB over IEEE 802.15.6.

A Design of ALE-compliant RFID Middleware System (ALE 기반 RFID 미들웨어 시스템 설계)

  • Hong, Yeon-Mi;Cho, Yoon-Sang;Byun, Ji-Woong;No, Young-Sik;Park, Sang-Yeol;Oh, Sang-Hyun;Byun, Yung-Cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.469-473
    • /
    • 2006
  • Nowadays, to realize ubiquitous computing environment, many research activities have been going on within various kinds of research domains including automatic identification, sensor network, home network, telematics and so on. Especially, RFID middle-ware that supports the aggregation of RFID tag data, control and management, and the integration with legacy systems has recently gained a lot of attention. Meanwhile, EPCglobal defined an ALE(Application Level Events) standard specification, which exists between RFID readers and applications, and substitutes the previous systems called Savant. In the specification internal structures and implementation technologies of ALE are not mentioned and only external interfaces are defined. This approach easies the verification of standard compliance and inter-operability of the layer. In this paper, we present the design of ALE-compliant RFID middle-ware systems that process RFID tag data efficiently.

  • PDF

The User Identification System using the ubiFloor (유비플로어를 이용한 사용자 인증 시스템)

  • Lee Seunghun;Yun Jaeseok;Ryu Jeha;Woo Woontack
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.4
    • /
    • pp.258-267
    • /
    • 2005
  • We propose the ubiFloor system to track and recognize users in ubiquitous computing environments such as ubiHome. Conventional user identification systems require users to carry tag sensors or use camera-based sensors to be very susceptible to environmental noise. Though floor-type systems may relieve these problems, high cost of load cell and DAQ boards makes the systems expensive. We propose the transparent user identification system, ubiFloor, exploiting user's walking pattern to recognize the user with a set of simple ON/OFF switch sensors. The experimental results show that the proposed system can recognize the 10 enrolled users at the correct recognition rate of $90\%$ without users' awareness of the system.

Intelligent Path Guide System using Fuzzy Logic (퍼지 로직을 이용한 지능형 경로 안내 시스템)

  • Choi, Woo-Kyung;Jeon, Hong-Tae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.68-74
    • /
    • 2008
  • The Ubiquitous Society is being attained gradually as it got through the step of super-high speed internet mobile and digital convergence. Now, it is being variously spread to no only the little ordinaries of communication but also fields of economy and industry. Specially, RFID and Navigation are being issued at home and foreign. These are prospected to give assistances that it bring along the competitive power of nation. But inflection range of RFID and Navigation is localized in the most sin lest. This paper proposes system to reflect the individual and special quality using RFID and Navigation and to fit easily changing environment. And we studied to use what kinds of information in the special environment. We used Fuzzy Logie and TSP for making the intelligent navigation system with more information.

An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks (브로커를 통한 모바일 IPv6 네트워크의 효율적인 계층적 인증기법)

  • Jung, Ha-Gwon;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • As quick and secure mobility service is becoming a critical issue in the ubiquitous environment. Internet Engineering Task Force (IETF) has done a lot of meaningful work in order to cope with the critical issues, which is a key technology of guaranteeing the legally and safely using of network resources, they has proposed Hierarchical Mobile IPv6 (HMIPv6) to complement for such problems as handover latency and signaling overhead in existing MIPv6. Most of the current research about HMIPv6 focuses on how to optimize the interactive processes between the HMIPv6 and AAA (Authentication, Authorization, Accounting) protocol. This paper describes a cost-effective hierarchical authentication scheme, which makes its focus on minimizing the authentication latency in AAA processing. In this scheme, a hierarchical AAA architecture is proposed, in which the AAA servers are deployed on the Mobility Anchor Point (MAP), the Root AAA server manages several Leaf AAA servers and the Brokers on behalf of the AAA server in home domain. The simulation results shows that the proposed scheme reduces the handoff and authentication latency evidently compared to the previous traditional authentication combination modeling.

A UPnP A/V Multimedia System using Prediction of Mobility for Mobile User (이동하는 사용자를 위한 이동성 예측을 이용하는 UPnP A/V 멀티미디어 시스템)

  • Kim, Kyung-Deok;Jung, E-Gun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1509-1520
    • /
    • 2009
  • Contrary to ubiquitous environments, indoor computing environments like home network doesn't support user mobility. This paper suggests UPnP A/V multimedia system using prediction of mobility for adaption of seamless multimedia service. The multimedia system enables indoor mobile users to play multimedia contents by transferring the current session to an adjacent device automatically. The system represents users' contextual information by Five Ws and One H model, and predicts user's movements by using contextual information and transitions of locations. The prediction basically includes multiple locations so that it improves accuracy of prediction. We evaluated the suggested system using in accuracy of prediction, time for prediction, handover time for service, and the system showed that adapt ion of seamless multimedia service was enabled by using prediction of mobility on mobile user.

  • PDF

Optimized implementation of HIGHT algorithm for sensor network (센서네트워크에 적용가능한 HIGHT 알고리즘의 최적화 구현 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1510-1516
    • /
    • 2011
  • As emergence of the ubiquitous society, it is possible to access the network for services needed to us in anytime and anywhere. The phenomena has been accelerated by revitalization of the sensor network offering the sensing information and data. Currently, sensor network contributes the convenience for various services such as environment monitoring, health care and home automation. However, sensor network has a weak point compared to traditional network, which is easily exposed to attacker. For this reason, messages communicated over the sensor network, are encrypted with symmetric key and transmitted. A number of symmetric cryptography algorithms have been researched. Among of them HIGHT algorithm in hardware and software implementation are more efficient than tradition AES in terms of speed and chip size. Therefore, it is suitable to resource constrained devices including RFID tag, Sensor node and Smart card. In the paper, we present the optimized software implementation on the ultra-light symmetric cryptography algorithm, HIGHT.

Power Aware Routing Protocol in Multimedia Ad-hoc Network Considering Hop Lifetime of Node

  • Huh, Jun-Ho;Kim, Yoondo;Seo, Kyungryong
    • Journal of Multimedia Information System
    • /
    • v.1 no.2
    • /
    • pp.101-110
    • /
    • 2014
  • The purpose of this research is to extend Ad-hoc network system lifetime with the proposed routing protocol which has considered hop lifetimes of the nodes while guaranteeing QoS in the establishment process of Ad-hoc network communication paths. Based on another power aware routing system that proposed in the advanced research [1], we are proposing an alternative power aware routing system in which nodes' hop lifetimes are compared in order to extend the lifetime of an Ad-hoc network system and delay factors have been considered for the assurance of QoS. The research of the routing protocol in this paper, which aims to maximize the system survival time considering power consumption status during the path searching in MANET and pursues the mechanism that controls hop delays for the same reason, can be applied to the study of WSN. The study concerning such phenomena is essential so that the proposed protocol has been simulated and verified with NS-2 in Linux system focusing on the lifetimes of the hops of the nodes. Commercialization of smart devices and arrival of the ubiquitous age has brought about the world where all the people and things are connected with networks. Since the proposed power aware method and the hop delay control mechanism used to find the adequate communication paths in MANET which mainly uses batteries or in WSN, they can largely contribute to the lifetime extension of the network system by reducing power consumptions when utilized for the communications attempts among soldiers during military operation, disaster areas, temporary events or exhibitions, mobile phone shadow areas, home networks, in-between vehicle communications and sense networks, etc. This paper presents the definitions and some advantages regarding the proposed outing protocol that sustain and extend the lifetime of the networks.

  • PDF

Trust-Based Filtering of False Data in Wireless Sensor Networks (신뢰도 평가를 통한 무선 센서 네트워크에서의 거짓 데이타 제거)

  • Hur, Jun-Beom;Lee, Youn-Ho;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.76-90
    • /
    • 2008
  • Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. In this paper, we propose a novel trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. The proposed scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions. The analysis and simulation results show that our aggregation scheme using trust evaluation is more resilient alternative to median.