• Title/Summary/Keyword: ubiquitous home network

Search Result 215, Processing Time 0.029 seconds

Metamorphosis Hierarchical Motion Vector Estimation Algorithm for Multidimensional Image System (다차원 영상 시스템을 위한 변형계층 모션벡터 추정알고리즘)

  • Kim Jeong-Woong;Yang Hae-Sool
    • The KIPS Transactions:PartB
    • /
    • v.13B no.2 s.105
    • /
    • pp.105-114
    • /
    • 2006
  • In ubiquitous environment where various kinds of computers are embedded in persons, objects and environment and they are interconnected and can be used in my place as necessary, different types of data need to be exchanged between heterogeneous machines through home network. In the environment, the efficient processing, transmission and monitoring of image data are essential technologies. We need to make research not only on traditional image processing such as spatial and visual resolution, color expression and methods of measuring image quality but also on transmission rate on home network that has a limited bandwidth. The present study proposes a new motion vector estimation algorithm for transmitting, processing and controlling image data, which is the core part of contents in home network situation and, using algorithm, implements a real time monitoring system of multi dimensional images transmitted from multiple cameras. Image data of stereo cameras to be transmitted in different environment in angle, distance, etc. are preprocessed through reduction, magnification, shift or correction, and compressed and sent using the proposed metamorphosis hierarchical motion vector estimation algorithm for the correction of motion. The proposed algorithm adopts advantages and complements disadvantages of existing motion vector estimation algorithms such as whole range search, three stage search and hierarchical search, and estimates efficiently the motion of images with high variation of brightness using an atypical small size macro block. The proposed metamorphosis hierarchical motion vector estimation algorithm and implemented image systems can be utilized in various ways in ubiquitous environment.

ZigBee End-to-End Security For Ubiquitous Home Network (유비쿼터스 홈 네트워크에서의 ZigBee End-to-End 보안 기술)

  • Park, W.C.;Lee, M.S.;Yoon, M.H.;Kim, S.D.;Yang, S.H.
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.128-136
    • /
    • 2007
  • 무선 기술이 가지는 장점인 설치의 편리성, 기동성으로 인하여, ZigBee를 이용한 홈 네트워크 서비스 활용성에 대한 기술개발이 활발히 진행되고 있다. 이러한 유비쿼터스 홈 서비스의 활용성에도 불구하고 ZigBee 기반 홈 기기나 센서 정보의 도청, 비정상적인 패킷의 유통, 메시지 재사용등의 데이터 위/변조 문제와 네트워크 전체를 마비시킬 수 있는 서비스 거부 공격등에 쉽게 노출되어 있다. 본 논문에서는 이에 대한 효과적인 대응과 관리 처리를 위하여, 유비쿼터스 홈 네트워크에서의 ZigBee 기술을 사용할 시에 발생할 수 있는 보안 문제점을 해결하기 위한 ZigBee 기반 End-to-End 보안 기술을 개발하였다. 본 기술 개발의 특징은 ZigBee Device, 코디네이터/게이트웨이 영역은 ZigBee 표준 스펙을 구현하였으며, 응용어플리케이션/서버 영역은 표준 스펙이 정의 되어 있지 않으나, 이 부분을 유비쿼터스 홈 네트워크 서비스 관점에서 설계 및 구현하였다. ZigBee 디바이스가 가지는 하드웨어 자원의 빈약성을 고려하여 최대한 보안 기능을 리소스가 풍부한 응용어플리케이션/서버의 자원 활용에 촛점을 맞췄다.

  • PDF

A Study on the Ubiquitous Home Network Interface System by Application of User's Gesture Recognition Method (사용자 제스처 인식을 활용한 유비쿼터스 홈 네트워크 인터페이스 체계에 대한 연구)

  • Park In-Chan;Kim Sun-Chul
    • Science of Emotion and Sensibility
    • /
    • v.8 no.3
    • /
    • pp.265-276
    • /
    • 2005
  • 현재의 유비쿼터스 환경의 홈 네트워크 제품 사용자는 단일 사용자가 아닌 다수의 사용자가 사용하는 네트워크 행태를 취하고 있다. 변화하는 사용환경과 시스템들은 현재와는 다른 요구사항을 가지고 있으며, 이에 따른 사용자 중심의 디자인과 제품 인터페이스 체계의 연구활동은 국내외에서 활발하게 이루어지고 있다. 다양한 모바일 디바이스 및 홈 네트워크 제품의 보급화가 빠르게 성장하면서 이를 쉽게 제어하기 위한 다양한 제어방식이 연구되고 있다. 이중 음성인식기술을 비롯한 표정은 안면표정인식기술의 개발이 활발히 진행되고 있다. 모션감지 센서를 활용한 사용자 제스처 콘트롤 체계는 아직까지는 초보적인 단계에 있으나, 제품 제어에 있어서 향후 근미래에는 자연스러운 인터랙티브 인터페이스의 활용도가 높아질 전망이다. 이에 본 연구에서는 효과적인 디바이스 제어를 위한 제스처 유형의 자연스러운 사용언어체계 개발 방법 및 결과 그리고 사용자 맨탈모델와 메타포 실험을 통한 연구내용을 정리하였다. 기존 사용자의 제스처 유형의 자연스러운 사용언어를 분석하면서 디바이스 제어방식으로서 활용 가능성을 검토할 수 있었으며, 동작 감지 카메라 및 센서를 활용한 새로운 디바이스 제어방식 개발과정의 연구를 통하여 제스처 유형의 자연스러운 언어 체계 개발 및 과정을 정립하였다.

  • PDF

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

Efficient Context-Aware Scheme for Sensor Network in Ubiquitous Devices

  • Shim, Jong-Ik;Sho, Su-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.12
    • /
    • pp.1778-1786
    • /
    • 2009
  • Many sensor network applications have been developed for smart home, disaster management, and a wide range of other applications. These applications, however, generally assume a fixed base station as well as fixed sensor nodes. Previous research on sensor networks mainly focused on efficient transmission of data from sensors to fixed sink nodes. Recently there has been active research on mobile sink nodes, sink mobility is one of the most comprehensive trends for information gathering in sensor networks, but the research of an environment where both fixed sink nodes and mobile sinks are present at the same time is rather scarce. This paper proposes a scheme for context-aware by ubiquitous devices with the sink functionality added through fixed sinks under a previously-built, cluster-based multi-hop sensor network environment. To this end, clustering of mobile devices were done based on the fixed sinks of a previously-built sensor network, and by using appropriate fixed sinks, context gathering was made possible. By mathematical comparison with TTDD routing protocol, which was proposed for mobile sinks, it was confirmed that performance increases by average 50% in energy with the number of mobile sinks, and with the number of movements by mobile devices.

  • PDF

Personal Mutual Authentication System for Ubiquitous Wireless Environments (유비쿼터스 무선환경을 위한 개인 상호인증 시스템)

  • Kim Byung-Gi;Hong Sang-Sun;Jouhn Young-Keel
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.99-111
    • /
    • 2004
  • Two general security measures in computing networks are secure data transmission and user authentication, These problems are still critical in the wireless LAN environments. Thus security becomes most significant issue in personal network environments and ubiquitous networks based on wireless LANs. We purpose a new authentication system for these kind of environments, and coined it UPMA(Ubiquitous Personal Mutual Authen-tication) model. UPMA supports authenticating configurations which provides personal verification for each system. It guarantees secure communications through the session key setup, and provides mutual authentication by verifying each user and his/her station. UPMA solves security problems in ubiquitous networks without accessing authentication server, Instead it performs mutual authentication between terminals or between systems. It is a global authentication system which enables global roaming service through the Internet or other public networks, It can be used to guarantee safe and convenient access to a company Intranet or to a home network.

  • PDF

Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem

  • Darem, Abdulbasit;Alhashmi, Asma A.;Jemal, H.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.303-311
    • /
    • 2022
  • The tremendous growth of the Internet of things is unbelievable. Many IoT devices have emerged on the market over the last decade. This has made our everyday life easier inside our homes. The technology used at home has changed significantly over the past several decades, leading to what is known today as the smart home. However, this growth has also brought new challenges to our home security and privacy. With the smart home becoming more mainstream, cybersecurity issues have become a fundamental concern. The smart home is an environment where heterogeneous devices and appliances are interconnected through the Internet of Things (IoT) to provide smart services to residents. These services include home climate control, energy management, video on demand, music on-demand, remote healthcare, remote control, and other similar services in a ubiquitous manner. Smart home devices can be controlled via the Internet using smartphones. However, connecting smart home appliances to wireless networks and the Internet makes individuals vulnerable to malicious attacks. Remote access within the same environment or over the Internet requires an effective access control mechanism. This paper intends to shed light on how smart home devices are working as well as the type of security and privacy threats of the smart home. It also illustrated the types of authentication methods that can be used with smart home devices. In addition, a comparison of Smart home IoT-based security protocols was presented along with a security countermeasure that can be used in a smart home environment. Finally, a few open problems were mentioned as future research directions for researchers.

A Study for Smart Apartment for Supporting Intelligent Service based on Ubiquitous (유비쿼터스 기반의 지능형 서비스를 지원하는 스마트 아파트 연구)

  • Ahn, Byeong-Tae;Lee, Chong-Ha;Chung, Bhum-suk
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.247-261
    • /
    • 2013
  • Recently, the smart phone, a carrying along terminal connection technology such as Galaxytap/iPad etc. evolves, and supply is increasing rapidly, is included for smart phone because various sensor technologies are developed and service application that is acted in terminal with this is accompanied and grow. Continuously 4 generation to 3 Gs, Wibro Wireless network technology of communications a LTE technology from that is constructed, environment for Ubiquitous realization is being constructed fast. Therefore, in this paper it can inquire state of electronic, furniture devices through apartment complex web server and gear that control groove network at smart phone, and control, and confirms home state prevention of crimes state, and video inquiry of position that CCTV is placed in apartment complex was available. And it proposed integrated smart apartment with parking system and medical system using RFID system in ubiquitous environment.

  • PDF