• Title/Summary/Keyword: ubiquitous-ID

Search Result 81, Processing Time 0.025 seconds

A Study on Ubiquitous Convention using RFID (RFID를 활용한 유비쿼터스 컨벤션에 관한 연구)

  • Noh, Young;Byun, Jeung Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.175-184
    • /
    • 2009
  • We are entering into a era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge s haring, and calm services. Some people refer to this as the "ubiquitous" computing because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Ubiquitous computing technology, "RF" stands for "radio frequency"; the "ID" means "identifer". The tag itself of a computer chip and an antenna. The shortest metaphor is that RFID is like a bar-code but is read with an electromagnetic field rather than by a laser beam. Much has already been written about the use of RFID. But there is no has written about the use of RFID in the convention industry. Therefore this study have specific objectives as follows. 1. To give details on the use of RFID in convention. 2. To introduces the key concepts behind RFID technology. 3. To identify advantage & disadvantage of RFID technology using a BEXCO CASE study. 4. To study on ubiquitous convention using RFID and effective operation methods such as entrance identification system, session management, machine management, CRM management, visitor management, and contents management. This results provide into the current status of ubiquitous computing technology in convention industries. Specific advantages by using ubiquitous computing technology(RFID) are one-stop differentiate service, wireless internet service, use of visitor management system, entrance by tag, and U-logistics. On other side, disadvantages are security, stabilization of RFID system, higher price of RFID tag, and commercial scale. Convention by using of RFID technology is currently at an early stage. Convention company as BEXCO need to have the capabilities to adapt, to customize, to commercialize, and to modify technology to suit our circumstances.

Performance of Double Binary Turbo Coding for LED-ID Systems (LED-ID 시스템을 위한 이중 이진 터보 코딩의 성능)

  • Hwang, Yu-Min;Kim, Kyung-Ho;Kim, Jin-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1078-1083
    • /
    • 2013
  • At the ubiquitous age, applications of Wireless Personal Area Network (WPAN) technology using LEDs are in progress. However, visible light communication using LED have weakness, which deteriorates performance of communication. To reduce information losses, which is caused by optical noise, such as incandescent lamps, fluorescent lamps, sunbeam etc., proposed channel coding scheme, double binary turbo codes. In this paper, encoding scheme of the proposed system is described and simulation results are analyzed. We had expected improved performance by using double binary turbo codes. Finally, performances of the proposed system came up to our expectations.

A Study on the Band Shifted Ubiquitous-lD Reader Platform (Band Shifted Ubiquitous-ID Reader Platform 연구개발)

  • Park, Kyung-Hwan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1045-1048
    • /
    • 2005
  • This paper is for the design and implementation of the reader which can recognize the tag of the UHF band that we do not become internationally the standardization. Universal RFID Reader uses the software and specifies the class of UHF band. And then, it can recognize UHF band tags controlling the hardware.

  • PDF

R3: A Lightweight Reactive Ring based Routing Protocol for Wireless Sensor Networks with Mobile Sinks

  • Yu, Sheng;Zhang, Baoxian;Yao, Zheng;Li, Cheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5442-5463
    • /
    • 2016
  • Designing efficient routing protocols for a wireless sensor network with mobile sinks (mWSN) is a challenging task since the network topology and data paths change frequently as sink nodes move. In this paper, we design a novel lightweight reactive ring based routing protocol called R3, which removes the need of proactively maintaining data paths to mobile sinks as they move in the network. To achieve high packet delivery ratio and low transmission cost, R3 combines ring based forwarding and trail based forwarding together. To support efficient ring based forwarding, we build a ring based structure for a network in a way such that each node in the network can easily obtain its ring ID and virtual angle information. For this purpose, we artificially create a virtual hole in the central area of the network and accordingly find a shortest cycled path enclosing the hole, which serves as base ring and is used for generating the remaining ring based structure. We accordingly present the detailed design description for R3, which only requires each node to keep very limited routing information. We derive the communication overhead by ring based forwarding. Extensive simulation results show that R3 can achieve high routing performance as compared with existing work.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

uPaging : A Voice Message Delivery System Based on Real-Time Location-Awareness (uPaging : 실시간 위치 인식 기반의 음성메시지 전송 시스템)

  • Park, Yu-Jin;Jun, Sang-Ho;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.11
    • /
    • pp.1004-1013
    • /
    • 2012
  • The legacy voice broadcast systems are used to broadcast the voice over an entire space or a specific zone. these broadcast systems generate unnecessary noise and waste of resources. In this paper, we propose a ubiquitous voice message broadcast system called uPaging, by combining the technique of location-awareness and the voice message delivery service in ubiquitous sensor network environment. In uPaging system, the wire/wireless hybrid network is used to implement the network system. Also, in order to actualize the location-awareness service, we use the Bidirectional Location ID-Exchange protocol was suggested by our previous research. the uPaging system can deliver the voice to a selected user or the location in which the user is present by this location awareness.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.205-214
    • /
    • 2006
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware or Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache Poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside. and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

A Design of Schema and Data Model for Shipping Distribution Field using Electronic Tag (전자태그의 해운 물류 유통 분야에 적용하기 위한 스키마 및 데이터 모델 설계)

  • Chang, Jung-Soo;Song, Jong-Chul;Choi, Il-Sun;Jeong, Jae-Gil;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.967-970
    • /
    • 2005
  • Ubiquitous Computing appeared, and moth researches are gone to apply this in various field. Specially, physical distribution circulation service field is intelligence enemy while alternate existent bar code and induction of RFID(Radio Frequency Identification) technology that permit various service is gone vigorously. In this treatise designed data model and schema to progress research about Core Event Type of PML(Product Markup Language) that is object information expression language that is proposed Auto-Id Lab and EPCglobal Inc. to process information of physical object and EPC-lS(Electronic Product Code Information Services) that is information services component and applies in sea transport physical logistics distribution service field.

  • PDF

A Crew Location Recognition System for a Naval Ship by Applying Ubiquitous Technologies

  • Lee, Jin-Tae;Cho, Seong-Rak;Kim, Seong-Jeon
    • Journal of Ship and Ocean Technology
    • /
    • v.12 no.3
    • /
    • pp.26-35
    • /
    • 2008
  • Recognition of real time locations of crews for a naval ship is important, not only for the operation efficiency but also for the safety of onboard crews in the ship. More than 100 crews are dwelling in a modem naval ship and they are involved in various duties. Moreover many visitors come in and out frequently while the ship is moored in a harbor. It sometimes requires considerable time and efforts to find a person for urgent mission. It would enhance the operational efficiency if locations of onboard crews are recognized and monitored in real time. An active type RFID tag, which has a specific ID number, is distributed to each crew member, which should be carried during his stay in the ship. A number of fixed type RFID readers are to be located at the major passages of the ship, which are connected to the main computer via Local Area Network. The location of a crew would be identified by the ID number of his RFID tag and the location of the RFID reader which detected the RFID tag. A middleware is needed to process the collected data in the main computer. The data is fed to application softwares, which actually display locations of the concerned crews. The software is coded using GUI (Graphic User Interface) for better user friendliness, which has the function of storing the location history of a crew, and sending warning messages to appropriate persons, if unallowable behavior is detected. An auxiliary naval ship is selected for an experimental application study of the proposed system. It turns out that the required budget and time for the realization of the system is within the allowable limits. But complementary measures to protect the privacy of onboard crews should be considered and adopted, before the application of the system is realized.