• Title/Summary/Keyword: wireless control network

Search Result 1,580, Processing Time 0.03 seconds

A Design of a Personnel Control System Using UHF-RFID in Shipping (UHF 대역 RFID를 이용한 선박내 인원관리 시스템 설계)

  • Cha, Jin-Man;Kim, Myeung-Hwan;Sung, Kil-Young;Lee, Sang-Wook;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2119-2124
    • /
    • 2008
  • An information-oriented basis in today's society has been changing fast, and the desire for connectivity has caused an exponential growth in wireless communication and sensor network. Sensor networks using RFID, in particular, have led this trend due to the increasing exchange of data in Ubiquitous such as the home RF, access control system, U-Healthcare, and Logistics information Systems. Also, the RFID when it applies a technique, is able to raise the stability of shipping as controling the mobile course and an entrance and exit of the crews an well as previously preventing an accident from shipping. In this paper, we designed and implemented personnel control system using UHF-RFID in vessels which shows through host PC reading and writing tag.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Bit-rate control of transcoder considering the activity and direction of motion vector (움직임 벡터의 활동성과 방향성을 고려한 트랜스 부호화기의 비트율 제어)

  • 구성조;장해원;황찬식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12C
    • /
    • pp.1209-1216
    • /
    • 2003
  • The transcoding is needed to modify the bit rate of the video bitstream in accordance with the bandwidth of a variety of channels in order to provide users with a realtime multimedia service and more stable and credible VOD(Video On Demand) service on various wire/wireless network. This paper suggests how to guarantee the video quality in the transcoding process, taking the activity and direction of the macroblock into consideration, thereby reducing the calculation. The threshold of the macroblock's activity and direction is applicable to the different videos, with the DCT coefficients from the intermediate data in the decoding process. Moreover, the suggested video transcoding algorism enables us to maintain the proper video quality and reduce the calculation through the video bit rate change experiment in H.263 environment.

Development of Monitering System for Remote Power Management Service (원격 전력관리 서비스를 위한 모니터링 시스템 개발)

  • Park, Ji-Saung;Jeon, Min-Ho;Lee, Myung-Eui
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.601-604
    • /
    • 2012
  • Recently, there have been many attempts to monitor the equipment's condition or the input devices in sensors remotely by using cable and wireless communications. Also, the research and development on this matter has been actively carried on. In this paper, we developed the monitoring system which will eliminate the errors of manual reading by humans and therefore will secure reliability between tenants and the building management office. Through the system, the private telecommunication network can be connected between the building management office and the households. This enables the control office to remotely read the electric meter and exact energy consumption of each household even when the tenants are absent.

  • PDF

Development of a Monitoring Equipment of Current and Potential on Power Transmission Line for 66kV

  • Nisiyama, Eiji;Kuwanami, Kenshi;Kawano, Mitsunori;Matsuda, Toyonori;Oota, I.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.41-44
    • /
    • 2003
  • We propose portable equipment that monitors current and voltage of high-potential power transmission lines. In the equipment, a current and voltage sensor are attached to an insulator that supports a power transmission line: A clamped to the power line and the detected current signal is transmitted to the ground station by a wireless optical link using transmission line is detected by a high resistance element, zinc oxide (ZnO). That acts as a potential divider between the power line and ground. We make an experimental device for 66kV power line and demonstrate that it can monitor currents proposed equipment is small-sized, light, and inexpensive in comparison with the conventional CT (current transformer) and PT (potential transformer) since it does not require high potential insulators and magnetic cores, further, the equipment is easily installed owing to its small size and its simple structure.

  • PDF

Dynamic Service Composition and Development Using Heterogeneous IoT Systems

  • Ryu, Minwoo;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.91-97
    • /
    • 2017
  • IoT (Internet of Things) systems are based on heterogeneous hardware systems of different types of devices interconnected each other, ranging from miniaturized and low-power wireless sensor node to cloud servers. These IoT systems composed of heterogeneous hardware utilize data sets collected from a particular set of sensors or control designated actuators when needed using open APIs created through abstraction of devices' resources associated to service applications. However, previously existing IoT services have been usually developed based on vertical platforms, whose sharing and exchange of data is limited within each industry domain, for example, healthcare. Such problem is called 'data silo', and considered one of crucial issues to be solved for the success of establishing IoT ecosystems. Also, IoT services may need to dynamically organize their services according to the change of status of connected devices due to their mobility and dynamic network connectivity. We propose a way of dynamically composing IoT services under the concept of WoT (Web of Things) where heterogeneous devices across different industries are fully integrated into the Web. Our approach allows developers to create IoT services or mash them up in an efficient way using Web objects registered into multiple standardized horizontal IoT platforms where their resources are discoverable and accessible. A Web-based service composition tool is developed to evaluate the practical feasibility of our approach under real-world service development.

Security Issue in T-MAC Communication Protocol (T-MAC 통신 프로토콜에서 보안 이슈)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.12
    • /
    • pp.4760-4765
    • /
    • 2010
  • Time out-medium access control (T-MAC) protocol is one of the well-known MAC protocols designed for wireless sensor networks (WSN), and is proposed to enhance the poor performance of the S-MAC protocol. In this paper, we are reviewed about security vulnerability in T-MAC, and analyzed the power which is consumed at each stage of T-MAC protocol according to vulnerability of denial of service (DoS) and replay problem. From our analytical results, it can be considered the need of power efficient authentication scheme which provides the reliability, efficiency, and security for a general T-MAC communication. This is the case study of possible DoS vulnerability and its power consumption in T-MAC.

Distributed Uplink Resource Allocation in Multi-Cell Wireless Data Networks

  • Ko, Soo-Min;Kwon, Ho-Joong;Lee, Byeong-Gi
    • Journal of Communications and Networks
    • /
    • v.12 no.5
    • /
    • pp.449-458
    • /
    • 2010
  • In this paper, we present a distributed resource allocation algorithm for multi-cell uplink systems that increases the weighted sum of the average data rates over the entire network under the average transmit power constraint of each mobile station. For the distributed operation, we arrange each base station (BS) to allocate the resource such that its own utility gets maximized in a noncooperative way. We define the utility such that it incorporates both the weighted sum of the average rates in each cell and the induced interference to other cells, which helps to instigate implicit cooperation among the cells. Since the data rates of different cells are coupled through inter-cell interferences, the resource allocation taken by each BS evolves over iterations. We establish that the resource allocation converges to a unique fixed point under reasonable assumptions. We demonstrate through computer simulations that the proposed algorithm can improve the weighted sum of the average rates substantially without requiring any coordination among the base stations.

Caching Methods of Client-Server Systems for Vector Map Services based on Mibile Phone (휴대폰 기반 벡터 지도 서비스를 위한 클라이언트-서버 시스템의 캐슁기법)

  • 김진덕;최진오
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.3
    • /
    • pp.452-458
    • /
    • 2002
  • Although the reuse of the cached data for scrolling the map reduces the amount of passed data between client and server, it needs the conversions of data coordinates, selertive deletion of objects and cache compaction at client. The conversion is time intensive operation due to limited resources of mobile phones such as low computing power, small memory. Therefore, for the efficient map control in the vector map service based mobile phone, it is necessary to study the method for reducing wireless network bandwidth and for overwhelming the limited resources of mobile phone as well. This paper proposes the methods for racking pre-received spatial objects in client-server systems for mobile CIS. We also analyze the strengths and drawbacks between the reuse of cached data and transmission of raw data respectively.

Modified BLUE Packet Buffer for Base-Stations in Mobile IP-based Networks

  • Hur, Kyeong
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.530-538
    • /
    • 2011
  • Performance of TCP can be severely degraded in Mobile IP-based wireless networks where packet losses not related to network congestion occur frequently during inter-subnetwork handoffs by user mobility. To solve such a problem in the networks using Mobile IP, the packet buffering method at a base station(BS) recovers those packets dropped during handoff by forwarding the buffered packets at the old BS to the mobile users. But, when the mobile user moves to a congested BS in a new foreign subnetwork, those buffered packets forwarded by the old BS are dropped and TCP transmission performance of a mobile user degrades severely. In this paper, we propose a Modified BLUE(MBLUE) buffer required at a BS to increase TCP throughput in Mobile IP-based networks. When a queue length exceed a threshold and congestion grows, MBLUE increases its packet drop probability. But, when a TCP connection is added at new BS by a handoff, the old BS marks the buffered packets. And new BS receives the marked packets without dropping. Simulation results show that MBLUE buffer reduces congestion during handoffs and increases TCP throughputs.