• Title/Summary/Keyword: wireless mobile device

Search Result 448, Processing Time 0.026 seconds

A Study on the Information Protection Plan for the Smartwork Service Environments (스마트워크 서비스 환경 구축을 위한 정보보호 방안에 대한 연구)

  • Kim, Dong Soo;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.3 no.2
    • /
    • pp.19-32
    • /
    • 2013
  • An explosive growth of mobile devices and smart phones, such as Tablet PC using wireless Internet, is changing the Information environment rapidly. Smart technology telecommuting work or smart work centers, mobile devices, and configure your environment to take advantage of remote collaboration. Also, you do not have the limitations of time and space provides a flexible working environment. Smartwork environment is an IT environment to be provided to carry out the business by accessing remotely via smart device outside of the internal IT infrastructure of an existing. Smartwork system to increase the work efficiency is present to what information protection threats according to their convenience. Safeguards information that can be utilized to build a secure smartwork environment is required. Therefore, in this paper, we examined the worksmart information protection measures that can protect the information be reconciled smoothly to fit the smartwork environment.

  • PDF

Rough Terrain Negotiable Mobile Platform with Passively Adaptive Double-Tracks and Its Application to Rescue Missions and EOD Missions

  • Lee, Woo-Sub;Kang, Sung-Chul;Kim, Mun-Sang;Shin, Kyung-Chul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1048-1053
    • /
    • 2005
  • This paper presents design and integration of the ROBHAZ-DT3, which is a newly developed mobile robot system with chained double-track mechanisms. A passive adaptation mechanism equipped between the front and rear body enables the ROBHAZ-DT3 to have good adaptability to uneven terrains including stairs. The passive adaptation mechanism reduces energy consumption when moving on uneven terrain as well as its simplicity in design and remote control, since no actuator is necessary for adaptation. Based on this novel mobile platform, a rescue version of the ROBHAZ-DT3 with appropriate sensors and a semi-autonomous mapping and localization algorithm is developed to participate in the RoboCup2004 US-Open: Urban Search and Rescue Competition. From the various experiments in the realistic rescue arena, we can verify that the ROBHAZ-DT3 is reliable in traveling rugged terrain and the proposed mapping and localization algorithm are effective in the unstructured environment with uneven ground. The another application is an military robot for an EOD(Explosive Ordnance Disposal) and reconnaissance mission. The military version of the ROBHAZ-DT3 with a water disrupter, a thermal scope and a long distance wireless communication device is developed and sent to the area of military tactics in Iraq. Consequently, the feasibility of the military version of ROBHAZ-DT3 is verified.

  • PDF

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

Implementation of a Client Display Interface for Mobile Devices via Serial Transfer (모바일 직렬 전송방식의 클라이언트 디스플레이 인터페이스 구현)

  • Park Sang-Woo;Lee Yong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.522-525
    • /
    • 2006
  • Recently, mobile devices support multi-functions such as 3D game, wireless internet, moving pictures, DMB, GPS, and PMP. Bigger size of display device is indispensable to support these functions and higher speed of the interface is needed. However, conventional parallel interfaces between processor and display nodule are not competent enough for that high speed transfers. High-speed serial interface is beginning to appear as an alternative for parallel interface. The advantages of the serial interface are high bandwidth, small number of interconnections, low-power consumption, and good quality of electro-magnetic interference. In this paper, we implement serial interface and use it for a display module. LVDS is used for PHY layer and a defined packet is used for link layer. The feature of the implemented serial interface is the reduced number of interconnections with enough bandwidth.

  • PDF

Adaptive Rate Control for Guaranteeing the Delay Bounds of Streaming Service (스트리밍 서비스의 지연한계 보장을 위한 적응적 전송률 제어기법)

  • Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.483-488
    • /
    • 2010
  • Due to the prevalence of various mobile devices and wireless broadband networks, there has been a significant increase in interest and demand for multimedia streaming services. Moreover, the user can service the participatory video broadcasting service in the mobile device and it can be used to deliver the real-time news and more variety information in the user side. Live multimedia service of user participation should consider not only the video quality but also the delay bounds and continuity of video playback for improving the user perceived QoS (Quality of Service) of streaming service. In this paper, we propose an adaptive rate control scheme, called DeBuG (Delay Bounds Guaranteed), to guarantee the delay bounds and continuity of video playback for the real-time streaming in mobile devices. In order to provide those, the proposed scheme has a quality adaptation function based on the transmission buffer status and network status awareness. It also has a selective frame dropper, which is based on the media priority, before the transmission video frames. The simulation results demonstrate the effectiveness of our proposed scheme.

Outdoor Experiments on video streaming over a Raspberry Pi-based MANETs (Raspberry Pi 기반 MANETs 환경에서 야외 Video Streaming 실험)

  • Lee, Yeong-mi;Kim, Byeong-jeong;Song, Seong-Ho;Park, Seop Hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.147-151
    • /
    • 2014
  • With the advent of tiny and inexpensive computer systems like Raspberry Pi, it has become possible to construct an experimental environment of MANETs (Mobile Ad hoc Networks) at a relatively low cost. In this paper, we implement a node of MANETs with a Raspberry Pi equipped with two 802.11 wireless LAN cards and dynamic routing software running on it. In an outdoor MANETs environment with moving mobile nodes automatically rebuilding broken routes, we conducted a real-time video streaming experiment over the MANET. The video stream is transmitted from a node with a video camera installed on it to another node through the route established dynamically. Each node is equipped with a display device, with which the current status of the node can be checked out. We also implemented software that automatically collects data stored in each node and analyzes the performance of the MANETs. Through this experiment, we could evaluate the performance of realistic video streaming service in a MANETs environment.

  • PDF

Vibrotactile Space Mouse (진동촉각 공간 마우스)

  • Park, Jun-Hyung;Choi, Ye-Rim;Lee, Kwang-Hyung;Back, Jong-Won;Jang, Tae-Jeong
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.337-341
    • /
    • 2008
  • This paper presents a vibrotactile space mouse which use pin-type vibrotactile display modules and a gyroscope chip. This mouse is a new interface device which is not only an input device as an ordinary space mouse but also a tactile output device. It consists of a space mouse which use gyroscope chip and vibrotactile display modules which have been developed in our own laboratory. Lately, by development of vibrotactile display modules which have small size and consume low power, vibrotactile displays are available in small sized embedded systems such as wireless mouses or mobile devices. Also, development of new sensors like miniature size gyroscope by MEMS technology enables manufacturing of a small space mouse which can be used in the air not in a plane. The vibrotactile space mouse proposed in this paper recognizes motion of a hand using the gyroscope chip and transmits the data to PC through Bluetooth. PC application receives the data and moves pointer. Also, 2 by 3 arrays of pin-type vibrotactile actuators are mounted on the front side of the mouse where fingers of a user's hand contact, and those actuators could be used to represent various information such as gray-scale of an image or Braille patterns for visually impared persons.

  • PDF

Update Frequency Cache Consistency for Reducing Wait Time in Mobile Computing (이동 컴퓨팅 환경에서 대기 시간을 감소시키는 갱신 빈도 캐쉬 일관성 기법)

  • Lee, Chan-Seob;Kim, Dong-Hyuk;Baek, Joo-Hyun;Choi, Eui-In
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1017-1024
    • /
    • 2002
  • According as mobile computing environment is generalized by development of wireless networking technology and communication device, mobile host uses local cache for extensibility and early response time. and reduction of limited bandwidth. This time, between mobile host and mobile support station cache need consistency interested person of done data accordingly much techniqueses propose. Existent consistency techniques because detection based techniqueses are used mainly and broadcast periodic invalid message considering frequent disconnection. However, these techniqueses increase abort step through increase or delay of transmission message number by accuracy examination of data. Therefore, because mobile host deletes cached data, and extensity are decreased. Techniques that is proposed in this paper did to perform refering update frequency about object that page request or when complete update operation happens to solve these problem. Therefore, have advantage that response is fast because could run write intention declaration or update by update frequency electively asynchronously when update operation consists and abort step decreases. Also, improved extensity running delete or propagation electively according to update frequency about periodic invalid message gone since disconnection.

A Research of LEACH Protocol improved Mobility and Connectivity on WSN using Feature of AOMDV and Vibration Sensor (AOMDV의 특성과 진동 센서를 적용한 이동성과 연결성이 개선된 WSN용 LEACH 프로토콜 연구)

  • Lee, Yang-Min;Won, Joon-We;Cha, Mi-Yang;Lee, Jae-Kee
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.167-178
    • /
    • 2011
  • As the growth of ubiquitous services, various types of ad hoc networks have emerged. In particular, wireless sensor networks (WSN) and mobile ad hoc networks (MANET) are widely known ad hoc networks, but there are also other kinds of wireless ad hoc networks in which the characteristics of the aforementioned two network types are mixed together. This paper proposes a variant of the Low Energy Adaptive Cluster Hierarchy (LEACH) routing protocol modified to be suitable in such a combined network environment. That is, the proposed routing protocol provides node detection and route discovery/maintenance in a network with a large number of mobile sensor nodes, while preserving node mobility, network connectivity, and energy efficiency. The proposed routing protocol is implemented with a multi-hop multi-path algorithm, a topology reconfiguration technique using node movement estimation and vibration sensors, and an efficient path selection and data transmission technique for a great many moving nodes. In the experiments, the performance of the proposed protocol is demonstrated by comparing it to the conventional LEACH protocol.

A novel power trace aligning method for power analysis attacks in mobile devices (모바일 기기에서의 전력 분석 공격을 위한 새로운 전력 신호 정렬 방법)

  • Lee, Yu-Ri;Kim, Wan-Jin;Lee, Young-Jun;Kim, Hyoung-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.153-166
    • /
    • 2011
  • Recent trends in mobile device market whose services are rapidly expanding to provide wireless internet access are drawing people's attention to mobile security. Especially, since threats to information leakage are reaching to the critical level due to the frequent interchange of important data such as personal and financial information through wireless internet, various encryption algorithms has been developed to protect them. The encryption algorithms confront the serious threats by the appearance of side channel attack (SCA) which uses the physical leakage information such as timing, and power consumption, though the their robustness to threats is theoretically verified. Against the threats of SCA, researches including the performance and development direction of SCA should precede. Among tile SCA methods, the power analysis (PA) attack overcome this misalignment problem. The conventional methods require large computational power and they do not effectively deal with the delay changes in a power trace. To overcome the limitation of the conventional methods, we proposed a novel alignment method using peak matching. By computer simulations, we show the advantages of the proposed method compared to the conventional alignment methods.