• Title/Summary/Keyword: wireless remote

Search Result 771, Processing Time 0.033 seconds

Bidirectional BLE enabled Audible Pedestrian Signal for Visual Impaired Pedestrian (양방향 통신 지원 시각장애인용 BLE 기반 음향신호기)

  • Kim, Ju-Wan;Kim, Jungsook;Na, Dong-Gil;Kim, Hyoung-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.99-106
    • /
    • 2017
  • Audible Pedestrian Signal(APS) is an additional equipment to provide information about pedestrian signals in non-visual formats such as audible tones and verbal messages. It can provide information to pedestrians about the location and directions of a crosswalk, and the traffic signal status. In general, a pedestrian who is visually impaired uses a 358.5MHz wireless remote controller to activate the APS and crosses at the crosswalk with the help of the APS. The existing APS can only receive an activation message from the remote controller. Therefore, the APS has an issue, especially at intersections, that all APSs within the communication range of the remote controller are activated simultaneously. It makes to confuse the visual impaired pedestrians. In this paper, we propose a BLE-enabled APS that can enable two-way communication via Bluetooth with a smartphone. The proposed system solves the problem and provides them with additional information, so that visually impaired pedestrians can cross at the crosswalk more conveniently.

Development of Eire-lighting and Rescue Robot for Outdoor Environment using Target Oriented Design Methodology (목표지향설계 개념을 이용한 실외화재진압 및 인명구조 로봇의 개발)

  • Kim, Moon-June;Maolin, Jin;Lee, Jin-Oh;Chang, Pyung-Hun;Kim, Jong-Hyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.2
    • /
    • pp.86-92
    • /
    • 2007
  • This paper presents the development of fire-fighting and rescue robot for Outdoor Environment. In the procedure of this development, we follow Target Oriented Design (TOD) which is recognized as the systematic methodology to design a system by specifying the target clearly. For some real fire fighting tasks (e.g. tasks in shopping street and a market), narrow road make it difficult for existing fire engine to access the firing place. On the other hand, for dangerous tasks (e.g. gasoline station and a storehouse) the explosive materials make it impossible for fire-fighters to access the firing place. Moreover, the smoke and the high-temperature caused by fire make fire fighting difficult. In this situation, the solution is to develop the fire-fighting and rescue robot. TOD is performed firstly by analyzing the environment properties of fro place and the demanded tasks and the fire-fighting and rescue robot is manufactured. For safety, the fire fighting robot should be controlled by remote operation to keep the operator away from the fire, and the control system is divided into three parts: the robot controllers, controller for remote operating device and wireless communication system. We have selected and developed appropriate hardware and software for each part of control system with considering TOD. As a result, the fire-fighting robot functions correctly and the performance and usefulness of our control architecture is validated by successfully performing some fire-fighting tasks.

Development of Wireless Base Station Remote Monitoring System Using IoT Based on Cloud Server (클라우드 서버 기반 IoT를 이용한 무선기지국 원격 감시시스템 개발)

  • Lee, Yang-weon;Kim, Chul-won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.849-854
    • /
    • 2018
  • Radio base stations, which are widely distributed across large areas, have many difficulties in managing them. Unmanned radio base stations in remote mountains are having a hard time accessing them in case of emergencies. Major telephone service providers only remotely control incoming and outgoing information and local small business partners responsible for maintaining actual facilities do not possess such technologies, so they are each checked during field visits. In this study, in order to process the sensor raw data and smoothing, we apply the particle filters and confirmed that the performance of sensor data accuracy is increased. Integrated system using temperature, humidity, fire condition, and power operation at a wide range of radio base stations under the real-time monitoring status is operated well. It show that all of the status of base station are monitored at the remote office using the cloud server through internet networking.

An Improved Anonymous Authentication Scheme for Remote Health Monitoring System (원격 건강정보 모니터링 시스템을 위한 개선된 익명인증 기법)

  • Park, Youngho;Noh, Si-Wan;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1551-1560
    • /
    • 2016
  • With the advancement of wearable devices and wireless body are networks, smart healthcare systems based on such technologies have been emerging to effectively monitor patient health and disease progression. In order to implement viable smart healthcare systems, the security and privacy of patient's personal health information must be considered. Yang et al. proposed a privacy-preserving authentication scheme using key-insulation technique for remote health monitoring system, however, key-insulation technique is not properly adapted to their scheme which in turn causes a security pitfall contrary to their assertions. Besides, Yang et al.'s scheme does not guarantee user anonymity against healthcare service provider. Therefore, in this paper, we discuss the security concerns for Yang et al.'s scheme and present an improved anonymous authentication scheme.

Implementation of Telematics System Using Driving Pattern Detection Algorithm (운전패턴 검출 알고리즘을 적응한 텔레매틱스 단말기 구현)

  • Kin, Gi-Seok;Jung, Hee-Seok;Yun, Kee-Bang;Jeong, Kyung-Hoon;Kim, Ki-Doo
    • 전자공학회논문지 IE
    • /
    • v.45 no.4
    • /
    • pp.33-41
    • /
    • 2008
  • Telematics system includes the "vehicle remote diagnosis technology", "driving pattern analysis technology" which are commercially attractive in the real life. To implement those technologies, we need vehicle signal interface, vehicle diagnosis interface, accelerometer/yaw-rate sensor interface, GPS data processing, driving pattern analysis, and CDMA data processing technique. Based on these technologies, we analyze the error existence by diagnosing the EMS(Engine Management System), TMS(Transmission Management System), ABS/TCS, A/BAG in real time. And we are checking about a driving pattern and management of the vehicle, which are sent to the information center through the wireless communication. These database results will make the efficient vehicle and driver management possible. We show the effectiveness of our results by field driving test after completing the H/W & S/W design and implementation for vehicle remote diagnosis and driving pattern analysis.

Healthcare Application based on Radio Frequency (무선 통신 기반의 헬스케어 어플리케이션)

  • Seo, Jung-hee;Park, Hung-bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.899-902
    • /
    • 2009
  • As computer network and wireless technology continue to grow rapidly, a wide range of remote application has been applied to medical field such as remote medical consulting and remote patient monitoring. This research aims to design RF telecommunication-based healthcare application to collect and manage patient's physiological data, and describe the overall procedure of experiment. MySQL database is designed to record patient's physiological data including temperature, blood pressure and heart rate and save information about medical behaviors such as doctor's prescription for patients. Therefore, users approved by healthcare application can query patient's data and collected data can be used to reorganize data for clinical test. As a result, temperature and humidity of patient's room which must be checked frequently can be processed automatically through ubiquitous sensor network. The information entered from mobile phones or web is saved in database, ensuring systematical management through computer. Moreover, patient's family members can easily access hospital data, improving their experience with medical service.

  • PDF

Securing communication between EMS and remote devices in a Microgrid (마이크로그리드 환경에서 EMS와 원격 장치간 통신 보안)

  • Kim, Mi-sun;Park, Kyung-Woo;Kim, Jong-Man;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.52-60
    • /
    • 2018
  • Energy Management System(EMS) of Microgrid(MG) collects and analyzes data from devices in the microgrid to provide information to operators, users and other systems. In the middle of the process, it is required to securely provide information through both wired and wireless communication networks. In this paper, we design and implement a module that provides encryption and decryption, key management, key distribution, and message authentication functions, thus enabling the development of a system which is safe from the exposure and modulation of data potentially occurrable during data transmission between RTU(Remote Terminal Unit) and EMS. Our method can increase the efficiency of connection and key management for RTU by connecting a virtual device(VD) to RTU.

Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem

  • Darem, Abdulbasit;Alhashmi, Asma A.;Jemal, H.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.303-311
    • /
    • 2022
  • The tremendous growth of the Internet of things is unbelievable. Many IoT devices have emerged on the market over the last decade. This has made our everyday life easier inside our homes. The technology used at home has changed significantly over the past several decades, leading to what is known today as the smart home. However, this growth has also brought new challenges to our home security and privacy. With the smart home becoming more mainstream, cybersecurity issues have become a fundamental concern. The smart home is an environment where heterogeneous devices and appliances are interconnected through the Internet of Things (IoT) to provide smart services to residents. These services include home climate control, energy management, video on demand, music on-demand, remote healthcare, remote control, and other similar services in a ubiquitous manner. Smart home devices can be controlled via the Internet using smartphones. However, connecting smart home appliances to wireless networks and the Internet makes individuals vulnerable to malicious attacks. Remote access within the same environment or over the Internet requires an effective access control mechanism. This paper intends to shed light on how smart home devices are working as well as the type of security and privacy threats of the smart home. It also illustrated the types of authentication methods that can be used with smart home devices. In addition, a comparison of Smart home IoT-based security protocols was presented along with a security countermeasure that can be used in a smart home environment. Finally, a few open problems were mentioned as future research directions for researchers.

Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 생체 정보 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.147-153
    • /
    • 2014
  • The numerous improved schemes of remote user authentication based on password have been proposed in order to overcome the security weakness in user authentication process. Recently, some of biometric-based user authentication schemes to use personal biometric information have been introduced and they have shown the relatively higher security and the enhanced convenience as compared to traditional password-based schemes. These days wireless sensor network is a fundamental technology in face of the ubiquitous era. The wireless sensor networks to collect and process the data from sensor nodes in increasing high-tech applications require important security issues to prevent the data access from the unauthorized person. Accordingly, the research to apply to the user authentication to the wireless sensor networks has been under the progress. In 2010, Yuan et al. proposed a biometric-based user authentication scheme to be applicable for wireless sensor networks. Yuan et al. claimed that their scheme is effectively secure against the various security flaws including the stolen verifier attack. In this paper, author will prove that Yuan et al.'s scheme is still vulnerable to the password guessing attack, user impersonation attack and the replay attack, by analyzing their security weakness.

Development of Wireless Measurement System for Bridge Using PDA and Fiber Optical Sensor (PDA와 광섬유 센서를 이용한 교량의 무선계측 시스템 개발)

  • Kwak, Kae-Hwan;Hwang, Hae-Sung;Jang, Hwa-Sup;Kim, Woo-Jong;Kim, Hoi-OK
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.13 no.1 s.53
    • /
    • pp.88-96
    • /
    • 2009
  • This study proposes a wireless measurement system that is a new safety management system by using an FBG sensor and a PDA. The sensor part has many advantages of implementing a wireless measurement system, and the study emploies an FBG-LVDT sensor, FBG-STRAIN sensor, FBG-TEMP sensor, and FBG-ACC sensor, using FBG sensors. Also, the study show a configuration of a signal process system for operating a wireless transmission system of FBG sensors applied to the signal process system, and engrafted the cutting edge information technology industry in order to display from a remote distance using a PDA. In order to verify the applicability of the developed FBG sensors and wireless measurement monitoring system to the field, their accuracy, and usability, the study has conducted a static and dynamic test to a bridge in the field. The study made an assessment of service for the vibration of the bridge by applying dynamic data measured by an FBG-LVDT sensor and FBG-ACC sensor to Meister's curve and prepared methods for assessing the vibration of the bridge by proposing a standard of vibration limitation given the service of vibration of the bridge. As a follow up for this study, it would be necessary to set up an overall model for the standard of service assessment established in this study.