Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674751
Jeong-Hwan Hwang, H. Yoe
This paper proposes the ‘Paprika greenhouse management system’ based on wireless sensor network technology, which will establish the ubiquitous agricultural environment and improve the productivity of farmers. The proposed ‘Paprika greenhouse management system’ has WSN environmental sensors and CCTVs at inside/outside of paprika greenhouse. These devices collect the growth-environment related information of paprika. The system collects and monitors the environmental information and video information of paprika greenhouse. In addition to the remote-control and monitoring of the greenhouse facilities, this system realizes the most optimum paprika growth environment based on the growth environmental data accumulated for a long time.
{"title":"Paprika greenhouse management system for ubiquitous agriculture","authors":"Jeong-Hwan Hwang, H. Yoe","doi":"10.1109/ICTC.2010.5674751","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674751","url":null,"abstract":"This paper proposes the ‘Paprika greenhouse management system’ based on wireless sensor network technology, which will establish the ubiquitous agricultural environment and improve the productivity of farmers. The proposed ‘Paprika greenhouse management system’ has WSN environmental sensors and CCTVs at inside/outside of paprika greenhouse. These devices collect the growth-environment related information of paprika. The system collects and monitors the environmental information and video information of paprika greenhouse. In addition to the remote-control and monitoring of the greenhouse facilities, this system realizes the most optimum paprika growth environment based on the growth environmental data accumulated for a long time.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117000936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674805
Jungjae Lee, Reeseo Cha, Younghun Han, Wonhong Nam, Jin-Young Choi, Wontae Kim, Seungmin Park
The autonomous military robot system is a complex hybrid system which is difficult to represent by ordinary modeling frameworks due to its continuous behaviors. In this paper, we present a case study to formally model this system using CHARON that is a hierarchical modeling framework for hybrid systems. To precisely capture all the behaviors of the military robot system, we propose several extensions for the CHARON framework.
{"title":"Modeling autonomous military robots using hybrid system framework","authors":"Jungjae Lee, Reeseo Cha, Younghun Han, Wonhong Nam, Jin-Young Choi, Wontae Kim, Seungmin Park","doi":"10.1109/ICTC.2010.5674805","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674805","url":null,"abstract":"The autonomous military robot system is a complex hybrid system which is difficult to represent by ordinary modeling frameworks due to its continuous behaviors. In this paper, we present a case study to formally model this system using CHARON that is a hierarchical modeling framework for hybrid systems. To precisely capture all the behaviors of the military robot system, we propose several extensions for the CHARON framework.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674717
Seung‐Eun Hong, W. Lee
Mobile WiMAX is emerging as one of the most promising systems for 4th generation mobile wireless networks where mobile TV services are foreseen to be proliferated. These applications are bandwidth hogs which cause a challenging capacity problem. To address this challenge, a novel mobile TV services over WiMAX network, called wireless switched digital video (WSDV), is proposed in this paper. Unlike with the conventional broadcast or unicast schemes, we use a hybrid approach that exploits adaptive modulation and coding (AMC) gain in unicast scheme and at the same time accommodates arbitrary many users watching the same channel like broadcast method, which enables to increase wireless capacity for mobile TV service. In addition, we present a WiMAX design tool, based on an analytical model, maximizing WiMAX capacity and study the influence of the most important traffic and system parameters. The analytical model can capture the details on WiMAX resource allocation and consider the popularity of the mobile TV contents from user, which provides an accurate estimate of the amount of bandwidth for WiMAX TV service and also enables a designer to optimally select the number of channels via WSDV schemes while meeting a desired level of blocking probability. Finally, we also demonstrate that the optimized scheme outperforms the conventional schemes in terms of blocking probability, and address the bandwidth sharing effect with other data services.
{"title":"Resource allocation and blocking analysis for mobile TV service over WiMAX network","authors":"Seung‐Eun Hong, W. Lee","doi":"10.1109/ICTC.2010.5674717","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674717","url":null,"abstract":"Mobile WiMAX is emerging as one of the most promising systems for 4th generation mobile wireless networks where mobile TV services are foreseen to be proliferated. These applications are bandwidth hogs which cause a challenging capacity problem. To address this challenge, a novel mobile TV services over WiMAX network, called wireless switched digital video (WSDV), is proposed in this paper. Unlike with the conventional broadcast or unicast schemes, we use a hybrid approach that exploits adaptive modulation and coding (AMC) gain in unicast scheme and at the same time accommodates arbitrary many users watching the same channel like broadcast method, which enables to increase wireless capacity for mobile TV service. In addition, we present a WiMAX design tool, based on an analytical model, maximizing WiMAX capacity and study the influence of the most important traffic and system parameters. The analytical model can capture the details on WiMAX resource allocation and consider the popularity of the mobile TV contents from user, which provides an accurate estimate of the amount of bandwidth for WiMAX TV service and also enables a designer to optimally select the number of channels via WSDV schemes while meeting a desired level of blocking probability. Finally, we also demonstrate that the optimized scheme outperforms the conventional schemes in terms of blocking probability, and address the bandwidth sharing effect with other data services.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129686540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674797
Hyosun Roh, Souhwan Jung
This paper proposes a secure session key exchange and mutual authentication scheme between mobile machines in WLAN-based ad hoc networks. One of the main security challenges for secure machine to machine communication is to accomplish a simple and efficient session key exchange and mutual authentication. The main idea of this paper is that non-interactive session key exchange uses the mobile machine's ID and mutual authentication without communication with an authentication server whenever a data transmission occurs between the mobile machines. The proposed scheme is secure against man-in-the-middle attack, impersonation attack, and modification attack.
{"title":"Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks","authors":"Hyosun Roh, Souhwan Jung","doi":"10.1109/ICTC.2010.5674797","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674797","url":null,"abstract":"This paper proposes a secure session key exchange and mutual authentication scheme between mobile machines in WLAN-based ad hoc networks. One of the main security challenges for secure machine to machine communication is to accomplish a simple and efficient session key exchange and mutual authentication. The main idea of this paper is that non-interactive session key exchange uses the mobile machine's ID and mutual authentication without communication with an authentication server whenever a data transmission occurs between the mobile machines. The proposed scheme is secure against man-in-the-middle attack, impersonation attack, and modification attack.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128753134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674808
Jaehyuk Kim, Soo-Hyung Lee, Wontae Kim, Seungmin Park
The DMW(Data-Centric Middleware) in CPS to support for high reliable and Autonomous Controlling Software is the platform that distributes a Publish/Subscribe based real-time data and supply a different QoS(Quality of Service). This paper deals with the DTB(Data Transport Block) in DMW that is to supply high reliable and QoS.
{"title":"Data Transport Block structure design in CPS Middleware Subsystem","authors":"Jaehyuk Kim, Soo-Hyung Lee, Wontae Kim, Seungmin Park","doi":"10.1109/ICTC.2010.5674808","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674808","url":null,"abstract":"The DMW(Data-Centric Middleware) in CPS to support for high reliable and Autonomous Controlling Software is the platform that distributes a Publish/Subscribe based real-time data and supply a different QoS(Quality of Service). This paper deals with the DTB(Data Transport Block) in DMW that is to supply high reliable and QoS.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114320592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674760
Sang Jin Lee, Ingeol Chun, Wontae Kim, Seungmin Park
Sensor networks are vulnerable to types of Denial-of-Service attacks such as the selective forwarding attack in which an adversary injects the compromised nodes, attempting to either deny these nodes of critical information or to deceive the base station. This attack can suppress or modify critical information such as the movement of enemy forces. However, such type of attacks faces the risk that neighboring nodes will conclude that the compromised node has failed and they will decide to find another route. To detect a selective forwarding attack, Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area where the selective forwarding attack is generated. However, CHEMAS has the static probability of selecting check-point nodes; it cannot achieve the flexibility to coordinate between the detection capability and energy consumption. This paper proposes a method that determines the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks. In the proposed method, a fuzzy rule-based system is exploited for selecting the checkpoint nodes by considering factors like the remaining energy of each path, the number of suspect nodes and the estimated distance from the BS to each node.
{"title":"Control method for the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks","authors":"Sang Jin Lee, Ingeol Chun, Wontae Kim, Seungmin Park","doi":"10.1109/ICTC.2010.5674760","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674760","url":null,"abstract":"Sensor networks are vulnerable to types of Denial-of-Service attacks such as the selective forwarding attack in which an adversary injects the compromised nodes, attempting to either deny these nodes of critical information or to deceive the base station. This attack can suppress or modify critical information such as the movement of enemy forces. However, such type of attacks faces the risk that neighboring nodes will conclude that the compromised node has failed and they will decide to find another route. To detect a selective forwarding attack, Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area where the selective forwarding attack is generated. However, CHEMAS has the static probability of selecting check-point nodes; it cannot achieve the flexibility to coordinate between the detection capability and energy consumption. This paper proposes a method that determines the number of checkpoint nodes for detecting selective forwarding attacks in wireless sensor networks. In the proposed method, a fuzzy rule-based system is exploited for selecting the checkpoint nodes by considering factors like the remaining energy of each path, the number of suspect nodes and the estimated distance from the BS to each node.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114556717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674693
Hyuntae Cho, Sanghyun Son, Yunju Baek
RFID (Radio Frequency Identification) is an automatic identification technology where information is carried by radio waves. The active type of RFID focuses on a long communication range while the passive type focuses on a low cost for a number of dense deployments. Nevertheless, the active type cannot be applied to a large-scale area due to its limited radio communication. This paper proposes a multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment. The proposed method uses a collection agent on ZigBee networks to extend the coverage of the RFID reader and collect RFID tags outside its communication range. This paper also includes an experiment and a performance evaluation. To evaluate the performance of the proposed method, we implemented an RFID system, which complies with a standard of 433MHz active RFIDs based on ISO/IEC 18000-71.
{"title":"Multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment","authors":"Hyuntae Cho, Sanghyun Son, Yunju Baek","doi":"10.1109/ICTC.2010.5674693","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674693","url":null,"abstract":"RFID (Radio Frequency Identification) is an automatic identification technology where information is carried by radio waves. The active type of RFID focuses on a long communication range while the passive type focuses on a low cost for a number of dense deployments. Nevertheless, the active type cannot be applied to a large-scale area due to its limited radio communication. This paper proposes a multi-hop based collection utilizing ZigBee networks for a large-scale active RFID deployment. The proposed method uses a collection agent on ZigBee networks to extend the coverage of the RFID reader and collect RFID tags outside its communication range. This paper also includes an experiment and a performance evaluation. To evaluate the performance of the proposed method, we implemented an RFID system, which complies with a standard of 433MHz active RFIDs based on ISO/IEC 18000-71.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115770622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674775
Man Yup Lee, Tai-Myung Chung
The rapid development of wireless and the advent of fixed mobile convergence have brought deployment of small wireless environment such as femtocell, which can connect Internet or network easily at home and office. Users must be authenticated from the Authentication, Authorization and Accounting (AAA) server to use the Internet or network at home and office. As diameter-based AAA uses TCP/SCTP at the transport, the diameter-based AAA server will have a limit on the number of clients if the interworking of small clients increases. Consequently, the performance will reach its peak and therefore the extension or enlargement of server will be required. This paper proposes an efficient interworking method between diameter-based clients, agent and server upon study of AAA mechanism.
无线技术的快速发展和固定移动融合的出现,带来了小型无线环境的部署,如femtocell,可以轻松地在家庭和办公室连接互联网或网络。用户必须通过AAA (Authentication, Authorization and Accounting)服务器的认证才能在家庭和办公室使用Internet或网络。由于基于直径的AAA在传输中使用TCP/SCTP,如果小客户端的互连增加,基于直径的AAA服务器将限制客户端的数量。因此,性能将达到峰值,因此需要扩展或扩大服务器。本文在研究AAA机制的基础上,提出了一种基于直径的客户端、代理和服务器之间的高效互连方法。
{"title":"Diameter-based AAA architecture to support small AAA client","authors":"Man Yup Lee, Tai-Myung Chung","doi":"10.1109/ICTC.2010.5674775","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674775","url":null,"abstract":"The rapid development of wireless and the advent of fixed mobile convergence have brought deployment of small wireless environment such as femtocell, which can connect Internet or network easily at home and office. Users must be authenticated from the Authentication, Authorization and Accounting (AAA) server to use the Internet or network at home and office. As diameter-based AAA uses TCP/SCTP at the transport, the diameter-based AAA server will have a limit on the number of clients if the interworking of small clients increases. Consequently, the performance will reach its peak and therefore the extension or enlargement of server will be required. This paper proposes an efficient interworking method between diameter-based clients, agent and server upon study of AAA mechanism.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132414403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674787
M. Shin, Hyoungjun Kim
Future Internet researches revolve around the notion “Architecture”. Architecture can be defined as the set of principles and basic mechanisms that guide network engineering. Historically, informal architectural ideas guided design of the Internet protocols, but the architecture was formalized later. The today's Internet architecture is under serious reconsideration and people started thinking about alternatives. It is necessary to support a variety of the new different architectures to accommodate the heterogeneity of Future Internet. In the paper, we discuss new challenges on virtualized programmable platform and discuss a new way forward for accommodating the multiple, heterogeneous architectures in a single infrastructure.
{"title":"Virtualized programmable platform: Accommodating multiple, heterogeneous architectures in a single infrastructure","authors":"M. Shin, Hyoungjun Kim","doi":"10.1109/ICTC.2010.5674787","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674787","url":null,"abstract":"Future Internet researches revolve around the notion “Architecture”. Architecture can be defined as the set of principles and basic mechanisms that guide network engineering. Historically, informal architectural ideas guided design of the Internet protocols, but the architecture was formalized later. The today's Internet architecture is under serious reconsideration and people started thinking about alternatives. It is necessary to support a variety of the new different architectures to accommodate the heterogeneity of Future Internet. In the paper, we discuss new challenges on virtualized programmable platform and discuss a new way forward for accommodating the multiple, heterogeneous architectures in a single infrastructure.","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131104797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-23DOI: 10.1109/ICTC.2010.5674796
Nogil Myoung, Younghyun Kim, Sang-Yeom Lee
Information and communication technologies (ICT) play a pivotal role in SmartGrid. However, the current ICT infrastructures do not fully support real-time, secure and reliable communications and do not accommodate requirements of new SmartGrid services. According to that, power utilities do their best to construct upgraded communication networks for SmartGrid. The intent of this paper is to introduce KEPCO's field area network (FAN) architecture and research for smart distribution automation system (DAS) and advanced metering infrastructure (AMI).
{"title":"The design of communication infrastructures for smart DAS and AMI","authors":"Nogil Myoung, Younghyun Kim, Sang-Yeom Lee","doi":"10.1109/ICTC.2010.5674796","DOIUrl":"https://doi.org/10.1109/ICTC.2010.5674796","url":null,"abstract":"Information and communication technologies (ICT) play a pivotal role in SmartGrid. However, the current ICT infrastructures do not fully support real-time, secure and reliable communications and do not accommodate requirements of new SmartGrid services. According to that, power utilities do their best to construct upgraded communication networks for SmartGrid. The intent of this paper is to introduce KEPCO's field area network (FAN) architecture and research for smart distribution automation system (DAS) and advanced metering infrastructure (AMI).","PeriodicalId":149198,"journal":{"name":"2010 International Conference on Information and Communication Technology Convergence (ICTC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133406131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}