http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
차량의 이동 방향과 거리 기반의 그리디 애니캐스트 포워딩 프로토콜
차시호,이종언,류민우,Cha, Siho,Lee, Jongeon,Ryu, Minwoo 디지털산업정보학회 2017 디지털산업정보학회논문지 Vol.13 No.1
Vehicular ad-hoc networks (VANETs) cause link disconnection problems due to the rapid speed and the frequent moving direction change of vehicles. Link disconnection in vehicle-to-vehicle communication is an important issue that must be solved because it decreases the reliability of packet forwarding. From the characteristics of VANETs, greedy forwarding protocols using the position information based on the inter-vehicle distance have gained attention. However, greedy forwarding protocols do not perform well in the urban environment where the direction of the vehicle changes greatly. It is because greedy forwarding protocols select the neighbor vehicle that is closest to the destination vehicle as the next transmission vehicle. In this paper, we propose a greedy anycast forwarding (GAF) protocol to improve the reliability of the inter-vehicle communication. The proposed GAF protocol combines the greedy forwarding scheme and the anycast forwarding method. Simulation results show that the GAF protocol can provide a better packet delivery rate than existing greedy forwarding protocols.
서비스 오케스트레이션 기반 사용자 맞춤형 IoT 서비스의 설계 및 구현
차시호,류민우,Cha, Siho,Ryu, Minwoo 디지털산업정보학회 2015 디지털산업정보학회논문지 Vol.11 No.3
The Internet of Things (IoT) is an Infrastructure which allows to connect with each device in physical world through the Internet. Thus IoT enables to provide meahup services or intelligent services to human user using collected data from those devices. Due to these advantages, IoT is used in divers service domains such as traffic, distribution, healthcare, and smart city. However, current IoT provides restricted services because it only supports monitor and control devices according to collected data from the devices. To resolve this problem, we propose a design and implementation of personalized IoT service base on service orchestration. The proposed service allows to discover specific services and then to combine the services according to a user location. To this end, we develop a service ontology to interpret user information according to meanings and smartphone web app to use the IoT service by human user. We also develop a service platform to work with external IoT platform. Finally, to show feasibility, we evaluate the proposed system via study.
제스처를 이용한 스마트폰 기반 사용자 편의 홈 네트워크 제어 시스템의 설계 및 구현
전병찬,차시호,Jeon, Byoungchan,Cha, Siho 디지털산업정보학회 2015 디지털산업정보학회논문지 Vol.11 No.2
Under the penetration of smartphones equipped with a variety of features grows globally, the efficient using of a variety of functions of smartphones has been increased. In accordance with this trend, a lot of researches on the remote control method using the smart phone for consumer products in home networks. Input methods of the current smpartphoes are typically button-based inputs through touching. The button input methods are inconvenient for people who are not familiar touch. Therefore, the researches on the different input schemes to replace the touch methods are required. In this paper, we propose a gesture based input method to replace the touch-sensitive input that of the existing smartphone applications, and a way to apply it to home networks. The proposed method uses three-axis acceleration sensor which is built into smatphones, and it also defines six kinds of gestures patterns that may be applied to home network systems by measuring the recognition rates.
차량인터넷을 포함한 V2X 환경에서 안전한 차량 통신 서비스 제공을 위한 해시 트리 기반 통신 프로토콜
진병욱,차시호,Jin, Byungwook,Cha, Siho 디지털산업정보학회 2018 디지털산업정보학회논문지 Vol.14 No.1
Various messages generated in vehicles are transmitted based on the wireless telecommunication which is a core technology of vehicle to everything (V2X). However, the hackers attack them upon penetration to the system and network to cause the generation of users' inconveniences for vehicular communication. Moreover, huge damage could be occurred in terms of physical and materialistic areas if the users in the vehicles were attacked in the communication environment. Therefore, this study was to design the safe communication protocol using hash tree technique in the V2X environments. Using hash tree technique, processes of issuing certificate and registration and communication protocol were designed, and safety analysis was performed on the attacking technique which is occurred in the existing vehicles. Approximately 62% of decrease in the capacity analysis was found upon comparative analysis of telecommunication processes with the system to issue the certificate which is used in the existing vehicles.
IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가
진병욱,정동욱,차시호,전문석,Jin, Byungwook,Jung, Dongwoog,Cha, Siho,Jun, Moonseog 디지털산업정보학회 2016 디지털산업정보학회논문지 Vol.12 No.1
Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.
퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가
진병욱,김종화,차시호,전문석,Jin, Byungwook,Kim, Jonghwa,Cha, Siho,Jun, Moonseog 디지털산업정보학회 2016 디지털산업정보학회논문지 Vol.12 No.1
Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.
김대영(Daeyoung Kim),이종언(Jongeon Lee),차시호(Siho Cha),조국현(Kukhyun Cho) 한국정보과학회 2004 한국정보과학회 학술발표논문집 Vol.31 No.2Ⅲ
기존 원력 통신 네트워크나 서비스를 위한 관리는 통합된 관리 모델(SNMP/SMI)을 사용함으로써 다양한 기반 구조의 통합을 가능하게 하였다. 그러나, 음성과 데이터의 통합, 유선과 무선의 융합, 사업자간 서비스 영역 구분으로 인하여 기존 관리 시스템은 비능률적이고 복잡하며 구현과 큰 네트워크에 적용하기 어렵다. 이를 개선하기 위하여 SUN에서 네트워크 관리 기술인 JMX(Java Management Extenstions)를 제공 하고 있다. JMX는 어플리케이션과 네트워크 관리 및 모니터링을 위한 아키텍처이며 현존하는 관리 및 모니터링 시스템을 통합하는 수단을 제공하여 준다. 따라서, 본 논문에서는 JMX를 활용하여 통합 네트워크 관리를 할 수 있는 시스템을 설계한다.