Mobile middleware platform for secure vessel traffic system in IoT service environment

Size: px
Start display at page:

Download "Mobile middleware platform for secure vessel traffic system in IoT service environment"

Transcription

1 SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9: Published online 10 November 2014 in Wiley Online Library (wileyonlinelibrary.com) SPECIAL ISSUE PAPER Mobile middleware platform for secure vessel traffic system in IoT service environment Namje Park 1 * and Hyo-Chan Bang 2 1 Department of Computer Education, Teachers College, Jeju National University, Jeju-si, Korea 2 Electronics and Telecommunications Research Institute (ETRI), Daejeon, Korea ABSTRACT The Inter-VTS Data Exchange Format (IVEF) service is the draft standard designed for exchange of information on sea traffic between the vessel traffic systems and between the vessels. Standardization of this service is under way as a part of the next-generation navigation system, called e-navigation. The International Association of Lighthouse Authorities suggests, on its recommendation V-145, the IVEF service model and the protocol for provisioning of this service. But the detailed configuration of this service must be designed by the users. IVEF service is aimed at establishing a common framework to ensure exchange of ship information between vessel traffic service (VTS) centers gained via automatic ship identification device, closed-circuit television, radar system and other devices. Robust exchange of marine traffic information between VTS centers through IVEF service will enable related authorities to identify location of domestic and international ships in the coastal waters real-time and predict expected sea route, thus ensure effective sea route control and pre-emptive response to potential disasters or accidents. This paper suggests, based on the basic service model and protocol provided in the recommendation V-145, the implementation of the Jeju-VTS middleware, which will facilitate exchange of information on sea traffic. This paper developed a system enabling IVEF service simulation under an Internet of Things environment made possible by improving IVEF software development kit, which is an open source. For this, a mobile phone loaded with Android platform and desk top PC has been used for emulation of a ship on voyage and VTS center. Copyright 2014 John Wiley & Sons, Ltd. KEYWORDS android platform; e-navigation; IVEF; VTS; IoT; internet of thing; mobile middleware; vessel traffic system *Correspondence Namje Park, Department of Computer Education, Teachers College, Jeju National University, 61 Iljudong-ro, Jeju-si, Jeju Special Self- Governing Province, , Korea. namjepark@jejunu.ac.kr 1. INTRODUCTION A vessel traffic service (VTS) is a marine traffic monitoring system established by harbor or port authorities, similar to air traffic control for aircraft. Typical VTS systems use radar, closed-circuit television (CCTV), VHF radiotelephony and automatic identification system to keep track of vessel movements and provide navigational safety in a limited geographical area. As electronic technology has been developing, a number of ship- and shore-based electronic devices have been used for vessels such as Automatic Identification System (AIS), Electronic Chart Display and Information System, and Long Range Identification and Tracking systems. In addition, internet technology is being adopted for safe, economic and efficient movement of vessels and maritime disasters. Therefore, electronic gadgets on a vessel and protocols between vessel traffic systems need to be standardized. e-navigation is a concept developed under the auspices of the UN s International Maritime Organization to bring about increased safety and security in commercial shipping through better organization of data on ships and on shore, and better data exchange and communication between the two. An effort to set a new global standard for e-navigation, which is a new concept of ship navigation system, is underway with the aim to secure stable ship navigation, preserve marine environment and provide security-related services in marine activities. International Maritime Organization under UN is providing sponsorship for this initiative. The objective of e-navigation, which is the next-generation ship navigation system based on electronic technology and IT, is to collect, integrate, exchange and analyze marine information between ships and between sea and land. The International Association of Lighthouse 500 Copyright 2014 John Wiley & Sons, Ltd.

2 N. Park and H.-C. Bang Mobile middleware platform for secure vessel traffic system Authorities (IALA) has developed Inter-VTS Data Exchange Format (IVEF) as the standard for mutual VTS data communication in e-navigation system and standardization is currently underway. The IVEF service is the draft standard designed for exchange of information on sea traffic between the vessel traffic systems and between the vessels. Standardization of this service is under way as a part of the next-generation navigation system, called e-navigation [6,7]. The IALA suggests, on its recommendation V-145, the IVEF service model and the protocol for provisioning of this service [1,5]. But the detailed configuration of this service must be designed by the users. IVEF service is aimed at establishing a common framework to ensure exchange of ship information between VTS centers gained via automatic ship identification device, CCTV, radar system and other devices. For this, a number of models such as data model, interaction model and security model are being proposed, and XML-type basic protocol to deliver them has been distributed. Robust exchange of marine traffic information between VTS centers through IVEF service will enable related authorities to identify location of domestic and international ships in the coastal waters real-time and predict expected sea route, thus ensure effective sea route control and pre-emptive response to potential disasters or accidents. Furthermore, an international collaboration system between countries that use standard protocol assists effective response to threats from pirates. This paper suggests, based on the basic service model and protocol provided in the recommendation V-145, the design of the Jeju-VTS (J-VTS) mobile middleware, which will facilitate exchange of information on sea traffic. The J-VTS middleware consists of various components for providing the IVEF service and for processing the IVEF message protocols. The vessel traffic systems and the vessels corresponding to upper-layer applications may use the IVEF service with the functions provided by the J-VTS middleware, and the services are designed to be accessed according to the security level of users. And this paper developed a system enabling IVEF service simulation under a wireless environment made possible by improving IVEF software development kit (SDK), which is an open source [1,3]. For this, a mobile phone loaded with Android platform and desk top PC has been used for emulation of a ship on voyage and VTS center [24,26]. 2. RELATED WORK 2.1. Introduction of VTS system Generally, the factors that comprise of VTS system are shown in Figure 1, where the VTS center on land, various sensors (CCTV, Radar, DF, MET and sensors) and the base station with AIS with the control center with actual VTS utilization are connected in a communication net of ship, satellite and sensors in the control system. The FP project in Europe promoted various e-navigation studies, including next-generation vessel transportation control related technologies of VTS, VTMIS and PCS. This is the e-navigation project that will be realized in to provide cruise support and search and rescue service through safe and efficient information management by collecting the various pieces of information, such as vessel movements and docking, sea area climates, geography and environment, with diverse equipments. In addition, the MarNIS project carried out by the European Union studied the wide sea area communication technology for Figure 1. System architecture of vessel traffic service. Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 501

3 Mobile middleware platform for secure vessel traffic system N. Park and H.-C. Bang an improved multimedia vessel communication. Especially, the improved sea area control function and vessel multimedia communication function were studied, and the practical service realization and international standards request continuous future research IVEF protocol The VTS Committee of IALA is a framework of methods and services to promote the safety, security, efficiency and environment protection in all transportable waters that is evolving from a traditional VTS to an e-navigation service. In other words, this service structure is advanced from the vessel traffic monitor and control to business service and e-navigation in vessel computing environment as a new service form. The various information collection and management in the sea encountered a rapid development in its technology, which aims to provide the information service for the vessels during their voyage, such as sea situations and sea map vessel support. At this time, the vessel information collection /management/production/ sharing/provision services should be enabled through the information collection from vessels or trusted information exchange between the land systems [1,6,28]. The IVEF service is a gateway service in the currently developing land system structure by IALA-AISM s e-navigation working group. In other words, the IVEF service can have an external third party system linking structure as the client that requests the service, and the mutually trusted network gateway security service is required. Figure 2 shows the IVEF information exchange of VTS center with other users and institutions, such as neighboring control center, control institutions within the control area or other relevant institutions. As shown in the figure, the traffic information provides the necessary information to the nearby system through the IVEF service. IVEF service should be defined as a mutually linked service between domains. In addition, for a safe IVEF service, the land systems of regional VTS, national VTS, related institutions and companies should be interconnected in a safe structure. The IVEF service is a server/client model serving as a protocol to exchange traffic information between VTS systems. Its development based on open source is underway by IALA and its protocol and sample program can be checked by downloading SDK in OpenIVEF website [2]. Basic actions to provide service between server/client take three steps as follows. In the first step, a client requests server certification and receives login reply if he or she is a legitimate user. In the second step, the server provides a certain service for the specific user only if it has such service. If it does not offer such service, it provides a basic service defined in the standard called Basic IVEF Services. In this step, the client can designate area of interest, data renewal period or data form based on his or her preference. In the third step, the client sends logout message to the server in order to end use of IVEF service. Because the server does not give a separate reply on the logout message, all the client has to do is just cancel access to server when he or she sends the message [4,6]. The IALA, which is the basic protocol to provide IVEF service between VTS centers, defines nine messages as shown in Table I. Definition of these messages is composed of XML-type schema, and all messages are composed of sub-elements of MSG_IVEF, which is the most significant element. Message of each sub-element also has its own sub-elements based on message characteristics. IVEF messages are broadly divided into control information message and real-time information message. The former consists of user certification and termination, service request to the server and its reply message and others to provide information on server status. The latter controls ship s current location, expected route, destination port and other physical information in an object data. The main purpose of object data is to exchange the following information: Figure 2. Vessel traffic service (VTS) and Inter-VTS Data Exchange Format (IVEF) service. 502 Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

4 N. Park and H.-C. Bang Mobile middleware platform for secure vessel traffic system Table I. Inter-VTS Data Exchange Format interface message define. Message From To Control information message Login Client Server Login response Server Client Logout Client Server Ping Both Both Pong Both Both Service request Client Server Service request response Server Client Service status Server Client Real-time information message Object data Server User real-time tracking positions, static vessel information and voyage related information. 3. PROPOSED J-VTS SERVICE ARCHITECTURE 3.1. Linking service structure among VTS domains The linking service among domains (gateway service) is regionally or globally connected as shown in Figure 3 [6]. The structure in Figure 3 can include the VTS domain headquarters that oversees all of the VTS s within the domain, such as harbor VTS (harbor arrival and departure control), shore VTS (shore area control), National VTS (overseas vessel control) and domain headquarters VTS (national or large scale policy management and gateway). The VTS domain headquarters can manage the policies and authorities with other domains and is organized in a hierarchical manner by the VTS domain headquarters to separate the roles of the control even with the centers under different departments through transfer of right to control. Figure 3. Structure of the vessel traffic service (VTS) domain service. Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 503

5 Mobile middleware platform for secure vessel traffic system N. Park and H.-C. Bang 3.2. Domain security factor definition and management flow map This clause defines the mutual security factors between domains and detailed procedures using the defined security messages. In other words, Figure 4 shows the security management flow map on the linking areas with the security messages where the VTS domain B approaches VTS domain A[7 9]. The basic security structure uses the XML-based standard protocols, and the characteristics for IVEF are expanded using the IVEF security message characteristic exchange protocol. The approach management procedures according to the procedures and authorities for the policy management within a domain when the domains are linked are shown in Figure 4. After the IVEF service between the domains is requested, the VTS IVEF service basic certification mechanism based on ID/Password with the access limitation based authority function is as follows. (1) The user sends the access request to use the system resources or application service. At this time, the access request is the same as the existing methods with user ID and password. (2) The Policy enforcement Point (PEP) of the access control receives the access request and confirms the user s ID and password with the access control list. This is the same as the previous method. (3) Once the VTS PEP (VPEP) confirms the user ID and password, it will transmit the user ID and the requested items (read, write, execute) to VTS Policy Decision Point (VPDP). (4) VPDP loads the policy from Policy Administration Point and determines whether the user has the appropriate authorities for the requested actions. For this, the user, resource, environmental characteristics and policy are used to determine whether to approve. (5) VPDP delivers the result to VPEP. In other words, approval/denial is delivered to VPEP. When it is approved, the user certificate is examined and if it is valid, then the user request is approved. (6) VPEP downloads the user certificate from the storage and checks for validity. If it is valid, it approves the access. The VTS basic authority management certificate mechanism procedures with access limitation do not have a huge advantage because the VTS system becomes more complex and the costs for the access control increases compared to the existing system, but it makes the integration of the access control system easier. Because it uses the standard technology of XACML and X.509 PMI, if the newly added system requires access control, the access determination does not have to be realized again. In other words, the additional open access control function in VTS basic authority management certificate access control system only needs to add the communication between the user and VPEP, and the rest can be on the existing realizations. Even if it is an independent system, the access control function can be reused, and it can reduce the costs for access control when adding the service system. Figure 5 shows the conditional user access control mechanism for VTS mutual linkage [10 12]. The conditional user access control mechanism for VTS mutual linkage is used when VTS domain B approaches the overall VTS service system provided by Figure 4. Inter-VTS Data Exchange Format (IVEF) security process. 504 Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

6 N. Park and H.-C. Bang Mobile middleware platform for secure vessel traffic system Figure 5. User access control mechanism for vessel traffic service (VTS) mutual linkage. the external system through the internal system and works as follows. The VTS domain B user opens an account based on the overall VTS service system certification and authority mechanism and also opens an account at the VTS service system. Before the overall VTS service system can approve the approach of the VTS domain B user, the VTS service system inquires the overall service related characteristics. In addition, the VTS service system can have its own VPEP and VPDP. In this case, VPDP returns the authority decisions attached to the conditional tasks on the VTS service characteristics. Therefore, VPEP transmits the authority decision request to the external service. VTS service receives the authority decision request from VPEP and returns the characteristic token, and this is used to examine the conditional tasks from VPEP on the VTS service system. What follows is the conditional user access control mechanism procedures for VTS domain linkage related characteristics [13 15,35]. (1) VTS domain B requests the VTS service system access. (2) VTS service system transmits the authority decision request to service. This is performed by the VPEP within the VTS service system or the external VPEP of VTS service system. (3) Once VTS service receives the authority decision request from the VPEP of VTS service system delivers the authority decision request to PEP. (4) VPEP transmits the XAML characteristic decision request to VPDP. (5) VPDP confirms the VTS domain B account, characteristics and policy to transmit the approval/denial decision to VPDP. (6) If the authority is approved, VPDP will transmit the SAML characteristic token to PEP. (7) VPEP transmits SAML token. (8) VTS service transmits the token to VTS service system. (9) VTS service system provides the VTS domain A service to VTS domain B. 4. PROPOSED J-VTS MIDDLEWARE PLATFORM 4.1. Security enhancement of user authentication scheme The IVEF is an open-source SDK for VTS information exchange that is being developed by IALA and is almost complete in its international standardization as a gateway. The official IVEF technology documents provided by IALA specify that the data security except for authentication and authorization is out of the IVEF scope. The IVEF security suggested at this point only codes the user authorization information in an open key method. However, when the physical link is terminated and then reconnected between VTS s, the VTS system may be delayed from temporary traffic overload. This may lead to data leakage. A solution requires studies on the main authorization server. This section suggests the main authorization server for user authentication as shown in Figure 6 [27,29]. Figure 7 briefly summarizes the information exchange system after authentication for the Main Authentication Server (MAS) with the IVEF Client (IC) and IVEF Server (IS). The MAS is composed of Authentication Server (AS) and Ticket Granting Server (TGS). Figure 7 shows the protocol between IC, IS and MAS. Step 1 in Figure 7 shows how IC requires to confirm the user from the AS in MAS using the login information. Step 2 is the issuing of the session key after the certification of the IC in AS. Step 3 is the request of the TGS ticket issuing from TGS with the issued Session key. TGS ticket holds Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 505

7 Mobile middleware platform for secure vessel traffic system N. Park and H.-C. Bang Figure 6. Main authorization scheme for user authentication in Inter-VTS Data Exchange Format (IVEF). Figure 7. Secure protocol between IVEF Client, IVEF Server and Main Authentication Server (MAS). the Client ID, IP address, Ticket issue time and ticket validity information. Step 4 sends the IC confirmation certified in AS in MAS to IS. Step 5 requests the Login information from IC by IS directly. Step 6 is the request of the server authentication with the Client Login information. Step 7 is the result delivery after the comparison of the confirmation from AS in step 4 and the client login result. Step 8 confirms the issued session key in step 2. Lastly, step 9 certifies IC and IS by issuing the same TGS ticket if there were no errors in all steps [6,17,18,25]. Therefore, MAS can authenticate IC and IS at the same time to sense the link termination in certain areas. In addition, the TGS ticket IP address and ticket valid time information can prevent the illegal access and replay attack of the attackers [30 32,36] Proposed VTS mobile middleware platform This paper suggests the J-VTS (Jeju National University- Vessel Traffic System) middleware structure to implement the IVEF service model. J-VTS consists of components and functions, which abstract the IVEF protocol and the IVEF service, enabling the vessel traffic system and vessels to easily use the IVEF service. The J-VTS middleware is designed in consideration of all models recommended in the IALA recommendation V-145: the data model, the security model, the interface model, the interaction model, the test model and the admin model. The J-VTS middleware has additional components; one analyzes and creates the IVEF messages in consideration of the IVEF message protocol, and the other provides specific actions in accordance with the result of the analysis. Figure 8 illustrates the overall architecture of the J-VTS middleware. J-VTS is divided into three layers. The first layer is the application layer, which corresponds to the vessel traffic system or vessels in service. The second layer is the J-VTS standard function layer. It consists of functions, which, on the application layer, communicate with major components of the J-VTS middleware and control the related components. The third layer consists of 12 components, which provide the IVEF service, send/receive messages under the IVEF protocol base and collect/analyze various sensor data [33,34]. For emulation of mutual data transmission/reception via IVEF between VTS server and ship, this paper used smart phone loaded with Android Gingerbread version as the VTS client system. For VTS server emulation, Intel Core-i5 desk top PC installed with Windows 7 was used. Communication between these systems is provided via wireless Internet network, and IVEF SK has been revised to fit the system to ensure convenient maintenance and protocol s scalability. 506 Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

8 N. Park and H.-C. Bang Mobile middleware platform for secure vessel traffic system Figure 8. Jeju-vessel traffic service (J-VTS) mobile middleware architecture VTS mobile client program The J-VTS Client program is based on Android version (Gingerbread), and nine major message protocols have been implemented upon recommendation from IALA s V-145. The messages organized interface using Android s list view, and the very message is requested to the server once a certain item in the list view is selected. Message request is in XML format as per V-145 recommendation, and the server makes an equivalent message reply after analyzing the requested message. The received message is displayed as major information acquired by parsing XML message transmitted from server securedtype of data as shown in the right of Figure 9. A client program is written with Android-based Java. As for network, it is written based on the Java TCP/IP protocol stack, and the UI components provided by the Android platform for user interface. The main codes for implementation of the client are as follows [7,8,19,20,25]: (1) developed on the Android Gingerbread platform, (2) MainActivity showing the protocol list, (3) the thread requesting messages from the server through the socket communication and extracts useful information from the received xml file, (4) ViewerActivity showing the xml file and useful information on the display, (5) actual V-145 recommended library, (6) the XmlMsgCreator code creating the xml file based on the recommended library and (7) the handler processing the library-parsed codes. Figure 9. Inter-VTS Data Exchange Format (IVEF s) client menu. Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 507

9 Mobile middleware platform for secure vessel traffic system N. Park and H.-C. Bang 4.4. VTS server system The major function of a server program is to receive V-145 recommendation message requested from the client via a specific port, analyze the requested message and provide proper navigation information. As per V-145 recommendation, Basic IVEF Services service has to be implemented, and other services can be provided as an addition. First, the server creates a separate thread whenever a client accesses into the server to process client s message. The requested message then distinguishes the message among IVEF interface messages in Figure 10 in the protocol analyzer implemented as Simple API for XML parser. The service provider then organizes services required by Figure 10. Server s flow chart. the user following user certification procedure and creates XML message as per V-145 recommendation for transmission to the client. All at the same time, information related to server s user interface is renewed to allow the user to monitor communication status between the server and the client. Screen of the server program is split into four parts, that is, Server Connection menu to start server operation, Server Status Monitoring, Request Protocol, Useful Information and Sending XML Message as shown in Figure 11. Server Status Monitoring shows IP, port, stand-by status of server in service, client s access time and other client s access information. Request Protocol shows messages requested by clients and analysis of the requested messages via protocol analyzer described in Section 3.2. Useful Information shows XML information analyzed via protocol analyzer, and data information is managed in container structure based on message classification. Sending XML Message shows texts of transmitted messages converted in XML-type format as per V- 145 recommendation. The final converted XML data are sent to the client via TCP/IP stack (Figure 12). The server program is written with the Java language. The daemon runs with the TCP/IP protocol stack provided by Java, and the user interface is implemented with Java Swing. If the server program is started initially and a user starts the server, a thread is created, waiting for access of a client. This thread uses the protocol developed in this project as the library, and performs the functions in accordance with this protocol. The main components for implementation of server and the implementation details are as follows [21 23,37,38]: Figure 11. Inter-VTS Data Exchange Format (IVEF s) server operation. 508 Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

10 N. Park and H.-C. Bang Mobile middleware platform for secure vessel traffic system Figure 12. Inter-VTS Data Exchange Format (IVEF s) service message transaction. (1) using the Java-based TCP/IP protocol stack, (2) using the Java Swing-based UI framework, (3) using the v-145 recommended protocol library developed in the project, (4) the thread creating and transmitting messages requested by the clients through the socket communication, (5) the handler code processing the final XML-parsed result and (6) the message creator code encoding messages into the recommended XML files. Figure 13 showed a difference for 4 s that compares average transfer time between client and mobile J-VTS middleware of middleware filtering and unfiltering by network. This showed a phenomenon that increases until 4 s according to an increased tag number on the whole protocol time. Figure 13. Simulation result of Jeju-vessel traffic service middleware filtering. Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 509

11 Mobile middleware platform for secure vessel traffic system N. Park and H.-C. Bang Figure 14. Simulation result of mobile middleware non-filtering. Figure 14 showed an average transmission time according to increased tag number in non-filtering protocol environment. If tag number increases, we can see that the average transfer time increases on the whole protocol time. And average transfer time increases rapidly in case the tag number is more than 45. Therefore, the tag number that can process stably in computer on testbed environment grasped about 40 (at the same time). Compared with the difference of filtering time and protocol time, the time of mobile middleware platform s filtering module is occupied and shows that the importance of signature module about 32% of whole protocol time. implementation work have not been carried out. Therefore, further study is required to finish the detailed design of the J-VTS middleware suggested in this study, to verify applicability and to examine the improvement. By doing so, we were able to emulate mutual data exchange status between ship and VTS centers and to predict applicability of IVEF service in the real world. At present, security procedures or policy on IVEF service do not have a defined standard, which requires further study, and IVEF protocol should be improved and a new protocol design needed to ensure that radar information and video information on CCTVs can be provided in an efficient manner. 5. CONCLUSION These days, the latest electronic technologies and IT are being employed for safer ship operation and efficient control of marine traffic. e-navigation relies on IVEF service as the standard to exchange data between VTS centers. IVEF, however, is still a program under development, and thus, its actual implementation and performance have not been fully verified. This paper suggests J-VTS as the middleware that provides the IVEF service. And this paper implemented IVEF client on the mobile phone loaded with Android platform and IVEF service server on desk top PC. J-VTS is the middleware that provides the IVEF service between the vessel traffic systems and between vessels. It is designed to provide, using various functions provided by J-VTS, functions, such as IVEF service provisioning, data security, protocol test, incorporation of data and incorporation of sea traffic image. The overall structure design of the middleware is finished, but a detailed design of each component and the actual ACKNOWLEDGEMENTS This paper is extended and improved from accepted paper of CSA 2012 conferences. This work was supported by the Electronics and Telecommunications Research Institute (ETRI) grant funded by the Korean government (14ZC1310, Development of USN/WoT Convergence Platform for Internet of Reality Service Provision) and Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A4A ). REFERENCES 1. IALA Recommendation V-145 on the Inter-VTS Exchange Format (IVEF) Service, E-Navigation from Wikipedia, the free encyclopedia OpenIVEF Project Homepage, 4. A security architecture of the inter-vts system for shore side collaboration of e-navigation Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

12 N. Park and H.-C. Bang Mobile middleware platform for secure vessel traffic system 5. International Association of Lighthouses and Aids-to- Navigation Authorities (IALA), Interface Control Document for IVEF, Release Lee B, Cho H, Han J, Park N. A Security Architecture of the inter-vts System for shore side collaboration of e-navigation. Journal of navigation and port research, 2012; 36(1): Park N, Cho S, Byung-Doo K, Byunggil L, Won D. Security enhancement of user authentication scheme using IVEF in vessel traffic service system. Lecture Notes in Electrical Engineering 2012; 203: Kyunghwan K, Byung-Doo K, Byunggil L, Park N. Design and implementation of IVEF protocol using wireless communication on android mobile platform. CCIS 2012; 339: Kang T, Park N. Design of J-VTS middleware based on IVEF protocol. LNCS Arifin B, Ross E, Brodsky Y. Data security in a ship detection and Identification system. IEEE RAST ; Carter B, Green S, Leeman R, Chaulk N. SmartBay: better information better decisions. IEEE OCEANS 2008; Frejlichowski D, Lisaj A. Analysis of lossless radar images compression for navigation in marine traffic and remote transmission. IEEE Radar Conference 2008; Garnier B, Andritsos F. A port waterside security systemic analysis. IEEE WSS Conference ; Park N, Kwak J, Kim S, Won D, Kim H. WIPI mobile platform with secure service for mobile RFID network environment. In APWeb Workshops LNCS, Vol.3842,Shen HT, Li J, Li M, Ni J, Wang W (eds). Springer: Heidelberg, 2006; Park N. Security scheme for managing a large quantity of individual information in RFID environment. In ICICA CCIS, Vol.106,Zhu R, Zhang Y, Liu B, Liu C (eds). Springer: Heidelberg, 2010; Park N. Secure UHF/HF dual-band RFID: strategic framework approaches and application solutions. In ICCCI LNCS. Springer: Heidelberg, Park N. Implementation of terminal middleware platform for mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 2011; 8(4): Park N, Kim Y. Harmful adult multimedia contents filtering method in mobile RFID service environment. In ICCCI LNCS (LNAI), Vol.6422,Pan JS, Chen SM, Nguyen NT (eds). Springer: Heidelberg, 2010; Park N, Song Y. AONT encryption based application data management in mobile RFID environment. In ICCCI LNCS (LNAI), Vol.6422,Pan JS, Chen SM, Nguyen NT (eds). Springer: Heidelberg, 2010; Park N. Customized healthcare infrastructure using privacy weight level based on smart device. Communications in Computer and Information Science, Vol. 206, Springer: Heidelberg, 2011; Park N. Secure data access control scheme using typebased re-encryption in cloud environment. Studies in Computational Intelligence, Vol. 381, Springer: Heidelbergm, 2011; Park N, Song Y. Secure RFID application data management using all-or-nothing transform encryption. In WASA LNCS, Vol.6221, Pandurangan G, Anil Kumar VS, Ming G, Liu Y, Li Y (eds). Springer: Heidelberg, 2010; Park N. The implementation of open embedded S/W platform for secure mobile RFID reader. The Journal of Korea Information and Communications Society 2010; 35(5): Kim Y, Park N. Development and Application of STEAM Teaching Model Based on the Rube Goldberg s Invention. Lecture Notes in Electrical Engineering, Vol. 203, Springer: Heidelberg, 2012; Park N, Cho S, Kim B, Lee B, Won D. Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System. Lecture Notes in Electrical Engineering, Vol. 203, Springer: Heidelberg, 2012; Ko Y, An J, Park N. Development of Computer, Math, Art Convergence Education Lesson Plans Based on Smart Grid Technology. Communications in Computer and Information Science, Vol. 339, Springer: Heidelberg, 2012; Kim Y, Park N. The Effect of STEAM Education on Elementary School Student s Creativity Improvement. Communications in Computer and Information Science, Vol. 339, Springer: Heidelberg, 2012; Kim Y, Park N. Development and Application of STEAM Teaching Model Based on the Rube Goldberg s Invention. In Vol. 203,Yeo S, Pan Y, Lee YS, et al (eds). Springer: Netherlands, 2012; Kim Y, Park N. The Effect of STEAM Education on Elementary School Student s Creativity Improvement. In Vol. 339, Kim T, Stoica A, Fang W, et al (eds). Springer: Berlin/Heidelberg, 2012; Kim Y, Park N. Elementary Education of Creativity Improvement Using Rube Goldberg s Invention. In Vol. 180,Park JH, Kim J, Zou D, et al (eds). Springer: Netherlands, 2012; Kim G, Park N. Program Development of Science and Culture Education Tapping into Jeju s Special Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 511

13 Mobile middleware platform for secure vessel traffic system N. Park and H.-C. Bang Characteristics for Adults. In Vol. 339,Kim T, Stoica A, Fang W, et al (eds). Springer: Berlin/Heidelberg, 2012; Taysi ZC, Yavuz AG. ETSI compliant GeoNetworking protocol layer implementation for IVC simulations. Human-centric Computing and Information Sciences 2013; 3(4): Do-keun K, Ki HC, Choi K. A dynamic Zigbee protocol for reducing power consumption. Journal of Information Processing Systems 2013; 9(1): Adwitiya S, Lobiyal DK. Performance evaluation of data aggregation for cluster-based wireless sensor network. Human-centric Computing and Information Sciences 2013; 3(13): Liu J, Chung SH. An efficient load balancing scheme for multi-gateways in wireless mesh networks. Journal of Information Processing Systems 2013; 9(3): Choi HY, Min SG, Han YH, Koodli R. Design and simulation of a flow mobility scheme based on proxy mobile IPv6. Journal of Information Processing Systems 2012; 8(4): Lee B, Park N. Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format Protocol Based on U-Navigation System in WoT Environment. Journal of Applied Mathematics, Vol. 2014, Article ID Hindawi Publishing Corporation, 2014; Park N. Design and Implementation of Mobile VTS Middleware for Efficient IVEF Service. The Journal of Korea Information and Communications Society 2014; 39C(6): Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

Byunggil Lee 1 and Namje Park Introduction

Byunggil Lee 1 and Namje Park Introduction Applied Mathematics, Article ID 734768, 7 pages http://dx.doi.org/0.55/204/734768 Research Article Performance Improvement Based Authentication Protocol for Intervessel Traffic Service Data Exchange Format

More information

Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing *

Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing * Detection and Mitigation of Web Application Vulnerabilities Based on Security Testing * Taeseung Lee 1, Giyoun Won 2, Seongje Cho 2, Namje Park 3, and Dongho Won 1,** 1 College of Information and Communication

More information

Remote Monitoring System of Ship Running State under Wireless Network

Remote Monitoring System of Ship Running State under Wireless Network Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department

More information

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs)

An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) An Overview of Smart Sustainable Cities and the Role of Information and Communication Technologies (ICTs) Sekhar KONDEPUDI Ph.D. Vice Chair FG-SSC & Coordinator Working Group 1 ICT role and roadmap for

More information

ITU-T Y Next generation network evolution phase 1 Overview

ITU-T Y Next generation network evolution phase 1 Overview I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2340 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

A Two-Fold Authentication Mechanism for Network Security

A Two-Fold Authentication Mechanism for Network Security Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1

More information

Design and Implementation of Secure OTP Generation for IoT Devices

Design and Implementation of Secure OTP Generation for IoT Devices , pp.75-80 http://dx.doi.org/10.14257/astl.2017.146.15 Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim 1 and Jeong-Nyeo Kim 1 1 Electronics and Telecommunications Research

More information

Implementation of Semantic Information Retrieval. System in Mobile Environment

Implementation of Semantic Information Retrieval. System in Mobile Environment Contemporary Engineering Sciences, Vol. 9, 2016, no. 13, 603-608 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2016.6447 Implementation of Semantic Information Retrieval System in Mobile

More information

A Study on the IoT Sensor Interaction Transmission System based on BigData

A Study on the IoT Sensor Interaction Transmission System based on BigData Vol.123 (SoftTech 2016), pp.220-224 http://dx.doi.org/10.14257/astl.2016.123.41 A Study on the IoT Sensor Interaction Transmission System based on BigData Jin-Tae Park 1, Gyung-Soo Phyo 1 and Il-Young

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

Secure User Authentication Mechanism in Digital Home Network Environments

Secure User Authentication Mechanism in Digital Home Network Environments Secure User Authentication Mechanism in Digital Home Network Environments Jongpil Jeong, Min Young Chung, and Hyunseung Choo Intelligent HCI Convergence Research Center Sungkyunkwan University 440-746,

More information

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3

More information

Information Push Service of University Library in Network and Information Age

Information Push Service of University Library in Network and Information Age 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Information Push Service of University Library in Network and Information Age Song Deng 1 and Jun Wang

More information

A Novel Model for Home Media Streaming Service in Cloud Computing Environment

A Novel Model for Home Media Streaming Service in Cloud Computing Environment , pp.265-274 http://dx.doi.org/10.14257/ijsh.2013.7.6.26 A Novel Model for Home Media Streaming Service in Cloud Computing Environment Yun Cui 1, Myoungjin Kim 1 and Hanku Lee1, 2,* 1 Department of Internet

More information

A Finite State Mobile Agent Computation Model

A Finite State Mobile Agent Computation Model A Finite State Mobile Agent Computation Model Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, and Yunhe Pan College of Computer Science, Zhejiang University Hangzhou 310027, PR China Abstract In this paper,

More information

POSITION PAPER. QUALITY CONTROL Prepared: TenneT team Reviewed: M. Müller Approved: F. Wester Release.

POSITION PAPER. QUALITY CONTROL Prepared: TenneT team Reviewed: M. Müller Approved: F. Wester Release. POSITION PAPER STAKE HOLDER CONSULTATION PROCESS OFFSHORE GRID NL Type: Position paper Work stream Technical Topic: T.18 Data acquisition systems on offshore platform Filename ONL-TTB-03103 T18_Data acquisition

More information

A Design of U-Health System on Smart Phone Using ISO/IEEE PHD Standard

A Design of U-Health System on Smart Phone Using ISO/IEEE PHD Standard A Design of U-Health System on Smart Phone Using ISO/IEEE 11073 PHD Standard Dokyeong Lee, Gihyun Bang, Sejin Han and Deokjai Choi Electronics and Computer Engineering, Chonnam National University 77 Yongbong-ro,

More information

Embedded Smart Home System Based on ZigBee Song Chi

Embedded Smart Home System Based on ZigBee Song Chi International Conference on Intelligent Systems Research and Mechatronics Engineering (ISRME 2015) Embedded Smart Home System Based on ZigBee Song Chi Liaoning Jidian Polytechnic North Gold and Jewelry

More information

The Integrated Smart & Security Platform Powered the Developing of IOT

The Integrated Smart & Security Platform Powered the Developing of IOT The Integrated Smart & Security Platform Powered the Developing of IOT We Are Entering A New Era- 50million connections Smart-Healthcare Smart-Wearable VR/AR Intelligent Transportation Eco-Agriculture

More information

Privacy and Security in Smart Grids

Privacy and Security in Smart Grids Faculty of Computer Science, Institute of Systems Architecture, Chair for Privacy and Data Security Privacy and Security in Smart Grids The German Approach Sebastian Clauß, Stefan Köpsell Dresden, 19.10.2012

More information

Revision of Previous Lectures

Revision of Previous Lectures Lecture 15 Overview Last Lecture Local area networking This Lecture Wide area networking 1 Source: chapters 8.1-8.3, 17.1, 18.1, 18.2 Next Lecture Wide area networking 2 Source: Chapter 20 COSC244 Lecture

More information

PIAX Service Platform and its Applications

PIAX Service Platform and its Applications The 3 rd EU-J Symposium PIAX Service Platform and its Applications Susumu Takeuchi National Institute of Information and Communications Technology (NICT), Japan Background Pervasive/Ubiquitous Computing

More information

A Study of Open Middleware for Wireless Sensor Networks

A Study of Open Middleware for Wireless Sensor Networks , pp.105-109 http://dx.doi.org/10.14257/astl.2014.60.26 A Study of Open Middleware for Wireless Sensor Networks Chen-Nam 1, Do-Hyeun Kim 2 1,2 Dept. of Computing Engineering Jeju National University Jeju-Si

More information

Applicability Estimation of Mobile Mapping. System for Road Management

Applicability Estimation of Mobile Mapping. System for Road Management Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1407-1414 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49173 Applicability Estimation of Mobile Mapping System for Road Management

More information

The Research and Design of the Android-Based Facilities Environment Multifunction Remote Monitoring System*

The Research and Design of the Android-Based Facilities Environment Multifunction Remote Monitoring System* The Research and Design of the Android-Based Facilities Environment Multifunction Remote Monitoring System* Lutao Gao, Linnan ang, Lin Peng, ingjie Chen, and ongzhou u College of Basic Science & Information

More information

Available online at ScienceDirect. Procedia Computer Science 56 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 56 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 56 (2015 ) 266 270 The 10th International Conference on Future Networks and Communications (FNC 2015) A Context-based Future

More information

Study of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1

Study of Smart Home System based on Zigbee Wireless Sensor System. Jie Huang 1 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Study of Smart Home System based on Zigbee Wireless Sensor System Jie Huang 1 1 College of Mechanical and Electronic

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY. ITU-T X.660 Guidelines for using object identifiers for the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Series X Supplement 31 (09/2017) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS

More information

Development of Smart-CITY Based Convergent Contents Platform Using Bluetooth Low Energy Beacon Sensors

Development of Smart-CITY Based Convergent Contents Platform Using Bluetooth Low Energy Beacon Sensors , pp.16-20 http://dx.doi.org/10.14257/astl.2017.145.04 Development of Smart-CITY Based Convergent Contents Platform Using Bluetooth Low Energy Beacon Sensors Jihoon Seo 1 and Kil-Hong Joo 2* 1 HI-CUBE,

More information

An Enhanced Security Policy Framework for Android

An Enhanced Security Policy Framework for Android All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to

More information

Design and Implementation a Virtualization Platform for Providing Smart Tourism Services

Design and Implementation a Virtualization Platform for Providing Smart Tourism Services Design and Implementation a Virtualization Platform for Providing Smart Tourism Services Nam Don Kim, Jungho Moon, Tae Yun Chung Abstract This paper proposes an Internet of Things (IoT) based virtualization

More information

AAA Authentication: New Use Cases

AAA Authentication: New Use Cases AAA Authentication: New Use Cases An AdvOSS Solution White Paper Authors: Farhan Zaidi and Fawad Pasha Contact: {farhan.zaidi, fawadpasha}@advoss.com Whitepaper URL www.advoss.com/resources/whitepapers/aaa-authentication-new-usecases.pdf

More information

CISE. an INFORMATION SHARING TOOL to support INTEGRATED MARITIME SURVEILLANCE. European Maritime Day Göteborg, May 22 nd 2012

CISE. an INFORMATION SHARING TOOL to support INTEGRATED MARITIME SURVEILLANCE. European Maritime Day Göteborg, May 22 nd 2012 CISE an INFORMATION SHARING TOOL to support INTEGRATED MARITIME SURVEILLANCE European Maritime Day Göteborg, May 22 nd 2012 Maritime Surveillance: What? WHAT S GOING ON AT SEA? AWARENESS Legitimate Activities

More information

Advanced Smart Mobile Monitoring Solution for Managing Efficiently Gas Facilities of Korea

Advanced Smart Mobile Monitoring Solution for Managing Efficiently Gas Facilities of Korea Advanced Smart Mobile Monitoring Solution for Managing Efficiently Gas Facilities of Korea Jeong Seok Oh 1, Hyo Jung Bang 1, Green Bang 2 and Il-ju Ko 2, 1 Institute of Gas Safety R&D, Korea Gas Safety

More information

Orange Smart Cities. the ICT partner for innovators in the urban space

Orange Smart Cities. the ICT partner for innovators in the urban space Orange Smart Cities the ICT partner for innovators in the urban space Orange Smart Cities offer ICT solutions for large city infrastructures and services to the citizen ETSI Smart Cities Workshop, 3-4

More information

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication

The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication The Design of Supermarket Electronic Shopping Guide System Based on ZigBee Communication Yujie Zhang, Liang Han, and Yuanyuan Zhang College of Electrical and Information Engineering, Shaanxi University

More information

Integrity monitoring and authentication for VDES Pre-Distributed Public Keys

Integrity monitoring and authentication for VDES Pre-Distributed Public Keys Input paper: 1 ENAV18-11.10 Input paper for the following Committee(s): check as appropriate Purpose of paper: ARM ENG PAP Input ENAV VTS Information Agenda item 2 18 Technical Domain / Task Number 2 Author(s)

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

Construction Scheme for Cloud Platform of NSFC Information System

Construction Scheme for Cloud Platform of NSFC Information System , pp.200-204 http://dx.doi.org/10.14257/astl.2016.138.40 Construction Scheme for Cloud Platform of NSFC Information System Jianjun Li 1, Jin Wang 1, Yuhui Zheng 2 1 Information Center, National Natural

More information

Research on Voyage Navigation S/W Development Architecture Using Open Source Base GIS Modules

Research on Voyage Navigation S/W Development Architecture Using Open Source Base GIS Modules Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings Volume 15 Seoul, South Korea Article 23 2015 Research on Voyage Navigation S/W Development Architecture Using Open Source Base

More information

An Efficient Arbitration Mechanism for Secure Data Exchange with NFC

An Efficient Arbitration Mechanism for Secure Data Exchange with NFC Proceedings of the 4th IIAE International Conference on Industrial Application Engineering 2016 An Efficient Arbitration Mechanism for Secure Data Exchange with NFC Ming-Tsung Kao a,*, Yu-Hsin Cheng b,

More information

Application of Redundant Backup Technology in Network Security

Application of Redundant Backup Technology in Network Security 2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Application of Redundant Backup Technology in Network Security Shuwen Deng1, Siping Hu*, 1, Dianhua Wang1, Limin

More information

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE Second International Conference World of Construction Project Management 2007 Shin, Jae Won, Ryu, Han-Guk, Lee, Dong-Ryul CSRI, HanmiParsons Co., Ltd. INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

More information

DESIGN OF WEB SERVICE SINGLE SIGN-ON BASED ON TICKET AND ASSERTION

DESIGN OF WEB SERVICE SINGLE SIGN-ON BASED ON TICKET AND ASSERTION DESIGN OF WEB SERVICE SINGLE SIGN-ON BASED ON TICKET AND ASSERTION Abstract: 1 K.Maithili, 2 R.Ruhin Kouser, 3 K.Suganya, 1,2,3 Assistant Professor, Department of Computer Science Engineering Kingston

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

DESIGNING A HOME PARAMETER MONITORING SYSTEM BASED ON IOT M.REVATHI, V.ANURADHA

DESIGNING A HOME PARAMETER MONITORING SYSTEM BASED ON IOT M.REVATHI, V.ANURADHA DESIGNING A HOME PARAMETER MONITORING SYSTEM BASED ON IOT M.REVATHI, V.ANURADHA 1 PG Scholar, Electronics and Communication Engineering, Shri Sai institute of Engineering & Technology. 2 AssociateProfessor,

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Intelligent Computer Room Management Platform Based on RF Card

Intelligent Computer Room Management Platform Based on RF Card 2017 2 nd International Conference on Artificial Intelligence and Engineering Applications (AIEA 2017) ISBN: 978-1-60595-485-1 Intelligent Computer Room Management Platform Based on RF Card LI ZHANG and

More information

Collaboration System using Agent based on MRA in Cloud

Collaboration System using Agent based on MRA in Cloud Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal

More information

Marine Information Objects (MIOs) and ECDIS: Concept and Practice

Marine Information Objects (MIOs) and ECDIS: Concept and Practice Proceedings: U.S. Hydrographic Conference, 24-27 March 2003, Biloxi, MS Marine Information Objects (MIOs) and ECDIS: Concept and Practice Dr. Lee Alexander 1 Center for Coastal and Ocean Mapping Joint

More information

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions April 26, 2018 The Secure Technology Alliance IoT Security Council is pleased to submit our response to

More information

Cryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation

Cryptanalysis and Improvement of a New. Ultra-lightweight RFID Authentication. Protocol with Permutation Applied Mathematical Sciences, Vol. 7, 2013, no. 69, 3433-3444 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.211587 Cryptanalysis and Improvement of a New Ultra-lightweight RFID Authentication

More information

Cemetery Navigation and Information Query System Based on Android and Java Web

Cemetery Navigation and Information Query System Based on Android and Java Web 2017 3rd International Conference on Computational Systems and Communications (ICCSC 2017) Cemetery Navigation and Information Query System Based on Android and Java Web Chao Ding1, a, Yongjie Yang1, b,

More information

Classification of N-Screen Services and its Standardization

Classification of N-Screen Services and its Standardization Classification of N-Screen Services and its Standardization Changwoo Yoon, Taiwon Um, Hyunwoo Lee *Electronics & Telecommunications Research Institute, Daejeon, Korea cwyoon@etri.re.kr, twum@etri.re.kr,

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

Wireless Smart Home Security System Based on Android

Wireless Smart Home Security System Based on Android 2017 2 nd International Conference on Artificial Intelligence and Engineering Applications (AIEA 2017) ISBN: 978-1-60595-485-1 Wireless Smart Home Security System Based on Android LIANGYU CHEN, SEN ZHANG

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

Construction and Application of Cloud Data Center in University

Construction and Application of Cloud Data Center in University International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014) Construction and Application of Cloud Data Center in University Hong Chai Institute of Railway Technology,

More information

Toward Energy Data Platform in Korea

Toward Energy Data Platform in Korea Toward Energy Data Platform in Korea 최준균 (Jun Kyun Choi) Korea Advanced Institute of Science and Technology (KAIST) Contents 1 ` Market Trends of Cloud Computing and IoT 2 ` Platform Revolution of Energy

More information

An Implementation of Fog Computing Attributes in an IoT Environment

An Implementation of Fog Computing Attributes in an IoT Environment An Implementation of Fog Computing Attributes in an IoT Environment Ranjit Deshpande CTO K2 Inc. Introduction Ranjit Deshpande CTO K2 Inc. K2 Inc. s end-to-end IoT platform Transforms Sensor Data into

More information

Implementation of Monitoring and Control Systems for 50KW PV Systems Using the Wire-Wireless Network

Implementation of Monitoring and Control Systems for 50KW PV Systems Using the Wire-Wireless Network Implementation of Monitoring and Control Systems for 50KW PV Systems Using the Wire-Wireless Network Byung-Ki, Kim, Jea-Bum Park, Jian Shen, Sun-Young Kim and Dae-Seok Rho Korea University of Technology

More information

Mobile Security Fall 2012

Mobile Security Fall 2012 Mobile Security 14-829 Fall 2012 Patrick Tague Class #9 The Internet of Things Partial slide credit to L. Zoia and Y. Zhang Announcements If you haven't signed up for a Survey presentation (two teams,

More information

DIMETRA X CORE DATA SHEET DIMETRA X CORE

DIMETRA X CORE DATA SHEET DIMETRA X CORE DIMETRA X CORE FOR GOVERNMENT ORGANISATIONS, PUBLIC SAFETY AGENCIES AND LARGE ENTERPRISES, MOBILE BROADBAND IS ON THE WAY. AND WHILE YOU DON T KNOW WHEN THAT CHANGE IS COMING YOU CAN BE READY FOR IT WITH

More information

QUALITY CONTROL Prepared: TenneT team Reviewed: M. Müller Approved: F. Wester

QUALITY CONTROL Prepared: TenneT team Reviewed: M. Müller Approved: F. Wester POSITION PAPER STAKE HOLDER CONSULTATION PROCESS OFFSHORE GRID NL Type: Position paper Work stream Technical Topic: T.18 Data acquisition systems on offshore platform Filename ONL-TTB-03103 T18_Data acquisition

More information

A Study on Architecture of CAN over 3GPP Gateway in Vehicle Network

A Study on Architecture of CAN over 3GPP Gateway in Vehicle Network , pp.71-76 http://dx.doi.org/10.14257/astl.205.97.12 A Study on Architecture of CAN over 3GPP Gateway in Vehicle Network Jeong-Hwan Lee 1, Ki Soon Sung 1, Sung-Min Oh 1 and Jaewook Shin 1 1 Wireless Transmission

More information

Design of Smart Home System Based on ZigBee Technology and R&D for Application

Design of Smart Home System Based on ZigBee Technology and R&D for Application Energy and Power Engineering, 2016, 8, 13-22 Published Online January 2016 in SciRes. http://www.scirp.org/journal/epe http://dx.doi.org/10.4236/epe.2016.81002 Design of Smart Home System Based on ZigBee

More information

Development of Communication Software for Mobile Computing

Development of Communication Software for Mobile Computing Development of Communication Software for Mobile Computing 246 Development of Communication Software for Mobile Computing Susumu Matsui Yasuhiro Takahashi Takeshi Kondo OVERVIEW: The mobile computing market

More information

Integrated Framework for Keyword-based Text Data Collection and Analysis

Integrated Framework for Keyword-based Text Data Collection and Analysis Sensors and Materials, Vol. 30, No. 3 (2018) 439 445 MYU Tokyo 439 S & M 1506 Integrated Framework for Keyword-based Text Data Collection and Analysis Minki Cha, 1 Jung-Hyok Kwon, 1 Sol-Bee Lee, 1 Jaehoon

More information

The BITX M2M ecosystem. Detailed product sheet

The BITX M2M ecosystem. Detailed product sheet The BITX M2M ecosystem Detailed product sheet Stop wasting energy! Finally an M2M application development platform that doesn t have you running in circles. Why building it all from scratch every time?

More information

Development of a Smart Power Meter for AMI Based on ZigBee Communication

Development of a Smart Power Meter for AMI Based on ZigBee Communication Development of a Smart Power Meter for AMI Based on ZigBee Communication Shang-Wen Luan Jen-Hao Teng Member IEEE Department of Electrical Engineering, I-Shou University, Kaohsiung, Taiwan Abstract: Many

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

Federated Identification Architecture

Federated Identification Architecture Federated Identification Architecture Arezoo Haghshenas Department of Computer Tehran South Branch, Islamic Azad University Tehran, Iran Mir Ali Seyyedi Department of Computer Tehran South Branch, Islamic

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

2013 Cisco and/or its affiliates. All rights reserved. 1

2013 Cisco and/or its affiliates. All rights reserved. 1 2013 Cisco and/or its affiliates. All rights reserved. 1 Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System

More information

White Paper. Connected Car Brings Intelligence to Transportation

White Paper. Connected Car Brings Intelligence to Transportation White Paper Connected Car Brings Intelligence to Transportation 2 NEXCOM White Paper As urban population grows at an exponential rate, traffic jams are becoming more hideous and driving more and more tedious.

More information

ZigBee Security Using Attribute-Based Proxy Re-encryption

ZigBee Security Using Attribute-Based Proxy Re-encryption J. lnf. Commun. Converg. Eng. 10(4): 343-348, Dec. 2012 Regular Paper ZigBee Security Using Attribute-Based Proxy Re-encryption Hwajeong Seo and Howon Kim*, Member, KIICE Department of Computer Engineering,

More information

ITU-T Y Requirements of smartphone as sink node for IoT applications and services

ITU-T Y Requirements of smartphone as sink node for IoT applications and services I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4553 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication

More information

A Case Study about IFEZ(Song-do) Smart-City. Ryan LEE

A Case Study about IFEZ(Song-do) Smart-City. Ryan LEE A Case Study about IFEZ(Song-do) Smart-City Ryan LEE Career History Incheon U-City Corporation Incheon, Korea - Director, IFEZ Smart-City Integrated Operation Center * Managing IFEZ Smart City Integrated

More information

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan

Appeal Decision. Appeal No USA ALCATEL-LUCENT USA LTD. Tokyo, Japan. Tokyo, Japan Appeal Decision Appeal No. 2014-5131 USA Appellant ALCATEL-LUCENT USA LTD. Tokyo, Japan Patent Attorney OKABE, Yuzuru Tokyo, Japan Patent Attorney YOSHIZAWA, Hiroshi The case of appeal against the examiner's

More information

XML Based on HL 7 V 3.0 Message Exchanging Model for Hospital Information System

XML Based on HL 7 V 3.0 Message Exchanging Model for Hospital Information System International Journal of Computational Intelligence and Healthcare Informatics, Vol. 3, No. 2, July-December 2010, pp. 85-88 Published by Serials Publications, ISSN : 0973-7413 XML Based on HL 7 V 3.0

More information

Introduction to Z-Wave SmartStart. Whitepaper

Introduction to Z-Wave SmartStart. Whitepaper Introduction to Z-Wave SmartStart Whitepaper TABLE OF CONTENTS Summary... 3 Abbreviations and Terminology... 3 Z-Wave SmartStart under the Hood... 5 Improved Inclusion Process...5 QR Data Structure...7

More information

An Intelligent Agent for RFID-based Home Network System

An Intelligent Agent for RFID-based Home Network System An Intelligent Agent for RFID-based Home Network System Woojin Lee 1, Juil Kim 2, Kiwon Chong 3 Department of Computing, Soongsil University, Seoul, Korea {bluewj 1, sespop 2 }@empal.com, chong@comp.ssu.ac.kr

More information

A Study on the Communication Agent Model for One-way Data Transfer System

A Study on the Communication Agent Model for One-way Data Transfer System , pp. 161-168 http://dx.doi.org/10.14257/ijsh.2015.9.10.18 A Study on the Communication Agent Model for One-way Data Transfer System Young-Chul Oh 1, Mi-Ran Han 2, Yongtae Shin 3 and Jong-Bae Kim 4* 1

More information

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company)

Aceware Technologies Pvt Ltd. (An ISO 9001:2008 Certified Company) Intranet Mailing System Intrusion Detection System M-banking Mobi-Thesaurus Mobile Video Archive Mobile i Broker Android Projects Mobiminder: Location Based Reminder on Mobiles Mobi Travel Guide Friend

More information

Smart City Solution & Case Study. LG Uplus

Smart City Solution & Case Study. LG Uplus Smart City Solution & Case Study LG Uplus LG Group & LGU+ LG Group Overview LG Group Founded in 1947, LG Group now has 3 main business domains Portfolio Revenue (USD) 9.6 B 10.2 B 11.0 B 2015 2016 2017

More information

Deliverable D1.29 MCP/VDES inter-operability report

Deliverable D1.29 MCP/VDES inter-operability report Deliverable D1.29 MCP/VDES inter-operability report Project no. 636329 Project acronym: EfficienSea2 Project full title: EFFICIENSEA2 efficient, safe and sustainable traffic at sea Funding scheme: Innovation

More information

S1000D - An Overview. Background, Benefits, and Overview of S1000D Data Module Structures

S1000D - An Overview. Background, Benefits, and Overview of S1000D Data Module Structures S1000D - An Overview Background, Benefits, and Overview of S1000D Data Module Structures What is S1000D? S1000D is an international specification for technical publications, utilizing a Common Source Database.

More information

A flexible biometrics remote user authentication scheme

A flexible biometrics remote user authentication scheme Computer Standards & Interfaces 27 (2004) 19 23 www.elsevier.com/locate/csi A flexible biometrics remote user authentication scheme Chu-Hsing Lin*, Yi-Yi Lai Department of Computer Science and Information

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things

A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things A Data Collecting and Caching Mechanism for Gateway Middleware in the Web of Things Xuchao Chang, Chunhong Zhang, Li Sun Beijing University of Posts and Telecommunications, Beijing, 100876, China E-mail:

More information

Standardization Activities in ITU-T

Standardization Activities in ITU-T Standardization Activities in ITU-T Nozomu NISHINAGA and Suyong Eum Standardization activities for Future Networks in ITU-T have produced 19 Recommendations since it was initiated in 2009. The brief history

More information

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices

WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices WEB-202: Building End-to-end Security for XML Web Services Applied Techniques, Patterns and Best Practices Chris Steel, Ramesh Nagappan, Ray Lai www.coresecuritypatterns.com February 16, 2005 15:25 16:35

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

GUIDELINES FOR DEFINING APPLICATION SPECIFIC MESSAGES

GUIDELINES FOR DEFINING APPLICATION SPECIFIC MESSAGES GUIDELINES FOR DEFINING APPLICATION SPECIFIC MESSAGES Edition 1.0 Version: 09-05-2017 Author: Vessel Tracking and Tracing Expert Group Table of Content 1 Scope... 3 2 References... 3 2.1 Provisions...

More information

Authentication and Authorization of End User in Microservice Architecture

Authentication and Authorization of End User in Microservice Architecture Journal of Physics: Conference Series PAPER OPEN ACCESS Authentication and Authorization of End User in Microservice Architecture To cite this article: Xiuyu He and Xudong Yang 2017 J. Phys.: Conf. Ser.

More information

SQL Based Paperless Examination System

SQL Based Paperless Examination System SQL Based Paperless Examination System Harshada Satav *, Trupti Nanekar, Supriya Pingale, Nupur Maharashtra Academy Of Engineering, Alandi, Pune University, Maharashtra, India *Email: satav.harshada@gmail.com

More information