The Architecture Design of Semantic Based Open USN Service Platform Model

  • Hyungkyu LeeEmail author
  • Namje Park
  • Hyo-Chan Bang
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 274)


Open USN service is USN service to enable enhanced and flexible service interoperability and provisioning based on the use of standards interfaces. In this paper is to define an open USN service framework, and provide reference architecture of open USN service framework. The use of standard interfaces of open USN service framework will ensure USN service reusability, portability across several USN services, as well as accessibility and interoperability by USN application providers and/or developers. This paper will contribute to the development and activation of new variety USN service by deploying sensor node constructed on variety field or sensor network to share and utilize at different service field.


Open USN Service Semantic Platform Model USN WSN 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Lee, J.S., Kim, S.J.: F.OpenUSN “Requirements and reference architecture for open USN service framework” (New): Initial draft from SG16 meeting (Geneva, 20 November – 2 December 2011). International Telecommunication Union, Study Group 16, TD 697(WP 2/16), Question(s).25/16 (2011)Google Scholar
  2. 2.
    Lee, J., Kim, M., Park, D.: Requirements and Reference Architecture for Open USN Service Framework. Telecommunications Technology Association(TTA) Standard, TTAK.KO-06.0282 (2012)Google Scholar
  3. 3.
    Park, D.-H., Kim, S.-J., Bang, H.-C.: Semantic Open USN Service Platform Architecture. In: ICTC 2012, pp. 12–15 (2012)Google Scholar
  4. 4.
    Kim, M., Lee, J.W., Lee, Y.J., Ryou, J.-C.: COSMOS: A Middleware for Integrated Data Processing overHeterogeneous Sensor Networks. ETRI Journal 30(5), 696–706 (2008)CrossRefGoogle Scholar
  5. 5.
    Park, N., Kwak, J., Kim, S., Won, D.H., Kim, H.W.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Park, N.: Security scheme for managing a large quantity of individual information in RFID environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  7. 7.
    Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)CrossRefGoogle Scholar
  8. 8.
    Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS, vol. 6422, pp. 193–202. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  9. 9.
    Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślęzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467–474. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  10. 10.
    Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319–327. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  11. 11.
    Park, N.: The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785–793 (2010)Google Scholar
  12. 12.
    Park, N., Cho, S., Kim, B.-D., Lee, B., Won, D.: Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System. In: Yeo, S.-S., Pan, Y., Lee, Y.S., Chang, H.B. (eds.) Computer Science and its Application. LNEE, vol. 203, pp. 699–705. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  13. 13.
    Park, N., Cho, S., Kim, B., et al.: Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service System. In: Yeo, S.-S., Pan, Y., Lee, Y.S., Chang, H.B. (eds.) Computer Science and its Application. LNEE, vol. 203, pp. 699–705. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  14. 14.
    Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  15. 15.
    Park, N., Ko, Y.: Computer Education’s Teaching-Learning Methods Using Educational Programming Language Based on STEAM Education. In: Park, J.J., Zomaya, A., Yeo, S.-S., Sahni, S., et al. (eds.) NPC 2012. LNCS, vol. 7513, pp. 320–327. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  16. 16.
    Kim, K., Kim, B.-D., Lee, B., Park, N.: Design and Implementation of IVEF Protocol Using Wireless Communication on Android Mobile Platform. In: Kim, T.-H., Stoica, A., Fang, W.-C., Vasilakos, T., Villalba, J.G., Arnett, K.P., Khan, M.K., Kang, B.-H. (eds.) SecTech/CA/CES3 2012. CCIS, vol. 339, pp. 94–100. Springer, Heidelberg (2012)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Department of Computer Education, Teachers CollegeJeju National UniversityJeju-siKorea
  2. 2.Electronics and Telecommunications Research Institute (ETRI)DaejeonKorea

Personalised recommendations