• Title, Summary, Keyword: Internet of Things

Search Result 1,754, Processing Time 0.078 seconds

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.

The Design of IoT-based Drive Through Service System for Customers in Distribution Stores (대형 유통매장의 고객을 위한 IoT기반 드라이브 스루 서비스 시스템 설계)

  • Min, So-Yeon;Lee, Jong-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.151-157
    • /
    • 2017
  • Recently, the retail industry has created efficient store operations, and has differentiated customer service through the future store. The intelligence of these stores is being applied by using technologies such as the Internet of Things (IoT), and the business process is being improved through this. The process also focuses on efficient store operations and service developments to provide customers with shopping convenience. The change in trends in the industry means that domestic distribution has already reached maturity. Even in countries where retail industries are mature, such as the U.S. and Europe, recent trends are moving toward maximizing operational efficiency and customer service. The reason is that many retailers have already reached saturation and survived the competition. This paper is a study of a drive-through service for automation and efficiency in receiving service after ordering by a customer of the distribution store. When ordering a product being purchased by a customer, the product picking process is done in a timely fashion through a picking scheduling agent. When the customer enters the store parking lot, a service supports the entry of information and finding a parking place so the customer can quickly pick up the goods. The proposed service can be applied to a retail store drive-through system, the distribution store's delivery system, the digital picking system, and indoor/outdoor large parking management systems, and it is possible to provide one-dimensional customer service through the application of IoT technology.

Development of a Portable Card Reader for the Visually Impaired using Raspberry Pi (라즈베리 파이를 적용한 시각장애인을 위한 휴대용 카드 리더기 개발)

  • Lee, Hyun-Seung;Choi, In-Moon;Lim, Soon-Ja
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.131-135
    • /
    • 2017
  • We developed a portable card reader for the visually impaired. In South Korea, there is insufficient development of lifestyle aids for people with disabilities. Living aids for people with disabilities are being developed using information technology, smart phones, Internet of Things(IoT) devices, 3D printers, and so on. Blind people were interviewed, which showed that the card recognition function using a currently developed smart phone app was not able to recognize the screen of the smart phone by the hand of the visually impaired, and it was inconvenient to operate. In recent years, devices that enable the visually impaired to recognize cards have been studied in foreign countries and are emerging prototypes. But what is currently available is expensive and inconvenient. In addition, visually impaired people are most vulnerable to low-income families, which makes it difficult to purchase and use expensive devices. In this study, we developed a card reader that recognizes a card using a Raspberry Pi, which is an open-source hardware that can be applied to IoT. The card reader plays it by voice and vibration, and the visually impaired can use it at a low price.

Development of the RAS-RMS Protocol optimized to PSTN environment and Implementation of its differentiated process (PSTN 환경에 최적화된 RAS-RMS 연동 프로토콜 개발 및 차별화된 처리과정 구축)

  • Chang, Sung-Keun;Lee, Jung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8357-8362
    • /
    • 2015
  • The emergency call device has been installed and operated for the elevator passenger safety, but the call can not be connected or delay to the operator in an emergency. The application of the Internet of Things(IoT) technology is required for the systematic management and reliability of the emergency call device installed in the elevator. To meet these requirements it is necessary to apply the RMS(Remote Management System). Emergency call device periodically reports the operating status information and the emergency call history information of the emergency call device to the RMS in the PSTN(Public Switched Telephone Network) environment, and transmits the call request information in an emergency. RAS(Remote Access Server) plays a role of converting the PSTN signals to TCP / IP. RMS reports a significant outbreak call and abnormal operating conditions to administrators. In this study, we developed optimized protocol to PSTN environment that is required by RMS and implemented its differentiated process. And a RAS-RMS Protocol was added to the Application Layer. Development protocol consisting of simple structure as compared to CoAP, MQTT or HTTP can work properly in low-spec CPU and transmit elevator emergency key information easily.

Systematic Development of Mobile IoT Device Power Management: Feature-based Variability Modeling and Asset Development (모바일 IoT 디바이스 파워 관리의 체계적인 개발 방법: 휘처 기반 가변성 모델링 및 자산 개발)

  • Lee, Hyesun;Lee, Kang Bok;Bang, Hyo-Chan
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.460-469
    • /
    • 2016
  • Internet of Things (IoT) is an environment where various devices are connected to each other via a wired/wireless network and where the devices gather, process, exchange, and share information. Some of the most important types of IoT devices are mobile IoT devices such as smartphones. These devices provide various high-performance services to users but cannot be supplied with power all the time; therefore, power management appropriate to a given IoT environment is necessary. Power management of mobile IoT devices involves complex relationships between various entities such as application processors (APs), HW modules inside/outside AP, Operating System (OS), platforms, and applications; a method is therefore needed to systematically analyze and manage these relationships. In addition, variabilities related to power management such as various policies, operational environments, and algorithms need to be analyzed and applied to power management development. In this paper, engineering principles and a method based on them are presented in order to address these challenges and support systematic development of IoT device power management. Power management of connected helmet systems was used to validate the feasibility of the proposed method.

A Method for Scalar Multiplication on Elliptic Curves against Differential Power Analysis using Efficient Key-Randomization (효율적인 키-난수화를 사용한 차분 전력 분석 공격에 대응하는 타원곡선 위의 스칼라 곱셈 방법)

  • Jung, Seok Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.356-363
    • /
    • 2020
  • As a becoming era of Internet-of-Things, various devices are connected via wire or wirless networks. Although every day life is more convenient, security problems are also increasing such as privacy, information leak, denial of services. Since ECC, a kind of public key cryptosystem, has a smaller key size compared to RSA, it is widely used for environmentally constrained devices. The key of ECC in constrained devices can be exposed to power analysis attacks during scalar multiplication operation. In this paper, a key-randomization method is suggested for scalar multiplication on SECG parameters. It is against differential power analysis and has operational efficiency. In order to increase of operational efficiency, the proposed method uses the property 2lP=∓cP where the constant c is small compared to the order n of SECG parameters and n=2l±c. The number of operation for the Coron's key-randomization scalar multiplication algorithm is 21, but the number of operation for the proposed method in this paper is (3/2)l. It has efficiency about 25% compared to the Coron's method using full random numbers.

Study on Development of LED Camping Light Design Based on IOT and Emotional Lighting Contents (IOT 및 감성조명 콘텐츠 기반의 LED 캠핑등 디자인 개발에 관한 연구)

  • Kim, Hee-Jun
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.12
    • /
    • pp.332-342
    • /
    • 2018
  • This study is aimed at suggesting information about technical choices for designing LED camping lights based on emotional lighting contents of integrated IOT and design areas which take a central role in creation and knowledge based industries and the procedure for materializing them. 'i-Light,' a portable LED camping light, is 'connected lighting' connecting men, space and emotion and a smart camping light based on IOT and emotional lighting contents. 'i-Light' has two functions. One is about lighting for adjusting color and color temperature naturally and the other is about safety for detecting harmful gases. 'i-Light' also has various emotional functions for experiencing interaction and taste of light. For the purpose, portable LED camping lights were designed, first of all, and then a highly color rendering/full-color lighting module, a smart sensor module and an IOT device platform were developed. In addition, efforts were made to establish detailed data about emotional lighting contents and to develop a Web application based on them. Finally, prototypes of portable LED camping lights were made to get a test bench and usability evaluation from related organizations. According to the results, all of 12 developed emotional lighting contents and three IOT safety sensors were suitable and prototypes were satisfactory. This paper will suggest a direction about actual technical choices for development of contents and products integrating artificial intelligence and big data and about the procedure for materializing them.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Development of Smart Packaging for Cream Type Cosmetic (크림 제형 화장품용 스마트 패키징 기술 개발)

  • Jeon, Sooyeon;Moon, Byounggeoun;Oh, Jaeyoung;Kang, Hosang;Jang, Geun;Lee, Kisung
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.25 no.3
    • /
    • pp.79-87
    • /
    • 2019
  • The degree of cosmetic's oxidation depends on the storage conditions and external conditions when using the product. The microbial contamination and oxygen exposure often results in the quality deterioration of cosmetics. In addition, the problem is that consumers often use cream-type cosmetics, which have short expiration period (6-12 months), even after the product is expired. When using the deteriorated cosmetics, it can be fatal to consumers' safety including some symptoms such as folliculitis, rashes, edema, and dermatitis. Therefore, it is necessary to develop sealed smart packaging for cosmetics to prevent the deterioration of cosmetics and improve consumer safety. In this study, we have developed smart packaging design for cosmetics that can measure the surrounding environment and expiration date for the cosmetics in the real time. In addition, the smart packaging includes sensor, which are linked to the mobile application. Users can find out the measurement results through the application. Also, the packaging design and functions were set up based on the survey results by the user and feasible model can be produced based on user choice. The measurement in the three environment has been done after manufactured the sensor, PCB, and mobile application. As a result, it works normally within a certain range under all three environmental conditions. It is believed that the information on expiration dates and storage environment can be efficiently delivered to the consumers through developed cosmetics smart packaging and applications. The development of UI/UX design for consumer is further studied. The UX/UI design of the application plays an essential role in achieving this goal through the commercialization the cosmetic products in the wide range.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.