Changes in the Industrial Structure caused by the IoT and AI

사물인터넷과 AI가 가져올 산업구조의 변화

  • 김장환 (성결대학교 공과대학 미디어소프트웨어학부)
  • Received : 2017.11.09
  • Accepted : 2017.12.29
  • Published : 2017.12.31

Abstract

Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

최근 국내외적으로 사물인터넷(IoT, Internet of Things) 서비스 산업은 매우 빠른 속도로 변화하고 성장해 나가고 있다. 본 논문은 IoT 서비스 산업의 변화와 함께 일어나고 있는 인류의 삶 속에서의 새로운 변화의 원동력이 무엇인가를 찾기 위해 노력하였다. 이렇게 시장 환경이 변화하는 가운데 경쟁도 글로벌 경쟁, 생태계 경쟁으로 그 양상이 확대되고 있으나, 글로벌 기업들의 플랫폼 선점과 고도의 생태계 발전 전략에 비해 국내 기업들의 생태계 구축 비전은 아직 뚜렷하지 않은 상황이다. 또한 IoT 서비스의 확산에 따른 모바일 네트워크에서의 IoT 서비스 연동이 요구되고 있다. IoT 보안 프로토콜은 무선과 유선을 연계하는 게이트웨이(Gateway)에서 전달되는 데이터의 모든 내용이 누출되는 보안상의 취약점이 있어 종단간 보안도 제공하지 못하는 단점이 있다. 이에 본 논문에서는 IoT와 인공지능(AI) 서비스 산업 생태계를 구성하고 있는 제반 요소의 현황을 살펴본 후, 이로부터 얻을 수 있는 보안 산업과 관련한 전략적 시사점을 제시해 보고자 한다.

Keywords

References

  1. Wikipedia, Ecosystem, Retrieved Mar. 17, 2013, from http://ko.wikipedia.org/
  2. G. Gueguen and T. Isckia, "The borders of mobile handset ecosystems: is coopetition inevitable?," Telematics and Informatics, vol. 28, pp. 5-11, Jan. 2011. https://doi.org/10.1016/j.tele.2010.05.007
  3. J.H.Kim, "Performance enhancement architecture for HLR system based on distributed mobile embedded system," J. KICS, vol. 29, no. 12B, pp. 1022-1036, Dec. 2004.
  4. Fransman, M., The New ICT Ecosystem: Implications for policy and regulation, Cambridge University Press, 2010.
  5. UC Berkeley, Above the Clouds: A Berkeley View of Cloud Computing, 2009.2.
  6. P. Mell and T. Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology, ver 15, 2009.10.7.
  7. S.C. Park and J.H.Kim, "A Study on Policy of M2M technology for nano-fusion sensor SoC in the IHN(Intelligent Home Networking)," Telecommunications Review, vol. 20, no. 4, Aug. 2010.
  8. J.H.Kim and Seung Chang Park, "IoT Relationship Between Korea and the Philippines",IJUNESST, Vol.9 No.7, July 2016.
  9. Saduf, M. A. Wani, "Comparative Study of High Speed Back Propagation Learning Algorithm ", The International Journal of Modern Education and Computer Science, vol. 12, pp. 34-40, 2014
  10. P. Sujatha, S. Purushothaman, and R. Rajeswari ,"Detecting The Presence of Hidden Information Using Back Propagation Neural Network Classifier", The International Journal of Computer Science and Information Security, vol. 10, no. 12, pp. 36-41, June, 2012
  11. S.Pratheepa and S. Purushothaman , "Implementation of Human Tracking Using Back Propagation Algorithm",The International Journal of Computer Science and Information Security, vol. 11, no. 10, pp. 99-102, 2013
  12. Jae-Saeng Kim, The introduction of IoT(Internet of Things) technologies and Policy Directions, Korea Contents Association, vol.13, no.1, pp. 18-24, march, 2015.
  13. Gyun-Tak Kim and Kye-San Lee and Kyu-Jin Lee, "IoT Technology Trends based on Wearable devices", Korea Contents Association, vol.13, no.1, pp. 25-30, march, 2015
  14. Choi Young-Sang, "Present condition and Future of Deep Learning, Intelligent Technology", Industrial engineering magazine, vol. 22, no. 2, pp. 31-35, June, 2015
  15. J.H.Kim, "The Structural Analysis and Implications of Mobile Service Industry," J.KICS,vol.38C,no.09,pp.733-739,September 2013. https://doi.org/10.7840/kics.2013.38C.9.733
  16. J.H.Kim, "The Structural Analysis and Implications of Security Vulnerabilities In Mobile Service Network," J.K. Convergence Security, vol.16, no.05, pp.49-55, September 2016.
  17. C.S. Rhee and J.H.Kim, "An Efficient Clustering algorithm for Target Tracking in WSNs," J.K.C. Security, vol. 16, no.05, pp.65-71, September 2016.