• Title/Summary/Keyword: 사물 인터넷

Search Result 2,448, Processing Time 0.027 seconds

A HTTP/2 Security Vulnerability for the Secure Web Environment (안전한 Web 환경을 위한 HTTP/2 취약점에 관한 연구)

  • Ryu, Jeong Hyun;Moon, Seo Yeon;Park, Jong Huyk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.238-240
    • /
    • 2016
  • Web 환경이 급격히 변화함에 따라 HTTP 프로토콜의 변화도 요구되었다. 이를 보완하기 위한 비동기 메커니즘, Ajax 등이 제시되었고 최근 사물인터넷, 클라우드 등을 활용한 웹 어플리케이션이 주목 받고 있다. 이러한 패러다임의 변화로 웹은 여러 가지 기능이 필요하게 되었으며 HTTP/1의 단점을 보완한 HTTP/2가 개발되었다. HTTP/2는 웹 어플리케이션 및 Hypertext page 변화를 위해 복합적인 기능들이 추가 되었으나 이러한 추가적인 요소에 대해 또 다른 보안 취약점이 나타났다. 웹 어플리케이션은 사용자의 서비스에 직접적인 영향을 미치기 때문에 보안 위협 및 그 피해가 매우 치명적일 수 밖에 없다. 따라서 이러한 보안 취약점에 대한 보안 대책이 시급하다. 본 논문에서는 HTTP/2의 주요 취약점에 대해 분석하고 네 가지 보안 위협에 대해 기술하여 앞으로의 HTTP/2에서의 웹 보안 대책 및 연구에 기여하고자 한다.

Development of an IoT-based Unmanned Home-Delivery Box System (사물인터넷(IoT) 기반의 무인 택배함 시스템 개발)

  • Park, Chan Hee;Kang, Hyun Tae;Kang, Chang Soon
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.129-138
    • /
    • 2017
  • This paper is concerned with an Internet of Things (IoT)-based unmanned home-delivery box system, in which the system is developed with a prototype using a weight sensor, shock sensor, the Arduino and Raspberry-Pi of open-source hardware platforms. The developed system provides several functions such as a safe storage means, prevention of delivery-theft, and remote control of the home-delivery box, etc. Specifically, the system recognizes the arrival of goods by detecting the weight of deliveries and sends the arrived message of deliveries to the recipient' smartphone, and also controls (i.e., open and close) the locker of the unmanned home-delivery box system remotely with the smartphone. Furthermore, the developed system provides automatically a warning alarm around the unmanned home-delivery box when an external shock is applied to the home-delivery box, and sends a message on the shock to the recipient' smartphone. The major functions of the developed home-delivery box system have been verified in a realistic environment, and confirmed to work well. With the application of the developed home-delivery box system to the homes and offices where recipients are always not to stay, it is expected to significantly improve the safety of delivered goods as well as to effectively prevent the delivery operatives posing as a crime.

Threat Issues of Intelligent Transport System in the V2X Convergence Service Envrionment (V2X 융합서비스 환경에서 지능형차량시스템의 위협 이슈)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.33-38
    • /
    • 2015
  • In a V2X convergence service environment, the principal service among infotainment services and driver management services must be supported centering on critical information of the driver, maintenance manager, customer, and anonymous user. Many software applications have considered solutions to be satisfied the specific requirements of driving care programs, and plans. This paper describes data flow diagram of a secure clinic system for driving car diagnosis, which is included in clinic configuration, clinic, clinic page, membership, clinic request processing, driver profile data, clinic membership data, and clinic authentication in the V2X convergence service environment. It is reviewed focusing on security threat issue of ITS diagnostic system such as spoofing, tampering, repudiation, disclosure, denial of service, and privilege out of STRIDE model.

Service Platform Technology of Dynamic Contents Collaboration of Clouds (클라우드 간의 콘텐츠 동적협업 서비스 플랫폼 기술)

  • Hong, YoHoon;Kusmawan, Putu;Rho, Jungkyu
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.2
    • /
    • pp.1-7
    • /
    • 2016
  • In this paper, we propose contents authoring, management, and distribution technologies where the contents registered in secure storage through a content acquisition and authoring tool can be used as a common experience in smartphones, smart pads, and PCs. Currently, many people are producing and consuming various types of contents in bulk, and it is expected that real-time contents and old contents coexist as IoT(Internet of Things) technology is commonly deployed in the future. Therefore, we need to develop a differentiated service that can compete with global services in contents authoring and collaboration systems to create new markets. Accordingly, we implemented an authoring service platform to occupy cloud markets with high quality contents produced through collaboration.

Progressive Retrieval Method using Intimacy between SNS Users in Internet of Things (사물인터넷에서 소셜 네트워크 사용자 친밀도를 이용한 점진적 검색 기법)

  • Kim, Sungrim;Kwon, Joonhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.1-10
    • /
    • 2018
  • Social network services allow you to share your thoughts and preferences more easily. They share your views with a large number of people who are friends with you without restriction of time or place. In the IoT environment, the amount of data is massively increasing as social network services spread rapidly. This change in the environment is driving the need for research into new retrieval methods that are different from conventional retrieval methods. In this paper, we propose a progressive retrieval method using the intimacy of social network users in the IoT. The first thing is to extract the user with the highest intimacy by using the property that the number of the owner of the information stored in the IoT environment is small. By accessing information in objects owned by these extracted users, the amount of information retrieved is reduced. It also improves retrieval efficiency by gradually retrieving information according to the user's level of interest. We present a new retrieval method and algorithm. The scenario also illustrates the effectiveness of the proposed method.

Fine Dust Monitoring and Removal Method in Urban Construction Sites Using Autonomous Mobile Vehicle and Dry Fog System (자율이동체와 드라이포그를 활용한 도심지 건설현장 미세먼지 모니터링 및 대응 방안)

  • Kim, Kyoon Tai
    • Ecology and Resilient Infrastructure
    • /
    • v.6 no.4
    • /
    • pp.277-286
    • /
    • 2019
  • The construction industry is known to be one of the representative industries that generate fine dust. Therefore, reducing the amount of fine dust generated in construction sites is very important for the overall fine dust management. Based on this, this study proposed the fine dust measurement and removal technology combined with advanced technologies such as autonomous mobile vehicle IoT and DFS. The qualitative, quantitative and risk elimination effects that can be expected when applying the proposed technique are analyzed. The proposed technique will be validated through system development and field application and evaluated specific economics through cost analysis.

A Study on Networking Technology for Cloud Data Centers (클라우드 데이터센터를 위한 네트워킹 기술에 관한 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.235-243
    • /
    • 2016
  • Legacy data centers are transforming toward cloud data centers according to the advance of mobile and Internet of Things technology, processing of big data, and development of cloud computing technology. The goal of cloud data centers is to efficiently manage energy and facility, and to rapidly provide service demands to users by operating virtualized ICT(Information and Communication Technology) resources. Accordingly, it requires to configure and operate networks for efficiently providing virtualized ICT resources. This paper analyzes networking technologies suitable for cloud data centers and presents ways to efficiently operate the data center.

Adaptive Packet Scheduling Algorithm in IoT environment (IoT 환경에서의 적응적 패킷 스케줄링 알고리즘)

  • Kim, Dong-Hyun;Lim, Hwan-Hee;Lee, Byung-Jun;Kim, Kyung-Tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.15-16
    • /
    • 2018
  • 본 논문에서는 다수의 센서 노드로 구성된 Internet of Things (IoT) 환경에서 새로운 환경에 대해 적응하는데 걸리는 시간을 줄이기 위한 새로운 스케줄링 기법을 제안한다. IoT 환경에서는 데이터 수집 및 전송 패턴이 사전에 정의되어 있지 않기 때문에 기존 정적인 Packet scheduling 기법으로는 한계가 있다. Q-learning은 네트워크 환경에 대한 사전지식 없이도 반복적 학습을 통해 Scheduling policy를 확립할 수 있다. 본 논문에서는 기존 Q-learning 스케줄링 기법을 기반으로 각 큐의 패킷 도착률에 대한 bound 값을 이용해 Q-table과 Reward table을 초기화 하는 새로운 Q-learning 스케줄링 기법을 제안한다. 시뮬레이션 결과 기존 기법에 비해 변화하는 패킷 도착률 및 서비스 요구조건에 적응하는데 걸리는 시간이 감소하였다.

  • PDF

ECQV Certificate Based Security Mechanism for End-to-End Security in IoT (IoT 종단간 보안을 위한 ECQV 인증서 기반의 보안 메커니즘)

  • Yeon, Han-Beol;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.53-61
    • /
    • 2017
  • IoT technology is evolving and related services and technologies are spreading throughout the life. These IoT technologies make life easier for users, but they also have big threats like double-edged swords. Therefore, the importance of security is emerging and related researches are actively proceeding. Existing researches have focused on reducing the computational load on the constrained devices, performing the DTLS for the end-to-end security from a network architecture perspective. In this paper, we propose a DTLS protocol that uses ECQV certificate instead of existing X.509 certificate to reduce the load of DTLS protocol from the network perspective. In addition, the proposed scheme is implemented and compared with PSK and RPK modes.

Security and Privacy Issues of Fog Computing (포그 컴퓨팅 환경에서의 보안 및 프라이버시 이슈에 대한 연구)

  • Nam, Hyun-Jae;Choi, Ho-Yeol;Shin, Hyung-June;Kwon, Hyun-Soo;Jeong, Jong-Min;Hahn, Chang-Hee;Hur, Jun-Beom
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.257-267
    • /
    • 2017
  • With the development of IoT (Internet of Things) technology, the application area has been diversified and the number of users using this service also has increased greatly. Real time big data generated by many IoT devices is no longer suitable for processing in a cloud computing environment. To solve this issue, fog computing is suggested which minimizes response time and makes real time processing suitable. However, security requirement for new paradigm called fog computing is not established until now. In this paper, we define models for fog computing, and the security requirements for the defined model.