• Title/Summary/Keyword: 사물 인터넷 기술

Search Result 1,395, Processing Time 0.029 seconds

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

International Standards and Technology for E-navigation and Maritime IoT (E-navigation과 해양 사물인터넷(IoT)의 국제표준 및 기술동향)

  • Lee, K.I.;Song, M.S.;Jang, B.T.
    • Electronics and Telecommunications Trends
    • /
    • v.29 no.5
    • /
    • pp.18-29
    • /
    • 2014
  • 최근 해양안전에 대한 국내외의 관심과 함께 통신기술의 발전, 선박에 다양한 디지털 및 전자장비들이 도입됨에 따라 선박을 위한 전자항법체계인 e-navigation이 주목을 받고 있다. E-navigation은 안전뿐 아니라, 해양에서의 디지털시대의 서막을 여는 IT 융합의 새로운 패러다임을 제공하고 있다. 본 논문에서는 e-navigation과 관련하여 국제해사기구(IMO), 국제항로표지협회(IALA: International Association of Lighthouse Authorities), 국제수로기구 (IHO: International Hydrographic Organization), 국제전기협회(IEC) 등의 관련 기술에 대한 국제표준화기구의 최근 동향에 대해서 살펴볼 것이다. 또한, 한국형 e-navigation에 대한 국내 동향과 함께 최근 각광을 받고 있는 사물인터넷(IoT: Internet of Things) 기술을 해양분야에 적용하기 위한 방안에 대해서도 다루고자 한다.

  • PDF

Industrial IoT 환경의 사이버보안 이슈 연구

  • Chang, Hyun Soo;Kim, Hyeon-Jin;Shon, Taeshik
    • Review of KIISC
    • /
    • v.25 no.5
    • /
    • pp.12-17
    • /
    • 2015
  • 산업사물인터넷(IIoT)은 사물인터넷(IoT)과 같이 기존의 여러 ICT 기술들과 무선센서네트워크 및 다양한 통신 기술들이 산업제어시스템에 적용된 것을 의미한다. IIoT는 일반적인 상용 IoT와 많은 부분 공통점과 그 기반 기술에 있어서의 동일한 성격을 가지지만 적용 대상 환경에 있어 차이를 가지고 있기 때문에 산업제어영역에서 IoT기술을 도입하기 위해서는 추가적으로 고려해야할 사항들이 존재한다. 본 논문에서는 IoT와 IIoT에 대하여 간단히 설명하고 IIoT 환경의 특수성에 대해서 다룬다. 그 후 상용 IoT에서 발생한 보안 사고관련 사례들을 살펴보고 산업제어영역에서 사이버보안 사고 발생시 그 피해 규모를 살펴본다. 그리고 IIoT를 도입하면서 보안관점에서 필요한 사항들에 대해 서술하였다.

Authentication for Beacon Service (비콘 서비스를 위한 보안 인증 방법)

  • Oh, Jeong-Gyu;Sin, Ji-Seon;Kim, Hyung-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.793-796
    • /
    • 2016
  • 정보통신 기술의 발달로 사물인터넷에 대한 관심이 증가하였다. 사물인터넷의 한 요소인 무선 큰거리 통신 기술에는 WIFi, 블루투스, ZigBee 등이 있다. 이러한 기술들 중 저전력 블루투스는 낮은 전력 소비와 범용성 덕분에 많은 각광을 밭고 있다. BLE(Bluetooth LE)의 한 형태인 비콘은 더욱 저전력이며, 패킷을 전달하는 방식 또한 기존의 블루투스와 차이가 있다. 본 논문에서논 컨텐츠 보안이 필요한 비콘 서비스의 예시로 비콘을 통한 새로운 형태의 음악 음반을 제시하였다. 또한, 그 보안 특성에 맞춰 패킷 이중화, RSSI, Serial Number Binding 등의 기술들을 사용한 보안 방법을 설계 및 구현한 보안 사레에 대하여 서술한다.

Ship Safety Management System based on IoT(Internet of Things) (IoT(Internet of Things)시대의 선박 안전관리시스템 구축 연구)

  • Lim, Sung-Hun;Ko, Young-Kyu;Park, Jin-Soo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.144-145
    • /
    • 2014
  • IoT (Internet of Things) is connected to all things Internet-based people and things, things and objects that communicate information between said intelligent technologies and services. Shipping each of a variety of devices that act independently from each other, but, it is actively interlock with each other is not easy practically days. Ship it within the means of communication, the communication between the ship, the communication between ship and shore configuration, SAN (Ship Area Network), RFID/USN, broadband communications, satellite communications and IT technology to a variety of marine environments for the safe navigation the ship's safety management system for the configuration you want to discuss the plan.

  • PDF

Analysis of Information Security Technology Development for ICT Convergence Services (ICT 융합서비스 제공을 위한 정보보호 기술개발 현황분석)

  • Kim, Dong-Chul
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.27-33
    • /
    • 2015
  • In this paper, the development level of information security technology for internet of things(Iot), big data and clo ud services is analyzed, and the detail policy is proposed to be leader in area of patents and ICT standard. The conc ept of ICT convergence is defined frist, market and current state of technology for three convergence services is the n analyzed, and finally main function and security target for each technology are presented. The evaluation criteria a nd IPR are analyzed to diagnose the level of patent and standard for the technology. From the results, even though the domestic competence is inferior compared to other advanced country, the efficient policy should be presented by using our capability for the big data and cloud. Furthermore, the technology development for the IoT and cloud is ne eded in advance considering the market-technology influence effects. In addition to, M2M security framework in IoT, data security in big data and reliable networking in cloud should be developed in advance.

Establishment of Analysis Model Using a Service Blueprint for Marketing Evaluation of IoT Services (IoT 서비스의 마케팅 평가를 위한 서비스 청사진 기법을 활용한 분석 모델 구축)

  • Jeon, Heewon;Park, Jae Wan
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.10
    • /
    • pp.71-79
    • /
    • 2018
  • The Internet of Things is a technology that makes it possible for objects made up of hardware and software to exchange information with one another via the Internet, thereby facilitating the servitization of the objects. An IoT service, which is composed of an IoT device and a web service, has recently been applied to the marketing field and is being used as a means to meet customer needs. However, applying appropriate marketing elements to IoT services is not easy. Therefore, analysis tools are needed to properly apply marketing elements to IoT services. This study aims to construct an analysis model for marketing evaluation of IoT services. In this study, the technical elements and marketing elements of IoT were derived through a literature review, and the analysis model for marketing evaluation of IoT services was established by exploring the relationship between the elements based on a service blueprint. We also applied real cases to verify the analytical model. This study is expected to contribute to the development of tools for evaluating IoT services.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.