• Title/Summary/Keyword: 산업 사물인터넷

Search Result 583, Processing Time 0.026 seconds

Smart Home Control System using Bluetooth and Wi-Fi (블루투스와 와이파이를 이용한 스마트홈 제어 시스템)

  • Yeo, Sang-Sam;Lee, Won-Ho;Park, Seong-Yong;Park, Geon-Hui;Jo, Da-Hye;Koo, Jun-yeong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.663-664
    • /
    • 2020
  • 안전함과 편리함을 추구하는 현대 사회에서 사람들은 각종 스마트기기에 가까워져 있다. 휴식을 취하는 가정에서도 역시 사람들은 스마트폰과 각종 웨어러블 기기가 일상이 되었고, 가전제품 또한 사물 인터넷화되며 사람들의 편의성에 보탬이 된다. 본 논문에서는 다가오는 4차산업혁명인 사물인터넷에 다가가는 주제를 선정하였고, 사람들이 가정에서 휴식을 취할 때 온습도, 미세먼지 농도를 사용자 지정 값에 의하여 자동 환기하여 쾌적한 환경 조성에 도움을 준다. 모든 측정값은 가정 내에서 블루투스 통신을 통해 결과를 표시하도록 하였다. 그리고 부하의 전원과도 연결하여 손쉽게 전원제어 역시 원격으로 가능하도록 구현하였다. 또한, 외출 시 가스 누출 사고와 화재 발생을 와이파이 통신 환경을 통해 원격으로 앱에 경보를 제시하고 누출된 측정값을 도식하면서 큰 2차 피해로 이어지기 전에 초동조치가 가능하도록 설계하였다. 사용자의 편의와 안전성을 주제로, 사람들에게 유익한 기능을 제공하고 앞으로의 4차산업혁명인 사물인터넷과의 연계 역시 기대할 수 있다.

  • PDF

Industrial IoT 환경의 사이버보안 이슈 연구

  • Chang, Hyun Soo;Kim, Hyeon-Jin;Shon, Taeshik
    • Review of KIISC
    • /
    • v.25 no.5
    • /
    • pp.12-17
    • /
    • 2015
  • 산업사물인터넷(IIoT)은 사물인터넷(IoT)과 같이 기존의 여러 ICT 기술들과 무선센서네트워크 및 다양한 통신 기술들이 산업제어시스템에 적용된 것을 의미한다. IIoT는 일반적인 상용 IoT와 많은 부분 공통점과 그 기반 기술에 있어서의 동일한 성격을 가지지만 적용 대상 환경에 있어 차이를 가지고 있기 때문에 산업제어영역에서 IoT기술을 도입하기 위해서는 추가적으로 고려해야할 사항들이 존재한다. 본 논문에서는 IoT와 IIoT에 대하여 간단히 설명하고 IIoT 환경의 특수성에 대해서 다룬다. 그 후 상용 IoT에서 발생한 보안 사고관련 사례들을 살펴보고 산업제어영역에서 사이버보안 사고 발생시 그 피해 규모를 살펴본다. 그리고 IIoT를 도입하면서 보안관점에서 필요한 사항들에 대해 서술하였다.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

Bug Reports Attribute Analysis for Fixing The Bug on The Internet of Things (사물인터넷 관련 버그 정정을 위한 버그리포트 속성 분석)

  • Knon, Ki Mun;Jeong, Seong Soon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.5
    • /
    • pp.235-241
    • /
    • 2015
  • Nowadays, research and industry on the internet of things is rapidly developing. Bug fixed field of the Software development related internet of things is a very important things. In this study, we analyze the properties that can affect what the bug fix-time by analyzing the time required to fix a bug associated with the Internet of Things. Using the k-NN classification method based on the attribute information to be classified as bug reports. Extracts a bug report based on the results of a similar property. Bug fixed by calculating the time of a similar bug report predicts the fix-time for new bugs. Depending on the prediction of the properties that affect the bug correction time, the properties of os, component, reporter, and assignee showed the best prediction accuracy.

Transmission Control Method of Beacon Signal Based on Bluetooth of Lower Electric Power (저 전력 블루투스 기반 비콘 신호 전송 제어 방법)

  • Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1136-1141
    • /
    • 2016
  • IoT technology has been used as a core technology of convergence service that needs intelligent information processing, and the importance is largely emerging now. And internal network construction thru IoT interaction device can connect with IoT device effectively, provide diverse services by connection with open platform. Especially, beacon that is based on low electric power bluetooth device is receiving attention as one of core technology of IoT. Beacon technology is utilized widly in various fields of industry, and there are lot of demands in the specific environment and conditions beyond the basic function. On this thesis, the authors are proposing the beacon device that utilized acceleration sensor and hole sensor. this beacon device can control the target on specific situation thru sensing of moving target. For the more, we will expect to apply to the various type of factory environments like detachable installation, optimized management using sensor.

A Study on the Development of Secure Communication Channel Using PUF Technology in M-IoT Environment (M-IoT 환경에서 PUF 기술을 활용한 안전한 통신채널 구성 기법)

  • Kim, Sumin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.107-118
    • /
    • 2019
  • Based on the Internet of Things technology, one of the core technologies of the fourth industrial revolution, our Ministry of Defense is also pushing to establish M-IoT in defense area to improve management efficiency, innovate military culture and strengthen military power. However, devices connected to the Military Internet of Things can be easily exposed to various of cyber threats as most of them are developed and with a focus on improving sensing and communication skills that collect and transmit data. And it is not easy to uniquely identify the numerous heterogeneous devices, and to establish a secure communication channel between devices or between devices and management servers. In this paper, based on PUF technology, we propose a novel key management scheme that can uniquely identify the various devices, and generate the secret keys needed for the establishment of a secure communication channel using non-replicable information generated by the PUF. We also analyze the efficiency of our proposed scheme through comparison with existing key management scheme and verify the logic and security using BAN Logic.

Development of Application for Blender Control and Alarm Service based on IoT (사물인터넷 기반 블렌더 제어 및 알람 서비스를 위한 애플리케이션 개발)

  • Kwon, Donguk;Lim, Wansu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.12
    • /
    • pp.76-81
    • /
    • 2016
  • The Internet of Things (IoT) interconnects every device by allowing them to communicate directly and share information with each other and has been recently applied to various industrial fields. The integration of home appliances with IoT has led to the creation of new markets by providing quick and better experience to consumers. Although IoT has been integrated into most modern day appliances, there have been few developments for kitchen appliances. This paper presents the development of integrating IoT with the blender, one of the most widely used appliance in the kitchen. A custom application was made to interact with the blender that provides three main functions: digital controller, maintenance, and defrosting alarm. The function of digital controller provides wireless control to the conventional blender. The maintenance function detects and alerts the user on blender reliability with the intent of enabling the anticipation of hardware failures. The defrost alarm alerts the user when the ingredient has reached the appropriate and desired temperature when cooking frozen food.

Medical Information Security and Standard Technology On IoT Environment (IoT 환경의 의료 정보보호와 표준 기술)

  • Woo, Sung-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2683-2688
    • /
    • 2015
  • Internet of Things(IoT) using a variety of technologies in combination provides a convenient, elevated range of services to users. IoT has been noted in combining the fields of medical service in particular. However, with the advent and growing of IoT, the more medical services are evolving, security problems caused by leakage of personal health information will become more serious. U-Health and medical devices, which deal mainly the personal health information, is required to a high level of privacy and security of health information. Therefore, the introduction of the IoT in the healthcare industry requires the medical information security as a prerequisite. This study analyzes security status and trend of IoT, personal medical information leakage cases, the health information protection measures in accordance with the life cycle of medical information, and the standardized protection technologies.

Analyses of Security Issues and Vulnerability for Healthcare System For Under Internet of Things (사물인터넷과 융합한 헬스케어 시스템에서의 보안 이슈 및 취약점 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.699-706
    • /
    • 2023
  • Recently, the 4 generation industry revolution is developed with advanced and combined with a variety of new technologies. Conventional healthcare system is applied with IoT application. It provides many advantages with mobility and swift data transfers to patient and doctor. In despite of these kinds of advantages, it occurred security issues between basic devices and protocols in their applications. Especially, internet of things have restricted and limited resources such as small memory capacity, low capability of computing power, etc. Therefore, we can not utilize conventional mechanism. In this paper, we analyzed attacks and vulnerability in terms of security issues. To analyze security structure, features, demands and requirements, we solve the methods to be reduced security issues.

Cloud Computing Based Analysis Incorporated with the Internet of Things (IoT) in Nuclear Safety Assessment for Fukushima Dai-ichi Disaster (후쿠시마 다이-이치 재해에 대한 원자력 안전 평가에서 사물 인터넷 (IoT)과 통합된 클라우드 컴퓨팅 기반 분석)

  • Woo, Tae-Ho;Jang, Kyung-Bae
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.73-81
    • /
    • 2020
  • The internet of things (IoT) using cloud computing is applied to nuclear industry in which the nuclear power plant (NPP) accident is analyzed for the safety assessment. The Fukushima NPP accident is modeled for the accident simulations where the earthquake induced plant failure accident is used for analyzing the cloud computing technology. The fast and reasonable treatment in the natural disaster was needed in the case of the Fukushima. The real time safety assessment (RTSA) and the Monte-Carlo real time assessment (MCRTA) are constructed. This cloud computing could give the practicable method to prepare for the future similar accident.