• Title/Summary/Keyword: 인터넷프로토콜

Search Result 2,045, Processing Time 0.027 seconds

Implementation of Smart Home System based on AWS IoT and MQTT (AWS IoT 와 MQTT 기반 스마트 홈 시스템 구현)

  • Jung, Inhwan;Hwang, Kitae;Lee, Jae-Moon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.7-12
    • /
    • 2022
  • This paper introduces the implementation of the AWS IoT service and MQTT based smart home system. The smart home system implemented in this study can monitor temperature and humidity, and can manually adjust the air conditioner heating, and can check the visitors with the camera and remotely control the door lock. The implemented smart home system controls door locks, heating and air conditioners using Arduino, and manages the collected data and control information using the AWS IoT service. In this study, the Android app has been developed to allow users to control IoT devices remotely, and the MQTT protocol was used for data communication and control between the app and the AWS IoT server and Arduino. The implemented smart home system has been implemented based on AWS IoT service, which has scalability to add sensors and devices.

Smart Centralized Remote Security Service Provisioning Framework for Open ICT Environment (개방형 ICT 환경을 위한 집중식 원격 보안 서비스 프로비저닝 프레임워크 구성 방안)

  • Park, Namje
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.2
    • /
    • pp.81-88
    • /
    • 2016
  • Machine-to-Machine (M2M) communication provides each component (machine) with access to Internet, evolving into the IoT technology. IoT is a trend where numbers of devices provide the communication service, using the Internet protocol. As spreading the concept of IoT(Internet of Things), various objects become home information sources. According to the wide spread of various devices, it is difficult to access data on the devices with unified manners. Under this environment, security is a critical element to create various types of application and service. In this paper propose the inter-device authentication and Centralized Remote Security Provisioning framework in Open M2M environment. The results of previous studies in this task is carried out by protecting it with the latest information on M2M / IoT and designed to provide the ultimate goal of future M2M / IoT optimized platform that can be integrated M2M / IoT service security and security model presents the information.

A Study on the Improvement of IoT Network Performance Test Framework using OSS (개방형 SW를 이용한 IoT 네트워크 성능시험기 개선에 관한 연구)

  • Joung Youngjun;Jeong Yido;Lee SungHwa;Kim JinTae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.97-102
    • /
    • 2023
  • This study is to provide improvement of tester for IoT system, which has recently become diversified and large-scale and It is about a method to improve the packet processing performance of the tester and securing flexibility in traffic protocol creation and operation. The purpose of this study is to design a OSS DPDK-based high-speed IoT network performance test system, which pre-verifies and measures the performance of data traffic transmission in an increasingly sophisticated high-capacity IoT network system. The basic structure of the high-speed IoT performance tester was designed using a DPDK-based traffic generator, the expected effect was suggested to traffic modeling and packet generation capability when the system was applied through experiments

A Study on Performance Analysis of a Messaging System in IoT Environments (IoT 환경에서의 메시징 시스템의 성능 분석에 관한 연구)

  • Young-Dong Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.112-118
    • /
    • 2023
  • Internet of Things(IoT) technology is developing to a stage where the Internet and objects are connected and objects themselves analyze and judge data to interconnect the real world and the virtual world in real time. This technology consists of sensors, actuators, devices, and networks, and it is being applied in various fields. As the number of IoT devices and applications increases, data traffic also increases. In this paper, a messaging system is designed and implemented in order to analyze the performance between an IoT device and MQTT broker. The experimental was performed to measure MQTT-based round-trip time and message transmission time between the IoT device and the broker. The result shows that there is no packet loss, and propagation delay affects round-trip time.

Retained Message Delivery Scheme utilizing Reinforcement Learning in MQTT-based IoT Networks (MQTT 기반 IoT 네트워크에서 강화학습을 활용한 Retained 메시지 전송 방법)

  • Yeunwoong Kyung;Tae-Kook Kim;Youngjun Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.131-135
    • /
    • 2024
  • In the MQTT protocol, if the retained flag of a message published by a publisher is set, the message is stored in the broker as a retained message. When a new subscriber performs a subscribe, the broker immediately sends the retained message. This allows the new subscriber to perform updates on the current state via the retained message without waiting for new messages from the publisher. However, sending retained messages can become a traffic overhead if new messages are frequently published by the publisher. This situation could be considered an overhead when new subscribers frequently subscribe. Therefore, in this paper, we propose a retained message delivery scheme by considering the characteristics of the published messages. We model the delivery and waiting actions to new subscribers from the perspective of the broker using reinforcement learning, and determine the optimal policy through Q learning algorithm. Through performance analysis, we confirm that the proposed method shows improved performance compared to existing methods.

Delay time Analysis of Asynchronous RIT Mode MAC in Wi-SUN (Wi-SUN에서 비동기 RIT모드 MAC의 지연시간 분석)

  • Dongwon Kim;Mi-Hee Yoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.65-70
    • /
    • 2024
  • In recent years, research on smart factory wireless mobile communication technology that wirelessly remotely controls utilities is being actively conducted. The Wi-SUN (Wireless Smart Utility Network) Alliance proposed a Wi-SUN protocol structure suitable for building a platform such as a smart factory as a new wireless communication standardization standard based on EEE802.15.4g/e. It analyzes the performance of the IEEE802.15.4e Receiver Initiated Transmission(RIT) Mode Media Access Control (MAC) in terms of throughput and latency, and looks at considerations for efficient operation. RIT mode shows that as the check interval becomes longer, delay time and throughput decrease. It was shown that as the traffic load increases, if the RIT check interval is shortened, the delay time can be shortened and throughput can be increased. RIT mode has the advantage of low power consumption and has neutral characteristics between IEEE802.15.4 and CSL mode in terms of delay time and throughput.

DAVon : A C++ Library for Developing WebDAV Clients ($\cdot$DAVon : C++ WebDAV 클라이언트 라이브러리)

  • Shin Wonjoon;Lee Hongchang;Park Yangsoo;Lee Myungjoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.586-588
    • /
    • 2005
  • WebDAV는 HTTP/1.1을 확장한 윕통신 프로토콜로서 인터넷을 통하여 다양한 콘텐츠의 비동기적인 협업 제작을 지원하기 위한 표준 하부구조를 제공한다. WebDAV명세를 지원하는 다양한 종류의 서버들은 사용자 상호간의 협업작업이 가능하게 해준다. 그리고 WebDAV 클라이언트는 서버와 HTTP 요청/응답 과정을 통하여 WebDAV 기능을 수행한다. 하지만 클라이언트 자체적으로 요청/응답 과정을 처리하는 것은 매우 복잡할 뿐만 아니라 비효율적이다. 따라서 WebDAV 기능을 잘 처리할 수 있는 클라리언트 라이브러리를 사용하는 것이 바람직하다. 본 논문에서는 WebDAV 클라이언트의 HTTP 요청/응답 처리를 위한 DAVon 클라이언트 라이브러리를 개발하였다. DAVon은 객체지향 기법으로 설계되어 C 라이브러리보다 편리한 API를 제공하고 리눅스 QT 라이브러리를 기반으로 구현되었다. 그리고 QT의 시그널/슬록 방식을 사용하여 HTTP 요청을 비동기적으로 처리함으로써 클라이언트의 병행성을 효율적으로 지원한다.

  • PDF

An Android BLE Emulator for Developing Wearable Apps (웨어러블 어플리케이션 개발을 위한 안드로이드 BLE 에뮬레이터)

  • Moon, Hyeonah;Park, Sooyong;Choi, Kwanghoon
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.2
    • /
    • pp.67-76
    • /
    • 2018
  • BLE (Bluetooth Low Energy) has been extensively used for communication between mobile applications and wearable devices in IoT (Internet of Things). In developing Android applications, wearable devices, on which the applications can run, should be available because the existing Android SDK does not support any BLE emulation facility. In this study, we have designed and implemented the first Android BLE emulator. Using this, we are able to develop and test BLE-based Android applications even when without wearable devices. We have also proposed an automatic generation method of Android BLE scenarios based on graph model. We have shown that the method is useful for systematically testing BLE application protocols by running the generated scenarios on the Android BLE emulator.

Secure-FMIPv6: A Study on Secure Fast Handover based on ID-based Cryptosystem (Secure-FMIPv6: ID 기반 암호시스템에 기반한 안전한 Fast 핸드오버 연구)

  • Lee Woo-Chan;Jung Soo-Jin;Lee Jong-Hyouk;Han Young-Ju;Chung Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.905-908
    • /
    • 2006
  • MIPv6 는 MN(Mobile Node)가 자신의 홈 네트워크를 벗어나 외부 네트워크로 이동하여도 다른 노드들과 끊김 없이 지속적인 통신을 할 수 있게 해주는 인터넷 프로토콜이다. MN 은 외부네트워크로 이동 후 HA(Home Agent) 및 CN(Correspondent Node)로 핸드오버(Handover) 동작의 수행하며 이로 인한 지연이 발생하게 된다. 이러한 지연을 줄이기 위한 대책으로 Fast 핸드오버가 등장하였다. Fast 핸드오버 과정에서 MN 은 이동하려는 서브넷의 라우터(New Access Router: NAR)로의 전환을 위하여 현재 연결된 AR 과 미리 정보를 주고 받게 되고, 이동이 발생한 후에 NAR 과의 핸드오버 지연시간이 감소하게 된다. 반면 공격자가 flooding 을 통해 MN 에게 DoS(Denial of Service) 공격을 가하여 MN 을 다운시킨 후, MN 으로 위장하여 데이터를 가로채는 취약점이 존재한다. 본 논문에서는 위의 취약점을 보완하기 위하여 핸드오버 과정에서 주고받는 메세지에 대한 기밀성 및 노드 인증을 제공하는 ID 기반 암호시스템에 기반한 안전한 Fast 핸드오버 방식을 제안한다. 제안하는 모델은 메시지의 암호화와 노드 인증을 통해 무결성 및 기밀성을 보장하고 Traditional PKI 시스템에 비해 공개키 인증시간을 단축하는 이점을 가질 것으로 기대된다.

  • PDF

A Study on the authentication scheme for Security of Wireless Internet (무선 인터넷에서 보안을 위한 인증방안에 관한 연구)

  • 최용식;강찬희;신승호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.87-91
    • /
    • 2004
  • The continuing development of the information technology industry and wireless networking has increased the use of mobile device, which provides both portability and mobility. As follows, demands for extended services within the wireless Internet are increasing rapidly. Because it still in its initial stages of development, the wireless Internet presents continuing problems in security and limitations in the content of services. Furthermore, most mobile equipment utilizes the touch pad input method. This input method is inconvenient when a user needs to input a long sentence. This has led to the more convenient development of image selection by using a pen mouse. In order to provide security under these conditions, a HASH code may be used to transmit an array of information and input values, created by the image input at the early stages. Thus, authentication and key exchange are completed securely. Messages are encoded and transmitted, preventing both information drain by insiders and interference from outside.