• Title/Summary/Keyword: 5사물인터넷

Search Result 364, Processing Time 0.028 seconds

Review of the suitability to introduce new identity verification means in South Korea : Focused on Block Chain and FIDO (우리나라의 본인확인수단에 관한 신규 인증수단의 도입 적합성 검토 : Block Chain과 FIDO를 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.85-93
    • /
    • 2018
  • This study investigates the suitability of the blockchain and FIDO among non-face-to-face authentication means in order to secure diversity of identfication means operated in South Korea. In order to do this, the study selected and analyzed seven conformance criteria (universality, persistence, uniqueness, convenience, security, applicability, and economics), and the results were appropriate. Accordingly, in order to apply the blockchain and FIDO as the identification means, the related regulations and notices should be revised to improve the identification procedure. In addition, differentiated certification standards should be established for each service field to apply various authentication means as well as existing identification means, and the authentication means should be continuously developed and linked with the service. In the future, the identification means will bring security of the information circulation environment in the IoT, so it should be implemented in a variety of services by supporting application of identification means.

Fast Detection of Disease in Livestock based on Deep Learning (축사에서 딥러닝을 이용한 질병개체 파악방안)

  • Lee, Woongsup;Kim, Seong Hwan;Ryu, Jongyeol;Ban, Tae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.1009-1015
    • /
    • 2017
  • Recently, the wide spread of IoT (Internet of Things) based technology enables the accumulation of big biometric data on livestock. The availability of big data allows the application of diverse machine learning based algorithm in the field of agriculture, which significantly enhances the productivity of farms. In this paper, we propose an abnormal livestock detection algorithm based on deep learning, which is the one of the most prominent machine learning algorithm. In our proposed scheme, the livestock are divided into two clusters which are normal and abnormal (disease) whose biometric data has different characteristics. Then a deep neural network is used to classify these two clusters based on the biometric data. By using our proposed scheme, the normal and abnormal livestock can be identified based on big biometric data, even though the detailed stochastic characteristics of biometric data are unknown, which is beneficial to prevent epidemic such as mouth-and-foot disease.

Improvement of Smart Surveillance Service using Service Priority (서비스 우선순위를 이용한 스마트 관제 서비스의 개선)

  • Seong, Dong-Su
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.1003-1010
    • /
    • 2018
  • When an applicant requests the emergency situation call or safe return service using a smart device, the smart surveillance service can select the CCTV(closed circuit television) cameras around the applicant using applicant's location information, then automatically takes a photograph to track the applicant. Since the surrounding CCTV camera shoots the applicant continuously using location information and the applicant can be observed by the monitor agent in real time, this service can be very helpful in an applicant's emergency situation or safe return. The existing smart surveillance service does not consider the priority of the emergency situation call and safe return service. Therefore, there is the disadvantage that the applicant who requests an emergency situation call service can not be photographed when safe return service has already preoccupied CCTV cameras which are capable of taking a picture of the applicant. The proposed smart surveillance service improves this disadvantage by using service priority.

Efficient Authentication Establishment Scheme between IoT Device based on Pascal Triangle Theory (파스칼 삼각 이론 기반의 IoT 장치간 효율적인 인증 설립 기법)

  • Han, Kun-Hee;Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.15-21
    • /
    • 2017
  • Recently, users' interest in IoT related products is increasing as the 4th industrial revolution has become social. The types and functions of sensors used in IoT devices are becoming increasingly diverse, and mutual authentication technology of IoT devices is required. In this paper, we propose an efficient double signature authentication scheme using Pascal's triangle theory so that different types of IoT devices can operate smoothly with each other. The proposed scheme divides the authentication path between IoT devices into two (main path and auxiliary path) to guarantee authentication and integrity of the IoT device. In addition, the proposed scheme is suitable for IoT devices that require a small capacity because they generate keys so that additional encryption algorithms are unnecessary when authenticating IoT devices. As a result of the performance evaluation, the delay time of the IoT device is improved by 6.9% and the overhead is 11.1% lower than that of the existing technique. The throughput of IoT devices was improved by an average of 12.5% over the existing techniques.

Secure Smart Safety System Using Streetlight Infrastructure (가로등 인프라를 활용한 안전한 스마트 방범 시스템)

  • Cha, Jeong-Hwa;Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.851-856
    • /
    • 2015
  • As crime has actually increased in recent years, various mobile applications related to safety and emergency measure have received much attention. Therefore, IoT (Internet of Things) technologies, which connect various physical objects with Internet communication, have been also paid attention and then diverse safety services based on IoT technologies have been on the increase. However, existing mobile safety applications are simply based on location based service (LBS). Also, as they are independently operated without the help of another safety systems, they cannot efficiently cope with various safety situations. So, this paper proposes the efficient smart safety service architecture with both the risky situation detection using user location as well as various sensing information and the risk congruence measure using the streetlight infrastructure. Additionally, UDID (unique device identifier) is utilized for the secure communication with the control center.

Location for a Car Crash and The Service System (차량 충돌 사고에 대한 위치 확인 및 서비스 시스템)

  • Moon, Seung-Jin;Lee, Yong-Joo
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.381-388
    • /
    • 2009
  • The spread of wireless Internet technology development and applications with location information in the form of location-based services are becoming more diverse. In particular, where you recognize the location of objects such as people and things and to provide valuable services based on the ubiquitous and location-based services are emerging as an important service. The collision between the vehicle position measurement in this thesis and offers related service system. Used in the proposed system, the GPS PACKET with information about the location and time of collision for the vehicle crash, the vehicle consists of a NodeID. Cause a conflict between these data at the vehicle, the vehicle through the gateway from the server to decide whether to go on to determine that an emergency situation, Emergency Center, the location information and giving information about whether the conflict is measured. Also, for such an emergency, such as a family on the outside of the wireless terminal related to Wireless (PDA, Phone) is to let me know. The server to want to save the crash information to the database of configuration. Additionally, the proposed U-LBS system to verify the validity of the experiment was performed.

Design and Implementation of Vehicle Control Network Using WiFi Network System (WiFi 네트워크 시스템을 활용한 차량 관제용 네트워크의 설계 및 구현)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.632-637
    • /
    • 2019
  • Recent researches on autonomous driving of vehicles are becoming very active, and it is a trend to assist safe driving and improve driver's convenience. Autonomous vehicles are required to combine artificial intelligence, image recognition capability, and Internet communication between objects. Because mobile telecommunication networks have limitations in their processing, they can be easily implemented and scale using an easily expandable Wi-Fi network. We propose a wireless design method to construct such a vehicle control network. We propose the arrangement of AP and the software configuration method to minimize loss of data transmission / reception of mobile terminal. Through the design of the proposed network system, the communication performance of the moving vehicle can be dramatically increased. We also verify the packet structure of GPS, video, voice, and data communication that can be used for the vehicle through experiments on the movement of various terminal devices. This wireless design technology can be extended to various general purpose wireless networks such as 2.4GHz, 5GHz and 10GHz Wi-Fi. It is also possible to link wireless intelligent road network with autonomous driving.

Performance Comparison of Task Partitioning Methods in MEC System (MEC 시스템에서 태스크 파티셔닝 기법의 성능 비교)

  • Moon, Sungwon;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.139-146
    • /
    • 2022
  • With the recent development of the Internet of Things (IoT) and the convergence of vehicles and IT technologies, high-performance applications such as autonomous driving are emerging, and multi-access edge computing (MEC) has attracted lots of attentions as next-generation technologies. In order to provide service to these computation-intensive tasks in low latency, many methods have been proposed to partition tasks so that they can be performed through cooperation of multiple MEC servers(MECSs). Conventional methods related to task partitioning have proposed methods for partitioning tasks on vehicles as mobile devices and offloading them to multiple MECSs, and methods for offloading them from vehicles to MECSs and then partitioning and migrating them to other MECSs. In this paper, the performance of task partitioning methods using offloading and migration is compared and analyzed in terms of service delay, blocking rate and energy consumption according to the method of selecting partitioning targets and the number of partitioning. As the number of partitioning increases, the performance of the service delay improves, but the performance of the blocking rate and energy consumption decreases.

IoT Malware Detection and Family Classification Using Entropy Time Series Data Extraction and Recurrent Neural Networks (엔트로피 시계열 데이터 추출과 순환 신경망을 이용한 IoT 악성코드 탐지와 패밀리 분류)

  • Kim, Youngho;Lee, Hyunjong;Hwang, Doosung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.5
    • /
    • pp.197-202
    • /
    • 2022
  • IoT (Internet of Things) devices are being attacked by malware due to many security vulnerabilities, such as the use of weak IDs/passwords and unauthenticated firmware updates. However, due to the diversity of CPU architectures, it is difficult to set up a malware analysis environment and design features. In this paper, we design time series features using the byte sequence of executable files to represent independent features of CPU architectures, and analyze them using recurrent neural networks. The proposed feature is a fixed-length time series pattern extracted from the byte sequence by calculating partial entropy and applying linear interpolation. Temporary changes in the extracted feature are analyzed by RNN and LSTM. In the experiment, the IoT malware detection showed high performance, while low performance was analyzed in the malware family classification. When the entropy patterns for each malware family were compared visually, the Tsunami and Gafgyt families showed similar patterns, resulting in low performance. LSTM is more suitable than RNN for learning temporal changes in the proposed malware features.

Outdoor Care System using WEMOS and Arduino MEGA (WEMOS와 아두이노 MEGA를 이용한 외출 케어 시스템)

  • Jeong-Geun Choi;Chang-Hyun Kim;Chan-Gyu Lee;Geon-Ho Choi;Boong-Joo Lee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.4
    • /
    • pp.677-686
    • /
    • 2023
  • In this paper, we study the design and implementation of a smart home outing care system that recognizes the user's purpose of going out and delivers useful information that can help when going out. RSS service data of the Korea Meteorological Administration can be transmitted in real time using ESP8266, and a system that can provide weather information to users after analyzing the data using Arduino MEGA is implemented. Using App Inventor, you can pack the necessary items without forgetting, and you can change the settings according to the desired weather and purpose. The position of the microphone was placed outside to increase awareness by 12%, and the sensitivity of the pressure sensor was set to a maximum of 210 kΩ. If there is an obstacle between the doors, the doors open automatically. An ultrasonic sensor was placed on the ceiling of the drawer to recognize an object within the range of 0.5cm to 10cm to check the existence of an object, and a camera was installed to research a security reinforcement system.