• Title/Summary/Keyword: 5사물인터넷

Search Result 362, Processing Time 0.027 seconds

Trends of NB-IoT (협대역 사물인터넷 기술동향)

  • Seo, S.;Shin, E.J.;Jo, G.D.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.5
    • /
    • pp.11-20
    • /
    • 2016
  • 사물인터넷은 다양한 응용 및 융합 서비스를 창출할 새로운 기회의 장으로 떠오르고 있다. 가트너 등의 시장 조사기관 및 전문가 들의 예측에 따르면 2020년까지 사물인터넷 디바이스는 300~500억 대로 증가할 것이며, 시장 규모는 3,000억 달러를 초과할 것으로 전망하였다. 이러한 거대한 규모의 시장 선점을 위한 기술 간, 업체 간 경쟁도 한층 증대되고 있다. 비 3GPP 계열 LPWA 네트워크는 유럽을 중심으로 이미 서비스가 시작되었으며, 3GPP에서는 LPWA 네트워크 실현을 위해 Narrowband Internet-of-Things(NB-IoT)를 새롭게 소개하였다. NB-IoT는 비 3GPP 계열 LPWA 기술과의 경쟁 속에서도 빠르게 시장에 진입할 것으로 기대된다. 본고에서는 표준화가 완료된 3GPP Release 13 NB-IoT 기술과 Release 14을 목표로 표준화가 진행 중인 NB-IoT enhancement에 대해 기술한다.

  • PDF

A Longitudinal Study on Customers' Usable Features and Needs of Activity Trackers as IoT based Devices (사물인터넷 기반 활동량측정기의 고객사용특성 및 욕구에 대한 종단연구)

  • Hong, Suk-Ki;Yoon, Sang-Chul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.17-24
    • /
    • 2019
  • Since the information of $4^{th}$ Industrial Revolution is introduced in WEF (World Economic Forum) in 2016, IoT, AI, Big Data, 5G, Cloud Computing, 3D/4DPrinting, Robotics, Nano Technology, and Bio Engineering have been rapidly developed as business applications as well as technologies themselves. Among the diverse business applications for IoT, wearable devices are recognized as the leading application devices for final customers. This longitudinal study is compared to the results of the 1st study conducted to identify customer needs of activity trackers, and links the identified users' needs with the well-known marketing frame of marketing mix. For this longitudinal study, a survey was applied to university students in June, 2018, and ANOVA were applied for major variables on usable features. Further, potential customer needs were identified and visualized by Word Cloud Technique. According to the analysis results, different from other high tech IT devices, activity trackers have diverse and unique potential needs. The results of this longitudinal study contribute primarily to understand usable features and their changes according to product maturity. It would provide some valuable implications in dynamic manner to activity tracker designers as well as researchers in this arena.

Analyses of Requirement of Integrated Security for Secure Internet of Things (안전한 사물인터넷망의 융합 보안을 위한 요구사항 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.4
    • /
    • pp.667-674
    • /
    • 2015
  • Internet of things (IoT) has been a focus of research and widespread. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. In order to facilitate this emerging domain, we analyzed the research progress of IoT, and pay attention to the security. By means of deeply analyzing the security architecture and features, the security requirements are required. And, we surveyed the demands and requirements.

사물인터넷(IoT) 기반 스마트 그리드 보안 특성 및 쟁점 분석

  • Jeon, Yong-Hee
    • Review of KIISC
    • /
    • v.24 no.5
    • /
    • pp.59-65
    • /
    • 2014
  • 산업제어시스템과 SCADA(Supervisory Control and Data Acquisition) 제어 시스템들이 기존의 고립적이고 폐쇄적인 시스템에서 점차 개방적이고 표준화된 시스템으로 전환되고 있으며, IT 망과의 통합이 이루어지고 있다. 따라서 주요 국가정보 인프라에 대한 사이버 위협 및 공격에 대한 우려가 증대되고 있다. 산업제어시스템의 정보보호 기술은 일반적인 IT 정보보호 기술과는 특성상 여러 가지 차이점이 존재한다. 국내에서의 산업제어시스템 정보보호 기술에 대한 연구는 아직 미약한 수준이다. 본 논문에서는 국가 주요 정보하부구조를 구성하고 있는 산업제어시스템 중에서 사물인터넷(IoT) 기반 스마트 그리드 시스템의 보안 특성에 대하여 분석하고 보안 쟁점 및 고려사항을 제시하고자 한다.

Implementation of Object Identifier, Mobile RFID and QR Code Exploiting End-of-Life Treatment Information of Internet of Things Devices (사물인터넷 디바이스의 폐기 처리 정보를 활용한 객체 식별자, 모바일 RFID 및 QR 코드 구현)

  • Seo, Jeongwook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.441-447
    • /
    • 2020
  • In a situation in which around 50 million metric tons of electrical and electronic products is generated globally per year, the total installed base of Internet of Things (IoT) devices is projected to amount to around 75 billion worldwide by 2025. However, there is very little research on identification schemes for end-of-life treatment (EoLT) of IoT devices. To address this issue, this paper proposes new identifiers including EoLT information such as recyclability rate (Rcyc) and recoverability rate (Rcov) of an IoT device, recycling rate (RCR) and recovery rate (RVR) of each part in the IoT device, etc. and implements them by using object identifier (OID), mobile radio frequency identification (RFID) and quick response (QR) code. The implemented OID and mobile RFID can be used with cooperation of a remote server via communication networks and the implemented QR code can be used simply with a smartphone app.

A Study on the Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence (사물 인터넷과 빅데이터 융복합 활성화를 위한 규제 개선 방안에 관한 연구)

  • Kim, Ki-Bong;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.5
    • /
    • pp.29-35
    • /
    • 2017
  • Korea has been showing a high interest in convergence centered on information and communication technologies for the past 10 years. However, with successful convergence of broadcasting and telecommunication sectors, successful convergence cases such as IPTV have been excluded. In some fields, The performance that citizens can experience is limited. In addition, the combination of the Internet of things and the big data shows that infinite data in the natural and social environment surrounding service users can be created and utilized to create better services. However, the division between departments and departments, And the limitations of policies and systems that can promote convergence of information and communication technologies. Therefore, in order to create new industries through the fusion of the Internet of things and big data, it is necessary to investigate what kind of inhibitory enzymes are present, to investigate the problems, to solve the problems, to develop technologies for activating the Internet and big data, And suggests ways to utilize the policy to promote convergence of related technologies.

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.

Hash-based SSDP for IoT Device Security (IoT 기기 보안을 위한 해시 기반의 SSDP)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Due to the prolonged infectious disease of COVID-19 worldwide, there are various security threats due to network attacks on Internet of Things devices that are vulnerable to telecommuting. Initially, users of Internet of Things devices were exploited for vulnerabilities in Remote Desktop Protocol, spear phishing and APT attacks. Since then, the technology of network attacks has gradually evolved, exploiting the simple service discovery protocol of Internet of Things devices, and DRDoS attacks have continued to increase. Existing SSDPs are accessible to unauthorized devices on the network, resulting in problems with information disclosure and amplification attacks on SSDP servers. To compensate for the problem with the authentication procedure of existing SSDPs, we propose a hash-based SSDP that encrypts server-specific information with hash and adds authentication fields to both Notify and M-Search message packets to determine whether an authorized IoT device is present.

End-to-end MQTT security protocol using elliptic curve cryptography algorithm (타원곡선암호 알고리즘을 이용한 종단간 MQTT 보안 프로토콜)

  • Min, Jung-Hwan;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.1-8
    • /
    • 2019
  • Internet of Things (IoT) is proliferating to provide more intelligent services by interconnecting various Internet devices, and TCP based MQTT is being used as a standard communication protocol of the IoT. Although it is recommended to use TLS/SSL security protocol for TCP with MQTT-based IoT devices, encryption and decryption performance degenerates when applied to low-specification / low-capacity IoT devices. In this paper, we propose an end-to-end message security protocol using elliptic curve cryptosystem, a lightweight encryption algorithm, which improves performance on both sides of the client and server, based on the simulation of TLS/SSL and the proposed protocol.