• Title/Summary/Keyword: Address of Things

Search Result 126, Processing Time 0.019 seconds

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks

  • Choi, Sang-Il;Koh, Seok-Joo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2017
  • The constrained application protocol (CoAP) can be used for remotely controlling various sensor devices in Internet of Things (IoT) networks. In CoAP, to support the handover of a mobile sensor device, service discovery and message transmission needs to be repeated, although doing so would increase the handover delay significantly. To address this limitation of CoAP, a centralized CoAP scheme has been proposed. However, it tends to result in performance degradation for an inter-domain handover case. In this letter, we propose a distributed CoAP handover scheme to support the inter-domain handover. In the proposed scheme, a distributed mobility agent (DMA) is used for managing the location of mobile sensors in a domain and performing handover control operations with its neighboring DMAs in a distributed manner. A performance comparison reveals that the proposed scheme offers a performance improvement of up to 29.5% in terms of the handover delay.

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

A Study on Smart Door Lock using Internet of Things (IoT를 이용한 스마트 도어락에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.539-544
    • /
    • 2020
  • The research is on progressing to operate digital door lock with the method to guarantee the security and safety in the meantime to use digital door lock conveniently using Internet of Things (IoT) standardizing various service providing technology using IoT in home network currently. In this study, compose home network interconnecting Raspberry-PI and web server reflection this trend and composed the system to control the door lock after connect Arduino substituting converter function. Making Raspberry-PI using dynamic IP address using existing open source easily maintain DNS information and possible to connect internet network in home network ethernet and finally, making the smartphone can control door lock remotely entering designated address after connect the internet. The connection between home network and Arduino is executed by Raspberry-PI and bluetooth pairing as 1:1 and make random user's access to be impossible. Especially, to make open/close the door lock with smartphone not by using password on the keypad or using RFID card is judged as the method increasing the security make random user's access to be impossible and also increased the usefulness making remote control to be possible.

Address Space Maintaining Scheme for Fast Program Execution in Linux-based Systems (Linux 기반에서 빠른 프로그램 실행을 위한 주소 공간 유지 기법)

  • Noh, Seung Joon;Kang, Dong Hyun;Kim, Junghan;Kim, Inhyeok;Eom, Young Ik
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.12
    • /
    • pp.786-791
    • /
    • 2015
  • The environment of Internet of Things (IoT) wherein various devices are connected through the Internet with value-added network functions, is currently a subject of active study. Accordingly, the existing computing environment based on desktop or mobile systems is being expanded into a computing environment of more diverse devices. Because the response of program launching is important in terms of User Experience (UX) in IoT environments, the technology for guaranteeing rapid response of program launching in IoT devices is getting the focus of much current research. In this paper we analyze the Zygote technique, which is being used for faster program execution in Android systems, and, based on our results, we propose an address space maintaining scheme for the rapid launching of programs for use in Linux-based systems. Our scheme utilizes the Copy on Write (CoW) technique in Linux systems as well as the Zygote technique of Android systems. In order to evaluate the proposed scheme, we implemented our scheme on Linux systems and performed several experiments. The experimental results show that the proposed scheme shortens the launching time up to 99%, compared to the existing technique.

International Benchmarking on Factors Affecting the Number of Country Domain Name (국가도메인 네임 등록 수에 영향을 미치는 요인에 관한 국제 비교)

  • Kim, So-ra;Jun, Hyo-Jung;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2434-2442
    • /
    • 2015
  • With the arrival of the era of the Internet of Things (IoT), identification of an individual object is gaining significance. Internet address resources such as domain name, IP address, and OID are expected to play the role of an identifier and demand for them is also expected to increase. Accordingly, it becomes important to obtain the Internet address resources. As the Internet address resources market development, Internet address resources at the present time there is a need to gauge whether the potential to develop into industry. For this purpose, we have selected factors affecting the number of country domain name with 18 countries among OECD member countries as research target and carried out a regression analysis.

IoT and Smart City Technology: Challenges, Opportunities, and Solutions

  • Jeong, Young-Sik;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.233-238
    • /
    • 2019
  • Internet of Things (IoT) technology has been recently utilized in diverse fields. Smart city is one of the IoT application domains with a lot of research topics and which is operated by integrated IoT applications. In this paper, diverse kinds of solutions, processes, and frameworks to address the existing challenges in information technology are introduced. Such solutions involve various future track topics including blockchain, security, steganography, optimization, machine learning, smart system, and so on. In the subsequent paragraphs, we describe each topic in a summarized way in terms of the existing challenges and their solutions. Specifically, this paper introduced 18 novel and enhanced research studies from different countries in the world. We present diverse kinds of paradigms to subjects that tackle diverse kinds of research areas such as IoT and Smart City, and so on.

Ethics of Situated-ness, Sustainability and Ecology

  • Baek, Jin
    • Architectural research
    • /
    • v.13 no.1
    • /
    • pp.11-16
    • /
    • 2011
  • This article illuminates the relationship between the human being and the surrounding things by referring to the philosophy of Martin Heidegger and Maurice Merleau-Ponty. Criticizing our habitual approaches to apprehending 'what a thing is,' the two thinkers elucidate how 'what a thing is' can be understood only in conjunction with situations in the everyday and how humanity is joined with the qualities of the thing. In addition to the situated-ness of a thing, this article demonstrates the situated-ness of the human being, too, by referring to the notion of the horizon in the tradition of phenomenology. The last part of the paper discusses the basic premises of sustainability in reference to the situated-ness of both things and human beings. Framing natural things such as light as the alternative sources of energy propagandized in sustainability seems progressive. However, this attitude maintains fundamentally the same instrumental attitude we had towards nature, an attitude that has caused the current ecological crisis. By pointing this out, this article seeks to shape a ground for a broad spectrum of sustainability that embraces non-instrumental dimensions such as the practical, the ethical and the spiritual. This article also points out the limits of some of the currently available versions of ecology such as Shallow Ecology and Deep Ecology. In so doing, it seeks to lay out the parameters that any future version of sustainability and ecology needs to address.

Predicting Desired Fertigation for Rose Using Internet of Things Sensors and Time-Series Model

  • Mingle Xu;Sook Yoon;Jongbin Park;Jeonghyun Baek;Dong Sun Park
    • Smart Media Journal
    • /
    • v.13 no.2
    • /
    • pp.16-22
    • /
    • 2024
  • Greenhouse provides opportunities to have big yield effectively and efficiently. However, many resources are required, such as fertigation, a kind of solution of nutrient. Resources supply is essential to cultivate crops. Inadequate supply will hinder plant growth whereas the surplus results in waste. In this paper, we are especially interested in the fertigation supply. Further, excess fertigation leads to drainage which is difficult to purify and threatens the environment. To address this challenge, we aim to predict the desired amount of fertigation. To achieve this objective, we first establish a prototype to record the climate conditions inside a rose greenhouse using Internet of Things sensors. Simultaneously, the desired fertigation amount is obtained with the help of weight scale and historical data of fertigation supply and drainage. Second, a method is proposed to predict the desired fertigation by taking the sensors' data as input, with a time-series model. Extensive experimental results suggest the potential of our objective and method. To be specific, our method achieves an average MAE 0.032 in the validation datasets.

  • PDF

Development of Brain-machine Interface for MindPong using Internet of Things (마인드 퐁 제어를 위한 사물인터넷을 이용하는 뇌-기계 인터페이스 개발)

  • Hoon-Hee Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.17-22
    • /
    • 2023
  • Brain-Machine Interfaces(BMI) are interfaces that control machines by decoding brainwaves, which are electrical signals generated from neural activities. Although BMIs can be applied in various fields, their widespread usage is hindered by the low portability of the hardware required for brainwave measurement and decoding. To address this issue, previous research proposed a brain-machine interface system based on the Internet of Things (IoT) using cloud computing. In this study, we developed and tested an application that uses brainwaves to control the Pong game, demonstrating the real-time usability of the system. The results showed that users of the proposed BMI achieved scores comparable to optimal control artificial intelligence in real-time Pong game matches. Thus, this research suggests that IoT-based brain-machine interfaces can be utilized in a variety of real-time applications in everyday life.

Incorporating "Kansei Engineering" Approach on Traditional Textiles - A Proposed Method for Identifying Multi-Sensorial Experiences on the Kansei Attributes of Traditional Textiles -

  • Syarief, Achmad
    • The Research Journal of the Costume Culture
    • /
    • v.20 no.1
    • /
    • pp.121-127
    • /
    • 2012
  • When people are asked to described certain textiles, they frequently refer to the expressions of its properties such as attractiveness, uniqueness, shininess, robustness, comfortability, and so on. It shows how senses play important role in it. Human employs their senses when interacting with textiles, most notably visual and tactile/ haptic to absorb its expressive properties. Yet, our sensorial experiences may amplify when interacting with those of traditional textiles, such as batik, as we can entice sensations when seeing its motifs and patterns, smelling its materials, and touching its surfaces. The multi-sensorial importance of seeing, smelling, and touching in the interaction with and experience of textiles suggests that one should address senses in a systematic way when evaluating users' perception on traditional textiles. To address this issue, the paper proposes the incorporation of Kansei Engineering (KE) approach for identifying multi-sensorial experiences on the expressive properties of traditional textiles, using batik as a case of study. KE approach address person's psychological understanding when observing things in order to analyze and study the inherent relationship between person's perceptual knowledge and objects evaluated. This paper outlines the use of KE approach in correlating sensorial perceptions when experience with traditional textiles and ultimately expose users' preferences toward them. Background of KE approach on textiles will be explored and its application for the multi-sensorial investigation of traditional textiles will be discussed.