• Title/Summary/Keyword: Android Things

Search Result 67, Processing Time 0.024 seconds

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

A Study on the Secure Communication at Android Things Environment using the SEED Library (SEED 암호 라이브러리를 활용한 안전한 Android Things 통신 환경연구)

  • Park, Hwa Hyeon;Yoon, Mi Kyung;Lee, Hyeon Ju;Lee, Hae Young;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.4
    • /
    • pp.67-74
    • /
    • 2019
  • As the market for Internet of Things (IoT) service grows, the security issue of the data from IoT devices becomes more important. In this paper, we implemented a cryptographic library for confidentiality of sensor data from Android Things based IoT services. The library made use of the SEED algorithm for encryption/decryption of data and we verified the library by implementing a service environment. With the library, the data is securely encrypted and stored in the database and the service environment is able to represent the current sensing status with the decrypted sensor data. The contribution of this work is in verifying the usability of SEED based encryption library by implementation in IoT sensor based service environment.

Smart Home System Using Internet of Things

  • Santoso, Leo Willyanto;Lim, Resmana;Trisnajaya, Kevin
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.1
    • /
    • pp.60-65
    • /
    • 2018
  • The Internet of Things (IoT) is happening now. By implementing IoT, we can build smart home system. Smart home is an application that is a combination of technology and services that specialize in the home environment with specific functions aimed at improving the efficiency, comfort and security of the occupants. Smart homes filled with connected products are loaded with possibilities to make our lives easier, more convenient, and more comfortable. This intelligent home system uses a microcontroller to process functions that provided by smart home system, such functions as RFID for door access and PIR sensors for motion detection. By using Android users could control the sensors anytime and anywhere. Microcontroller used is Arduino IDE with WeMos D1R2 board. Based on the testing process, there was a successful communication between the components of the device, sensors, and Android devices. Users could open or close the solenoid, users can also turn off or turn on electronic devices using Android.

Internet of Things based Smart Energy Management for Smart Home

  • TASTAN, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2781-2798
    • /
    • 2019
  • Thanks to internet, as one of indispensable parts of our lives, many devices that we use in our daily lives like TV, air conditioner, refrigerator, washing machine, can be monitored and controlled remotely by becoming more intelligent via Internet of Things (IoT) technology. Smart Home applications as one of the elements of smart cities, are individually the most demanded application without question. In this study, Smart Energy Management (SEM) system, based on NodeMCU and Android, has been designed for SEM, which is a part of the smart home application. With this system, household energy consumption can be monitored in real time, as well as having the ability to record the data comprising of operation times and energy consumption information for each device. Additionally, it is ensured to meet the energy needs on a maximized level possible, during the hours when the energy costs are lower owing to the SEM system. The Android interface provides the users with the opportunity to monitor and change their electricity consumption habits in order to optimize the energy efficiency, along with the opportunity to draw up of a daily and weekly schedule.

Remote Binder: Remote Procedure Call between Android Devices (Remote Binder: 안드로이드 디바이스 간 원격 프로시저 호출)

  • Jeong, Kihyun;Kang, HeeEun;Lee, Kwonyong;Park, Sungyong
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.5
    • /
    • pp.359-364
    • /
    • 2015
  • As Internet of Things(IoT) has become one of the most rapidly growing market in the world, the number of embedded Android devices has increased. Therefore, it is necessary to set up an environment that connects and cooperates between the devices via network. The environment requires an ability not only to obtain information about other devices through a network but to control remote devices by invoking remote procedures. This paper suggests the Remote Binder, which is a method for remote procedure call between devices operating on Android platform. It invokes procedures of other Android devices without any revisions via network by extending the binder structure which is used for inter-process communication in Android.

Optimal Machine Learning Model for Detecting Normal and Malicious Android Apps (안드로이드 정상 및 악성 앱 판별을 위한 최적합 머신러닝 기법)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.1-10
    • /
    • 2020
  • The mobile application based on the Android platform is simple to decompile, making it possible to create malicious applications similar to normal ones, and can easily distribute the created malicious apps through the Android third party app store. In this case, the Android malicious application in the smartphone causes several problems such as leakage of personal information in the device, transmission of premium SMS, and leakage of location information and call records. Therefore, it is necessary to select a optimal model that provides the best performance among the machine learning techniques that have published recently, and provide a technique to automatically identify malicious Android apps. Therefore, in this paper, after adopting the feature engineering to Android apps on official test set, a total of four performance evaluation experiments were conducted to select the machine learning model that provides the optimal performance for Android malicious app detection.

Digital Forensic for Location Information using Hierarchical Clustering and k-means Algorithm

  • Lee, Chanjin;Chung, Mokdong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.30-40
    • /
    • 2016
  • Recently, the competition among global IT companies for the market occupancy of the IoT(Internet of Things) is fierce. Internet of Things are all the things and people around the world connected to the Internet, and it is becoming more and more intelligent. In addition, for the purpose of providing users with a customized services to variety of context-awareness, IoT platform and related research have been active area. In this paper, we analyze third party instant messengers of Windows 8 Style UI and propose a digital forensic methodology. And, we are well aware of the Android-based map and navigation applications. What we want to show is GPS information analysis by using the R. In addition, we propose a structured data analysis applying the hierarchical clustering model using GPS data in the digital forensics modules. The proposed model is expected to help support the IOT services and efficient criminal investigation process.

Development Status of Crowdsourced Ground Vibration Data Collection System Based on Micro-Electro-Mechanical Systems (MEMS) Sensor (MEMS 센서 기반 지반진동 정보 크라우드소싱 수집시스템 개발 현황)

  • Lee, Sangho;Kwon, Jihoe;Ryu, Dong-Woo
    • Tunnel and Underground Space
    • /
    • v.28 no.6
    • /
    • pp.547-554
    • /
    • 2018
  • Using crowdsourced sensor data collection technique, it is possible to collect high-density ground vibration data which is difficult to obtain by conventional methods. In this study, we have developed a crowdsourced ground vibration data collection system using MEMS sensors mounted on small electronic devices including smartphones, and implemented client and server based on the proposed infrastructure system design. The system is designed to gather vibration data quickly through Android-based smartphones or fixed devices based on Android Things, minimizing the usage of resource like power usage and data transmission traffic of the hardware.

Design and Implementation of Machine Learning-based Blockchain DApp System (머신러닝 기반 블록체인 DApp 시스템 설계 및 구현)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, we developed a web-based DApp system based on a private blockchain by applying machine learning techniques to automatically identify Android malicious apps that are continuously increasing rapidly. The optimal machine learning model that provides 96.2587% accuracy for Android malicious app identification was selected to the authorized experimental data, and automatic identification results for Android malicious apps were recorded/managed in the Hyperledger Fabric blockchain system. In addition, a web-based DApp system was developed so that users who have been granted the proper authority can use the blockchain system. Therefore, it is possible to further improve the security in the Android mobile app usage environment through the development of the machine learning-based Android malicious app identification block chain DApp system presented. In the future, it is expected to be able to develop enhanced security services that combine machine learning and blockchain for general-purpose data.

A Method for Visualizing a Large JT File of Ship Blocks in an Android Device (선박 블록 단위의 대용량 JT 파일을 안드로이드 기기에서 가시화하는 방법)

  • Cheon, Sanguk;Suh, Heung-Won
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.4
    • /
    • pp.258-266
    • /
    • 2013
  • In shipbuilding, 2D manufacturing drawings are crucial for building a ship. Even various types of 3D models are being utilized for supporting ship manufacturing, which does not reduce the importance of 2D drawings. Recently things are changing in the shipbuilding industry. To reduce the number of 2D drawings or to reduce the quantity of information contained in 2D drawings, some attempts that can substitute for 2D drawings are being made. One of the attempts is to visualize lightweight 3D manufacturing models in a mobile device. In this paper, a method for displaying lightweight 3D models of a ship in an Android based device is introduced. To overcome the problem with parsing JT files in Android system, JT files are parsed in a Windows based server and as-simple-as-possible visualization data are transmitted to an Android based viewer. A comparison result with a commercial system is also given.