• Title/Summary/Keyword: Heterogeneous IoT Devices

Search Result 61, Processing Time 0.026 seconds

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.

Implementation of Zigbee-based Publish/Subscribe System for M2M/IoT Services (M2M/IoT 서비스를 위한 지그비 기반의 Publish/Subscr ibe 시스템 구현)

  • Lee, Dokyeong;Choi, Deokjai
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1461-1472
    • /
    • 2014
  • Recently, smart devices has been spreaded and the definition of RFID/USN(Radio Frequency Identification/Ubiquitous Sensor Network) technology has also extended. So, originally, human is an agent of communications but now, 'the things' are also an agent of communication. That is, Internet of Things(IoT). IoT is very big IT infra technology that is based on wire-wireless network technologies such as Bluetooth and Wi-Fi. However, in reality, IoT service that can provide various meaning and integrate smoothly is not appear yet. To solve these problems of IoT, we implemented Publish/Subscribe system, which operate in Zigbee based wireless sensor network by using MQTT-SN protocol. Moreover, this system can operate with combining MQTT system that is already existed in external Internet network so, extensibility and flexibility aspect is excellent. We show that possibility of IoT services that is combined between different heterogeneous network through the MQTT-SN.

A Trust Evaluation Model on QoS based Services Composition for IoT Environments (IoT 환경에서 QoS 기반 서비스 조합을 위한 신뢰 평가모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.85-93
    • /
    • 2019
  • In an open, heterogeneous environment based on machine-to-machine (M2M) interactions, service selection is a critical issue and the concept of social trust can be applied to service selection so that IoT devices can make the best choice for interaction. In this paper, we propose a method for evaluating the trust level of the service and for estimating the QoS of the composite service using a profile created based on social trust relationship in IoT environment. As the service selection is made through quantitative evaluation, it is expected that the result of a more reliable service combination can be obtained.

A Study of End-to-End Message Security Protocol Based on Lightweight Ciphers for Smart IoT Devices (스마트 IoT 디바이스를 위한 경량 암호기반 종단간 메시지 보안 프로토콜)

  • Kim, Hee-jeong;Kim, Jeong Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1309-1317
    • /
    • 2018
  • Although the IoT market is steadily growing, there is still a lack of consideration for increasing security threats in the IoT environment. In particular, it is difficult to apply existing IP security technology to resource-constrained devices. Therefore, there is a demand for reliable end-to-end communication security measures to cope with security threats such as information tampering and leakage that may occur during communication between heterogeneous networks do. In this paper, we propose an end-to-end message security protocol based on lightweight cipher that increases security and lowers security overhead in resource-constrained IoT device communication. Through simulation of processing time, we verified that the proposed protocol has better performance than the existing AES-based protocol.

A Name-based Service Discovering Mechanism for Efficient Service Delivery in IoT (IoT에서 효율적인 서비스 제공을 위한 이름 기반 서비스 탐색 메커니즘)

  • Cho, Kuk-Hyun;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.46-54
    • /
    • 2018
  • The Internet of Things (IoT) is an environment in which various devices provide services to users through communications. Because of the nature of the IoT, data are stored and distributed in heterogeneous information systems. In this situation, IoT end applications should be able to access data without having information on where the data are or what the type of storage is. This mechanism is called Service Discovery (SD). However, some problems arise, since the current SD architectures search for data in physical devices. First, turnaround time increases from searching for services based on physical location. Second, there is a need for a data structure to manage devices and services separately. These increase the administrator's service configuration complexity. As a result, the device-oriented SD structure is not suitable to the IoT. Therefore, we propose an SD structure called Name-based Service-centric Service Discovery (NSSD). NSSD provides name-based centralized SD and uses the IoT edge gateway as a cache server to speed up service discovery. Simulation results show that NSSD provides about twice the improvement in average turnaround time, compared to existing domain name system and distributed hash table SD architectures.

A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment (IoT 환경에서 속성기반 암호화 기술을 활용한 메시지 통신 기법에 관한 연구)

  • Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.295-302
    • /
    • 2016
  • Many countries, especially ICT powers, are supporting IoT-based technology at a national level and this technology is actively being researched in the businesses and research institutes in an aim to develop technology and create an ecosystem. Roads in the Seoul city are building public facilities based on IoT to provide various services and conveniences for the users. However, for the full-fledged introduction and development of IoT, there are many cases where infringement on security and privacy and threat for life and safety happen. Also, as the IoT environment includes various environment technologies such as the existing sensor network, heterogeneous communication network, and devices optimized for the IoT environment, it inherits the existing security threat and various attack techniques. This paper researches the attribute based encryption technology for safe communication in the IoT environment. The data collected from the device is transmitted utilizing the attribute based encryption and by designing the key generation protocol, grades and authorities for the device and users are identified to transmit safe messages.

Development of IIoT Edge Middleware System for Smart Services (스마트서비스를 위한 경량형 IIoT Edge 미들웨어 시스템 개발)

  • Lee, Han;Hwang, Joon Suk;Kang, Dae Hyun;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.115-125
    • /
    • 2021
  • Due to various ICT Technology innovations and Digital Transformation, the Internet of Things(IoT) environment is increasingly requiring intelligence, decentralization, and automated service, especially an advanced and stable smart service environment in the Industrial Internet of Things(IIoT) where communication network(5G), data analysis and artificial intelligence(AI), and digital twin technology are combined. In this study, we propose IIoT Edge middleware systems for flexible interface with heterogeneous devices such as facilities and sensors at various industrial sites and for quick and stable data collection and processing.

Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem

  • Darem, Abdulbasit;Alhashmi, Asma A.;Jemal, H.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.303-311
    • /
    • 2022
  • The tremendous growth of the Internet of things is unbelievable. Many IoT devices have emerged on the market over the last decade. This has made our everyday life easier inside our homes. The technology used at home has changed significantly over the past several decades, leading to what is known today as the smart home. However, this growth has also brought new challenges to our home security and privacy. With the smart home becoming more mainstream, cybersecurity issues have become a fundamental concern. The smart home is an environment where heterogeneous devices and appliances are interconnected through the Internet of Things (IoT) to provide smart services to residents. These services include home climate control, energy management, video on demand, music on-demand, remote healthcare, remote control, and other similar services in a ubiquitous manner. Smart home devices can be controlled via the Internet using smartphones. However, connecting smart home appliances to wireless networks and the Internet makes individuals vulnerable to malicious attacks. Remote access within the same environment or over the Internet requires an effective access control mechanism. This paper intends to shed light on how smart home devices are working as well as the type of security and privacy threats of the smart home. It also illustrated the types of authentication methods that can be used with smart home devices. In addition, a comparison of Smart home IoT-based security protocols was presented along with a security countermeasure that can be used in a smart home environment. Finally, a few open problems were mentioned as future research directions for researchers.

Transfer Methods of Inorganic Thin Film Materials for Heterogeneously- Integration Flexible Semiconductor System (이종 집적 유연 반도체 시스템 구현을 위한 무기물 박막소재의 전사 방법)

  • Gyeong Hyeon Ju;Jeong Hyeon Kim;Sang Yoon Park;Kang Hyeon Kim;Han Eol Lee
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.37 no.3
    • /
    • pp.241-252
    • /
    • 2024
  • With the recent development of emerging technologies, information acquisition and delivery between users has been actively conducted, and inorganic thin film transfer technology that effectively transfers various materials and devices is being studied to develop flexible electronic devices accordingly. This is aimed at innovative structural changes and functional improvement of electronic devices in the era of the Internet of Things (IoT). In particular, advanced technologies such as microLEDs are used to realize high-resolution flexible displays, and the possibility of heterogeneous integrated technologies can be presented by precisely transferring materials to substrates through various transfer process. This paper introduced physical, chemical, and self-assembly transfer methods based on inorganic thin film materials to implement heterogeneous integrated flexible semiconductor systems and introduces the results of application studies of semiconductor devices obtained through different transfer technologies. These studies are expected to bring about innovative changes in the field of smart devices, medical technology, and user interfaces in the future.

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.