• Title/Summary/Keyword: IO

Search Result 5,124, Processing Time 0.035 seconds

A Study on improving manufacturing environment using IoT technology in small business environment (중소기업 환경에서 IoT 기술을 이용한 제조 환경 개선에 관한 분석 연구)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.83-90
    • /
    • 2017
  • To launch the product recently attached to IoT consumer electronics, smart phones and healthcare products around the large companies is a trend that is growing interest in the IoT. However, the country's small business environment is what the environmental improvement process that is easily accessible to the small business environment because the IoT technologies are difficult to apply the IoT technologies than any other country environment than desperate situation. In this paper, we propose a service operating model to improve production efficiency when the fusion manufacturing process is currently operating in the country SMEs and IoT technology. Proposed model using the manufacturing product information and sensor / dabayiseu information in the entire manufacturing process has as its object to utilize the IoT technology. Performance evaluation, the proposed model is more efficient than the previous model and 23.1% of the manufacturing process. In addition, it is increasing the manufacturing process was reduced by 17.3%, the average processing time as compared to the previous model. Finally, the personnel cost to be used in the manufacturing process was found to be an average decrease of 19.8% than previous model.

Development of an IoT-Based Human Interactive Advertising Service for Sharing Economy (공유경제를 위한 IoT 기반의 휴먼 인터랙티브 광고 서비스 구현)

  • Jung, Wonseok;Lee, Chang-Kyo;Ko, Wan-Jin;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.413-415
    • /
    • 2019
  • In this paper, we develop IoT-HiAS(IoT-Human Interactive Advertising Service) for sharing economy. The HiAS device shooting the front of the device via a webcam and recognizes the person in real time through the SSD model using MobileNet. If the number of persons above the set threshold is recognized by counting the recognized person, the advertisement is reproduced on the idle resource through the beam projector. At the same time as the advertisement is reproduced, the captured image of the advertisement start time in the front of the device and the number of recognized persons are sends the IoT server of an oneM2M-compliant HiAS server using the IoT client. When the advertisement is finish, the webcam is shooting the front of the device and the image is sends the IoT server. We implemented the IoT-based human interactive advertising service by transmitting the received data to the advertiser and the advertising producers through the SNS(Social Network Service) agent of the HiAS server.

  • PDF

Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

  • Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.328-342
    • /
    • 2022
  • The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.

Network Security Protocol Performance Analysis in IoT Environment (IoT 환경에서의 네트워크 보안 프로토콜 성능 분석)

  • Kang, Dong-hee;Lim, Jae-Deok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.955-963
    • /
    • 2022
  • The Internet of Things (IoT), combined with various technologies, is rapidly becoming an integral part of our daily life. While it is rapidly taking root in society, security considerations are relatively insufficient, making it a major target for cyber attacks. Since all devices in the IoT environment are connected to the Internet and are closely used in daily life, the damage caused by cyber attacks is also serious. Therefore, encryption communication using a network security protocol must be considered for a service in a more secure IoT environment. A representative network security protocol includes TLS (Transport Layer Protocol) defined by the IETF. This paper analyzes the performance measurement results for TLS version 1.2 and version 1.3 in an IoT device open platform environment to predict the load of TLS, a representative network security protocol, in IoT devices with limited resource characteristics. In addition, by analyzing the performance of each major cryptographic algorithm in version 1.3, we intend to present a standard for setting appropriate network security protocol properties according to IoT device specifications.

A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure (IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구)

  • Hwang, Song-yi;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.617-635
    • /
    • 2021
  • Internet of Things (IoT) devices connected to the network without appropriate security solutions have become a serious security threat to ICT infrastructure. Moreover, due to the nature of IoT devices, it is difficult to apply currently existing security solutions. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are actually increasing every year. Even though several security solutions are being developed to protect IoT infrastructure, there is a great risk to apply unverified security solutions to real-world environments. Therefore, verification tools to verify the functionality and performance of the developed security solutions are also needed. Furthermore, just as security threats vary, there are several security solution s that defend against them, requiring suitable verification tools based on the characteristics of each security solution. In this paper, we propose an high-speed malware propagation tool that spreads malware at high speed in the IoT infrastructure. Also, we can verify the functionality of the security solution that detect and quickly block attacks spreading in IoT infrastructure by using the high-speed malware propagation tool.

IoT Security and Machine Learning

  • Almalki, Sarah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.103-114
    • /
    • 2022
  • The Internet of Things (IoT) is one of the fastest technologies that are used in various applications and fields. The concept of IoT will not only be limited to the fields of scientific and technical life but will also gradually spread to become an essential part of our daily life and routine. Before, IoT was a complex term unknown to many, but soon it will become something common. IoT is a natural and indispensable routine in which smart devices and sensors are connected wirelessly or wired over the Internet to exchange and process data. With all the benefits and advantages offered by the IoT, it does not face many security and privacy challenges because the current traditional security protocols are not suitable for IoT technologies. In this paper, we presented a comprehensive survey of the latest studies from 2018 to 2021 related to the security of the IoT and the use of machine learning (ML) and deep learning and their applications in addressing security and privacy in the IoT. A description was initially presented, followed by a comprehensive overview of the IoT and its applications and the basic important safety requirements of confidentiality, integrity, and availability and its application in the IoT. Then we reviewed the attacks and challenges facing the IoT. We also focused on ML and its applications in addressing the security problem on the IoT.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

IoT 플랫폼 개발 동향 및 발전방향

  • Kim, Jae-Ho;Yun, Jae-Seok;Choe, Seong-Chan;Ryu, Min-U
    • Information and Communications Magazine
    • /
    • v.30 no.8
    • /
    • pp.29-39
    • /
    • 2013
  • IoT기술은 Internet of Thing의 약자로서 국내에서는 사물인터넷 기술로 불리우고 있다. IoT 기술은 실 세계에 존재하는 사물 (Physical Things) 및 사이버 환경에 존재하는 사물(Virtual Things) 들이 인터넷을 통하여 서로 연결되고 이러한 물리공간과 가상공간의 사물들의 연동을 통하여 다양한 서비스를 제공할 수 있는 미래 인터넷 인프라 기술이다. 본고에서는 현재 개발완료 또는 개발 중인 국내외 IoT 기술에 대하여 소개하고 각 기술의 특징에 대하여 알아본다. 또한 IoT 기술의 발전을 위하여 IoT 생태계의 중요성을 제시하고 이를 통한 IoT 플랫폼의 발전 방향에 대하여 논의 한다.

Scheme for Constructing Infra-less network in Multi-interface based IoT Network (멀티인터페이스 기반 IoT 네트워크에서 Infra-less 네트워크 구성 기법)

  • Youn, JooSang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.55-56
    • /
    • 2015
  • 본 논문에서는 여러 접속 인터페이스를 가진 노드로 구성된 저전력 손실 네트워크 기반의 로컬 Infra IoT 환경에서 로컬 Infra-less IoT 서비스를 제공하기 위한 네트워크 구성 방법을 제안한다. 우선, Infra IoT 네트워크환경의 분석을 통해 문제점을 정의하고 이후 로컬 Infra-less IoT 네트워크 모델을 정의하고 정의된 네트워크 모델에 필요한 네트워크 구성 방법을 제안한다.

  • PDF

FOTA System Configuration for IoT Firmware Security (IoT 펌웨어 보안을 위한 FOTA 시스템 구성)

  • Jisu-Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.196-199
    • /
    • 2023
  • 다양한 산업과 환경에서 IoT 기술이 사용되는 만큼 보안에 대한 위협도 증가하고 있다. IoT 서비스를 제공하는 디바이스와 시스템이 보안 공격을 당해 중단되는 경우 그에 따른 피해가 막대하기 때문에 IoT 의 보안 중요성은 날로 커지고 있다. IoT 디바이스 보안을 강화하기 위한 방법으로 FOTA 시스템를 통한 펌웨어 업데이트를 하는 것이 필요하다. 본 고에서는 IoT 디바이스 펌웨어 업데이트를 위해 필요한 FOTA 시스템에 대한 아키텍처와 구성 등을 제언한다.