• Title/Summary/Keyword: Information of Things(IoT)

Search Result 1,386, Processing Time 0.028 seconds

A Development of Semantic Connected Service between Vehicles and Things for IoV (차량 인터넷 기술을 위한 시맨틱 차량-사물 연결 서비스 구현)

  • Ryu, Minwoo;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • The recent efforts in academia and industry represent a paradigm shift that will extend the IoT from the home environment so that it is interoperable with the Internet of Vehicles (IoV). IoV is a special kind of IoT. It allows to connect between vehicle and things located in infrastructure. Furthermore, IoV enable to create new intelligent services through collaboration with existing various services such as smart city and connected home. In this paper, we develop a service in order to realize IoV. To this end, we design a novel vehicle service platform which could automatical controlling the IoT device according to drivers' voice. To show practical usability of our proposed platform, we develop a prototype service could be call car-to-thing (C2T). We expect that our proposed platform could eventually contribute to realizing IoV.

A Study on Development and Application of Taxonomy of Internet of Things Service (사물인터넷 서비스 분류체계 개발 및 활용에 관한 연구)

  • Kim, Eun-A;Kim, Kwang Soo;Leem, Choon Seong;Lee, Choong Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.107-123
    • /
    • 2015
  • Internet of Things (IoT) is being globally spotlighted as a fundamental technology to realize hyper-connected society, and as new growth engines of nation and enterprises. Although the technical aspect of IoT receives a great deal of attention as a new business opportunity, the business aspect of IoT is suffering insufficient scholarly research and objective insight. Thus, the business aspect of IoT requires a thorough research on its service market and business opportunities. In order to stimulate the IoT service market and facilitate objective statistic data aggregation, this paper aims to suggest an IoT service categorization model. This model is comprised of three perspectives which are IoT purpose, IoT Player, and IoT Domain; they function as tools to comprehensively analyze the IoT industry. Efficacy of this model has been confirmed by simulating 117 IoT services on the model, in which the results successfully offered the market trend of the IoT service based on Case. This study is able to apply for basic research of IoT-Service Development Plan, and provide practical implications.

Risk of Attack through an Open Wireless Network of IoT Devices (IoT 장치의 개방형 무선 네트워크를 통한 공격 위험)

  • Lee, Geonwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.10-14
    • /
    • 2019
  • The number of security incidents is increasing as the Internet of Things(IoT) is distributed widely. The security incidents of IoT can cause financial damages. Moreover, It can become direct threats to humans. In order to prevent these problems, the security installation for IoT devices is important. This paper describes the definition of IoT devices, security incident case, architecture, and the security threats that can occur when a device is connected to network without security installation.

  • PDF

Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things

  • Wu, Jun;Wang, Cong;Yu, Yue;Song, Tiecheng;Hu, Jing
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.976-986
    • /
    • 2020
  • Internet of Things (IoT) is considered the future network to support wireless communications. To realize an IoT network, sufficient spectrum should be allocated for the rapidly increasing IoT devices. Through cognitive radio, unlicensed IoT devices exploit cooperative spectrum sensing (CSS) to opportunistically access a licensed spectrum without causing harmful interference to licensed primary users (PUs), thereby effectively improving the spectrum utilization. However, an open access cognitive IoT allows abnormal IoT devices to undermine the CSS process. Herein, we first establish a hard-combining attack model according to the malicious behavior of falsifying sensing data. Subsequently, we propose a weighted sequential hypothesis test (WSHT) to increase the PU detection accuracy and decrease the sampling number, which comprises the data transmission status-trust evaluation mechanism, sensing data availability, and sequential hypothesis test. Finally, simulation results show that when various attacks are encountered, the requirements of the WSHT are less than those of the conventional WSHT for a better detection performance.

A double-blockchain architecture for secure storage and transaction on the Internet of Things networks

  • Aldriwish, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.119-126
    • /
    • 2021
  • The Internet of Things (IoT) applications are quickly spread in many fields. Blockchain methods (BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography (ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing (CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

Business Model Framework for IoT: Case Studies and Strategic Implications for IoT Businesses

  • Kim, Dongwook;Kim, Sungbum;Lee, Junghwan
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.1
    • /
    • pp.1-28
    • /
    • 2022
  • To realize the vision of internet of things (IoT), where it is expected to bring significant impact to the global economy in the future, consideration of business models in the IoT context is necessary. This research attempts to build an enhanced artifact business model framework based on the definitions of IoT and literature on business models for analysis of IoT businesses. The framework is used to analyze four different types of players: the owner of things, vendors of devices, providers of connectivity and providers of IoT application services. The findings suggest that the owners of things tend to partner with ICT players to complement their weakness, and it tends to be connectivity providers. The device vendors leverage their strength of devices and device platforms to attract and enable 3rd party sensor/devices to interconnect, while the service providers are aiming to penetrate into customer premise. These lead to the following recommendations for non-IT players to consider in expanding into IoT business: 1) take into account differences in product development process between IT and non-IT businesses in expanding into IoT market; 2) collaborate with ICT players that acknowledge and understand the differences.

GreenIoT Architecture for Internet of Things Applications

  • Ma, Yi-Wei;Chen, Jiann-Liang;Lee, Yung-Sheng;Chang, Hsin-Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.444-461
    • /
    • 2016
  • A power-saving mechanism for smartphone devices is developed by analyzing the features of data that are received from Internet of Things (IoT) sensors devices to optimize the data processing policies. In the proposed GreenIoT architecture for power-saving in IoT, the power saving and feedback mechanism are implemented in the IoT middleware. When the GreenIoT application in the power-saving IoT architecture is launched, IoT devices collect the sensor data and send them to the middleware. After the scanning module in the IoT middleware has received the data, the data are analyzed by a feature evaluation module and a threshold analysis module. Based on the analytical results, the policy decision module processes the data in the device or in the cloud computing environment. The feedback mechanism then records the power consumed and, based on the history of these records, dynamically adjusts the threshold value to increase accuracy. Two smart living applications, a biomedical application and a smart building application, are proposed. Comparisons of data processed in the cloud computing environment show that the power-saving mechanism with IoT architecture reduces the power consumed by these applications by 24% and 9.2%.

A Hedonic Model Effects for Consumer-oriented Retargeting Advertising Based on Internet of Things

  • Kim, Bo-Ram;Yoon, Yong-Ik;Chung, Man-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.75-80
    • /
    • 2017
  • In this study, we developed a Hedonic Model for Retargeting Advertising Based on Consumer-centerd IoT space for offering useful, interest, and interactive information to consumer. And most existing relative researches about Internet of Things but, this paper focusing on the Type of information, humor, and interactive and analyze the attitude and clicks intention to Retargeting Advertising Based on Consumer-centerd Internet of Things. According to the results, humor Advertising is positively related to attitude and click intention toward Internet of Things Advertising. But information Ad and interactive Ad affect positive to click intention. This is mean that click intention is more immediate reaction of consumers in the IoT space. Therefore Future research will be designed in a more interactive elements that can lead to positive reaction of consumers on the Internet of Things be more effective if you advertise advertising.

A Framework for Effectively Managing Dynamism of IoT Devices (IoT 디바이스의 동적 특성의 효과적 관리를 위한 프레임워크)

  • La, Hyun Jung;Park, Chun Woo;Kim, Soo Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.41 no.8
    • /
    • pp.545-556
    • /
    • 2014
  • Internet of Things (IoT), one of the emerging research areas, is the computing paradigm where various things connect to the network and cooperate with their neighbors to reach common goals. Computing with IoT devices opens up a new array of opportunities for providing value-added smart services and applications to end users. That is, IoT devices play an important role of providing useful services to the users. However, the states of IoT devices are dynamically changed at runtime, which come from their mobility, network connectivity, and a battery drain problem. This dynamism results in difficulties in managing these IoT devices. In this paper, we propose a framework to manage those IoT devices with dynamism. Hence, we first derive issues from IoT devices' dynamism. And, we define a set of requirements to manage the IoT devices and present a framework to manage the device dynamism. The framework is equipped by a device discovery method, a device status monitoring method, a device selection and connection method, and a device replacement method. Finally, we verify the feasibility and effectiveness of the framework through experiments.