• Title/Summary/Keyword: Intelligent IoT environment

Search Result 102, Processing Time 0.028 seconds

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

Deep Neural Network-Based Critical Packet Inspection for Improving Traffic Steering in Software-Defined IoT

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid growth of intelligent devices and communication technologies, 5G network environment has become more heterogeneous and complex in terms of service management and orchestration. 5G architecture requires supportive technologies to handle the existing challenges for improving the Quality of Service (QoS) and the Quality of Experience (QoE) performances. Among many challenges, traffic steering is one of the key elements which requires critically developing an optimal solution for smart guidance, control, and reliable system. Mobile edge computing (MEC), software-defined networking (SDN), network functions virtualization (NFV), and deep learning (DL) play essential roles to complementary develop a flexible computation and extensible flow rules management in this potential aspect. In this proposed system, an accurate flow recommendation, a centralized control, and a reliable distributed connectivity based on the inspection of packet condition are provided. With the system deployment, the packet is classified separately and recommended to request from the optimal destination with matched preferences and conditions. To evaluate the proposed scheme outperformance, a network simulator software was used to conduct and capture the end-to-end QoS performance metrics. SDN flow rules installation was experimented to illustrate the post control function corresponding to DL-based output. The intelligent steering for network communication traffic is cooperatively configured in SDN controller and NFV-orchestrator to lead a variety of beneficial factors for improving massive real-time Internet of Things (IoT) performance.

A system to block external intrusion Intelligent Definition Network System Design in Smart Home IOT environment (스마트 홈 IoT 외부 침입 차단을 위한 지능 정의 네트워크 시스템 설계)

  • Choi, Yu-Jun;Hwang, Yun-Young;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.91-92
    • /
    • 2021
  • 최근 사물 인터넷 관련 해킹 우려 신고 건수가 증가하는 추세를 보이고 있다. 하지만 급격하게 늘어나는 IoT 환경에 따라서 관리자가 새로운 침입 탐지 공격패턴을 인식하는 것에 대한 어려움이 있으며, 대량의 공격이나 새로운 공격패턴이 등장할 경우 이에 맞는 특징을 재선정해야 할 경우도 발생한다. 본 논문에서는 운영 네트워크 상에 특정이상동작 파악 및 근원지 진단을 위한 목적을 가진 전반적인 네트워크 상태 분석 및 사용자 이슈 식별이 가능한 프레임워크를 설계하였다.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Arduino-based power control system implemented by the MyndPlay (MyndPlay를 이용한 Arduino기반의 전원제어시스템 구현)

  • Kim, Byeongsu;Kim, Seungjin;Kim, Taehyung;Baek, Dongin;Shin, Jaehwan;An, Jeong-Eun;Jeong, Deok-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.924-926
    • /
    • 2015
  • In this paper, we use the interface, which many countries concentrates research of Brain - Computer Interface with the device and MyndPlay based on the IoT intelligent Arduino. Finally we will make the Brain - Computer Connection environment, the purpose of Brain - Computer Interface. Recognizes the EEG of a person who wearing the equipment, analyze, classify, and we did a research to design an intelligent thing to suit user's condition. In addition, we use the XBee, and Bluetooth to communicate to other devices, such as smart phone. In conclusion, this paper check users current status via brain waves, and it allows to control the power and other objects by using the EEG(Electroencephalography).

  • PDF

A Study on the Stabilization of a System for Big Data Transmission of Intelligent Ventilation Window based on Sensor and MCU (센서 및 MCU기반 지능형 환기창 빅데이터전송용 시스템 안정화에 관한 연구)

  • Ryoo, Hee-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.3
    • /
    • pp.551-558
    • /
    • 2021
  • In this paper, we made the integrated intelligent air ventilation of the actuator module that can be remotely controlled based on IoT and sensors. we implemented a ventilation window system by configuring an algorithm design and a driving circuit to control the operation of the actuator to open and close the ventilation port based on a predetermined number of data that detects indoor gas/CO2/humidity temperature and outdoor fine dust related indoor/outdoor environment. It is difficult to store, manage, and analyze data due to the large number of sensors and conditions for the transmission data of indoor air circulation module. The remote monitoring and remote wireless control screens were constructed to automate the separation and operation conditions by extracting and managing the state. We apply MQTT to enhance big data transmission and construct the system using Rocket MQ to ensure safe transmission of operational big data against system errors.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

A Service Composition using Hierarchical Model in Multiple Service Environment

  • Tang, Jiamei;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.9
    • /
    • pp.1091-1097
    • /
    • 2015
  • Internet-of-Things (IoT) becomes one of the most promising future paradigms, which foresees enormous amounts of interoperable things and heterogeneous services. The goal of IoT is to enable all things connected and brings all kinds information and services to people. However, such a great deal of information may lead to cognitive overload or restrain in productivity of people. Thus, it is a necessity to build intelligent mechanisms to assist people in accessing the information or services they needed in a proactive manner. Most of previous related mechanisms are built on well-defined web services and lack of consideration of constrained resources. This paper suggests a services composition method by adapting a hierarchical model, which is a graph-based model composed of four layers: Context Layer, Event Layer, Service Layer and Device Layer. With a such multi-layer graph, service composition can be achieved by the iteration of layer by layer. Then, to evaluate the effectiveness of this proposed hierarchical model, a real-life emergency response dataset is applied and the experimental results are composed with the general probabilistic method and indicate that the proposed method is help for compositing multiple services while considering given context and constrained resources.

Transmission Control Method of Beacon Signal Based on Bluetooth of Lower Electric Power (저 전력 블루투스 기반 비콘 신호 전송 제어 방법)

  • Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1136-1141
    • /
    • 2016
  • IoT technology has been used as a core technology of convergence service that needs intelligent information processing, and the importance is largely emerging now. And internal network construction thru IoT interaction device can connect with IoT device effectively, provide diverse services by connection with open platform. Especially, beacon that is based on low electric power bluetooth device is receiving attention as one of core technology of IoT. Beacon technology is utilized widly in various fields of industry, and there are lot of demands in the specific environment and conditions beyond the basic function. On this thesis, the authors are proposing the beacon device that utilized acceleration sensor and hole sensor. this beacon device can control the target on specific situation thru sensing of moving target. For the more, we will expect to apply to the various type of factory environments like detachable installation, optimized management using sensor.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF