• Title/Summary/Keyword: Internet of Things %28IoT%29

Search Result 4, Processing Time 0.019 seconds

Business Model Framework for IoT: Case Studies and Strategic Implications for IoT Businesses

  • Kim, Dongwook;Kim, Sungbum;Lee, Junghwan
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.1
    • /
    • pp.1-28
    • /
    • 2022
  • To realize the vision of internet of things (IoT), where it is expected to bring significant impact to the global economy in the future, consideration of business models in the IoT context is necessary. This research attempts to build an enhanced artifact business model framework based on the definitions of IoT and literature on business models for analysis of IoT businesses. The framework is used to analyze four different types of players: the owner of things, vendors of devices, providers of connectivity and providers of IoT application services. The findings suggest that the owners of things tend to partner with ICT players to complement their weakness, and it tends to be connectivity providers. The device vendors leverage their strength of devices and device platforms to attract and enable 3rd party sensor/devices to interconnect, while the service providers are aiming to penetrate into customer premise. These lead to the following recommendations for non-IT players to consider in expanding into IoT business: 1) take into account differences in product development process between IT and non-IT businesses in expanding into IoT market; 2) collaborate with ICT players that acknowledge and understand the differences.

Analysis of Technology Convergence of 'Internet of Things' Patents by IPC Code Analysis (IPC 코드 분석에 의한 '사물인터넷(IoT)' 특허의 기술 융복합 분석)

  • Shim, Jae-ruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.3
    • /
    • pp.266-272
    • /
    • 2016
  • In this study, we analysed the technology convergence of Internet of Things(IoT) by International Patent Classification(IPC) code analysis. 163 patent applications in Korea are the subjects of this study. We confirmed that the most representative IPC code combinations between Main and Sub categories are G06Q 50/24-G06Q 50/22(6 cases), H04L 29/02-H04L 12/28(4 cases), G06F 15/16-G06F 3/048(3 cases), G06F 15/16-G06F 9/44(3 cases), and G06Q 50/22-G06Q 50/24(3 cases). The field of Health Care business have been prepared 9 patent applications by technology convergence between 'Health Care(G06Q 50/22)' and 'Patient Record Management(G06Q 50/24)'. Finally we also concluded that the core IPC code are G06F 15/16, G06Q 50/22, G06Q 50/24, and H04L 12/28 by the technology convergence interconnections analysis of IoT patent applications.

Memory-Efficient Implementation of Ultra-Lightweight Block Cipher Algorithm CHAM on Low-End 8-Bit AVR Processors (저사양 8-bit AVR 프로세서 상에서의 초경량 블록 암호 알고리즘 CHAM 메모리 최적화 구현)

  • Seo, Hwajeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.545-550
    • /
    • 2018
  • Ultra-lightweight block cipher CHAM, consisting of simple addition, rotation, and eXclusive-or operations, enables the efficient implementations over both low-end and high-end Internet of Things (IoT) platforms. In particular, the CHAM block cipher targets the enhanced computational performance for the low-end IoT platforms. In this paper, we introduce the efficient implementation techniques to minimize the memory consumption and optimize the execution timing over 8-bit AVR IoT platforms. To achieve the higher performance, we exploit the partly iterated expression and arrange the memory alignment. Furthermore, we exploit the optimal number of register and data update. Finally, we achieve the high RANK parameters including 29.9, 18.0, and 13.4 for CHAM 64/128, 128/128, and 128/256, respectively. These are the best implementation results in existing block ciphers.

Secure 6LoWPAN Neighbor Discovery Address Registration Protocol (안전한 6LoWPAN Neighbor Discovery 주소 등록 프로토콜)

  • Han, Sang-woo;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.17-28
    • /
    • 2019
  • 6LoWPAN based on IEEE 802.15.4 is a realistic standard platform for various Internet of Things (IoT) applications. To bootstrap the LoWPAN (Low-power Wireless Personal Area Network), each device must perform 6LoWPAN-ND address registration to assign a unique IPv6 address. Without adequate security mechanisms, 6LoWPAN-ND is vulnerable to a variety of security attacks including corrupted node attacks. Several security mechanisms have been proposed as a supplement to the vulnerability, but the vulnerability exists because it relies solely on IEEE 802.15.4 hop-by-hop security. In this paper, we propose and analyze a vulnerability of 6LoWPAN-ND address registration and a new security mechanism suitable for preventing the attack of damaged node. It also shows that the proposed security mechanism is compatible with the Internet Engineering Task Force (IETF) standard and is more efficient than the mechanism proposed in the IETF 6 lo WG.