• Title/Summary/Keyword: Internet of Things Environment

Search Result 726, Processing Time 0.026 seconds

Analysis of the Effect of The Internet Activation on Students in IoT Environment (사물인터넷 환경에서 인터넷 활성화가 학생에 미치는 영향 분석)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • The world is changing rapidly as the Internet spreads and various smart devices appear. High-performance PCs and high-speed communication networks are rapidly spreading in every home, and all kinds of the internet sites are emerging. In particular, the high education enthusiasm of Korean parents adds to this, and the ratio of the internet users among teenagers is exploding every day. In the case of adolescents, most of them use the Internet for online games, indicating that online games are the main cause of the internet addiction. This study was conducted using a questionnaire for male and female high school students using the Internet, and demographic and sociological characteristics were used only as basic data. In this study, as much as parents, students and teachers think, the results of the internet addiction type analysis according to academic achievement in humanities high school students are to be investigated to determine whether internet use has an effect on academic achievement.

Implementation of Indoor Environment Monitoring and Automatic Control System based on Internet of Things (사물인터넷 기반 실내 환경 모니터링 및 자동제어 시스템 구현)

  • Lee, Sang Hoon;Kim, Jin-Yeop;Kim, Su-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.21 no.6
    • /
    • pp.71-80
    • /
    • 2016
  • Along with the increase in the standard of living, the interest and awareness level of the public about environmental issues have also gradually increased. Recently, time spent on indoor activities have increased and the need for awareness and demand on methods in improving the quality of an indoor environment has been recognized. The purpose of this study is to sense the environment information through real-time monitoring of the room environment by using the IoT based technology and to maintain and improve the indoor environment to an appropriate level through the developed interlocking controller device. This provides an automatic control system in improving the indoor environment at home and other small areas like general offices in place of the traditional passive interior environmental improvement actions or large-scale facility control system. A status analysis with the relative reference values of the air quality and CO2, temperature and humidity and illumination and noise was applied through transmitting a control signal to automatic control module in accordance with the nine indoor environment standards set to improve the indoor environment.

Network Security Protocol Performance Analysis in IoT Environment (IoT 환경에서의 네트워크 보안 프로토콜 성능 분석)

  • Kang, Dong-hee;Lim, Jae-Deok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.955-963
    • /
    • 2022
  • The Internet of Things (IoT), combined with various technologies, is rapidly becoming an integral part of our daily life. While it is rapidly taking root in society, security considerations are relatively insufficient, making it a major target for cyber attacks. Since all devices in the IoT environment are connected to the Internet and are closely used in daily life, the damage caused by cyber attacks is also serious. Therefore, encryption communication using a network security protocol must be considered for a service in a more secure IoT environment. A representative network security protocol includes TLS (Transport Layer Protocol) defined by the IETF. This paper analyzes the performance measurement results for TLS version 1.2 and version 1.3 in an IoT device open platform environment to predict the load of TLS, a representative network security protocol, in IoT devices with limited resource characteristics. In addition, by analyzing the performance of each major cryptographic algorithm in version 1.3, we intend to present a standard for setting appropriate network security protocol properties according to IoT device specifications.

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

Practical Methods for Managing Faults in IoT Computing (IoT 컴퓨팅의 실용적 결함 관리 기법)

  • Park, Chun Woo;Kim, Soo Dong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.75-86
    • /
    • 2015
  • Internet of Thing (IoT) computing is an environment where various devices with sensors and actuators are connect, and interact together to acquire contexts and provide useful services. With the advances of IoT technologies, its usability becomes an in important issue. However, there exist various types of faults in IoT computing which are not conventionally addressed in software research community. Providing reliable IoT services is challenging. In this paper, we present a hierarchy of IoT faults and analyze causes and symptoms of the faults. Based on the analysis, we define effective methods for managing IoT faults. We believe that our proposed framework for managing IoT faults can be utilized in reducing the development cost of IoT applications and enhancing the quality of the applications.

Secure Configuration Scheme for Internet of Things using NFC as OOB Channel (NFC를 OOB 채널로 활용한 사물인터넷 보안 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • The PSK (Pre-shared Secret Key) based method is appropriate for the IoT environment consisting of lightweight devices since this method requires less computing time and energy than the method to configure the session key based on the public key algorithm. A fundamental prerequisite for the PSK based method is that PSK should have been configured between the communication entities safely in advance. However, in case of a small sensor or actuator, no input and output interface such as keyboard and monitor required for configuration exists, so it is more difficult to configure PSK for such lightweight devices safely in the IoT environment than the previous Internet devices. Especially, normal users lack expertise in security so they face difficulty in configuration. Therefore, the default value configured at the time of manufacturing at factories is used or the device installer configures PSK in most cases. In such case, it is a matter for consideration whether all installers and manufacturers can be trusted or not. In order to solve such problem, this paper proposes a secure bootstrapping scheme, which utilizes the NFC (Near Field Communication) as an OOB (Out-Of-Band) channel, for lightweight devices with limited resources.

Analysis on Smart Factory in IoT Environment (사물인터넷 환경에서의 스마트 공장 추진 분석)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.1-5
    • /
    • 2019
  • Looking at the surrounding environment in which we live, we are facing various situations in which new industries are emerging under the influence of ICT and at the same time, existing industries are combined with ICT technology. In addition, the network environment foretells a change from 4G to 5G. One of the things that is actively discussed during this 5G era is the smart factory. Faster transmission speeds are essential for the use of numerous data generated by various sensors used in smart factories. This study deals with smart factory technologies related to the 5G era. In addition to the various interpretations of smart factories, this study examined the situation and progress of smart factories in major countries around the world and described solutions.

Broadcast Data Delivery in IoT Networks with Packet Loss and Energy Constraint (IoT 네트워크에서 패킷 손실과 에너지 소모를 고려한 브로드캐스트 데이터 전달 방법)

  • Jeon, Seung Yong;Ahn, Ji Hyoung;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.269-276
    • /
    • 2016
  • Internet of Things (IoT) is based on wireless networks being able to connect things and people on a large scale. In the IoT environment, reliable broadcast plays an important role to distribute data to a large number of devices. Energy harvesting from a surrounding environment is a key technique to achieve a sustainable IoT network. In IoT networks, a problem of transmission errors and energy shortage should be mitigated for reliable broadcast. In this paper, we propose an energy-efficient and reliable broadcast method to consider packet errors and energy consumption in the environment where a large number of nodes are connected. The proposed scheme can improve data restoration probability by up to 15% and reduce energy consumption by up to 17%.

Implementation of Smart Home Network System based on CoAP/6LoWPAN in Mobile Environment (모바일 환경에서 CoAP/6LoWPAN 기반의 스마트 홈네트워크 시스템 구현 및 성능 분석)

  • Lee, Bo-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.99-105
    • /
    • 2018
  • As the Internet of Thing(IoT) technology recently has become a big issue, many researches have been carried out to link the Internet of things with the home network system. Various home network systems are being implemented to connect many devices used in the home with the Internet and to control and operate the devices using a smart phone. However, existing protocols that operate on the Internet are not suitable for a limited environment such as low power, low capacity, and low performance. Therefore, the Internet Engineering Task Force (IETF) Working Group proposed the CoAP/6LoWPAN technology as a suitable protocol for internetworking IoT devices with the Internet in a limited environment and adopting it as a standard. In this paper, a smart home network system is implemented to control and operate various IoT devices in a home using CoAP/6LoWPAN in mobile environment. The performance of HTTP and CoAP such as data transmission time, data transmission rate is analyzed.

Custody Transfer of Bundle layer in Security Mechanism for Under water Inter net of Things (UIoT)

  • Urunov, Khamdamboy;Namgung, Jung-Il;Park, Soo-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.506-523
    • /
    • 2015
  • The intent is to determine whether or not the custody transfer is helpful for data transmission in challenging underwater communications when running Bundle protocol or underwater protocols. From the point of view defending side, Underwater Acoustic Network (UAN) will be a serious threat for its strong functionality long rang and high precision of surveillance and detection. Therefore, countermeasures must be taken to weaken its effect. Our purpose is analyzed that how to benefit from the UIoT to learn from, exploit and preserve the natural underwater resources. Delay/Disruption Tolerant Network (DTN) is essential part of the network heterogeneity communication network. The vulnerability and potential security factors of UIoT are studied thereafter. Security mechanisms for an underwater environment are difficult to apply owing to the limited bandwidth. Therefore, for underwater security, appropriate security mechanisms and security requirements must be defined simultaneously. The paper consists of mathematical and security model. Most important point of view in the security challenges of effective Buffer and Storage management in DTN.