• Title/Summary/Keyword: Internet of Things Environment

Search Result 734, Processing Time 0.026 seconds

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

An Insight Study on Keyword of IoT Utilizing Big Data Analysis (빅데이터 분석을 활용한 사물인터넷 키워드에 관한 조망)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.146-147
    • /
    • 2017
  • Big data analysis is a technique for effectively analyzing unstructured data such as the Internet, social network services, web documents generated in the mobile environment, e-mail, and social data, as well as well formed structured data in a database. The most big data analysis techniques are data mining, machine learning, natural language processing, and pattern recognition, which were used in existing statistics and computer science. Global research institutes have identified analysis of big data as the most noteworthy new technology since 2011. Therefore, companies in most industries are making efforts to create new value through the application of big data. In this study, we analyzed using the Social Matrics which a big data analysis tool of Daum communications. We analyzed public perceptions of "Internet of things" keyword, one month as of october 8, 2017. The results of the big data analysis are as follows. First, the 1st related search keyword of the keyword of the "Internet of things" has been found to be technology (995). This study suggests theoretical implications based on the results.

  • PDF

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.

A Study for Development Status of Functional Bedding -Focusing on Smart Bedding Based on Internet of Things- (국내외 기능성 침구 개발 현황에 관한 연구 -IoT(Internet of Things) 기술기반 스마트 침구를 중심으로-)

  • Yoon, Subin;Kim, Seongdal
    • Journal of Fashion Business
    • /
    • v.23 no.1
    • /
    • pp.14-24
    • /
    • 2019
  • Various types of functional bedding for inducing and maintaining sleep, are developed and launched with the importance of improving health through sleep emphasized currently. The purpose of this study is to examine development status and direction of functional bedding in the $4^{th}$ Industrial Revolution era, through systematic classification of elements of IoT-based smart bedding cases actively developed as functional bedding at home and abroad. Through previous research, literature and Internet data, characteristics and functional extension of smart bedding and the background of smart bed development was analyzed. And it was analyzed that smart bedding pursues recent functionalism and convergence of physical and digital concept such as IoT or AI, and also mental value to improve sleep quality. As bedroom where smart bedding place in has the private and limited characteristics and users are in sleep-conscious, that hard to ensure power and discomfort in carrying are moderated and the aesthetic elements are not very important, and that the smart bedding performance while sleeping were affected on developmental background. Based on CES case study and analysis on how smart beds are functionally expanded from conventional bedding, smart beds have gained information through digital sensing, and common properties that can be controlled anytime, anywhere, using a smart phone. Some set up the right environment and pose, while others stimulate nerves directly as active intervention. It is expected that smart bedding will be developed to cure user's body and mind, through active intervention when sleeping.

Core Experiments for Standardization of Internet of Media Things (미디어사물인터넷의 국제표준화를 위한 핵심 실험)

  • Jeong, Min Hyuk;Lee, Gyeong Sik;Kim, Sang Kyun
    • Journal of Broadcast Engineering
    • /
    • v.22 no.5
    • /
    • pp.579-588
    • /
    • 2017
  • Recently, due to the development of network environment, the internet market has been expanding, so it is necessary to standardize the data format and API to exchange information among objects. Therefore, MPEG (Moving Picture Expert Group), an international standardization organization, is establishing the MPEG-IoMT (ISO/IEC 23093) project to standardize the Internet of Things. MPEG-IoMT establishes Core Experiment (CE) and discusses overall data exchange such as data exchange procedure, markup language and communication method. In this paper, core experiments 1, 2, 4, and 5 of the core experiments of MPEG-IoMT will be discussed. The performance information of the sensor, the sensor data, the performance information of the driver, and the exchange procedure of the control command are explained and the exchange of the media additional data is discussed. We compare the markup language and communication method through experiment.

Design and Implementation of Smart Home Remote Control Based on Internet of Things Service Platform (사물인터넷 서비스 플랫폼 기반 스마트 홈 리모컨의 설계 및 구현)

  • Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1563-1570
    • /
    • 2018
  • Internet of Things technology is rapidly becoming a reality in many parts of our lives through various product services, and product development especially in the field of smart home is being actively carried out. Most controllers for controlling various smart home products use smart phone applications. However, smart phone applications are not suitable as smart home controllers, contrary to smart home services that emphasize intelligence and convenience. In order to provide intelligent smart home service, intuitive form of smart home controller is needed, which enables integrated control of smart home device. Therefore, this paper proposes a smart home remote control that can control the Internet devices and services of objects. The proposed smart home remote control provides an environment where users can build a smart home service through the IFTTT(If This Then That) automated service platform.

Study on Component-Based Middleware for IoT Service Scalability (IoT 서비스 확장성을 고려한 컴포넌트 기반의 미들웨어에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.330-337
    • /
    • 2015
  • A service in the environments of internet of things (IoT) exist various types with automation facilities and sensors. There can configure so many communication protocols to networking facilities and sensors. To provide efficient various kind of service, a middleware platform, is based on the internet protocol network, is needed a unified access with devices, controlling and monitoring huge kind of facilities and sensors, to provide a efficient IoT service and application configurations. In this paper, we propose a middleware that an application and service interact with automation facilities and monitor sensors. The proposed middleware is designed with adapter pattern that one of the software engineering design pattern. The adapter pattern is to ensure communication with each sensor and to make sure of service scalability. Finally, the proposed component middleware shows that variety sensors can be easily configure the service in the IoT environment.

Privacy Protection Technologies on IoT Environments: Case Study of Networked Cameras (사물인터넷(IoT) 환경에서 프라이버시 보호 기술: 네트워크 카메라 사례 연구)

  • Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.329-338
    • /
    • 2016
  • Internet of Things (IoTs) technology makes every things in physical world being digitalized and communicated with each other. The technology is emerging as a new paradigm and is expected to provide a convenient and effective life. However, for the successful realization of the IoT technologies, IoT security issues are an important prerequisite, and particularly the privacy protection is expected to become more important in view of object communication directively related with human. In this paper we describe for the security and privacy threats in IoT environment and introduce the shodan (a legitimate search engine that finds backdoor routers, switches, webcams, IoT devices connected to the Internet etc.) that can expose the security and privacy problems. Lastly, we compare the privacy threats through real-world case study of network cameras currently in use and finally derive the countermeasures for the threats.

Address Space Maintaining Scheme for Fast Program Execution in Linux-based Systems (Linux 기반에서 빠른 프로그램 실행을 위한 주소 공간 유지 기법)

  • Noh, Seung Joon;Kang, Dong Hyun;Kim, Junghan;Kim, Inhyeok;Eom, Young Ik
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.12
    • /
    • pp.786-791
    • /
    • 2015
  • The environment of Internet of Things (IoT) wherein various devices are connected through the Internet with value-added network functions, is currently a subject of active study. Accordingly, the existing computing environment based on desktop or mobile systems is being expanded into a computing environment of more diverse devices. Because the response of program launching is important in terms of User Experience (UX) in IoT environments, the technology for guaranteeing rapid response of program launching in IoT devices is getting the focus of much current research. In this paper we analyze the Zygote technique, which is being used for faster program execution in Android systems, and, based on our results, we propose an address space maintaining scheme for the rapid launching of programs for use in Linux-based systems. Our scheme utilizes the Copy on Write (CoW) technique in Linux systems as well as the Zygote technique of Android systems. In order to evaluate the proposed scheme, we implemented our scheme on Linux systems and performed several experiments. The experimental results show that the proposed scheme shortens the launching time up to 99%, compared to the existing technique.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.