• Title/Summary/Keyword: Internet of Things Environment

Search Result 734, Processing Time 0.027 seconds

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

Power efficiency research for application of IoT technology (사물인터넷 기술 적용을 위한 소비전력 효율화 연구)

  • Seo, Younghoon;Park, Eun-Cheol;Kang, Sunghwan;Hwang, Jae-Mun;Yun, Junghwan;Eom, Junyoung;Gwon, Hyeong-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.669-672
    • /
    • 2015
  • Recent Internet of Things (IoT, Internet of Things) that can be applied to various fields as the development of technology has been developed a lot of service and has been developed with the service also for crop management. To manage the essential elements of soil moisture in the crop growth but existing a direct person measuring the fluid point to carry the measuring instrument, if you take advantage of the WPAN (Wireless Personal Area Network) in this paper to manage sensor data, a fixed 3 points (30, 60, 90 cm) and can be managed can be scientifically analyzed the state of growth of the crop. Open field environment is utilized as it is less disturbance of the interference and the frequency of the radio frequency signal of the structure provides a relatively comfortable environment. Therefore, WPAN building and data transmission scheme of the minimum cost is to be developed. In addition, the operation to enter low power mode, the algorithm is necessary because a lot of restrictions on the power supply applied to the sensor nodes and the gateway is constructed in the open field. In the experiment, verifying the effectiveness by using a network configuration of each of the sensor nodes and the gateway, and provides a method for time synchronization of the operation and a low power mode. The study protocol for the RF communication with the LoRa and to enhance communication efficiency is needed in the future.

  • PDF

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.

Effects of Service Quality on Customer Satisfaction and Reuse Intention of Chinese Fashion Product Live Commerce Using SERVQUAL Model in Internet of Things Environment -Focusing on Female College Students in Changchun, China- (사물인터넷 환경에서의 SERVQUAL 모델을 이용한 중국 패션제품 라이브커머스의 서비스품질이 고객만족도 및 재사용 의도에 미치는 영향 -중국 창춘시 여대생을 중심으로-)

  • Mo Liu;Young-Sook Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.59-68
    • /
    • 2024
  • China's huge population and industrial diversification have driven increased demand for IoT, and in a social environment where IoT technology is changing all aspects of personal and family life, including smart shopping, this study was conducted in Changchun, China. The study aimed to find ways to meet the Fashion needs of female college students living in the country and promote the development of the fashion product industry by improving the service quality of Chinese fashion product live commerce. The analysis results are as follows. First, the service quality characteristics of Chinese fashion product live commerce had a positive effect on customer satisfaction. Second, the service quality characteristics of Chinese fashion product live commerce had a positive effect on reuse intention. Third, customer satisfaction had a positive effect on reuse intention. Based on these results, it can be concluded that improving the service quality of live commerce can directly promote product sales and create direct economic benefits. In addition, based on the results of the study, which show that the service quality of fashion product live commerce affects customer satisfaction and reuse intention, it is judged that it will provide useful information in establishing marketing strategies for live commerce platforms by region and target.

Economic application of structural health monitoring and internet of things in efficiency of building information modeling

  • Cao, Yan;Miraba, Sepideh;Rafiei, Shervin;Ghabussi, Aria;Bokaei, Fateme;Baharom, Shahrizan;Haramipour, Pedram;Assilzadeh, Hamid
    • Smart Structures and Systems
    • /
    • v.26 no.5
    • /
    • pp.559-573
    • /
    • 2020
  • One of the powerful data management tools is Building Information Modeling (BIM) which operates through obtaining, recalling, sharing, sorting and sorting data and supplying a digital environment of them. Employing SHM, a BIM in monitoring systems, would be an efficient method to address their data management problems and consequently optimize the economic aspects of buildings. The recording of SHM data is an effective way for engineers, facility managers and owners which make the BIM dynamic through the provision of updated information regarding the occurring state and health of different sections of the building. On the other hand, digital transformation is a continuous challenge in construction. In a cloud-based BIM platform, environmental and localization data are integrated which shape the Internet-of-Things (IoT) method. In order to improve work productivity, living comfort, and entertainment, the IoT has been growingly utilized in several products (such as wearables, smart homes). However, investigations confronting the integration of these two technologies (BIM and IoT) remain inadequate and solely focus upon the automatic transmission of sensor information to BIM models. Therefore, in this composition, the use of BIM based on SHM and IOT is reviewed and the economic application is considered.

Lightweight IPsec protocol for IoT communication environments (IoT 통신 환경을 위한 경량 IPsec 프로토콜 연구)

  • Song, In-A;Oh, Jeong-Hyeon;Lee, Doo-Won;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.121-128
    • /
    • 2018
  • Internet of Things architecture connected to the Internet is a technology. However, Many paper research for the lightweight Protocol of IoT Environment. In these Paper excluded secure problem about protocol. So Light weight Protocol has weakness of secure in IoT environment. All of IoT devices need encryption algorithm and authentication message code for certain level of security. However, IoT environment is difficult to using existing security technology. For this reason, Studies for Lightweight IPsec is essential in IoT environment. For Study of Lightweight IPsec, We analyze existing protocols such as IPsec, 6LoWPAN for IEEE 802.15.4 layer and Lightweight IPsec based 6LoWPAN. The result is to be obtained for the lightweight IPsec protocols for IoT environment. This protocol can compatible with Internet network.

Indoor autonomous driving system based on Internet of Things (사물인터넷 기반의 실내 자율주행 시스템)

  • Seong-Hyeon Lee;Ah-Eun Kwak;Seung-Hye Lee;Tae-Kook Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.69-75
    • /
    • 2024
  • This paper proposes an IoT-based indoor autonomous driving system that applies SLAM (Simultaneous Localization And Mapping) and Navigation techniques in a ROS (Robot Operating System) environment based on TurtleBot3. The proposed autonomous driving system can be applied to indoor autonomous wheelchairs and robots. In this study, the operation was verified by applying it to an indoor self-driving wheelchair. The proposed autonomous driving system provides two functions. First, indoor environment information is collected and stored, which allows the wheelchair to recognize obstacles. By performing navigation using the map created through this, the rider can move to the desired location through autonomous driving of the wheelchair. Second, it provides the ability to track and move a specific logo through image recognition using OpenCV. Through this, information services can be received from guides wearing uniforms with the organization's unique logo. The proposed system is expected to provide convenience to passengers by improving mobility, safety, and usability over existing wheelchairs.

Analysis of Computer Simulated and Field Experimental Results of LoRa Considering Path Loss under LoS and NLoS Environment (LoS 및 NLoS 환경에서의 경로 손실을 고려한 LoRa의 모의실험 및 실측 결과 분석)

  • Yi, Dong Hee;Kim, Suk Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.444-452
    • /
    • 2017
  • Recently, a demand of Internet-of-things (IoT) rises dramatically and an interest in Low Power Wide Area (LPWA) grows larger accordingly. In this paper, performance in LoRa which is included in LPWA standard is analyzed. Particularly, after measuring Received Signal Strength Indication (RSSI) of received signal on Line-of-sight (LoS) and Non-line-of-sight (NLoS) environment and it is compared with RSSI which theoretical path loss model is applied to. Among many path loss models, the simulation for theoretical RSSI use Log-distance, Two-ray model and Okumura-Hata model that is based on the test database. Consequently, the result of Okumura-Hata model is the most similar with the measured RSSI. When a network based on LoRa is built, this result can used to decide optimal node arrangement.

Estimation of maximum object size satisfying mean response time constraint in web service environment (웹 서비스 환경에서 평균 응답 시간의 제약조건을 만족하는 최대 객체 크기의 추정)

  • Yong-Jin Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.1-6
    • /
    • 2023
  • One of the economical ways to satisfy the quality of service desired by the user in a web service environment is to adjust the size of the object. To this end, this study finds the maximum size of objects that satisfy this constraint when the mean response time is given below an arbitrary threshold for quality of service. It can be inferred that in the steady state of system, the mean response time in the deterministic model by using the round-robin will be the same as that of the queueing model following the general distribution. Based on this, analytical formulas and procedures for finding the maximum object size are obtained. As a service distribution of web traffic, the Pareto distribution is appropriate, so the maximum object size is computed by applying the M/G(Pareto)/1 model and the M/G/1/PS model using exponential distribution as computational experience. Performance evaluation through numerical calculation shows that as the shape parameter in the Pareto distribution increases, the M/G(Pareto)/1 model and M/G/1/PS model have the same maximum object size. The results of this study can be used to environments where objects can be sized for economical web service control.