• 제목/요약/키워드: IoT:Internet of Things

Search Result 1,866, Processing Time 0.024 seconds

An ID-Based Remote User Authentication Scheme in IoT (사물인터넷에서 ID기반 원격 사용자 인증 방식)

  • Park, KiSung;Lee, SungYup;Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.12
    • /
    • pp.1483-1491
    • /
    • 2015
  • Applications of Internet of Things (IoT) supply various conveniences, however unsolved security problems such as personal privacy, data manipulation cause harm to persons, even nations and an limit the applicable areas of Internet of IoT technology. Therefore, study about secure and efficient security system on IoT are required. This paper proposes ID-based remote user authentication scheme in IoT environments. Proposed scheme provides untraceability of users by using different pseudonym identities in every session and reduces the number of variables. Our proposal is secure against inside attack, smart card loss attack, user impersonation attack, server masquerading attack, online/offline password guessing attack, and so on. Therefore, this can be applied to the lightweight IoT environments.

Analyses of Trend of Threat of Security in Internet of Things (사물 인터넷망에서의 보안 위협 기술 동향 분석)

  • Shin, Yoon-gu;Jung, Sungha;Do, Tahoon;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

Towards Designing Efficient Lightweight Ciphers for Internet of Things

  • Tausif, Muhammad;Ferzund, Javed;Jabbar, Sohail;Shahzadi, Raheela
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4006-4024
    • /
    • 2017
  • Internet of Things (IoT) will transform our daily life by making different aspects of life smart like smart home, smart workplace, smart health and smart city etc. IoT is based on network of physical objects equipped with sensors and actuators that can gather and share data with other objects or humans. Secure communication is required for successful working of IoT. In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined for resource-constrained scenarios like IoT. These algorithms are analysed by dissecting them into their logical and structural elements. This paper tries to investigate the relationships between the structural elements of an algorithm and its performance. Association rule mining is used to find association patterns among the constituent elements of the selected ciphers and their performance. Interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time. This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.

Effects of Internet of Things (IoT) exhibition service quality on exhibition acceptance (사물인터넷(IoT) 전시 서비스품질이 전시수용에 미치는 영향)

  • Kim, In-hwan;Nam, Yun-Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.13-28
    • /
    • 2021
  • The purpose of this study is to demonstrate the causal relationship between exhibition acceptance through the quality factors of Internet of Things (IoT) exhibition services and ease and usefulness of technology acceptance factors for domestic exhibition visitors. Through this, the company intends to present effective and efficient development plans in the IoT exhibition industry. Therefore, we present a research model that applies DeLone & McLean's quality factors to key variables in the information system success model and ease and usefulness in the Technology Acceptance Model (TAM). A survey was conducted on ordinary people with experience using the Internet of Water (IoT) exhibition service. The survey was conducted for two weeks from July 15 to August 20, 2021. A total of 276 surveys were used for data analysis during this period. The hypothesis results related to the information system success model of the Internet of Things (IoT) exhibition show that, first, system quality had no significant effect on usefulness, but significantly on ease. Second, information quality has been shown to have a significant effect on usability and ease. Third, service quality has been shown to have a significant impact on usability and ease. Fourth, usefulness has been shown to have a significant effect on exhibition acceptance. Fifth, ease has been shown to have a significant effect on usability. Sixth, ease was shown to have a significant effect on exhibition acceptance.

Design and Implementation of Parking Guidance System Based on Internet of Things(IoT) Using Q-learning Model (Q-learning 모델을 이용한 IoT 기반 주차유도 시스템의 설계 및 구현)

  • Ji, Yong-Joo;Choi, Hak-Hui;Kim, Dong-Seong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.3
    • /
    • pp.153-162
    • /
    • 2016
  • This paper proposes an optimal dynamic resource allocation method in IoT (Internet of Things) parking guidance system using Q-learning resource allocation model. In the proposed method, a resource allocation using a forecasting model based on Q-learning is employed for optimal utilization of parking guidance system. To demonstrate efficiency and availability of the proposed method, it is verified by computer simulation and practical testbed. Through simulation results, this paper proves that the proposed method can enhance total throughput, decrease penalty fee issued by SLA (Service Level Agreement) and reduce response time with the dynamic number of users.

A Comparison of the Construction for IoT System in Smart Clothing

  • Ko, Jooyoung;Shim, Jaechang
    • Journal of Multimedia Information System
    • /
    • v.2 no.4
    • /
    • pp.327-332
    • /
    • 2015
  • Recently, as microcomputers and sensors have been miniaturized due to dropdown of their market rates, this lead to a favorable environment for implementing the Internet of Things. Smart clothing refers to a system which can be wearable or portable, and allows people to communicate or conduct sensing. Applying the Internet of things, the role of the server computer is to receive and process data obtained from the sensor. An ordinary PC can act as a server but during the implementation of IoT, a PC has limited application due to a large size and the inconvenient portability. This study proposes a model that allows a variety of functions while implementation with the server from the sensing using the Arduino and Raspberry Pi. If we apply this proposed model, everyone can easily and inexpensively experience mobile IoT system.

The Impact of Privacy Control on Users' Intention to Use Smart Home Internet of Things (IoT) Services

  • Kim, Mingyung;Choi, Bo Reum
    • Asia Marketing Journal
    • /
    • v.24 no.1
    • /
    • pp.29-38
    • /
    • 2022
  • Despite the diverse benefits of smart home Internet of Things (IoT) services, the biggest obstacle to the actual usage of those services is concern about privacy. However, little research has investigated the impact of privacy control on users' intention to use smart home services. Based on communication privacy management theory and privacy calculus theory, this study investigates how privacy control options affect users' perceived benefits and costs and how those perceptions affect individuals' intentions to use smart home services by conducting an experiment. Our results showed that smart home privacy control options decreased perceived benefits and increased perceived costs. The perceived benefits and costs significantly affected the intention to use smart home security services. More intriguingly, the effect of perceived benefit was found to be stronger than that of the expected cost. This research contributes to the field of IoT and smart home research and provides practitioners with notable guidelines.

Electrical Automatic Control System Based on the Internet of Things

  • Jiyong, Jin
    • Journal of Information Processing Systems
    • /
    • v.18 no.6
    • /
    • pp.784-793
    • /
    • 2022
  • Grid-connected distributed power generation has been widely used in green energy generation. However, due to the distributed characteristics, distributed power generation is difficult to be dynamically allocated and monitored in the electrical control process. In order to solve this problem, this research combined the Internet of Things (IoT) with the automatic control system of electrical engineering to improve the control strategy of the power grid inverter according to the characteristics of the IoT system. In the research, a connection system of the power grid inverter and the IoT controller were designed, and the application effect was tested by simulation experiments. The results showed that the power grid inverter had strong tracking control ability for current and power control. Meanwhile, the electrical control system of the IoT could independently and dynamically control the three-phase current and power. The given value was reached within 50 ms after the step signal was input, which could protect the power grid from being affected by the current. The overall system could realize effective control, dynamic control and protective control.

A Study on the Influential Factors of Intelligence Internet of Things for Establishing Smart Supply Chains (스마트 공급망 구축을 위한 지능형사물인터넷 영향요인에 관한 연구)

  • Kun-Shik Cho;Cheol-Soo Park
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.2
    • /
    • pp.51-66
    • /
    • 2024
  • Internet of Things (IoT) is a term that has been introduced in recent years, and it defines objects being able to connect and transfer data through the internet. Although some IoT-related products are currently available in the market, there are still some IoT problems that need to be overcome, such as the technology issues and lack of confidence and understanding of IoT. This study aims to analyze the influential factors in building successful IoT system for smart supply chain. This study develops the Analytic Hierarchy Process (AHP) to evaluate the influential factors in IoT. This study finds that tangible factors (Technology, Value and Connectivity) are more important than the intangible factors (Operation and Intelligence). Finally, this study concludes that after enterprises build a good IoT connectivity system, it is essential to combine this with good IoT technology to create a successful IoT environment. The findings may help practitioners implement IoT in smart supply chains to deal with disruptions, risks and vulnerabilities in the post-pandemic era.

Implementation of crypto key-based IoT network security system (암호키 기반 IoT 네트워크 보안 시스템 구현)

  • Jeon, Ji-Soo;Kang, Dong-Yeon;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.349-350
    • /
    • 2022
  • As research on IT convergence continues, the scope of IoT (Internet of Things) services continues to expand. The IoT service uses a device suitable for the purpose. These IoT devices require an authentication function. In addition, in IoT services that handle important information such as personal information, security of transmission data is required. In this study, we implement a crypto key-based IoT network security system that can authenticate devices for IoT services and securely transmit data between devices. Through this study, IoT service can authenticate the device itself and maintain the confidentiality of transmitted data. However, since it is an IoT service, additional research on the application efficiency of the encryption algorithm is required.

  • PDF