• Title/Summary/Keyword: IoT:Internet of Things

Search Result 1,875, Processing Time 0.028 seconds

Hash-based SSDP for IoT Device Security (IoT 기기 보안을 위한 해시 기반의 SSDP)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Due to the prolonged infectious disease of COVID-19 worldwide, there are various security threats due to network attacks on Internet of Things devices that are vulnerable to telecommuting. Initially, users of Internet of Things devices were exploited for vulnerabilities in Remote Desktop Protocol, spear phishing and APT attacks. Since then, the technology of network attacks has gradually evolved, exploiting the simple service discovery protocol of Internet of Things devices, and DRDoS attacks have continued to increase. Existing SSDPs are accessible to unauthorized devices on the network, resulting in problems with information disclosure and amplification attacks on SSDP servers. To compensate for the problem with the authentication procedure of existing SSDPs, we propose a hash-based SSDP that encrypts server-specific information with hash and adds authentication fields to both Notify and M-Search message packets to determine whether an authorized IoT device is present.

Analysis of the Hardware Structures of the IoT Device Platforms for the Minimal Power Consumption (소비 전력 최소화를 위한 IoT 디바이스 플랫폼의 하드웨어 구조 분석)

  • Lee, Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.11-18
    • /
    • 2020
  • Since the end devices of the Internet of Things (IoT) are battery operated products, careful consideration for ultra-low power (ULP) is required. The Micro Controller Unit (MCU) industry has developed very effective functions to save energy, but developers have difficulty in selecting the MCU because various operating modes are applied to reduce energy consumption by manufacturers. Therefore, this paper introduces ULPMark benchmark, a standardized benchmark method that can compare MCUs of various vendors and feature sets, and provides hardware functions for ultra-low-power operation of the two platforms that received the high evaluation scores from ULPMark. In addition, we investigated and analyzed how developers can utilize the functions for ultra low power consumption through driver APIs and detailed register control.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

IoT Platform and Control App Design for Wireless Data Transmission (무선 데이터 전송을 위한 IoT 플랫폼과 제어 앱 설계)

  • Roh, Jae-sung;Cho, Young-joon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.72-77
    • /
    • 2017
  • In recent years, internet of things (IoT) technology has developed rapidly and has been applied in many fields. IoT devices collect and analyze information in various environments and provide useful information to users. Due to the recent increase in IoT devices, many open source platforms based on hardware and software that are cheap and easy to use have been developed and provided. In this paper, we have studied the IoT system based on Arduino which can communicate Bluetooth wireless data with smart phone in real time. And we have developed a wireless system control app based on App Invertor 2 for communication with Android smart phone. Also, we propose an IoT system based on Arduino which can control the devices and implement the function of connectivity between devices.

Design and Implementation of Personalized IoT Service base on Service Orchestration (서비스 오케스트레이션 기반 사용자 맞춤형 IoT 서비스의 설계 및 구현)

  • Cha, Siho;Ryu, Minwoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.21-29
    • /
    • 2015
  • The Internet of Things (IoT) is an Infrastructure which allows to connect with each device in physical world through the Internet. Thus IoT enables to provide meahup services or intelligent services to human user using collected data from those devices. Due to these advantages, IoT is used in divers service domains such as traffic, distribution, healthcare, and smart city. However, current IoT provides restricted services because it only supports monitor and control devices according to collected data from the devices. To resolve this problem, we propose a design and implementation of personalized IoT service base on service orchestration. The proposed service allows to discover specific services and then to combine the services according to a user location. To this end, we develop a service ontology to interpret user information according to meanings and smartphone web app to use the IoT service by human user. We also develop a service platform to work with external IoT platform. Finally, to show feasibility, we evaluate the proposed system via study.

A Framework for Internet of Things (IoT) Data Management

  • Kim, Kyung-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.159-166
    • /
    • 2019
  • The collection and manipulation of Internet of Things (IoT) data is increasing at a fast pace and its importance is recognized in every sector of our society. For efficient utilization of IoT data, the vast and varied IoT data needs to be reliable and meaningful. In this paper, we propose an IoT framework to realize this need. The IoT framework is based on a four layer IoT architecture onto which context aware computing technology is applied. If the collected IoT data is unreliable it cannot be used for its intended purpose and the whole service using the data must be abandoned. In this paper, we include techniques to remove uncertainty in the early stage of IoT data capture and collection resulting in reliable data. Since the data coming out of the various IoT devices have different formats, it is important to convert them into a standard format before further processing, We propose the RDF format to be the standard format for all IoT data. In addition, it is not feasible to process all captured Iot data from the sensor devices. In order to decide which data to process and understand, we propose to use contexts and reasoning based on these contexts. For reasoning, we propose to use standard AI and statistical techniques. We also propose an experiment environment that can be used to develop an IoT application to realize the IoT framework.

Feasibility of Societal Model for Securing Internet of Things

  • Tsunoda, Hiroshi;Roman, Rodrigo;Lopez, Javier;Keeni, Glenn Mansfield
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3567-3588
    • /
    • 2018
  • In the Internet of Things (IoT) concept, devices communicate autonomously with applications in the Internet. A significant aspect of IoT that makes it stand apart from present-day networked devices and applications is a) the very large number of devices, produced by diverse makers and used by an even more diverse group of users; b) the applications residing and functioning in what were very private sanctums of life e.g. the car, home, and the people themselves. Since these diverse devices require high-level security, an operational model for an IoT system is required, which has built-in security. We have proposed the societal model as a simple operational model. The basic concept of the model is borrowed from human society - there will be infants, the weak and the handicapped who need to be protected by guardians. This natural security mechanism works very well for IoT networks which seem to have inherently weak security mechanisms. In this paper, we discuss the requirements of the societal model and examine its feasibility by doing a proof-of-concept implementation.

Study on Component-Based Middleware for IoT Service Scalability (IoT 서비스 확장성을 고려한 컴포넌트 기반의 미들웨어에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.330-337
    • /
    • 2015
  • A service in the environments of internet of things (IoT) exist various types with automation facilities and sensors. There can configure so many communication protocols to networking facilities and sensors. To provide efficient various kind of service, a middleware platform, is based on the internet protocol network, is needed a unified access with devices, controlling and monitoring huge kind of facilities and sensors, to provide a efficient IoT service and application configurations. In this paper, we propose a middleware that an application and service interact with automation facilities and monitor sensors. The proposed middleware is designed with adapter pattern that one of the software engineering design pattern. The adapter pattern is to ensure communication with each sensor and to make sure of service scalability. Finally, the proposed component middleware shows that variety sensors can be easily configure the service in the IoT environment.

Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things (사물인터넷의 경량화 장치를 위한 안전한 Pre-shared Key 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.1-6
    • /
    • 2015
  • The IoT(Internet of things) technology enable objects around user to be connected with each other for sharing information. To support security is the mandatory requirement in IoT because it is related to the disclosure of private information but also directly related to the human safety. However, it is difficult to apply traditional security mechanism into lightweight devices. This is owing to the fact that many IoT devices are generally resource constrained and powered by battery. PSK(Pre-Shared Key) based approach, which share secret key in advance between communication entities thereafter operate security functions, is suitable for light-weight device. That is because PSK is costly efficient than a session key establishment approach based on public key algorithm. However, how to safely set a PSK of the lightweight device in advance is a difficult issue because input/output interfaces such as keyboard or display are constrained in general lightweight devices. To solve the problem, we propose and develop a secure PSK configuration scheme for resource constrained devices in IoT.