• Title/Summary/Keyword: IoT:Internet of Things

Search Result 1,866, Processing Time 0.034 seconds

LoRa Network based Parking Dispatching System : Queuing Theory and Q-learning Approach (LoRa 망 기반의 주차 지명 시스템 : 큐잉 이론과 큐러닝 접근)

  • Cho, Youngho;Seo, Yeong Geon;Jeong, Dae-Yul
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1443-1450
    • /
    • 2017
  • The purpose of this study is to develop an intelligent parking dispatching system based on LoRa network technology. During the local festival, many tourists come into the festival site simultaneously after sunset. To handle the traffic jam and parking dispatching, many traffic management staffs are engaged in the main road to guide the cars to available parking lots. Nevertheless, the traffic problems are more serious at the peak time of festival. Such parking dispatching problems are complex and real-time traffic information dependent. We used Queuing theory to predict inbound traffics and to measure parking service performance. Q-learning algorithm is used to find fastest routes and dispatch the vehicles efficiently to the available parking lots.

A Study on Social Perception on the Regulatory Information Service Diffusion of Traffic Facilities (교통안전시설 정보개방 서비스 확산을 위한 인식 조사 연구)

  • Im, I-Jeong;Kim, Youngmin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.2
    • /
    • pp.1-17
    • /
    • 2020
  • This Study aims to change and expand present traffic regulation from the human driver to Automated Vehicle(AV), we conducted an in-depth interview(IDI) into the traffic regulation service's strategy for an AV-related information consumer group(AVs and service developers) and a manager group (an information service management agency). The IDI results confirmed several important opinions and requirements for an information service by regulatory information manager groups (enough for AV development), such as a systematic need for dynamic regulatory information and a unified information management system. Also, we find out implications about adopting the Internet of Things (IoT) technology in traffic safety facilities to provide dynamic regulation information on the roads.

A More Storage-Efficient Order-Revealing Encryption Scheme (우수한 공간 효율성을 제공하는 순서노출암호 기법)

  • Kim, Kee Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.503-509
    • /
    • 2019
  • Order-revealing encryption which enables a range query over encrypted data is attracting attention as one of the important security technologies in industry such as IoT, smart manufacturing, and cloud computing. In 2015, an ideally-secure order-revealing encryption whose ciphertexts reveal no additional information beyond the order of the underlying plaintexts has been proposed. However, their construction is too inefficient for practical use and some security analysis of multilinear maps, which their construction relies on, have been proposed. Recently, more practical schemes have been proposed, focusing on achieving practically usable efficiency rather than the ideal security. In this paper, we propose a more storage-efficient order-revealing encryption scheme than the Lewi et al.'s scheme most recently published by presenting an idea that can generate shorter ciphertexts without any security loss.

Channel Selection Using Optimal Channel-Selection Policy in RF Energy Harvesting Cognitive Radio Networks (무선 에너지 하비스팅 인지 무선 네트워크에서 최적의 채널 선택 정책을 이용한 채널 선택)

  • Jung, Jun Hee;Hwang, Yu Min;Cha, Gyeong Hyeon;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.1-5
    • /
    • 2015
  • Recently, RF energy harvesting technology is a promising technology for small-size IoT(Internet of Things) devices such as sensor to resolve battery scarcity problem. When applied to existing cognitive radio networks, this technology can be expected to increase network throughput through the increase of cognitive user's operating time. This paper proposes a optimal channel-selection policy for RF energy harvesting CR networks model where cognitive users in harvesting zone harvest ambient RF energy from transmission by nearby active primary users and the others in non-harvesting zone choose the channel and communicate with their receiver. We consider that primary users and secondary users are distributed as Poisson point processes and contact with their intended receivers at fixed distances. Finally we can derive the optimal frame duration, transmission power and density of secondary user from the proposed model that can maximize the secondary users's throughput under the given several conditions and suggest future directions of research.

BLE-OTP Authorization Mechanism for iBeacon Network Security (iBeacon 네트워크 보안을 위한 BLE-OTP 인증 메커니즘)

  • Jung, Hyunhee;Shin, Dongryeol;Cho, Kwangsu;Nam, Choonsung
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.979-989
    • /
    • 2015
  • Machine to Machine (M2M) technology has gained attention due to the fast diffusion of Internet of Things (IoT) technologies and smart devices. Most wireless network experts believe that Bluetooth Low Energy (BLE) Communications technology in an iBeacon network has amazing advantages in terms of providing communication services at a low cost in smartphone applications. Specifically, BLE does not require any pairing process during its communication phases, so it is possible to send a message to any node without incurring additional transmissions costs if they are within the BLE communication range. However, BLE does not require any security verification during communication, so it has weak security. Therefore, a security authorization process would be necessary to obtain customer confidence. To provide security functions for iBeacon, we think that the iBeacon Message Encryption process and a Decryption (Authorization) process should be designed and implemented. We therefore propose the BLE message Authorization Mechanism based on a One Time Password Algorithm (BLE-OTP). The effectiveness of our mechanism is evaluated by conducting a performance test on an attendance system based on BLE-OTP.

ITU-R Study on Frequency Sharing for Mobile Satellite Services (ITU-R의 이동위성업무 주파수 공유 연구 현황)

  • B.J. Ku;D.S. Oh
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.1
    • /
    • pp.55-64
    • /
    • 2023
  • Recently, preparations for 6G have led to the increasing interest in integrated or hybrid communication networks considering low-orbit satellite communication networks with terrestrial mobile communication networks. In addition, the demand for frequency allocation for new mobile services from low-orbit small satellites to provide global internet of things (IoT) services is increasing. The operation of such satellites and terrestrial mobile communication networks may inevitably cause interference in adjacent bands and the same band frequency between satellites and terrestrial systems. Focusing on the results of the recent ITU-R WP4C meeting, this study introduces the current status of frequency sharing and interference issues between satellites and terrestrial systems, and frequency allocation issues for new mobile satellite operations. Coexistence and compatibility studies with terrestrial IMT in L band and 2.6 GHz band, operated by Inmassat and India, respectively, and a new frequency allocation study (WRC-23 AI 1.18) are carried out to reflect satellite IoT demand. For the L band, technical requirements have been developed for emission from IMT devices at 1,492 MHz to 1,518 MHz to bands above 1,518 MHz. Related studies in the 2 GHz and 2.6 GHz bands are not discussed due to lack of contributions at the recent meeting. In particular, concerning the WRC-23 agenda 1.18 study on the new frequency allocation method of narrowband mobile satellite work in the Region 1 candidate band 2,010 MHz to 2,025 MHz, Region 2 candidate bands 1,695 MHz to 1,710 MHz, 3,300 MHz to 3,315 MHz, and 3,385 MHz to 3,400 MHz, ITU-R results show no new frequency allocation to narrow mobile satellite services. Given the expected various collaborations between satellites and the terrestrial component are in the future, interference issues between terrestrial IMT and mobile satellite services are similarly expected to continuously increase. Therefore, participation in related studies at ITU-R WP4C and active response to protect terrestrial IMT are necessary to protect domestic radio resources and secure additional frequencies reflecting satellite service use plans.

Device Virtualization Framework for Smart Home Cloud Service (스마트홈 클라우드 서비스를 위한 디바이스 가상화 프레임워크)

  • Kim, Kyungwon;Park, Jongbin;Kum, Seungwoo;Jung, Jongjin;Yang, Chang-Mo;Lim, Taebeom
    • Telecommunications review
    • /
    • v.24 no.5
    • /
    • pp.677-691
    • /
    • 2014
  • Connectivity is becoming more important keywords recently. For example, many devices are going to be connected to the internet. It is usually called as the IoT(internet of things). Many IoT devices can be evolved as a part of giant system of the world wide web. It is a great opportunity for us, because many new services can have emerged through this paradigm. In this paper, we propose a device virtualization framework for smart home service. The proposed framework connects the many home appliances devices and the internet using a dynamic protocol conversion. After our protocol conversion for device virtualization, our framework provides a RESTful API to access the resources of device through the internet. Therefore, the proposed framework can provide a variety of services, so it also can be developed into the ecosystem for smart home service. The current framework version only supports UPnP enabled devices of the home, but it can easily be extended to many other home middleware solutions. To verify the feasibility of the framework, we have implemented several service scenarios.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

A Research on Effective Wi-Fi Easy Connect Protocol Improvement Method Applicable to Wired and Wireless Environments (유·무선 환경에 적용 가능한 효율적인 Wi-Fi Easy Connect 프로토콜 개선방안 연구)

  • Ho-jei Yu;Chan-hee Kim;Sung-sik Im;Seo-yeon Kim;Dong-woo Kim;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.45-54
    • /
    • 2023
  • Recently, with the development of the Internet of Things, research on protocols that can easily connect devices without a UI to the network has been steadily conducted. To this end, the Wi-Fi Alliance announced Wi-Fi Easy Connect, which can connect to a network using a QR code. However, since Wi-Fi Easy Connect requires a large amount of computation for safety, it is difficult to apply to low-power and miniaturized IoT devices. In addition, Wi-Fi Easy Connect considering scalability is designed to operate in a wired environment, but problems such as duplicate encryption occur because it does not consider a security environment like TLS. Therefore, in this paper, we analyze the Wi-Fi Easy Connect protocol and propose a protocol that can operate efficiently in the TLS environment. It was confirmed that the proposed protocol satisfies the existing security requirements and at the same time reduces about 67% of ECC scalar multiplication operations with a large amount of computation.

Design and Function Analysis of Dust Measurement Platform based on IoT protocol (사물인터넷 프로토콜 기반의 미세먼지 측정 플랫폼 설계와 기능해석)

  • Cho, Youngchan;Kim, Jeongho
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.79-89
    • /
    • 2021
  • In this paper, the fine dust (PM10) and ultrafine dust (PM2.5) measurement platforms are designed to be mobile and fixed using oneM2M, the international standard for IoT. The fine dust measurement platform is composed and designed with a fine dust measurement device, agent, oneM2M platform, oneM2M IPE, and monitoring system. The main difference between mobile and fixed is that the mobile uses the MQTT protocol for interconnection between devices and services without blind spots based on LTE connection, and the fixed uses the LoRaWAN protocol with low power and wide communication range. Not only fine dust, but also temperature, humidity, atmospheric pressure, volatile organic compounds (VOC), carbon monoxide (CO), sulfur dioxide (SO2), nitrogen dioxide (NO2), and noise data related to daily life were collected. The collected sensor values were managed using the common API provided by oneM2M through the agent and oneM2M IPE, and it was designed into four resource types: AE and container. Six functions of operability, flexibility, convenience, safety, reusability, and scalability were analyzed through the fine dust measurement platform design.