• Title/Summary/Keyword: IoT:Internet of Things

Search Result 1,875, Processing Time 0.03 seconds

A Study on Social Perception on the Regulatory Information Service Diffusion of Traffic Facilities (교통안전시설 정보개방 서비스 확산을 위한 인식 조사 연구)

  • Im, I-Jeong;Kim, Youngmin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.2
    • /
    • pp.1-17
    • /
    • 2020
  • This Study aims to change and expand present traffic regulation from the human driver to Automated Vehicle(AV), we conducted an in-depth interview(IDI) into the traffic regulation service's strategy for an AV-related information consumer group(AVs and service developers) and a manager group (an information service management agency). The IDI results confirmed several important opinions and requirements for an information service by regulatory information manager groups (enough for AV development), such as a systematic need for dynamic regulatory information and a unified information management system. Also, we find out implications about adopting the Internet of Things (IoT) technology in traffic safety facilities to provide dynamic regulation information on the roads.

A More Storage-Efficient Order-Revealing Encryption Scheme (우수한 공간 효율성을 제공하는 순서노출암호 기법)

  • Kim, Kee Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.503-509
    • /
    • 2019
  • Order-revealing encryption which enables a range query over encrypted data is attracting attention as one of the important security technologies in industry such as IoT, smart manufacturing, and cloud computing. In 2015, an ideally-secure order-revealing encryption whose ciphertexts reveal no additional information beyond the order of the underlying plaintexts has been proposed. However, their construction is too inefficient for practical use and some security analysis of multilinear maps, which their construction relies on, have been proposed. Recently, more practical schemes have been proposed, focusing on achieving practically usable efficiency rather than the ideal security. In this paper, we propose a more storage-efficient order-revealing encryption scheme than the Lewi et al.'s scheme most recently published by presenting an idea that can generate shorter ciphertexts without any security loss.

Channel Selection Using Optimal Channel-Selection Policy in RF Energy Harvesting Cognitive Radio Networks (무선 에너지 하비스팅 인지 무선 네트워크에서 최적의 채널 선택 정책을 이용한 채널 선택)

  • Jung, Jun Hee;Hwang, Yu Min;Cha, Gyeong Hyeon;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.1-5
    • /
    • 2015
  • Recently, RF energy harvesting technology is a promising technology for small-size IoT(Internet of Things) devices such as sensor to resolve battery scarcity problem. When applied to existing cognitive radio networks, this technology can be expected to increase network throughput through the increase of cognitive user's operating time. This paper proposes a optimal channel-selection policy for RF energy harvesting CR networks model where cognitive users in harvesting zone harvest ambient RF energy from transmission by nearby active primary users and the others in non-harvesting zone choose the channel and communicate with their receiver. We consider that primary users and secondary users are distributed as Poisson point processes and contact with their intended receivers at fixed distances. Finally we can derive the optimal frame duration, transmission power and density of secondary user from the proposed model that can maximize the secondary users's throughput under the given several conditions and suggest future directions of research.

BLE-OTP Authorization Mechanism for iBeacon Network Security (iBeacon 네트워크 보안을 위한 BLE-OTP 인증 메커니즘)

  • Jung, Hyunhee;Shin, Dongryeol;Cho, Kwangsu;Nam, Choonsung
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.979-989
    • /
    • 2015
  • Machine to Machine (M2M) technology has gained attention due to the fast diffusion of Internet of Things (IoT) technologies and smart devices. Most wireless network experts believe that Bluetooth Low Energy (BLE) Communications technology in an iBeacon network has amazing advantages in terms of providing communication services at a low cost in smartphone applications. Specifically, BLE does not require any pairing process during its communication phases, so it is possible to send a message to any node without incurring additional transmissions costs if they are within the BLE communication range. However, BLE does not require any security verification during communication, so it has weak security. Therefore, a security authorization process would be necessary to obtain customer confidence. To provide security functions for iBeacon, we think that the iBeacon Message Encryption process and a Decryption (Authorization) process should be designed and implemented. We therefore propose the BLE message Authorization Mechanism based on a One Time Password Algorithm (BLE-OTP). The effectiveness of our mechanism is evaluated by conducting a performance test on an attendance system based on BLE-OTP.

ITU-R Study on Frequency Sharing for Mobile Satellite Services (ITU-R의 이동위성업무 주파수 공유 연구 현황)

  • B.J. Ku;D.S. Oh
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.1
    • /
    • pp.55-64
    • /
    • 2023
  • Recently, preparations for 6G have led to the increasing interest in integrated or hybrid communication networks considering low-orbit satellite communication networks with terrestrial mobile communication networks. In addition, the demand for frequency allocation for new mobile services from low-orbit small satellites to provide global internet of things (IoT) services is increasing. The operation of such satellites and terrestrial mobile communication networks may inevitably cause interference in adjacent bands and the same band frequency between satellites and terrestrial systems. Focusing on the results of the recent ITU-R WP4C meeting, this study introduces the current status of frequency sharing and interference issues between satellites and terrestrial systems, and frequency allocation issues for new mobile satellite operations. Coexistence and compatibility studies with terrestrial IMT in L band and 2.6 GHz band, operated by Inmassat and India, respectively, and a new frequency allocation study (WRC-23 AI 1.18) are carried out to reflect satellite IoT demand. For the L band, technical requirements have been developed for emission from IMT devices at 1,492 MHz to 1,518 MHz to bands above 1,518 MHz. Related studies in the 2 GHz and 2.6 GHz bands are not discussed due to lack of contributions at the recent meeting. In particular, concerning the WRC-23 agenda 1.18 study on the new frequency allocation method of narrowband mobile satellite work in the Region 1 candidate band 2,010 MHz to 2,025 MHz, Region 2 candidate bands 1,695 MHz to 1,710 MHz, 3,300 MHz to 3,315 MHz, and 3,385 MHz to 3,400 MHz, ITU-R results show no new frequency allocation to narrow mobile satellite services. Given the expected various collaborations between satellites and the terrestrial component are in the future, interference issues between terrestrial IMT and mobile satellite services are similarly expected to continuously increase. Therefore, participation in related studies at ITU-R WP4C and active response to protect terrestrial IMT are necessary to protect domestic radio resources and secure additional frequencies reflecting satellite service use plans.

Device Virtualization Framework for Smart Home Cloud Service (스마트홈 클라우드 서비스를 위한 디바이스 가상화 프레임워크)

  • Kim, Kyungwon;Park, Jongbin;Kum, Seungwoo;Jung, Jongjin;Yang, Chang-Mo;Lim, Taebeom
    • Telecommunications review
    • /
    • v.24 no.5
    • /
    • pp.677-691
    • /
    • 2014
  • Connectivity is becoming more important keywords recently. For example, many devices are going to be connected to the internet. It is usually called as the IoT(internet of things). Many IoT devices can be evolved as a part of giant system of the world wide web. It is a great opportunity for us, because many new services can have emerged through this paradigm. In this paper, we propose a device virtualization framework for smart home service. The proposed framework connects the many home appliances devices and the internet using a dynamic protocol conversion. After our protocol conversion for device virtualization, our framework provides a RESTful API to access the resources of device through the internet. Therefore, the proposed framework can provide a variety of services, so it also can be developed into the ecosystem for smart home service. The current framework version only supports UPnP enabled devices of the home, but it can easily be extended to many other home middleware solutions. To verify the feasibility of the framework, we have implemented several service scenarios.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

A Research on Effective Wi-Fi Easy Connect Protocol Improvement Method Applicable to Wired and Wireless Environments (유·무선 환경에 적용 가능한 효율적인 Wi-Fi Easy Connect 프로토콜 개선방안 연구)

  • Ho-jei Yu;Chan-hee Kim;Sung-sik Im;Seo-yeon Kim;Dong-woo Kim;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.45-54
    • /
    • 2023
  • Recently, with the development of the Internet of Things, research on protocols that can easily connect devices without a UI to the network has been steadily conducted. To this end, the Wi-Fi Alliance announced Wi-Fi Easy Connect, which can connect to a network using a QR code. However, since Wi-Fi Easy Connect requires a large amount of computation for safety, it is difficult to apply to low-power and miniaturized IoT devices. In addition, Wi-Fi Easy Connect considering scalability is designed to operate in a wired environment, but problems such as duplicate encryption occur because it does not consider a security environment like TLS. Therefore, in this paper, we analyze the Wi-Fi Easy Connect protocol and propose a protocol that can operate efficiently in the TLS environment. It was confirmed that the proposed protocol satisfies the existing security requirements and at the same time reduces about 67% of ECC scalar multiplication operations with a large amount of computation.

Design and Function Analysis of Dust Measurement Platform based on IoT protocol (사물인터넷 프로토콜 기반의 미세먼지 측정 플랫폼 설계와 기능해석)

  • Cho, Youngchan;Kim, Jeongho
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.79-89
    • /
    • 2021
  • In this paper, the fine dust (PM10) and ultrafine dust (PM2.5) measurement platforms are designed to be mobile and fixed using oneM2M, the international standard for IoT. The fine dust measurement platform is composed and designed with a fine dust measurement device, agent, oneM2M platform, oneM2M IPE, and monitoring system. The main difference between mobile and fixed is that the mobile uses the MQTT protocol for interconnection between devices and services without blind spots based on LTE connection, and the fixed uses the LoRaWAN protocol with low power and wide communication range. Not only fine dust, but also temperature, humidity, atmospheric pressure, volatile organic compounds (VOC), carbon monoxide (CO), sulfur dioxide (SO2), nitrogen dioxide (NO2), and noise data related to daily life were collected. The collected sensor values were managed using the common API provided by oneM2M through the agent and oneM2M IPE, and it was designed into four resource types: AE and container. Six functions of operability, flexibility, convenience, safety, reusability, and scalability were analyzed through the fine dust measurement platform design.

Operating Direction of Integrated Real-time Discharge Measurement System: By Applying Information and Communication Technology (ICT 기술을 적용한 수문조사시설 운영·관리 효율화 및 방향)

  • Dong Heon Oh;Sang Uk Cho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.439-439
    • /
    • 2023
  • 근래 국내에서는 기후변화로 인한 국지성 호우가 점점 늘어나는 추세로 급격한 하천 수위상승 및 유량 증가로 인해 지속적으로 홍수피해가 발생하고 있으며, 이를 예방하기 위한 실시간 자료수집의 중요성이 증대되고 있다. 이러한 사회적 환경을 고려하여 우리는 물 순환에 관한 자료를 실시간으로 수집하고 홍수예보를 위한 수문조사시설을 설치하여 운영하고 있으나, 대부분 하천과 인접한 곳에 설치되는 시설 특성상 시스템 오류, 전원 이상 발생 등 다양한 요인으로 발생하는 자료 결측·손실에 즉각적인 조치가 어려운 실정이다. 이에, 현장 기반 시설의 안정적인 운영을 통한 연속성 있는 자료 제공을 위해 수문조사시설 중 하천 내 설치된 유량측정시스템에 ICT·사물인터넷(IoT, Internet of Things)을 적용하여 현장 환경-정보 등 언택트(non-contact) 모니터링을 통해 실시간 점검을 수행하였다. 그 결과 2022년 기준 총 508회(현장점검 358회) 점검 중 150회 원격점검을 수행하였고, 이중 74회 즉각 점검 및 복구 조치가 이루어져 점검 시간 단축을 통한 자료 결측 최소화, 현장점검 최소화를 통해 효율적인 시설 운영이 가능하도록 하였다. 또한, 점검을 위해 현장 이동 시 발생하는 이산화탄소 배출량 저감으로 탄소중립 효과도 나타낼 수 있었다. 코로나바이러스감염증-19 이후 사회환경 패러다임 전환에 따라 비대면 활성화, 탄소중립, 안전하고 건전한 사회환경 조성 등과 같이 대면 위주로 운영되는 현장 시설의 관리 방향 또한 사회적 상황을 고려하여 효율적인 시설물 운영, 예산 절감, 자료의 연속성 확보 등을 위해 적극적인 운영 방향의 전환이 필요하다고 판단된다.

  • PDF