• Title/Summary/Keyword: IoT:Internet of Things

Search Result 1,866, Processing Time 0.028 seconds

Development of Interactive Content Services through an Intelligent IoT Mirror System (지능형 IoT 미러 시스템을 활용한 인터랙티브 콘텐츠 서비스 구현)

  • Jung, Wonseok;Seo, Jeongwook
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.472-477
    • /
    • 2018
  • In this paper, we develop interactive content services for preventing depression of users through an intelligent Internet of Things(IoT) mirror system. For interactive content services, an IoT mirror device measures attention and meditation data from an EEG headset device and also measures facial expression data such as "sad", "angery", "disgust", "neutral", " happy", and "surprise" classified by a multi-layer perceptron algorithm through an webcam. Then, it sends the measured data to an oneM2M-compliant IoT server. Based on the collected data in the IoT server, a machine learning model is built to classify three levels of depression (RED, YELLOW, and GREEN) given by a proposed merge labeling method. It was verified that the k-nearest neighbor (k-NN) model could achieve about 93% of accuracy by experimental results. In addition, according to the classified level, a social network service agent sent a corresponding alert message to the family, friends and social workers. Thus, we were able to provide an interactive content service between users and caregivers.

A Study on the Infringement Incident Response Curriculum Model in IoT Environment (사물인터넷 환경에서 침해사고대응 교육과정 모델에 관한 연구)

  • Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.55-60
    • /
    • 2023
  • The IoT environment is very vulnerable to security threats, and if an intrusion occurs, it can cause great damage. In order to strengthen the security of the IoT environment, a curriculum that considers the characteristics of the IoT environment is needed. In this paper, we propose a curriculum model for cyber incident response in the Internet of Things environment. The proposed curriculum model was designed as a model for security threats in the IoT environment, types of intrusion incidents, and incident response procedures. The proposed curriculum model is expected to contribute to improving security awareness in the IoT environment and fostering cyber incident response experts in the IoT field. The proposed curriculum model strengthens the security of the IoT environment and is expected to be safe through security incident response in the IoT.

Integrity Guarantee System in IoT Virtual Environment Platform: Through Hyperedfger Indy and MQTT (IoT 가상환경 플랫폼에서의 무결성 보장 시스템:Hyperledger Indy와 MQTT를 통하여)

  • Yoosung Hong;Geun-Hyung Kim
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.76-85
    • /
    • 2024
  • In this paper, we propose a system that improves the data integrity of IoT(Internet of Things) devices in the virtual environment by combining Hyperledger Indy and MQTT(Message Queuing Telemetry Transport). The system complements the limitations of the centralized system by realizing a DPKI(Decentralized Public Key Infrastructure) structure that utilizes a distributed network in publish-subscribe(pub/sub) pattern communication. Digital signature technology was applied to ensure the data integrity of IoT devices and communication scenarios between the four core components of the client, IoT device, broker, and blockchain, as well as a topic structure using a decentralized identifier to ensure safety in the virtual environment. We present a systematic method for transparent data exchange. To prove the performance of the proposed system, this paper conducted experiments on four scenarios and evaluated communication performance in a virtual environment. The experimental results confirmed that the proposed system provides a reliable IoT data communication structure in a virtual environment.

Efficient Packet Transmission Utilizing Vertical Handover in IoT Environment (IoT 환경에서 수직 핸드오버를 활용한 효율적인 패킷 전송)

  • Ju, Hyunwoo;Yoo, Younghwan
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.807-816
    • /
    • 2015
  • The Internet of Things (IoT) has recently been showered with much attention worldwide. Various kinds of devices, communicating with each other in the IoT, demand multiple communication technologies to coexist. In this environment, mobile devices may utilize the vertical handover between different wireless radio interfaces such as Wi-Fi and Bluetooth, for efficient data transfer. In this paper, an IoT broker is implemented to support the vertical handover, which can also support and manage heterogeneous devices and communication interfaces. The handover is activated based on RSSI, Link Quality values, and real time traffic. The experimental results show that the proposed handover system substantially improves QoS in Bluetooth and reduces power consumption in mobile devices as compared with a system using only Wi-Fi.

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

Authentication Mechanism of Devices in Smart Home Using Internet of Things (사물 인터넷망을 이용한 스마트 홈에서의 기기 인증 메카니즘)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.258-259
    • /
    • 2017
  • Recently, as science and technology is very growing, wire and wireless communication is merged and interconnected. Therefore, advanced internet technology allow all kinds of communication to integrate with heterogeneous device and sensors. The representative example is smart home network based on internet of things. Communication surroundings under IoT services are more complex. Conventional encryption techniques can't provide to IoT application because of its limited resources such as small memory capacity and low computing power. In this paper, we analyzed authentication procedure between home gateway and node in sensor under smart home network.

  • PDF

Examining Organizational Factors Impacting IoT Implementation, Production, Services, and Performance in the Thai Manufacturing and Distribution Sector

  • Krisana KITCHAROEN
    • Journal of Distribution Science
    • /
    • v.22 no.4
    • /
    • pp.23-35
    • /
    • 2024
  • This study investigates the organizational factors including firm size, adaptive capability, absorptive capability, innovative capability, and executive support to determine internet of things, production and services, and organizational performance. Research design, data, and methodology: A quantitative methodology was employed, involving the distribution of surveys to 460 employees occupying managerial and strategic roles. These individuals have accrued a minimum of one year of experience within 20 leading manufacturing and distribution companies in Thailand, each boasting a workforce exceeding 250 employees. Sampling techniques utilized encompass judgmental, quota, and snowball sampling. Furthermore, analysis of the data was conducted through Confirmatory Factor Analysis (CFA) and Structural Equation Model (SEM). Results: The findings indicate that factors such as firm size, adaptive capability, absorptive capability, and innovative capability exert significant influence on the Internet of Things (IoT). In addition, IoT significantly impacts both production and services. Furthermore, the study highlights the significant influence of production and services on organizational performance. However, the anticipated relationship between executive support and IoT lacks support according to the results. Conclusions: This study highlights the transformative potential of IoT for the manufacturing and distribution sector, paving the way for enhanced efficiency, competitiveness, and sustainability in a rapidly evolving business landscape.

Consumer Experience and Adoption Intention of Internet of Things Services: The Impact of Network Externalities (소비자의 사물인터넷 서비스 경험과 수용의도 : 네트워크 외부성을 중심으로)

  • Zhang, Minxin;Lee, Jin-Myong
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.177-186
    • /
    • 2019
  • The purpose of this study is to enhance the understanding of consumer experience and behavior of Internet of Things (IoT) services and to provide practical implications through investigating the impact of benefits-cost factors and network externalities on consumers' adoption intention of IoT services. An online survey was conducted on general consumers in their 20s to 60s who were aware of the IoT services and 328 data were collected. Using SPSS 24.0, frequency analysis, correlation analysis, factor analysis, and hierarchical regression analysis were conducted. As a result, the level of consumers' IoT service experience in various contexts was examined, and entertainment, informativeness, loss of humanity, compatibility, and complementarity were found to have a significant effect on consumers' adoption intention of IoT services. This study suggests that strengthening network externality effects by increasing compatibility and complementarity is important in promoting consumers' adoption of IoT services. In future studies, it is necessary to adopt specific Internet of Things services to verify the validity of the models developed in this study.

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

Establishment of Analysis Model Using a Service Blueprint for Marketing Evaluation of IoT Services (IoT 서비스의 마케팅 평가를 위한 서비스 청사진 기법을 활용한 분석 모델 구축)

  • Jeon, Heewon;Park, Jae Wan
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.10
    • /
    • pp.71-79
    • /
    • 2018
  • The Internet of Things is a technology that makes it possible for objects made up of hardware and software to exchange information with one another via the Internet, thereby facilitating the servitization of the objects. An IoT service, which is composed of an IoT device and a web service, has recently been applied to the marketing field and is being used as a means to meet customer needs. However, applying appropriate marketing elements to IoT services is not easy. Therefore, analysis tools are needed to properly apply marketing elements to IoT services. This study aims to construct an analysis model for marketing evaluation of IoT services. In this study, the technical elements and marketing elements of IoT were derived through a literature review, and the analysis model for marketing evaluation of IoT services was established by exploring the relationship between the elements based on a service blueprint. We also applied real cases to verify the analytical model. This study is expected to contribute to the development of tools for evaluating IoT services.