• Title/Summary/Keyword: IoT:Internet of Things

Search Result 1,875, Processing Time 0.161 seconds

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

Data Error Compensation Estimation Technology for Providing High Quality Contents in IoT Environment (IoT 환경에서 고품질 콘텐츠 제공을 위한 데이터 오류 보상 추정 기술)

  • Kim, Jeong Su
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.333-338
    • /
    • 2019
  • Cultural contents are the most important factor in high speed and high quality data communication. High-quality content includes VR and AR technology, and a variety of high-quality content can be streamed over wireless mobile phones via smartphones. In addition, network and wired/wireless communication are inevitably required in an Internet of Things (IoT) environment in which things are connected to a wireless Internet. IoT is used in various network technologies such as 4G, 5G mobile communication, WIFI wireless LAN, Bluetooth and so on. It is a technology that can use the connection between things anytime, anywhere, and can be achieved in a wireless mobile communication environment. Therefore, in this paper, we study data error compensation estimation method which can reduce data error based on mobile communication channel environment analysis so that high quality contents can be serviced even in high speed mobile environment.

Analysis of Digital Trust in the Era of Internet of Things

  • LIU, Xiao-wen;Lee, Jiapei;Lee, Hyun-chang;LIU, Xiao-wen;Jin, Chan-Yong;Shin, Seong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.371-374
    • /
    • 2016
  • In the digital business environment, digital trust has became a key element of business compete. With the Internet of Things(IoT) development, the success of businesses that participate in the world of connected devices depends on the level of digital trust consumers have in them. This paper introduced the definition and elements of digital trust, analyzed status of digital trust in IoT era, then puts forward the countermeasure of strengthening digital trust.

  • PDF

Design of Learning Model using Triz for PBL(Project-based Learning) in IoT Environment (사물인터넷환경에서 프로젝트중심학습에 Triz를 이용한 학습 모델 설계)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2019
  • It is changing to the 4th Industrial Revolution rapidly as the information age through the Internet is changing, and it is rapidly changing to the era of the IoT using all things. In education, with the change to the Internet of Things, interest in education for the 4th Industrial Revolution is increasing. It is necessary to change from NetPBL method using Internet to T-PBL using Triz. In this paper, we focus on the task-based learning (T-PBL) method using Triz and examine the necessity and importance of its use. We propose a teaching model using Triz as a tool for T-PBL. Triz is being used as a tool to solve problems in creative ways. We will design a model applying Triz to the blockchain system security class related to the IoT.

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.

Smart Home System Using Internet of Things

  • Santoso, Leo Willyanto;Lim, Resmana;Trisnajaya, Kevin
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.1
    • /
    • pp.60-65
    • /
    • 2018
  • The Internet of Things (IoT) is happening now. By implementing IoT, we can build smart home system. Smart home is an application that is a combination of technology and services that specialize in the home environment with specific functions aimed at improving the efficiency, comfort and security of the occupants. Smart homes filled with connected products are loaded with possibilities to make our lives easier, more convenient, and more comfortable. This intelligent home system uses a microcontroller to process functions that provided by smart home system, such functions as RFID for door access and PIR sensors for motion detection. By using Android users could control the sensors anytime and anywhere. Microcontroller used is Arduino IDE with WeMos D1R2 board. Based on the testing process, there was a successful communication between the components of the device, sensors, and Android devices. Users could open or close the solenoid, users can also turn off or turn on electronic devices using Android.

Measuring Stress Using HRV sensor and Standard-based IoT Platforms (HRV 센서와 표준 사물인터넷 플랫폼을 활용한 스트레스 측정 시스템)

  • Ahn, Eunsol;Yun, Jaeseok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.457-458
    • /
    • 2019
  • 본 논문에서는 심장 박동 변이 (HRV: heart rate variability) 센서와 표준 기반 사물인터넷 (IoT: Internet of Things) 플랫폼을 활용한 스트레스 측정 시스템을 구현하고 그 활용 방법을 제안한다. HRV를 측정하기 위해 맥파 (PPG)센서와 오픈소스 하드웨어를 이용해 센싱 시스템을 구축하고 표준 사물인터넷 플랫폼을 이용하여 서버 시스템을 구축하였다. 추후 분석을 통해 유추한 스트레스 정도에 따라 플랫폼에 연결된 다양한 기기들을 이용하여 스트레스를 낮추기 위한 개인별 스트레스 관리 솔루션을 구현할 수 있음을 알 수 있다.

  • PDF

Utilize Air Pollution Measuring System based on Internet of Things(IoT) (사물인터넷(IoT) 기반의 미세먼지 측정 시스템 활용)

  • Cha, Hoon;Jeon, Minyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.24-26
    • /
    • 2019
  • Air Pollution is increasing in Korea due to recent factory and environmental pollution and desertification in China. People are said to be wearing masks or reducing outdoor activities, but there is little effect on quarantine. Therefore, in order to clean up Air Pollution that has an adverse effect on the body, the government is planning to design a Prototype, an Air Pollution measuring system based on the Internet of Things.

  • PDF

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.