• Title/Summary/Keyword: IoT:Internet of Things

Search Result 1,912, Processing Time 0.036 seconds

Drsign and Evaluation of a GQS-based Fog Pub/Sub System for Delay-Sensitive IoT Applications (지연 민감형 IoT 응용을 위한 GQS 기반 포그 Pub/Sub 시스템의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1369-1378
    • /
    • 2017
  • Pub/Sub (Publish/Subscribe) paradigm is a simple and easy to use model for interconnecting applications in a distributed environment. In general, subscribers register their interests in a topic or a pattern of events and then asynchronously receive events matching their interest, regardless of the events' publisher. In order to build a low latency lightweight pub/sub system for Internet of Things (IoT) services, we propose a GQSFPS (Group Quorum System-based Fog Pub/Sub) system that is a core component in the event-driven service oriented architecture framework for IoT services. The GQSFPS organizes multiple installed pub/sub brokers in the fog servers into a group quorum based P2P (peer-to-peer) topology for the efficient searching and the low latency accessing of events. Therefore, the events of IoT are cached on the basis of group quorum, and the delay-sensitive IoT applications of edge devices can effectively access the cached events from group quorum fog servers in low latency. The performance of the proposed GQSFPS is evaluated through an analytical model, and is compared to the GQPS (grid quorum-based pud/sub system).

IoT Security and Machine Learning

  • Almalki, Sarah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.103-114
    • /
    • 2022
  • The Internet of Things (IoT) is one of the fastest technologies that are used in various applications and fields. The concept of IoT will not only be limited to the fields of scientific and technical life but will also gradually spread to become an essential part of our daily life and routine. Before, IoT was a complex term unknown to many, but soon it will become something common. IoT is a natural and indispensable routine in which smart devices and sensors are connected wirelessly or wired over the Internet to exchange and process data. With all the benefits and advantages offered by the IoT, it does not face many security and privacy challenges because the current traditional security protocols are not suitable for IoT technologies. In this paper, we presented a comprehensive survey of the latest studies from 2018 to 2021 related to the security of the IoT and the use of machine learning (ML) and deep learning and their applications in addressing security and privacy in the IoT. A description was initially presented, followed by a comprehensive overview of the IoT and its applications and the basic important safety requirements of confidentiality, integrity, and availability and its application in the IoT. Then we reviewed the attacks and challenges facing the IoT. We also focused on ML and its applications in addressing the security problem on the IoT.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

Internet of Things 기술 및 발전 방향

  • Kim, Dae-Yeong;Kim, Seong-Hun;Ha, Min-Geun;Kim, Tae-Hong;Lee, Yo-Han
    • Information and Communications Magazine
    • /
    • v.28 no.9
    • /
    • pp.49-57
    • /
    • 2011
  • 지금까지의 인터넷은 인간이 정보의 생산자 혹은 소비자로서 정보를 공유할 수 있는 최적의 공간으로 활용되어왔다. 미래에는 인간이 생산해내는 정보뿐만이 아니라 일상 사물까지도 인터넷에 연결되어 사물의 정보와 사물이 센싱하는 환경 정보까지도 인터넷을 통하여 공유할 수 있는 사물인터넷(Internet of Things, IoT)으로 진화할 것으로 예견되고 있다. 본고에서는 IoT틀 바라보는 다양한 관점과 정외에 대하여 살펴보고 IoT의 비전을 실현하는데 있어 필요한 핵심기술들을 네트워크기술과 소프트웨어 기술의 관점에서 정리한다. 네트워크 관련 기술은 사물의 식별과 트랙킹을 위한 RFID, 무선 센서네트워크, 인터넷 호환성을 제공하는 IP 기반 센서 사물 정보 명세를 위한 메타데이터 기술, 사물을 인터넷 기반의 웹으로 표현하기 위한 Web of Things 기술을 바탕으로 진화할 것이다. 마지막으로 IoT와 관련된 국내외 기술 및 표준화 동향을 정리한다.

Design and Implementation of a Smart Signage System based on the Internet of Things(IoT) for Elevators

  • Ryu, Hyunmi;Lee, Guisun;Park, Sunggon;Cho, Sungguk;Jeon, Byungkook
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.184-192
    • /
    • 2019
  • The existing digital signage systems inside the elevators are a lack of tailored contents appropriate to the space and environment inside or outside the elevators. Also, they almost impossible to flexibly respond to various contents disclosure according to the demand of the consumers or the elevator markets. Therefore we design and implement an IoT(Internet of Things)-based smart digital signage system for the safety of elevator passengers.. In order to provide IoT-based information to the smart digital signage within the elevator, we propose an IoT system as a set-top box with gyroscope sensor, acceleration sensor, RFID(Radio-Frequency Identification), fine dust sensor, etc., which processes various data collected by the sensors and provides the elevator passengers with various tailored contents such as elevator driving information, environmental information inside and outside the elevator, and disaster information in addition to simple advertisement information. The proposed IoT system is a set-top box that operates the smart digital signage and has an independent information control processor based on the IoT sensors that do not depend on the elevator control system. For the proposed smart digital signage, it supports an operating system that is independent of the elevator driving service as well as the media service. So the smart signage system has a characteristic that it does not depend on the elevator control system since it is a stand-along IoT-based information control system. With the proposed system providing intuitive content for the surge, steep descent, and radical movements of an elevator due to an emergency situation, the elevator passengers should be able to recognize the situation quickly and respond accordingly. In the near future, the proposed system will expand the market of digital signage applied in conjunction with the development of contents in the disaster, safety and environment fields, and expect expected to revitalize related industries associated with signage.

Security Threats and Attacks in Internet of Things (IOTs)

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.107-118
    • /
    • 2021
  • The term Internet of Things (IoTs) refers to the future where things are known daily through the Internet, whether in one way or another, as it is done by the method of collecting various information from various sensors to form a huge network through which people, things and machines are helped to make a link between them at all time and anywhere. The IoTs is everywhere around us such as connected appliances, smart homes security systems and wearable health monitors. However, the question is what if there is a malfunction or outside interference that affects the work of these IoTs based devises? This is the reason of the spread of security causes great concern with the widespread availability of the Internet and Internet devices that are subject to many attacks. Since there aren't many studies that combines requirements, mechanisms, and the attacks of the IoTs, this paper which explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality Additionally, the paper addresses the different types of attacks in IoTs. We have also addressed the different approaches aim to prevention mechanisms according to several researchers' conclusions and recommendations.

Network Security Protocol Performance Analysis in IoT Environment (IoT 환경에서의 네트워크 보안 프로토콜 성능 분석)

  • Kang, Dong-hee;Lim, Jae-Deok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.955-963
    • /
    • 2022
  • The Internet of Things (IoT), combined with various technologies, is rapidly becoming an integral part of our daily life. While it is rapidly taking root in society, security considerations are relatively insufficient, making it a major target for cyber attacks. Since all devices in the IoT environment are connected to the Internet and are closely used in daily life, the damage caused by cyber attacks is also serious. Therefore, encryption communication using a network security protocol must be considered for a service in a more secure IoT environment. A representative network security protocol includes TLS (Transport Layer Protocol) defined by the IETF. This paper analyzes the performance measurement results for TLS version 1.2 and version 1.3 in an IoT device open platform environment to predict the load of TLS, a representative network security protocol, in IoT devices with limited resource characteristics. In addition, by analyzing the performance of each major cryptographic algorithm in version 1.3, we intend to present a standard for setting appropriate network security protocol properties according to IoT device specifications.

An Analysis of Research Trends in IoT Security (IoT 보안에 대한 국내외 연구 동향 분석)

  • Yu, Woo Young
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.61-67
    • /
    • 2018
  • IoT technology is currently being applied at various industrial sites and is developing as a core technology in the fourth industrial revolution. Along with IoT developments, awareness and importance of IoT security is increasing, and research on IoT security is underway to counter these threats. However, research trends in the context of IoT security awareness are insufficient. This paper is a research that analyzes the progress of R&D and IoT security in both domestic and international IoT and thus leads to improvements. The research covered the 229 papers and articles of domestic and foreign journals covering security fields as a main theme. Among them, detailed analyses of 96 papers related to IoT security were performed. Research has shown that many studies are being conducted on trends in IoT security, key management and privacy. A detailed study on the characteristics of services to apply IoT technologies and access control and authentication between IoT devices is needed, and a study that addressed the issues of privacy in IoT environments in Korea.

  • PDF

Exploring Opportunities of IoT for Product-Service System Conceptualization and Implementation

  • Mohammad R. Basirati;Jorg Weking;Sebastian Hermes;Markus Bohm;Helmut Krcmar
    • Asia pacific journal of information systems
    • /
    • v.29 no.3
    • /
    • pp.524-546
    • /
    • 2019
  • Product-service systems (PSS), integrating physical products and services, currently play a crucial role in sustainable economies. In addition to the highly competitive global economy, the emergence of new digital paradigms is supporting the shift toward servitization. Although the great potential of such paradigms is recognized by both practice and research, their implications for PSS are not yet clear. In particular, features of Internet of Things (IoT), such as total connectedness and ubiquity of smart sensors and actuators, provide various new opportunities for PSS. This study explores such opportunities by conducting structured literature review and 13 interviews. We organize the findings in two folds: First, we introduce four degrees of IoT involvement in PSS business models and elaborate the opportunities that they create for different types of PSS. Second, we present the key technologies and approaches that IoT provides concerning PSS lifecycle management.