• Title/Summary/Keyword: IoT서비스

Search Result 1,179, Processing Time 0.029 seconds

Secure Multiplication Method against Side Channel Attack on ARM Cortex-M3 (ARM Cortex-M3 상에서 부채널 공격에 강인한 곱셈 연산 구현)

  • Seo, Hwajeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.943-949
    • /
    • 2017
  • Cryptography implementation over lightweight Internet of Things (IoT) device needs to provide an accurate and fast execution for high service availability. However, adversaries can extract the secret information from the lightweight device by analyzing the unique features of computation in the device. In particular, modern ARM Cortex-M3 processors perform the multiplication in different execution timings when the input values are varied. In this paper, we analyze previous multiplication methods over ARM Cortex-M3 and provide optimized techniques to accelerate the performance. The proposed method successfully accelerates the performance by up-to 28.4% than previous works.

Design of Mixed Integer Linear Programming Model for Transportation Planning (혼합 정수 선형 계획법을 이용한 수송 계획 모델 설계)

  • Park, Yong Kuk;Lee, Min Goo;Jung, Kyung Kwon;Won, Young-Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.11
    • /
    • pp.166-174
    • /
    • 2016
  • In this paper, we developed a mixed-integer linear programming model for transportation planning of athletes in sports events. The transportation planning of athletes involves finding the lowest-cost and fastest-time plan for distributing athletes from multiple accommodation to stadium. The decision variables associate with the number of driving events, and the total transportation cost is the objective function that needs to be minimized. The proposed method uses mixed integer linear programming to solve transportation problem, thus the global optimality is guaranteed. In order to verify the effectiveness of proposed method, we performed simulation and built the sports event management service platform (SEMSP) for transportation planning.

Hedonic Model Study for Retargeting Advertising Based Air Inteface (공간 중심의 사물정보통신 기반 리타게팅광고를 위한 헤도닉모델 연구)

  • Kim, Bo-Ram;Yoon, Yong-Ik
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.3
    • /
    • pp.100-103
    • /
    • 2016
  • This Study is focused on hedonic model study for retargeting advertising Based air inteface using useful information. many research related to the existing Internet of things, relatively not many study for effective advertising model based air inteface. So, this study is designed more information, fun, interactive advertising model based air inteface. therefore, result of this study show that implication to produce advertising based air inteface provides a practical guide.

A Study on the On-Board Interface for Smartphones (스마트폰을 위한 OBD2 인터페이스 제공 방안)

  • Hong, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.410-411
    • /
    • 2018
  • In this paper, In this paper, Smart OBD2 terminal collects OBD2 Data on the vehicle. And it passes through this with SmartPhone Bluetooth. OBD2 system is the system to use a variety of Service using it in SmartPhone. Utilizing NFC to help ordinary people, it can easily use to configure the Bluetooth Pairing. By using the Bluetooth 4.0, it is maximized compatibility of Bluetooth. Furthermore OBD2 terminal is a system to minimize the standby power of the terminal to prevent the discharge of the vehicle up issues. Anyone can develop an OBD2 connection App by providing the interfaces to make DB to develop and understand ODB2 data.

  • PDF

Design and Implementation of Lightweight Encryption Algorithm on OpenSSL (OpenSSL 상에서 LEA 설계 및 구현)

  • Park, Gi-Tae;Han, Hyo-Joon;Lee, Jae-Hwoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.822-830
    • /
    • 2014
  • Recently, A Security service in Internet environments has been more important and the use of SSL & TLS is increasing for the personel homepage as well as administrative institutions. Also, IETF suggests using DTLS, which can provide a security service to constrained devices with lower CPU power and limited memory space under IoT environments. In this paper, we implement LEA(Lightweight Encryption Algorithm) algorithm and apply it to OpenSSL. The implemented algorithm is compared with other symmetric encryption algorithms such as AES etc, and it shows the superior performance in calculation speed.

User Identification Method based on Sonic Communication (소닉 커뮤니케이션 기반 사용자 식별 방법 연구)

  • Lim, Yoon-gyu;Seo, Jaehak;Kim, Daecheon;Park, Yechan;Yeom, Sanggil;Choo, Hyunseung
    • Annual Conference of KIPS
    • /
    • 2016.10a
    • /
    • pp.501-502
    • /
    • 2016
  • 최근 스마트기기 사용량이 증가함에 따라 NFC나 Bluetooth 등 다양한 근거리 통신 서비스가 제공되고있다. 그러나 이들 통신방식은 별도의 통신 모듈을 필요로 하는 단점이 있다. 이러한 단점을 해결하기 위해 비가청주파수 대역을 이용한 통신이 연구되고 있다. 비가청주파수 대역은 18kHz~22kHz 사이의 사람에게 들리지 않는 주파수 대역으로 마이크와 스피커만 있으면 비가청주파수 통신이 가능하다. 기존 연구는 특정 사용자를 식별하여 데이터를 보안상 안전하게 전송하는 방식이 없다. 본 논문에서는 통신에 사용되는 두 기기가 본 논문에서 제안한 공유키를 활용하여 3단계의 과정을 거쳐 사용자를 식별하는 방법을 제안한다. 또한 식별 과정에서 만들어진 값은 메시지를 암호화하는데 사용되어 보안을 강화한다. 이 식별 방법은 비가청주파수 통신을 IoT 등 다양한 분야에 활용하는데 사용할 수 있다.

3.5 GHz대역 주파수 공동사용 정책 및 기술추진 동향

  • Choe, Ju-Pyeong;Lee, Won-Cheol
    • Information and Communications Magazine
    • /
    • v.32 no.11
    • /
    • pp.41-49
    • /
    • 2015
  • 현대 사회는 스마트폰 사용량의 급증으로 인한 모바일 트래픽의 폭발적인 증가와 IoT(Internet of Things)를 비롯한 융복합 유무선 서비스의 확대 등으로 국가적으로 한정적 자원인 주파수의 효율적 사용을 인한 대책 마련이 시급한 실정이다. 이에 미국 및 유럽을 중심으로 다양한 용도의 무선기기들이 한정적 주파수 대역을 효율적으로 이용하기 위한 방안으로 주파수 공동사용에 대한 정책도입 및 연구개발이 지속적으로 추진되고 있다. 본 고에서는 수요 대비 공급 부족 현상이 점차 심각해 지고 있는 한정적 주파수 자원의 효율적 이용을 위한 대안으로 급부상하고 있는 주파수 공동사용 기술에 대한 국내외 관련 정책 및 기술추진 현황에 대해 소개하고자 한다. 특히 본 고에서는 2010년 국가광대역계획(NBP, National Broadband Plan) 발표를 시작으로 전 세계적으로 주파수 공동사용 추진에 있어 가장 적극적인 행보를 보여주고 있는 미국에서의 3.5GHz 대역 주파수 공동사용을 위한 전파규칙인 CFR(Code of Federal Regulation) Part 96의 주요 내용을 자세히 소개하고자 한다. 본 고의 II장에서는 국내외에서 진행되고 있는 대표적인 주파수 공동사용 정책추진 현황에 대해 소개하였으며, III장에서는 올해 4월 최종 전파규칙이 발표된 미국의 SAS(Spectrum Access System) 기반 주파수 공동사용 전파규칙에 대해 소개하였다. 또한 IV장에서는 SAS 기반의 주파수 공동사용 기법 및 기존에 개발되고 있는 다양한 동적 스펙트럼 접속 기법들을 미국 내 주요 도심지역에 적용하기 위한 대규모 테스트베드 프로그램인'Model City'프로그램 소개 및 결론을 통하여 주파수 공동사용 도입의 당위성을 설명하고자 한다.

Proliferation of Smart Agriculture through Advanced ICT Technology (ICT 기술 고도화를 통한 스마트농업 확산)

  • Kim, Joo-Man;Chung, Wonho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.117-122
    • /
    • 2018
  • This paper suggests smart agricultural diffusion strategy through advanced ICT technology. Today, the world is threatened by environmental pollution and traditional warming due to global warming, and the decrease in agricultural workers due to low fertility and aging is expected to bring social problems to future food resources. The convergence of ICT technology and agriculture is not a labor-intensive primary industry, but a new paradigm that includes cultivation, manufacturing and services. It is urgent to spread smart farm technology that can supply stable food with low labor force. In this paper, we review the current state of smart farm technology, analyze the impediments to diffusion, and present the direction of smart agricultural development in the future by upgrading ICT technology.

Analysis on the Security threat factors of the Internet of Things (사물 인터넷의 보안 위협 요인들에 대한 분석)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.47-53
    • /
    • 2015
  • Recently, the Internet of Things is an important technology with a Cloud computing services and a Big data in the IT fields. and The Internet of Things is widely used in various industries. This trend may be referred to as the emergence of significant based technologies for realizing a ubiquitous times. But the security problems of Internet of things are expected to increase with being realized in a variety of industries. and it will be have to provide a corresponding technology to the security threat for this. Therefore, this paper will be analyzed to the security threats of the Internet of Things by the cases. Thereby this is expected to be utilized as a basis for the countermeasure of Internet of Things in a future.

A Case Study of the Impact of a Cybersecurity Breach on a Smart Grid Based on an AMI Attack Scenario (AMI 공격 시나리오에 기반한 스마트그리드 보안피해비용 산정 사례)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.809-820
    • /
    • 2016
  • The smart grid, a new open platform, is a core application for facilitating a creative economy in the era of the Internet of Things (IoT). Advanced Metering Infrastructure (AMI) is one of the components of the smart grid and a two-way communications infrastructure between the main utility operator and customer. The smart meter records consumption of electrical energy and communicates that information back to the utility for monitoring and billing. This paper investigates the impact of a cybersecurity attack on the smart meter. We analyze the cost to the smart grid in the case of a smart meter attack by authorized users based on a high risk scenario from NESCOR. Our findings could be used by policy makers and utility operators to create investment decision-making models for smart grid security.