• Title/Summary/Keyword: IoT

Search Result 4,303, Processing Time 0.033 seconds

A Survey of the Self-Adaptive IoT Systems and a Compare and Analyze of IoT Using Self-Adaptive Concept (자가적응형 IoT 시스템 개발 동향과 자가적응형 개념을 활용한 IoT 비교분석)

  • Hwang, Seyoung;Seo, Jangill;Park, Sungjun;Park, Sangwon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.1
    • /
    • pp.17-26
    • /
    • 2016
  • IoT means things space networks that form the intelligent relationship such as sensing, networking, information processing about human being, things and service without explicit mutual cooperation of human being. Lately many IoT groups such as AllSeen Alliance, OIC launched a platform for IoT. Self-adaptive is aimed at implementation without the need for decisions of human being during the operation, so that the machine can respond to changes in its own determination. There is a need to apply the concept of self-adaptive to existing IoT and IoT platform. So In this paper, We look for trends of existing IoT, IoT platform and comparisons by applying a self-adaptive concept to IoT, IoT platform. In addition as an example of this paper, we suggest lacking self-adaptive elements to OIC.

Application Scenario of Integrated Development Environment for Autonomous IoT Applications based on Neuromorphic Architecture (뉴로모픽 아키텍처 기반 자율형 IoT 응용 통합개발환경 응용 시나리오)

  • Park, Jisu;Kim, Seoyeon;Kim, Hoinam;Jeong, Jaehyeok;Kim, Kyeongsoo;Jung, Jinman;Yun, Young-Sun
    • Smart Media Journal
    • /
    • v.11 no.2
    • /
    • pp.63-69
    • /
    • 2022
  • As the use of various IoT devices increases, the importance of IoT platforms is also rising. Recently, artificial intelligence technology is being combined with IoT devices, and research applying a neuromorphic architecture to IoT devices with low power is also increasing. In this paper, an application scenario is proposed based on NA-IDE (Neuromorphic Architecture-based autonomous IoT application integrated development environment) with IoT devices and FPGA devices in a GUI format. The proposed scenario connects a camera module to an IoT device, collects MNIST dataset images online, recognizes the collected images through a neuromorphic board, and displays the recognition results through a device module connected to other IoT devices. If the neuromorphic architecture is applied to many IoT devices and used for various application services, the autonomous IoT application integrated development environment based on the neuromorphic architecture is expected to emerge as a core technology leading the 4th industrial revolution.

Design Method of Things Malware Detection System(TMDS) (소규모 네트워크의 IoT 보안을 위한 저비용 악성코드 탐지 시스템 설계 방안 연구)

  • Sangyoon Shin;Dahee Lee;Sangjin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.459-469
    • /
    • 2023
  • The number of IoT devices is explosively increasing due to the development of embedded equipment and computer networks. As a result, cyber threats to IoT are increasing, and currently, malicious codes are being distributed and infected to IoT devices and exploited for DDoS. Currently, IoT devices that are the target of such an attack have various installation environments and have limited resources. In addition, IoT devices have a characteristic that once set up, the owner does not care about management. Because of this, IoT devices are becoming a blind spot for management that is easily infected with malicious codes. Because of these difficulties, the threat of malicious codes always exists in IoT devices, and when they are infected, responses are not properly made. In this paper, we will design an malware detection system for IoT in consideration of the characteristics of the IoT environment and present detection rules suitable for use in the system. Using this system, it will be possible to construct an IoT malware detection system inexpensively and efficiently without changing the structure of IoT devices that are already installed and exposed to cyber threats.

IoT data trust techniques based on auto-encoder through IoT-linked processing (오토인코더 기반의 IoT 연계 처리를 통한 IoT 데이터 신뢰 기법)

  • Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.351-357
    • /
    • 2021
  • IoT devices, which are used in various ways in distributed environments, are becoming more important in data transmitted and received from IoT devices as fields of use such as medical, environment, transportation, bio, and public places are diversified. In this paper, as a method to ensure the reliability of IoT data, an autoencoder-based IoT-linked processing technique is proposed to classify and process numerous data by various important attributes. The proposed technique uses correlation indices for each IoT data so that IoT data is grouped and processed by blockchain by characteristics for IoT linkage processing based on autoencoder. The proposed technique expands and operates into a blockchain-based n-layer structure applied to the correlation index to ensure the reliability of IoT data. In addition, the proposed technique can not only select IoT data by applying weights to IoT collection data according to the correlation index of IoT data, but also reduce the cost of verifying the integrity of IoT data in real time. The proposed technique maintains the processing cost of IoT data so that IoT data can be expanded to an n-layer structure.

IoT data processing techniques based on machine learning optimized for AIoT environments (AIoT 환경에 최적화된 머신러닝 기반의 IoT 데이터 처리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Industrial Convergence
    • /
    • v.20 no.3
    • /
    • pp.33-40
    • /
    • 2022
  • Recently, IoT-linked services have been used in various environments, and IoT and artificial intelligence technologies are being fused. However, since technologies that process IoT data stably are not fully supported, research is needed for this. In this paper, we propose a processing technique that can optimize IoT data after generating embedded vectors based on machine learning for IoT data. In the proposed technique, for processing efficiency, embedded vectorization is performed based on QR such as index of IoT data, collection location (binary values of X and Y axis coordinates), group index, type, and type. In addition, data generated by various IoT devices are integrated and managed so that load balancing can be performed in the IoT data collection process to asymmetrically link IoT data. The proposed technique processes IoT data to be orthogonalized based on hash so that IoT data can be asymmetrically grouped. In addition, interference between IoT data may be minimized because it is periodically generated and grouped according to IoT data types and characteristics. Future research plans to compare and evaluate proposed techniques in various environments that provide IoT services.

IoT Roaming Service for Seamless IoT Service (무중단 IoT 서비스 제공을 위한 IoT 로밍서비스)

  • Ahn, Junguk;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.10
    • /
    • pp.1258-1269
    • /
    • 2020
  • The IoT(Internet of Things) service provides users with valuable services by collecting and analyzing data using Internet-connected IoT devices. Currently, IoT service platforms are accomplished by using edge computing to reduce the delay time required to collect data from IoT devices. However, if a user moves to another network with IoT device, the connection will be lost and IoT service will be suspended. To solve this problem, we proposes a service that automatically roaming IoT service when IoT device makes move. IoT roaming service provides a device automatic tracking management technique designed to continue receiving IoT services even if users move to other networks. To check if the proposed roaming service was effective, we implemented IoT roaming service and measured the data transfer time while move between networks along with devices while using IoT service. As a result, the average data transfer time was 124.62ms, and the average service interrupt time was 812.12ms. with this result, we can assume that the user could feel service interruption time very shortly and it will not affect the service experience. with IoT roaming service, we expect that it will present a method that stably providing IoT services even if user moves networks.

A Privacy Approach Model for Multi-Access to IoT Users based on Society 5.0 (소사이어티 5.0 기반 IoT 사용자에 대한 다중 접근방식의 프라이버시 접근 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.4
    • /
    • pp.18-24
    • /
    • 2020
  • Recently, research on Society 5.0 has been actively carried out in Japan. The Society 5.0 is used in various areas using IoT sensors. This paper proposes a privacy approach model of multiple approaches to IoT users based on Society 5.0. The proposed model used multiple methods of synchronizing important information of IoT devices with one another in the virtual environment. The proposed model improved the efficiency of IoT information by accumulating the weight of IoT information on a probability-based basis. Further, it improves the accuracy of IoT information by segmenting it so that attribute information is linked to IoT information. As a result of the performance evaluation, the efficiency of IoT devices has improved by an average of 5.6 percent, depending on the number of IoT devices and the number of IoT hub devices. Accuracy has improved by an average of 15.9% depending on information collection and processing.

A Generic Interface for Internet of Things (IoT) Platforms (IoT 플랫폼을 위한 범용 인터페이스)

  • Kim, Mi;Lee, Nam-Yong;Par, Jin-Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.1
    • /
    • pp.19-24
    • /
    • 2018
  • This paper presents an IoT platform of common interfaces that are flexible IoT applications and Connect the smart devices. The IoT platform includes automatic collaboration discovery the smart Device. It is different things case with connection each device through IoT Platforms are each device and application service. Due to these heterogeneities, it is quite advantages to develop applications working with derived IoT services. This circumstance needs the generic interface and results in a range of IoT architectures by not only the environments settings and discovery resource but also varied uniqe to implementation services working with IoT applications. Therefore, this suggestion of solve the problems and make it possible independent platforms always alive to connection with each devices based on the generic interface. The generic interface is heterogeneity-driven solve the problems and effectively contributions a platform that could be operated in diverse IoT Platforms.

Practical Methods for Managing Faults in IoT Computing (IoT 컴퓨팅의 실용적 결함 관리 기법)

  • Park, Chun Woo;Kim, Soo Dong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.75-86
    • /
    • 2015
  • Internet of Thing (IoT) computing is an environment where various devices with sensors and actuators are connect, and interact together to acquire contexts and provide useful services. With the advances of IoT technologies, its usability becomes an in important issue. However, there exist various types of faults in IoT computing which are not conventionally addressed in software research community. Providing reliable IoT services is challenging. In this paper, we present a hierarchy of IoT faults and analyze causes and symptoms of the faults. Based on the analysis, we define effective methods for managing IoT faults. We believe that our proposed framework for managing IoT faults can be utilized in reducing the development cost of IoT applications and enhancing the quality of the applications.

A IoT Security Service based on Authentication and Lightweight Cryptography Algorithm (인증 및 경량화 암호알고리즘 기반 IoT 보안 서비스)

  • Kim, Sun-Jib
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.1-7
    • /
    • 2021
  • The IoT market continues to expand and grow, but the security threat to IoT devices is also increasing. However, it is difficult to apply the security technology applied to the existing system to IoT devices that have a problem of resource limitation. Therefore, in this paper, we present a service that can improve the security of IoT devices by presenting authentication and lightweight cryptographic algorithms that can reduce the overhead of applying security features, taking into account the nature of resource limitations of IoT devices. We want to apply these service to home network IoT equipment to provide security. The authentication and lightweight cryptographic algorithm application protocols presented in this paper have secured the safety of the service through the use of LEA encryption algorithms and secret key generation by users, IoT devices and server in the IoT environment. Although there is no difference in speed from randomly generating secret keys in experiments, we verify that the problem of resource limitation of IoT devices can be solved by additionally not applying logic for secret key sharing to IoT devices.