• Title/Summary/Keyword: IoT

Search Result 4,304, Processing Time 0.028 seconds

An IoT Tag and Social Message-based Device Control System (IoT 태그 및 소셜 메시지 기반 사물 제어 시스템)

  • Baek, Seung Min;Jin, Yeon Ju;Ha, Kwon Woo;Han, Sang Wook;Jeong, Jin-Woo
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.550-556
    • /
    • 2017
  • Due to the rapid growth and development of Internet of Things (IoT), various devices are now accessible and controllable anytime from anywhere. However, the current IoT system requires a series of complex steps (e.g., launch an application, choose a space and thing, control the thing, etc.) to control the IoT devices; therefore, IoT suffers from a lack of efficient and intuitive methods of interacting with users. To address this problem, we propose a novel IoT control framework based on IoT tags and social messages. The proposed system provides an intuitive and efficient way to control the device based on the device ownership: 1) users can easily control the device by IoT tagging, or 2) users can send an IoT social message to the device owner to request control of the tagged device. Through the development of the prototype system, we show that the proposed system provides an efficient and intuitive way to control devices in the IoT environment.

A Method for Dynamic Clustering-based Efficient Management in Large-Scale IoT Environment (대규모 IoT 컴퓨팅 환경에서 동적 클러스터링 기반 효율적 관리 기법)

  • Kim, Dae Young;La, Hyun Jung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.85-97
    • /
    • 2014
  • IoT devices that collect information for end users and provide various services like giving traffic or weather information to them that are located everywhere aim to raise quality of life. Currently, the number of devices has dramatically increased so that there are many companies and laboratories for developing various IoT devices in the world. However, research about IoT computing such as connecting IoT devices or management is at an early stage. A server node that manages lots of IoT device in IoT computing environment is certainly needed. But, it is difficult to manage lots of devices efficiently. However, anyone cannot surly know about how many servers are needed or where they are located in the environment. In this paper, we suggest a method that is a way to dynamic clustering IoT computing environment by logical distance among devices. With our proposed method, we can ensure to manage the quality in large-scale IoT environment efficiently.

An IoT Information Security Model for Securing Bigdata Information for IoT Users (IoT 사용자의 빅데이터 정보를 안전하게 보호하기 위한 IoT 정보 보안 모델)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.8-14
    • /
    • 2019
  • Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.

Blockchain-Based IoT Device Authentication Scheme (블록체인 기반 IoT 디바이스 인증 스킴)

  • Park, Byeong-ju;Lee, Tae-jin;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.343-351
    • /
    • 2017
  • With ICT technology develops, IoT environment is attracting attention. However, IoT devices have various CPU performance as much as various purpose of use. Some IoT devices use the cpu that doesn't support public key cryptogrphy or crypto acceleration. In this paper, we study Blockchain-based IoT Device Authentication Scheme that provides authentication, integirity and non-repudation through analysis of Lamport Hash-chain, Lamport Signature, Blockchain and existing Authentication protocols. The proposed scheme requires only simple hash operation in IoT devices and it can operate in low performance IoT device, thus ensuring secure authentication in IoT environment.

A Study on the Design of a Test Item Framework for Securing Reliability of Laundry Home Appliances Using IoT Functions (IoT 기능을 적용한 세탁 가전제품의 신뢰성 확보를 위한 시험항목 프레임워크 설계에 관한 연구)

  • Cho, Kyoung-Rok;Park, Woo Jung;Lee, Eun-Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.2
    • /
    • pp.67-80
    • /
    • 2022
  • Recently, many laundry home appliances have been released with Internet of Things (IoT) functions, but there are few quality evaluation tests for IoT functions. In particular, since IoT test items are not prepared for laundry home appliances applied with IoT functions, it is difficult to find the cause even if defects occur, and test institutions are limited in selecting test items related to IoT and conducting proper performance tests. In this paper, we design a test item framework that separates IoT test items into commonality and variability to identify product defects and causes for laundry home appliances with IoT features among products in the field of home appliances. Through the proposed research, manufacturers and test institutions can test the proper performance of laundry products with IoT functions, which can improve the completeness of the products and ensure reliability.

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

Different Heterogeneous IoT Data Management Techniques for IoT Cloud Environments (IoT 클라우드 환경을 위한 서로 다른 이기종의 IoT 데이터 관리 기법)

  • Cho, Sung-Nam;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.15-21
    • /
    • 2020
  • Although IoT systems are used in a variety of heterogeneous environments as cloud environments develop, all IoT devices are not provided with reliable protocols and services. This paper proposes an IoT data management technique that can extend the IoT cloud environment to an n-layer multi-level structure so that information collected from different heterogeneous IoT devices can be efficiently sorted and processed. The proposed technique aims to classify and process IoT information by transmitting routing information and weight information through wireless data link data collected from heterogeneous IoT devices. The proposed technique not only delivers information classified from IoT devices to the corresponding routing path but also improves the efficiency of IoT data processing by assigning priority according to weight information. The IoT devices used in the proposed technique use each other's reliable protocols, and queries for other IoT devices locally through a local cloud composed of hierarchical structures have features that ensure scalability because they maintain a certain cost.y channels of IoT information in order to make the most of the multiple antenna technology.

Efficient IoT data processing techniques based on deep learning for Edge Network Environments (에지 네트워크 환경을 위한 딥 러닝 기반의 효율적인 IoT 데이터 처리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.325-331
    • /
    • 2022
  • As IoT devices are used in various ways in an edge network environment, multiple studies are being conducted that utilizes the information collected from IoT devices in various applications. However, it is not easy to apply accurate IoT data immediately as IoT data collected according to network environment (interference, interference, etc.) are frequently missed or error occurs. In order to minimize mistakes in IoT data collected in an edge network environment, this paper proposes a management technique that ensures the reliability of IoT data by randomly generating signature values of IoT data and allocating only Security Information (SI) values to IoT data in bit form. The proposed technique binds IoT data into a blockchain by applying multiple hash chains to asymmetrically link and process data collected from IoT devices. In this case, the blockchainized IoT data uses a probability function to which a weight is applied according to a correlation index based on deep learning. In addition, the proposed technique can expand and operate grouped IoT data into an n-layer structure to lower the integrity and processing cost of IoT data.

Dynamic Mediation Methods for Resolving Mismatch Problems between IoT Context Exchange Schemes (IoT 컨텍스트 교환 방식 불일치의 동적 중재 기법)

  • Lee, Jae Yoo;La, Hyun Jung;Kim, Soo Dong
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.12
    • /
    • pp.756-761
    • /
    • 2015
  • With the emergence of the Internet-of-Things (IoT) paradigm, there is a growing demand for personalized services using IoT contexts acquired from heterogeneous IoT devices. However, due to the mismatch between IoT context exchange schemes of context-aware services and IoT devices, IoT applications can acquire IoT contexts only from IoT devices that support the same IoT context exchange schemes. In this paper, we propose dynamic methods to mediate those mismatches on the IoT context exchange schemes. With the proposed mediation methods, context-aware services can collect IoT contexts from heterogeneous IoT devices without considering their IoT context exchange schemes.

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.