• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,917, Processing Time 0.032 seconds

A Study on the Internet of Things (IoT) Lab Education based on LoRa Communication (LoRa 통신 기반 사물인터넷(IoT) 실습 교육에 관한 연구)

  • Han-jong Kim
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.549-555
    • /
    • 2023
  • The representative technology of the WWAN wireless communication network used in the Internet of Things is LoRa communication technology, and LoRa communication uses the ISM band. The 920 MHz (920.9 MHz~923.3 MHz) band frequency, which is used as a domestic LoRa frequency, had a problem in performing LoRa network practice in the curriculum using a commercially available LoRa modules that have been used in Europe and the United States because of different frequency band, but a RYLR896 LoRa module was developed that allowed RF frequency to be programmed. With this module, this paper confirmed that the frequency can be set at a specified frequency in Korea using AT commands. In addition, using these RYLR896 LoRa modules, a LoRa network consisting of end nodes and gateways was constructed and practiced to confirm that development equipment capable of practicing the RYLR896 LoRa module and IoT was operating normally.

Memory-Efficient Implementation of Ultra-Lightweight Block Cipher Algorithm CHAM on Low-End 8-Bit AVR Processors (저사양 8-bit AVR 프로세서 상에서의 초경량 블록 암호 알고리즘 CHAM 메모리 최적화 구현)

  • Seo, Hwajeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.545-550
    • /
    • 2018
  • Ultra-lightweight block cipher CHAM, consisting of simple addition, rotation, and eXclusive-or operations, enables the efficient implementations over both low-end and high-end Internet of Things (IoT) platforms. In particular, the CHAM block cipher targets the enhanced computational performance for the low-end IoT platforms. In this paper, we introduce the efficient implementation techniques to minimize the memory consumption and optimize the execution timing over 8-bit AVR IoT platforms. To achieve the higher performance, we exploit the partly iterated expression and arrange the memory alignment. Furthermore, we exploit the optimal number of register and data update. Finally, we achieve the high RANK parameters including 29.9, 18.0, and 13.4 for CHAM 64/128, 128/128, and 128/256, respectively. These are the best implementation results in existing block ciphers.

A Design of Industrial Safety Service using LoRa Gateway Networks (LoRa 게이트웨이 네트워크를 활용한 산업안전서비스 설계)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.313-316
    • /
    • 2021
  • In the IoT(IoT: Internet of Things) environment, network configuration is essential to collect data generated from objects. Various communication methods are used to process data of objects, and wireless communication methods such as Bluetooth and WiFi are mainly used. In order to collect data of objects, a communication module must be installed to collect data generated from sensors or edge devices in real time. And in order to deliver data to the database, a software architecture must be configured. Data generated from objects can be stored and managed in a database in real time, and data necessary for industrial safety can be extracted and utilized for industrial safety service applications. In this paper, a network environment was constructed using a LoRa(LoRa: Long Range) gateway to collect object data, and a client/server data collection model was designed to collect object data transmitted from the LoRa module. In order to secure the resources necessary for data collection and storage management without data leakage, data collection should be possible in real time. As an application service, location data required for industrial safety can be stored and managed in a database in real time.

  • PDF

A Study on Security Threats and Countermeasures in Smart Farm Environments (스마트 팜 환경에서 보안 위협 및 대응 방안에 관한 연구)

  • Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.53-58
    • /
    • 2024
  • IoT, Big-data, AI, and Cloud technologies, which are core technologies of the 4th Industrial Revolution, have recently been applied to various fields and are being used as core technologies for new growth engines. Accordingly, these core technologies are applied to the agricultural field without exception, contributing to solving the problem of labor shortage, reducing production costs, and reducing environmental burden through remote and automated production without time and space constraints. However, as these core technologies are utilized, security incidents are occurring in the agricultural field as well. Accordingly, this study divides smart farms into three stages(Basic, Middle, and High) and presents the characteristics and security threats of each stage. In particular, as the number of container-based services and research increases under cloud platforms, we would like to suggest countermeasures focusing on security threats.

Smart Parking System Using Ultrasonic Sensor and Bluetooth Communication in Internet of Things (사물인터넷에서 초음파 센서와 블루투스 통신을 이용한 스마트 주차 시스템)

  • Lee, Chungsan;Han, Youngtak;Jeon, Soobin;Seo, Dongmahn;Jung, Inbum
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.6
    • /
    • pp.268-277
    • /
    • 2016
  • IoT (Internet of Things) technologies have largely contributed to our smart living environment. The smart parking system is one of the prominent services that IoT supports. To identify the parked vehicles, the previous parking system use special identifying devices, the RFID tags carried by the users, and the high quality camera to recognize the vehicle license numbers. However, the previous methods cause cost inefficiency and unfriendly usages. To address these problems, we propose a smart parking system based on ultrasonic sensors and Bluetooth communication. The proposed system decides the available slots by using the sensor motes located in the parking spaces. Also it recognizes the location of the parked vehicle using Bluetooth RSSI between a Smartphone and the sensor motes. In addition, based on these converging technologies, it can support the parked routes of vehicles for users. To evaluate the implemented smart parking system, we applied the RSSI transform equations and the recognition rate for parked vehicles. As a result, the accurate rate of transformed distances could be measured.

A Combined Random Scalar Multiplication Algorithm Resistant to Power Analysis on Elliptic Curves (전력분석 공격에 대응하는 타원곡선 상의 결합 난수 스칼라 곱셈 알고리즘)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.25-29
    • /
    • 2020
  • The elliptic curve crypto-algorithm is widely used in authentication for IoT environment, since it has small key size and low communication overhead compare to the RSA public key algorithm. If the scalar multiplication, a core operation of the elliptic curve crypto-algorithm, is not implemented securely, attackers can find the secret key to use simple power analysis or differential power analysis. In this paper, an elliptic curve scalar multiplication algorithm using a randomized scalar and an elliptic curve point blinding is suggested. It is resistant to power analysis but does not significantly reduce efficiency. Given a random r and an elliptic curve random point R, the elliptic scalar multiplication kP = u(P+R)-vR is calculated by using the regular variant Shamir's double ladder algorithm, where l+20-bit u≡rn+k(modn) and v≡rn-k(modn) using 2lP=∓cP for the case of the order n=2l±c.

Architecture Design for Disaster Prediction of Urban Railway and Warning System (UR-DPWS) based on IoT (IoT 기반 도시철도 재난 예지 및 경보 시스템 아키텍처 설계)

  • Eung-young Cho;Joong-Yoon Lee;Joo-Yeoun Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.163-174
    • /
    • 2024
  • Currently, the urban railway operating agency is improving the emergency telephone in operation into an IP-based "trackside integrated interface communication facility" that can support a variety of additional services in order to quickly respond to emergency situations within the tunnel. This study is based on this Analyze the needs of various stakeholders regarding the design of a system architecture that establishes an IoT sensor network environment to detect abnormal situations in the tunnel and transmits the collected information to the control center to predict disaster situations in advance, and defines the system requirements. In addition, a scenario model for disaster response was provided through the presentation of a service model. Through this, the perspective of responding to urban railway disasters changes from reactive response to proactive prevention, thereby ensuring safe operation of urban railways and preventing major industrial accidents.

Development of System for Drunk Driving Prevention using Big Data in IoT environment (IoT 환경에서 빅데이터를 활용한 음주 운전 방지 시스템 개발)

  • Shin, Dong-Jin;Hwang, Seung-Yeon;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.69-74
    • /
    • 2022
  • Even after the drunk driving law was revised through the Yoon Chang-ho Act in 2019, the proportion of habitual offenders among all drunk drivers in 2021 was 4.7%, up 0.5% from 2018. In addition, drunk driving is not easily stopped due to the addiction of alcohol, and there is a high probability of recidivism in accidents as it is often driven again. Therefore, in this paper, to prevent this, when alcohol is measured using its own sensor rather than a manual police measure, the vehicle stops and related data such as the current location and time are automatically saved. Since it is not possible to develop directly on the car, this system was developed by converging various technologies and sensors such as Arduino board, Firebase, and GPS based on the IoT environment in consideration of the simulation environment.

Design and Implementation of Walking Activity Prediction Service for Exercise Motive (운동 동기 부여를 위한 걷기 활동량 예측 서비스 설계 및 구현)

  • Kim, Bogyeong;Lee, Cheolhyo;Kim, DoHyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.99-104
    • /
    • 2016
  • The walking exercise can alleviate stress and also it can improve health fortheir lifetime. Recent development in Information and Communication Technologies (ICT) has laid the foundation for Internet of Things (IoT) to become the future technology. IoT has many applications in industry automation, security, smart homes and cities, education, health etc. In personal health-care domain, IoT is mainly used for monitoring fitness condition by observing current activity of individual. In this paper, we have proposed a novel IoT based personal wellness care system. Proposed system not only keep track of current fitness level but also provide future activity prediction based on history data along with standard recommendations. Predicted activity helps in motivating the individual to achieve the desired fitness level. Initially, we consider only walking activity for testing purpose and later, other types of activities/exercise will be captured for improved health care support.

Countermeasure to Underlying Security Threats in IoT communication (사물인터넷 통신기술에 내재된 보안위협과 대응 전략)

  • Mun, Hyung-Jin;Choi, Gwang-Houn;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.37-43
    • /
    • 2016
  • Due to the remarkable improvement of ICT, with the popularization of mobile devices and every sector of society connected by networks, an era, in which peer to peer, peer to thing, thing to thing can be connected to one another everywhere, has begun. As all the electronic devices are connected to Internet, they have become more intellectualized and automated, making convergence and process of information through the connection of the devices possible to provide a lot better services. However, those devices communicate mutually to send information and they are exposed to various security threats. Therefore, this study analyzes ZigBee, CoAP, MQTT, XMPP, which are communication-related technology of IoT, draws security threats they have, and suggests requirements that components of IoT should have. Plus, it examines real cases about security threats in IoT, and suggests a countermeasure so as to contribute to establishment of a basis for IoT to be used much more safely in the future.