• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.032 seconds

Implementation of crypto key-based IoT network security system (암호키 기반 IoT 네트워크 보안 시스템 구현)

  • Jeon, Ji-Soo;Kang, Dong-Yeon;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.349-350
    • /
    • 2022
  • As research on IT convergence continues, the scope of IoT (Internet of Things) services continues to expand. The IoT service uses a device suitable for the purpose. These IoT devices require an authentication function. In addition, in IoT services that handle important information such as personal information, security of transmission data is required. In this study, we implement a crypto key-based IoT network security system that can authenticate devices for IoT services and securely transmit data between devices. Through this study, IoT service can authenticate the device itself and maintain the confidentiality of transmitted data. However, since it is an IoT service, additional research on the application efficiency of the encryption algorithm is required.

  • PDF

Development of IIoT Edge Middleware System for Smart Services (스마트서비스를 위한 경량형 IIoT Edge 미들웨어 시스템 개발)

  • Lee, Han;Hwang, Joon Suk;Kang, Dae Hyun;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.115-125
    • /
    • 2021
  • Due to various ICT Technology innovations and Digital Transformation, the Internet of Things(IoT) environment is increasingly requiring intelligence, decentralization, and automated service, especially an advanced and stable smart service environment in the Industrial Internet of Things(IIoT) where communication network(5G), data analysis and artificial intelligence(AI), and digital twin technology are combined. In this study, we propose IIoT Edge middleware systems for flexible interface with heterogeneous devices such as facilities and sensors at various industrial sites and for quick and stable data collection and processing.

Business Process Support Based on IoT Technology (사물인터넷을 이용한 비즈니스 프로세스 지원방안)

  • Hong, Hyun-Gi
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.75-79
    • /
    • 2017
  • The purpose of this paper is to propose a method for business process system (BPS) based on the Internet of Things (IoT). As the results of this research the IoT architecture and the business process design are derived. The main findings include the proposed IoT-enabled BPS method, illustrated by the description of the application and its assessment. In addition, the key business processes namely; remote machine monitoring; maintenance of machine; material procurement; product pricing; and information reporting system, are affected by IoT technology. The proposed method of this research could be the reference for the companies which want to have better management performance based on IoT technologies.

The Diffusion of Internet of Things: Forecasting Technologies and Company Strategies using Qualitative and Quantitative Approach (사물인터넷의 확산: 정성적·정량적 기법을 이용한 기술 및 기업 전략 예측)

  • Lee, Saerom;Jahng, Jungjoo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.19-39
    • /
    • 2015
  • Internet of Things (IoT) is expected to provide efficiency and convenience in human life by integrating the Internet into the things that we use in daily lives. IoT can not only create new businesses but also can bring great changes in our lives thanks to the various ways of technical application: defining relationships among things or automatic use of technology by analyzing the usage pattern. This study uses the qualitative research of interviewing the experts to predict the changes that IoT technology is expected to bring in our lives. In addition, this paper analyzes news articles about internet of things in Korea using text-network analysis. This study also discusses the factors which need to be considered to put IoT into successful use in business contexts.

Recommendation Method considering New User in Internet of Things Environment (사물인터넷 환경에서 새로운 사용자를 고려한 정보 추천 기법)

  • Kwon, Joonhee;Kim, Sungrim
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.23-35
    • /
    • 2017
  • With the popularization of mobile devices, the number of social network service users is increasing, thereby the amount of data is also increasing accordingly. As Internet of Things environment is expanding to connect things and people, there is information much more than before. In such an environment, it becomes very important to recommend the necessary information to the user. In this paper, we propose a recommendation method that considers new users in IoT environment. In the proposed method, we recommend the information by applying the centrality-based social network analysis method to the recommendation method using the social relationships in the social IoT. We describe the seven-step recommendation method and apply them to the music circle scenario of the IoT environment. Through the music circle scenario, we show that we can recommend more suitable information to new users in the IoT environment than the existing recommendation method.

Internet of Things(IoT) ON system implementation with minimal Arduino based appliances standby power using a smartphone alarm in the environment (사물인터넷(IoT)환경에서 스마트폰 알람을 이용한 아두이노(Arduino)기반 가전기기 대기전력을 최소화한 ON 시스템 구현)

  • Park, Se-Eon;Hwang, Chan-Gyu;Park, Dong-Cheul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1175-1182
    • /
    • 2015
  • This paper has been an era of full-fledged objects Internet of Things(IoT), which involved the subject of this communication in the communication paradigm of the human heart. Things Arduino-based appliances ON, the system was implemented using the smartphone alarm in the Internet environment. All appliances even if plug connected to an external power source only standby power is present. This system is used for communication with the Arduino things. Connect the appliances power automatically rings the smartphone alarm minimize appliances standby power to things all by ON automatically connected to the Arduino, and the work of giving consumer electronics devices to help weather that automatically operates by Objects is an Internet system.

A Study on the Secure Communication at Android Things Environment using the SEED Library (SEED 암호 라이브러리를 활용한 안전한 Android Things 통신 환경연구)

  • Park, Hwa Hyeon;Yoon, Mi Kyung;Lee, Hyeon Ju;Lee, Hae Young;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.4
    • /
    • pp.67-74
    • /
    • 2019
  • As the market for Internet of Things (IoT) service grows, the security issue of the data from IoT devices becomes more important. In this paper, we implemented a cryptographic library for confidentiality of sensor data from Android Things based IoT services. The library made use of the SEED algorithm for encryption/decryption of data and we verified the library by implementing a service environment. With the library, the data is securely encrypted and stored in the database and the service environment is able to represent the current sensing status with the decrypted sensor data. The contribution of this work is in verifying the usability of SEED based encryption library by implementation in IoT sensor based service environment.

Study of Policies of Major Countries on Internet of Things and Market Forecast (사물인터넷(IoT)의 주요국 정책과 시장전망에 관한 연구)

  • Ko, Yun Seung
    • International Commerce and Information Review
    • /
    • v.16 no.5
    • /
    • pp.27-47
    • /
    • 2014
  • Gartner mentioned IoT (Internet of Things) as one of the ten growth engines in the world in 2014. In addition, IoT has been frequently invited as a theme by participants at CES held in the early this year. Gartner predicts that the number of devices connected will reach to 26 billion and a total of economic value added will grow to 1.9 trillion dollars until 2020. The definition of IoT has been arranged in a different way by each institution. Therefore, this study arranged the concept of IoT which has been variously defined and used together with M2M and IoE. Further, forecasts presented by research institutions which stated domestic and foreign market outlook were collected and arranged. As IoT is on the uptrend and is selected as one of the ten growth engines in the world, it was found out how policies on IoT in the US, China, Japan and Korea were established and promoted as well as how recent strategies on IoT of major large companies have been carried out. Lastly, the following countermeasures of our government and companies were discussed.

  • PDF

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.