• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,917, Processing Time 0.028 seconds

Extending the Home Network using UPnP+ (UPnP+를 이용한 홈 네트워크 확장)

  • Kim, Hyun-Sik;Park, Yong-Suk;Koo, Sung Wan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.540-542
    • /
    • 2014
  • The Universal Plug and Play (UPnP) specification permits networked devices to discover each other and to provide diverse services in the home network environment. Recently, new paradigms such as mobile connected computing, cloud-based service delivery, smart device content sharing, and Internet of Things (IoT) have emerged, but the home network based UPnP shows functional limitations in supporting such paradigms. To support them, the UPnP Forum has recently extended the capabilities of the existing UPnP, calling it UPnP+. In this paper, the UPnP Device Architecture V2.0 (UDA 2.0), which forms the basis of UPnP+, is presented. We present how UDA 2.0 enables the expansion of the home network to wide-area networks and non-IP device domains.

  • PDF

A Study on Structuring of Information Sharing Platforms Based on Risk Communication Theory (위험커뮤니케이션 이론에 기반을 둔 정보공유 플랫폼 구조화 연구)

  • Yoo, Ji-Yeon;Park, Hyang-Mi
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.59-72
    • /
    • 2019
  • In this day and age physical and cyber boundaries have converged due to the development of new technologies, such as the Internet of Things (IoT) and the Cyber Physical System (CPS). As the relationship between physical system and cyber technology strengthens, more diverse and complex forms of risk emerge. As a result, it is becoming difficult for single organization or government to fully handle this situation alone and cooperation based on information sharing and the strengthening of active defense systems are needed. Shifting to a system in which information suitable for various entities can be shared and automatically responded to is also necessary. Therefore, this study tries to find improvements for the current system of threat information collecting and sharing that can actively and practically maintain cyber defense posture, focusing particularly on the structuring of information sharing platforms. To achieve our objective, we use a risk communication theory from the safety field and propose a new platform by combining an action-oriented security process model.

MCU Module Design for Smart Farm Sensor Processing (스마트팜 센서 처리용 MCU 모듈 설계)

  • Kim, Gwan-hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.285-286
    • /
    • 2021
  • With the recent development of Internet of Things (IoT) technology, smartization technology is expanding to the fields of agriculture, livestock, and fisheries, and smartization is in progress. In this smart technology, the most important thing is how to measure the data in the field and transmit it to the management system. Currently, the sensors used in the construction of smart farms and other livestock houses and farms are measuring and monitoring smart farms and other environmental conditions through various sensors such as temperature, humidity, CO gas, CO2, hydrogen, and O2. The communication method between these sensors and the HMI (Human Machine Interface) module that controls and manages the smart farm is still mainly using the RS-485-based modbus-RTU method. In this paper, we intend to design the MCU module for HMI so that various sensor modules can be connected to manage data through the RS-485-based Modbus method so that the sensor data required for smart farm construction can be managed by the HMI module.

  • PDF

A Time Synchronization Protocol for Energy-Constrained Wireless Networks (에너지 제한적인 무선 네트워크에서 동작하는 시각 동기화 프로토콜)

  • Bae, Shi-Kyu
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.385-392
    • /
    • 2015
  • In IoT(Internet of Things), it is important for wireless networks to communicate data created among resource-constrained wireless nodes, where time synchronization is needed for meaningful data creation and transmission. Time Synchronization by flooding is one of the mostly used protocols for WSN(Wireless Sensor Networks). Even though this type of scheme has some advantages over other types (i.e. a simple algorithm and independency of topology and so on), too many data transmission is required, leading to large power consumption. So, reducing transmission data is an important issue for energy efficiency in this kind of networks. In this paper, a new Flooding-based time synchronization protocol is proposed to use energy efficiently by reducing a transmitted traffic. The proposed scheme's performance has been evaluated and compared with an representative scheme, FTSP(Flooding Time Synchronization Protocol) by simulation. The results are shown that the proposed scheme is better than FTSP.

Big data-based Local Store Information Providing Service (빅데이터에 기반한 지역 상점 관련 정보제공 서비스)

  • Mun, Chang-Bae;Park, Hyun-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.561-571
    • /
    • 2020
  • Location information service using big data is continuously developing. In terms of navigation, the range of services from map API service to ship navigation information has been expanded, and system application information has been extended to SNS and blog search records for each location. Recently, it is being used as a new industry such as location-based search and advertisement, driverless cars, Internet of Things (IoT) and online to offline (O2O) services. In this study, we propose an information system that enables users to receive information about nearby stores more effectively by using big data when a user moves a specific route. In addition, we have designed this system so that local stores can use this system to effectively promote it at low cost. In particular, we analyzed web-based information in real time to improve the accuracy of information provided to users by complementing the data. Through this system, system users will be able to utilize the information more effectively. Also, from a system perspective, it can be used to create new services by integrating with various web services.

A Study on the Causes of Security Vulnerability in 'Wall Pads' ('월패드'의 보안 취약 원인에 관한 고찰)

  • Kim Sang Choon;Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • Recently, smart home technology has been developed with a great response due to the convenience of home automation. Smart home technology provides various services by connecting various Internet of Things (IoT) and sensors to a home network through wired/wireless networks. In addition, the smart home service easily and conveniently controls lighting, energy, environment, and door cameras through a wall pad. However, while it has become a social issue due to the recent hacking accident of wall pads, personal information leakage and privacy infringement are expected. Accordingly, it is necessary to prepare preventive and countermeasures against security vulnerability factors of wall pads. Therefore, this study expects that it can be used as basic data for future smart home application and response technology development by examining the weak causes and countermeasures related to wall pads.

Unsupervised learning with hierarchical feature selection for DDoS mitigation within the ISP domain

  • Ko, Ili;Chambers, Desmond;Barrett, Enda
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.574-584
    • /
    • 2019
  • A new Mirai variant found recently was equipped with a dynamic update ability, which increases the level of difficulty for DDoS mitigation. Continuous development of 5G technology and an increasing number of Internet of Things (IoT) devices connected to the network pose serious threats to cyber security. Therefore, researchers have tried to develop better DDoS mitigation systems. However, the majority of the existing models provide centralized solutions either by deploying the system with additional servers at the host site, on the cloud, or at third party locations, which may cause latency. Since Internet service providers (ISP) are links between the internet and users, deploying the defense system within the ISP domain is the panacea for delivering an efficient solution. To cope with the dynamic nature of the new DDoS attacks, we utilized an unsupervised artificial neural network to develop a hierarchical two-layered self-organizing map equipped with a twofold feature selection for DDoS mitigation within the ISP domain.

Enhancing Irregular Repetition Slotted ALOHA with Polarization Diversity in LEO Satellite Networks

  • Su, Jingrui;Ren, Guangliang;Zhao, Bo;Ding, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3907-3923
    • /
    • 2020
  • An enhanced irregular repetition slotted ALOHA (IRSA) protocol is proposed by using polarization characteristic of satellite link and MIMO detection in low earth orbit (LEO) satellite networks, which is dubbed polarized MIMO IRSA (PM-IRSA). In the proposed scheme, one or two packets in one slot can be decoded by employing polarized MIMO detection, and more than two collided packets in multiple slots which can construct the virtual MIMO model can be decoded by the MIMO detection algorithm. The performance of the proposed scheme is analyzed with the density evolution (DE) approach and the degree distribution is optimized to maximize the system throughput by using a differential evolution. Numerical results certify our analysis and show that the normalized throughput of the proposed PM-IRSA can achieve 1.89 bits/symbol.

The Impact of Network Coding Cluster Size on Approximate Decoding Performance

  • Kwon, Minhae;Park, Hyunggon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1144-1158
    • /
    • 2016
  • In this paper, delay-constrained data transmission is considered over error-prone networks. Network coding is deployed for efficient information exchange, and an approximate decoding approach is deployed to overcome potential all-or-nothing problems. Our focus is on determining the cluster size and its impact on approximate decoding performance. Decoding performance is quantified, and we show that performance is determined only by the number of packets. Moreover, the fundamental tradeoff between approximate decoding performance and data transfer rate improvement is analyzed; as the cluster size increases, the data transfer rate improves and decoding performance is degraded. This tradeoff can lead to an optimal cluster size of network coding-based networks that achieves the target decoding performance of applications. A set of experiment results confirms the analysis.

Study on the MQTT protocol design for the application of the real-time HVAC System

  • Jung, Hun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.19-26
    • /
    • 2016
  • In this paper, the existing domestic HVAC systems, devices TCP / IP does not support the most, thereby, not performed remote management, it is necessary to regularly field service, inefficiency and cost bring a burden. This is through a comparison of the IoT-based primary, real-time protocol of what has become a hot topic recently, to be able to control and real-time monitoring through the CCU device in the HVAC system. Compare for this Internet of Things device for real-time monitoring and control of the XMPP, CoAP, MQTT main real-time protocol is used on. Finally, flexibility, light weight, based on MQTT a two-way messaging protocols with reliable message delivery, implements the protocol on the real-time HVAC system in the cloud platform.