• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.034 seconds

A Study on Hardware Implementation of 128-bit LEA Encryption Block (128비트 LEA 암호화 블록 하드웨어 구현 연구)

  • Yoon, Gi Ha;Park, Seong Mo
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.39-46
    • /
    • 2015
  • This paper describes hardware implementation of the encryption block of the '128 bit block cipher LEA' among various lightweight encryption algorithms for IoT (Internet of Things) security. Round function blocks and key-schedule blocks are designed by parallel circuits for high throughput. The encryption blocks support secret-key of 128 bits, and are designed by FSM method and 24/n stage(n=1, 2, 3, 4, 8, 12) pipeline methods. The LEA-128 encryption blocks are modeled using Verilog-HDL and implemented on FPGA, and according to the synthesis results, minimum area and maximum throughput are provided.

Restaurant order program with NFC & P2P function. (NFC 기능을 활용한 공유 및 주문 시스템 개발)

  • Yoon, Hyewon;Lim, Hayoung;Jeong, Hyewon;Yoon, Yong Ik
    • Annual Conference of KIPS
    • /
    • 2015.04a
    • /
    • pp.312-314
    • /
    • 2015
  • 2015년 현재 정보통신기술(ICT)중 사물인터넷 (IoT : Internet of Things)이 화두에 오르고 있다. 언제 어디서나 통신으로 연결만 되어 있으면 스마트폰으로 주변에 있는 사물들의 제어가 가능하다. 또, 주목 받고 있는 기술로서 근거리통신기능(NFC : Near Field Communication)이 IoT와 결합해 우리 주변을 편리하게 해주고 있다. NFC 발달과 함께, 본 연구에서는 NFC를 통해 메뉴를 공유하고 종업원 없이도 주방으로 Order를 보낼 수 있는 제어기능이 탑재된 어플리케이션을 기획한다. 여러 명의 Order를 한 사람의 스마트폰으로 NFC를 이용한 기술인 P2P 기능을 이용해 모아준다. 그 후, 한 데 모은 주문내역을 대표 한 사람이 주방으로 Order를 보내는 기능과 두 번 이상의 방문을 하게 될 경우 그 동안의 주문내역 히스토리를 분석해서 주문에 대한 피드백을 제공함으로써 편리하게 사용할 수 있도록 연구하고자 한다.

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

  • Mi-Kyung Oh;Sangjae Lee;Yousung Kang;Dooho Choi
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.346-357
    • /
    • 2023
  • Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices.

A study on Strengthening Cyber Capabilities According to the Digital Transformation in the Defense Sector (국방 디지털 전환에 따른 사이버역량 강화 방안 연구)

  • InJung Kim;Soojin Lee
    • Convergence Security Journal
    • /
    • v.21 no.4
    • /
    • pp.3-13
    • /
    • 2021
  • As new technologies such as artificial intelligence (AI), cloud, Internet of Things (IoT), big data, and mobile become organically integrated, a new era of digital transformation is emerging. As a result of this digital transformation, cybersecurity issues have surfaced as a negative side effect. Cyberspace, unlike physical space, has no clear limits, which leads to additional side effects and hazards. While promoting digital transformation in defense, conventional customs and behavioral approaches make it difficult to alter the cybersecurity strategy, even if it is vital to comprehend and prepare the attributes associated with time and technology trends. As a result, in this study, we will look at the direction of technology application in the defense as a result of digital transformation and analyze how to correlate from the standpoint of cybersecurity.

An Empirical Study of Implementation and Application of Mold Life Cycle Management Information System In the Cloud Computing Environment (클라우드 컴퓨팅 환경에서 금형 수명주기관리 정보시스템 구축 및 적용의 실증적 연구)

  • Koh, Joon-Cheol;Nam, Seung-Done;Kim, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.4
    • /
    • pp.331-341
    • /
    • 2014
  • Internet of Thing(IoT), which is recently talked about with the development of information and communication technology, provides big data to all nodes such as companies and homes, means of transportation etc. by connecting all things with all people through the integrated global network and connecting all actual aspects of economic and social life with Internet of Thing through sensor and software. Defining Internet of Thing, it plays the role of a connector of providing various information required for the decision-making of companies in the cloud computing environment for the Insight usage by collecting and storing Raw Data of the production site through the sensor network and extracting big data in which data is accumulated and Insight through this. In addition, as the industry showing the largest linkage with other root industries among root industries, the mold industry is the core technology for controlling the quality and performance of the final product and realizing the commercialization of new industry such as new growth power industry etc. Recently, awareness on the mold industry is changing from the structure of being labor-intensive, relying on the experience of production workers and repeating modification without the concept of cost to technology-intensive, digitization, high intellectualization due to technology combination according to IT convergence. This study, therefore, is to provide a golden opportunity to increase the direct and indirect expected effects in poor management activities of small businesses by actually implementing and managing the entire process of mold life cycle to information system from mold planning to mass production and preservation by building SME(small and medium-sized enterprises)-type mold life cycle management information system in the cloud computing environment and applying it to the production site.

An optimized deployment strategy of smart smoke sensors in a large space

  • Liu, Pingshan;Fang, Junli;Huang, Hongjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3544-3564
    • /
    • 2022
  • With the development of the NB-IoT (Narrow band Internet of Things) and smart cities, coupled with the emergence of smart smoke sensors, new requirements and issues have been introduced to study on the deployment of sensors in large spaces. Previous research mainly focuses on the optimization of wireless sensors in some monitoring environments, including three-dimensional terrain or underwater space. There are relatively few studies on the optimization deployment problem of smart smoke sensors, and leaving large spaces with obstacles such as libraries out of consideration. This paper mainly studies the deployment issue of smart smoke sensors in large spaces by considering the fire probability of fire areas and the obstacles in a monitoring area. To cope with the problems of coverage blind areas and coverage redundancy when sensors are deployed randomly in large spaces, we proposed an optimized deployment strategy of smart smoke sensors based on the PSO (Particle Swarm Optimization) algorithm. The deployment problem is transformed into a multi-objective optimization problem with many constraints of fire probability and barriers, while minimizing the deployment cost and maximizing the coverage accuracy. In this regard, we describe the structure model in large space and a coverage model firstly, then a mathematical model containing two objective functions is established. Finally, a deployment strategy based on PSO algorithm is designed, and the performance of the deployment strategy is verified by a number of simulation experiments. The obtained experimental and numerical results demonstrates that our proposed strategy can obtain better performance than uniform deployment strategies in terms of all the objectives concerned, further demonstrates the effectiveness of our strategy. Additionally, the strategy we proposed also provides theoretical guidance and a practical basis for fire emergency management and other departments to better deploy smart smoke sensors in a large space.

A Selective Compression Strategy for Performance Improvement of Database Compression (데이터베이스 압축 성능 향상을 위한 선택적 압축 전략)

  • Lee, Ki-Hoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.371-376
    • /
    • 2015
  • The Internet of Things (IoT) significantly increases the amount of data. Database compression is important for big data because it can reduce costs for storage systems and save I/O bandwidth. However, it could show low performance for write-intensive workloads such as OLTP due to the updates of compressed pages. In this paper, we present practical guidelines for the performance improvement of database compression. Especially, we propose the SELECTIVE strategy, which compresses only tables whose space savings are close to the expected space savings calculated by the compressed page size. Experimental results using the TPC-C benchmark and MySQL show that the strategy can achieve 1.1 times better performance than the uncompressed counterpart with 17.3% space savings.

Fine Dust Monitoring and Removal Method in Urban Construction Sites Using Autonomous Mobile Vehicle and Dry Fog System (자율이동체와 드라이포그를 활용한 도심지 건설현장 미세먼지 모니터링 및 대응 방안)

  • Kim, Kyoon Tai
    • Ecology and Resilient Infrastructure
    • /
    • v.6 no.4
    • /
    • pp.277-286
    • /
    • 2019
  • The construction industry is known to be one of the representative industries that generate fine dust. Therefore, reducing the amount of fine dust generated in construction sites is very important for the overall fine dust management. Based on this, this study proposed the fine dust measurement and removal technology combined with advanced technologies such as autonomous mobile vehicle IoT and DFS. The qualitative, quantitative and risk elimination effects that can be expected when applying the proposed technique are analyzed. The proposed technique will be validated through system development and field application and evaluated specific economics through cost analysis.

IoT(Internet of Things)'s Reliable Services Organization using Directed Service-Object Graph Deployment Scheme (단방향 서비스 객체 그래프 배치 기법을 이용한 신뢰할 수 있는 사물인터넷 서비스 구성)

  • Park, Jun-Ha;Li, Quan Zhe;Kim, Shin-Dug
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.471-474
    • /
    • 2015
  • 최근 사물인터넷이 빠른 속도로 발전할 것으로 예측됨에 따라서, 서비스들은 사용자들에게 제공되기 위해서 작은 디바이스부터 거대한 디바이스들간의 임베디드 디바이스의 발전과 센서 허브와 같은 보조 프로세서의 발전을 통해, 서로 연결되고 있으며, 사용자들을 위해 지금보다 더 정확하고 신뢰할 수 있는 맞춤형 사물인터넷 서비스를 제공하기 위한 개발의 필요성이 대두되고 있다. 효과적인 서비스 구축을 위한 기법들로 하위 디바이스 계층의 수준과 상위 어플리케이션 계층의 수준을 서로 구분 지을 수 있도록 서비스 지향형 컴퓨팅 방식을 사용하는 여러 계층 구성의 계층적 추상화 접근 방법이 소개되고 있지만, 사용자들에게 더 정확하고 신뢰할 수 있는 서비스를 구축하는 것은 여전히 다양한 이슈가 존재한다. 본 논문에서는 서비스 객체의 단방향 그래프 구성 기법을 적용하여, 효과적이고 신뢰할 수 있는 사물인터넷 서비스 구성을 위하여 서비스 오브젝트를 단방향 그래프 자료구조로 구성한 새로운 형태의 IoT 미들웨어 구조를 제안한다. 또한, 새로 제안된 미들웨어 구조상에서의 사용자의 사용 시나리오 및 시스템 성능상의 이점을 분산 시뮬레이션을 통하여 증명한다.

A Study on the Application Method of GOF Design Pattern for Optimizing Android Devices (안드로이드 디바이스 최적화를 위한 GOF 디자인 패턴적용 방법에 대한 연구)

  • Jung, Woo-Cheol;Jeon, Mun-Seok;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.89-97
    • /
    • 2017
  • Recent Internet of Things(IoT), and in addition to wearable PC, such as software development methodologies based on a variety of object-oriented design and design patterns of GoF(Gang of Four) with OOP(Object-Oriented Programming) intended for portable devices. However, incorrect application design specification is that the higher the importance of the optimization of the program on the device because it can cause problems such as decreased operating speed, increase the memory occupancy and battery usage. In this paper, we propose an optimized design pattern based on the method of application, such as Android (Android) OS Strategy Pattern, State Pattern, Observer pattern. Test results show that the proposed scheme selection patterns can be selected to optimize the design pattern in the device that specification.