• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.033 seconds

A Web-based Monitoring of Electrical Energy Consumption and Data Analysis of Smart Farm Facilities (스마트팜 전기 사용에 대한 웹기반 실시간 모니터링 시스템 운영 및 전력사용량 분석)

  • Lee, Mu Yeol;Sim, Sojeong;Kim, Eun-jeong;Han, Young-Soo
    • Journal of Bio-Environment Control
    • /
    • v.31 no.4
    • /
    • pp.366-375
    • /
    • 2022
  • The monitoring of electricity consumption using Internet of Things (IoT) technology is attracting attention as a technology to reduce operation costs of smart farms. In this study, we propose a method to apply a real-time electrical consumption monitoring system (the e-Gauge system) and utilization of the collected data real-time while a melon-producing smart farm is in operation. For this purpose, the electrical consumption data for the individual smart-farm facilities such as boilers, nutrient distribution systems, automatic controllers, circulation fans, boiler controllers, and other IoT-related utilities were collected during three months of melon cultivation period. By using the monitoring results, the electrical energy consumption pattern was analyzed as an example, and necessary considerations needed to optimally utilize the measurement data were suggested. This paper will be useful in lowering the technological implementation barriers for new researchers to build a electrical consumption monitoring system and reducing trial and errors in the usage of the generated data.

A Software Vulnerability Analysis System using Learning for Source Code Weakness History (소스코드의 취약점 이력 학습을 이용한 소프트웨어 보안 취약점 분석 시스템)

  • Lee, Kwang-Hyoung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.46-52
    • /
    • 2017
  • Along with the expansion of areas in which ICT and Internet of Things (IoT) devices are utilized, open source software has recently expanded its scope of applications to include computers, smart phones, and IoT devices. Hence, as the scope of open source software applications has varied, there have been increasing malicious attempts to attack the weaknesses of open source software. In order to address this issue, various secure coding programs have been developed. Nevertheless, numerous vulnerabilities are still left unhandled. This paper provides some methods to handle newly raised weaknesses based on the analysis of histories and patterns of previous open source vulnerabilities. Through this study, we have designed a weaknesses analysis system that utilizes weakness histories and pattern learning, and we tested the performance of the system by implementing a prototype model. For five vulnerability categories, the average vulnerability detection time was shortened by about 1.61 sec, and the average detection accuracy was improved by 44%. This paper can provide help for researchers studying the areas of weaknesses analysis and for developers utilizing secure coding for weaknesses analysis.

Real-time Reefer Container Monitoring System based on IoT (IoT 기반 실시간 냉장컨테이너 상태 모니터링 시스템)

  • Moon, Young-Sik;Jung, Jun-Woo;Choi, Sung-Pill;Kim, Tae-Hoon;Lee, Byung-Ha;Kim, Jae-Joong;Choi, Hyung-Lim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.629-635
    • /
    • 2015
  • In this paper, we propose the reefer container monitoring system that not only monitors internal temperature, humidity of reefer container but also tracks the real-time location using GPS. It consists of a tag of information of situation using 433MHz RF transmitter(communication), GPS to track the real-time location and a device using WCDMA/GSM communication to transmit information to the server. We tested by applying the proposed system in reefer containers with yellow melons, melons transported from Korea to Singapore to track the location and check the temperature and the humidity. The result of this test is that there is a temperature difference around 1.7 degree depending on the position of inside of container and maintains the humidity stably about 97%. If we apply this proposed system to agricultural marketing, it is possible to get the time that fruits start to decay and minimize the loss of fruits by decaying during shipping.

A Study on Classification of CNN-based Linux Malware using Image Processing Techniques (영상처리기법을 이용한 CNN 기반 리눅스 악성코드 분류 연구)

  • Kim, Se-Jin;Kim, Do-Yeon;Lee, Hoo-Ki;Lee, Tae-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.634-642
    • /
    • 2020
  • With the proliferation of Internet of Things (IoT) devices, using the Linux operating system in various architectures has increased. Also, security threats against Linux-based IoT devices are increasing, and malware variants based on existing malware are constantly appearing. In this paper, we propose a system where the binary data of a visualized Executable and Linkable Format (ELF) file is applied to Local Binary Pattern (LBP) image processing techniques and a median filter to classify malware in a Convolutional Neural Network (CNN). As a result, the original image showed the highest accuracy and F1-score at 98.77%, and reproducibility also showed the highest score at 98.55%. For the median filter, the highest precision was 99.19%, and the lowest false positive rate was 0.008%. Using the LBP technique confirmed that the overall result was lower than putting the original ELF file through the median filter. When the results of putting the original file through image processing techniques were classified by majority, it was confirmed that the accuracy, precision, F1-score, and false positive rate were better than putting the original file through the median filter. In the future, the proposed system will be used to classify malware families or add other image processing techniques to improve the accuracy of majority vote classification. Or maybe we mean "the use of Linux O/S distributions for various architectures has increased" instead? If not, please rephrase as intended.

Evolution of corporate social contribution activities in the era of the Fourth industrial revolution (4차 산업혁명 시대의 기업사회공헌 활동의 진화)

  • Kim, Minseok;Cho, Youngbohk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.1
    • /
    • pp.85-95
    • /
    • 2019
  • Recently, studies on the fourth industrial revolution have been actively conducted in the areas of government, business, and academia. Corporate business models that utilize the major agendas of the fourth industrial revolution such as robots, artificial intelligence, Internet of things (IoT), and block chains have been created, and various changes have occurred in not only business, education, and living environments but also in international relations. In this study, we looked at changes in social contribution activities from the perspective of a company facing impacts of the fourth industrial revolution. This study examines the definition and activities of corporate social contribution and how we can contribute to society through corporate activities. 'AT Educom', LG Uplus 'Social Contribution through IoT', KT's anti-infectious disease prevention platform and cases of Intel using IoT. In addition, we have presented what we need to do in the future to promote corporate social contribution activities that will make more meaningful impacts on how corporate social contribution activities will change according to technology development. The first, measuring the performance of corporate social contribution activities needs a standardized methodology and social contribution activities through platform business and ICT should be actively pursued. Lastly, social contribution activities between companies and sectors will increase.

The IEEE 802.15.4e based Distributed Scheduling Mechanism for the Energy Efficiency of Industrial Wireless Sensor Networks (IEEE 802.15.4e DSME 기반 산업용 무선 센서 네트워크에서의 전력소모 절감을 위한 분산 스케줄링 기법 연구)

  • Lee, Yun-Sung;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.213-222
    • /
    • 2017
  • The Internet of Things (IoT) technology is rapidly developing in recent years, and is applicable to various fields. A smart factory is one wherein all the components are organically connected to each other via a WSN, using an intelligent operating system and the IoT. A smart factory technology is used for flexible process automation and custom manufacturing, and hence needs adaptive network management for frequent network fluctuations. Moreover, ensuring the timeliness of the data collected through sensor nodes is crucial. In order to ensure network timeliness, the power consumption for information exchange increases. In this paper, we propose an IEEE 802.15.4e DSME-based distributed scheduling algorithm for mobility support, and we evaluate various performance metrics. The proposed algorithm adaptively assigns communication slots by analyzing the network traffic of each node, and improves the network reliability and timeliness. The experimental results indicate that the throughput of the DSME MAC protocol is better than the IEEE 802.15.4e TSCH and the legacy slotted CSMA/CA in large networks with more than 30 nodes. Also, the proposed algorithm improves the throughput by 15%, higher than other MACs including the original DSME. Experimentally, we confirm that the algorithm reduces power consumption by improving the availability of communication slots. The proposed algorithm improves the power consumption by 40%, higher than other MACs.

A Wireless AP Power Saving Algorithm by Applying Sleep Mode and Transmission Power Coordination in IoT Environments (사물 인터넷 환경에서 무선 AP의 수면 모드 운영 및 송출 전력 조절을 통한 전력 소비 절감 알고리즘)

  • Jeong, Kyeong Chae;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.393-402
    • /
    • 2014
  • We have experienced an explosive increase of the IoT(Internet of Things) technology based devices including smart phones and the wireless communications. Also the growing power consumption in IEEE 802.11 WLANs(Wireless LANs) driven by these dramatic increases in not only mobile users and but also wireless APs(Access Points). To reduce the power consumption, this paper proposes a wireless AP power saving algorithm, which minimizes the transmission power without decrease the transmission and carrier sense ranges. A wireless AP which is use in our algorithm checks its own original coverage periodically for whether there is a new STA(Station) or not when its transmission power is decreased. Moreover, if there are no signaling message to connect the wireless AP, it changes its operation mode Wake-up to sleep. A Result shows that the proposed AP algorithm can reduce the total power consumption of the wireless AP approximated 18% and 35% compared to the conventional wireless AP with and without the existing power saving algorithm, respectively.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

Development of 2W-Level Wireless Powered Energy Harvesting Receiver using 60Hz power line in Electricity Cable Tunnel (전력구 내 지중선을 이용한 2W급 상용주파수 무선전력 수신장치 개발)

  • Jang, Gi-Chan;Choi, Bo-Hwan;Rim, Chun-Taek
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.21 no.4
    • /
    • pp.296-301
    • /
    • 2016
  • Using high magnetic flux from a 60 Hz high-current cable, a 2 W wireless-powered energy harvesting receiver for sensor operation, internet of things (IoT) devices, and LED lights inside electrical cable tunnels is proposed. The proposed receiver comprises a copper coil with a high number of turns, a ring-shaped ferromagnetic core, a capacitor for compensating for the impedance of the coil in series, and a rectifier with various types of loads, such as sensors, IoT devices, and LEDs. To achieve safe and easy installation around the power cable, the proposed ring-shaped receiver is designed to easily open or close using a clothespin-shaped handle, which is made of highly-insulated plastic. Laminated silicon steel plates are assembled and used as the core because of their mechanical robustness and high saturation flux density characteristic, in which the thickness of each isolated plate is 0.3 mm. The series-connected resonant capacitor, which is appropriate for low-voltage applications, is used together with the proposed receiver coil. The concept of the figure of merit, which is the product weight and cost of both the silicon steel plate and the copper wire, is used for an optimized design; therefore, the weight of the fabricated receiver and the price of raw material is 750 gf and USD $2 each, respectively. The 2.2 W powering capability of the fabricated receiver was experimentally verified with a power cable current of $100A_{rms}$ at 60Hz.

Heuristic and Statistical Prediction Algorithms Survey for Smart Environments

  • Malik, Sehrish;Ullah, Israr;Kim, DoHyeun;Lee, KyuTae
    • Journal of Information Processing Systems
    • /
    • v.16 no.5
    • /
    • pp.1196-1213
    • /
    • 2020
  • There is a growing interest in the development of smart environments through predicting the behaviors of inhabitants of smart spaces in the recent past. Various smart services are deployed in modern smart cities to facilitate residents and city administration. Prediction algorithms are broadly used in the smart fields in order to well equip the smart services for the future demands. Hence, an accurate prediction technology plays a vital role in the smart services. In this paper, we take out an extensive survey of smart spaces such as smart homes, smart farms and smart cars and smart applications such as smart health and smart energy. Our extensive survey is based on more than 400 articles and the final list of research studies included in this survey consist of 134 research papers selected using Google Scholar database for period of 2008 to 2018. In this survey, we highlight the role of prediction algorithms in each sub-domain of smart Internet of Things (IoT) environments. We also discuss the main algorithms which play pivotal role in a particular IoT subfield and effectiveness of these algorithms. The conducted survey provides an efficient way to analyze and have a quick understanding of state of the art work in the targeted domain. To the best of our knowledge, this is the very first survey paper on main categories of prediction algorithms covering statistical, heuristic and hybrid approaches for smart environments.