• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.025 seconds

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

Analysis of Security Vulnerabilities for IoT Devices

  • Kim, Hee-Hyun;Yoo, Jinho
    • Journal of Information Processing Systems
    • /
    • v.18 no.4
    • /
    • pp.489-499
    • /
    • 2022
  • Recently, the number of Internet of Things (IoT) devices has been increasing exponentially. These IoT devices are directly connected to the internet to exchange information. IoT devices are becoming smaller and lighter. However, security measures are not taken in a timely manner compared to the security vulnerabilities of IoT devices. This is often the case when the security patches cannot be applied to the device because the security patches are not adequately applied or there is no patch function. Thus, security vulnerabilities continue to exist, and security incidents continue to increase. In this study, we classified and analyzed the most common security vulnerabilities for IoT devices and identify the essential vulnerabilities of IoT devices that should be considered for security when producing IoT devices. This paper will contribute to reducing the occurrence of security vulnerabilities in companies that produce IoT devices. Additionally, companies can identify vulnerabilities that frequently occur in IoT devices and take preemptive measures.

Design and Its Applications of a Hypercube Grid Quorum for Distributed Pub/Sub Architectures in IoTs (사물인터넷에서 분산 발행/구독 구조를 위한 하이퍼큐브 격자 쿼럼의 설계 및 응용)

  • Bae, Ihnhan
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.8
    • /
    • pp.1075-1084
    • /
    • 2022
  • Internet of Things(IoT) has become a key available technology for efficiently implementing device to device(D2D) services in various domains such as smart home, healthcare, smart city, agriculture, energy, logistics, and transportation. A lightweight publish/subscribe(Pub/Sub) messaging protocol not only establishes data dissemination pattern but also supports connectivity between IoT devices and their applications. Also, a Pub/Sub broker is deployed to facilitate data exchange among IoT devices. A scalable edge-based publish/subscribe (Pub/Sub) broker overlay networks support latency-sensitive IoT applications. In this paper, we design a hypercube grid quorum(HGQ) for distributed Pub/Sub systems based IoT applications. In designing HGQ, the network of hypercube structures suitable for the publish/subscribe model is built in the edge layer, and the proposed HGQ is designed by embedding a mesh overlay network in the hypercube. As their applications, we propose an HGQ-based mechansim for dissemination of the data of sensors or the message/event of IoT devices in IoT environments. The performance of HGQ is evaluated by analytical models. As the results, the latency and load balancing of applications based on the distributed Pub/Sub system using HGQ are improved.

A Study on Logistics Distribution Industry's IoT Situation and Development Direction (국내외 물류산업의 사물인터넷(IoT) 현황과 발전방향에 관한 연구)

  • Park, Young-Tae
    • Management & Information Systems Review
    • /
    • v.34 no.3
    • /
    • pp.141-160
    • /
    • 2015
  • IoT(Internet of Things) has become a major issue as new type of convergence technology, expending existing of USNs(Ubiquitous Sensor Networks), NFC(Near Field Communication), and M2M(Machine to Machine). The IoT technology defines as a networking for things, which can establish intelligent links collaboratively for sensing networking and processing between each other without human intervention. The purpose of this study is to investigate to forecast the future distribution changes and orientation of contribution of distribution industry on IoT and to provide the implication of distribution changes. To become a global market leader, IoT requires much more development of core technology of IoT for distribution industry, new service creation and try to use a market-based demand side strategy to create markets. So, to become a global leader in distribution industry, this study results show that first of all establishment of standardization of IoT, privacy safeguards, security issues, stability and value were more important than others. The research findings suggest that the development goals of IoT should strive to boost the creation of a global leader in distribution industry and convenience to consider consumers' demands as the most important thing.

  • PDF

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

Active-Passive Ranging Method for Effective Positioning in Massive IoT Environment (대규모 IoT 환경에서의 효과적 측위를 위한 능동적-수동적 거리 추정 기법)

  • Byungsun Hwang;Seongwoo Lee;Kyoung-Hun Kim;Young-Ghyu Sun;Jin-Young Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.41-47
    • /
    • 2024
  • With the advancement and proliferation of the Internet of Things (IoT), a wide range of location-based services are being offered, and various ranging methods are being researched to meet the objectives of the required services. Conventional ranging methods involve the direct exchange of signals between tags and anchors to estimate distance, presenting a limitation in efficiently utilizing communication resources in large-scale IoT environments. To overcome these limitations, active-passive ranging methods have been proposed. However, there is a lack of theoretical convergence guarantees against clock drift errors and a detailed analysis of the characteristics of ranging estimation techniques, making it challenging to derive precise positioning results. In this paper, an improved active-passive ranging method that accounts for clock drift errors is proposed for precise positioning in large-scale IoT environments. The simulation results confirmed that the proposed active-passive ranging method can enhance distance estimation performance by up to 94.4% and 14.4%, respectively, compared to the existing active-passive ranging methods.

Delayed offloading scheme for IoT tasks considering opportunistic fog computing environment (기회적 포그 컴퓨팅 환경을 고려한 IoT 테스크의 지연된 오프로딩 제공 방안)

  • Kyung, Yeunwoong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.89-92
    • /
    • 2020
  • According to the various IoT(Internet of Things) services, there have been lots of task offloading researches for IoT devices. Since there are service response delay and core network load issues in conventional cloud computing based offloadings, fog computing based offloading has been focused whose location is close to the IoT devices. However, even in the fog computing architecture, the load can be concentrated on the for computing node when the number of requests increase. To solve this problem, the opportunistic fog computing concept which offloads task to available computing resources such as cars and drones is introduced. In previous fog and opportunistic fog node researches, the offloading is performed immediately whenever the service request occurs. This means that the service requests can be offloaded to the opportunistic fog nodes only while they are available. However, if the service response delay requirement is satisfied, there is no need to offload the request immediately. In addition, the load can be distributed by making the best use of the opportunistic fog nodes. Therefore, this paper proposes a delayed offloading scheme to satisfy the response delay requirements and offload the request to the opportunistic fog nodes as efficiently as possible.

Analysis and Study for the Technical Direction of Internet of Things (IoT) in the Perspective of the Vehicle with Vehicle-Home IoT Service Cases (차량과 홈 IoT 기기 연동 서비스 사례를 통한 차량 측면에서의 IoT 기술 방향성 분석 및 고찰)

  • Kim, Joon-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.53-60
    • /
    • 2020
  • With the major advancement of vehicle-related technologies and services, the demands for the in/out-vehicle service expansion increase significantly. The key importance of the service expansion is to provide various vehicle-centric services in addition to improve the convenience and usability of users with connectivity. Recently, Internet of Things (IoT) gains major attention for small device connectivity and service, and it widens its area to other industries including automotive to advance and diversify its services. In this paper, we investigated the technical direction of the IoT service with the analysis of IoT technologies in the perspective of the vehicle. At first, we analyzed the vehicle and IoT services in each so that we are able to suggest the service design guideline and consideration to release integrated services between vehicle and IoT. Also, we reviewed the cases of few vehicle and home IoT integration services for the major insights and future direction of the integration services.

A study on the application of blockchain to the edge computing-based Internet of Things (에지 컴퓨팅 기반의 사물인터넷에 대한 블록체인 적용 방안 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.219-228
    • /
    • 2019
  • Thanks to the development of information technology and the vitalization of smart services, the Internet of Things (IoT) technology, in which various smart devices are connected to the network, has been continuously developed. In the legacy IoT architecture, data processing has been centralized based on cloud computing, but there are concerns about a single point of failure, end-to-end transmission delay, and security. To solve these problems, it is necessary to apply decentralized blockchain technology to the IoT. However, it is hard for the IoT devices with limited computing power to mine blocks, which consumes a great amount of computing resources. To overcome this difficulty, this paper proposes an IoT architecture based on the edge computing technology that can apply blockchain technology to IoT devices, which lack computing resources. This paper also presents an operaional procedure of blockchain in the edge computing-based IoT architecture.

OAuth-based User Authentication Framework for Internet of Things (IoT 환경에 적합한 OAuth 기반의 사용자 인증 프레임워크)

  • Yu, Sung-Tae;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.8057-8063
    • /
    • 2015
  • It is expected that internet of things can be used for various fields such as smart home, smart building and smart city as the representative case of ICT that sensor, communication and interface technologies operate organically and the researches of the technologies regarding internet of things are being carried out in each countries worldwide. However, many problems rise against internet of things continuously in respect of security. Among them, the problem of privacy is the one that should be solved definitely regarding internet of things. If user data does not remain during the process of user authentication, such the privacy problem can be solved. In this paper, we propose the framework of user authentication based on OAuth that is suitable for the environment of internet of things that can solve privacy problem and analyze its security.