• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.031 seconds

Design of the Smart Feeding System based on the LPWA network for Inland Fish Farms (내수면 양식장을 위한 LPWA망 기반 스마트 급이 시스템 설계)

  • Dokko, Sehjoon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.31-35
    • /
    • 2016
  • IoT technologies have been rapidly developed in recent years, and applied to many industries. In the field of fisheries, the water quality management system have been developed, helping in improving productivity and working environment. In this paper, we have designed the smart feeding system, interoperable with the water quality system, using LPWA network. LPWA network is an IoT network, which is appropriate to fish farms because of its wide area coverages and low power consumption. We expect this work to contribute to developing the aquaculture technology through the big data analysis with the accumulated data.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.

Analytical model for mean web object transfer latency estimation in the narrowband IoT environment (협대역 사물 인터넷 환경에서 웹 객체의 평균 전송시간을 추정하기 위한 해석적 모델)

  • Lee, Yong-Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.1-4
    • /
    • 2015
  • This paper aims to present the mathematical model to find the mean web object transfer latency in the slow-start phase of TCP congestion control mechanism, which is one of the main control techniques of Internet. Mean latency is an important service quality measure of end-user in the network. The application area of the proposed latency model is the narrowband environment including multi-hop wireless network and Internet of Things(IoT), where packet loss occurs in the slow-start phase only due to small window. The model finds the latency considering initial window size and the packet loss rate. Our model shows that for a given packet loss rate, round trip time and initial window size mainly affect the mean web object transfer latency. The proposed model can be applied to estimate the mean response time that end user requires in the IoT service applications.

Ontology-based IoT Platform for Improving Interoperability (상호운용성 향상을 위한 온톨로지 기반의 IoT 플랫폼)

  • Lee, Kangjun;Jang, Woolin;Yang, Byeongheon;Lee, Seungyeon;Jeong, Dongwon;Lee, Sukhoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.6-8
    • /
    • 2021
  • Recently, the Internet of Things technologies are continuously advanced, and IoT devices are being used in various domain. IoT platforms should not only collect and manage data by connecting to various devices, but also monitor and control them. However, conventional IoT platforms have different data types and protocols, and have the problem of not monitoring or controlling cross-platform devices. This research proposes an ontology-based IoT platform to resolve this problem. Therefore, this research analyzes the types and characteristics of conventional IoT platforms, and this paper proposes a new platform architecture based on the analysis. The proposed platform is expected to flexible data management and improvement of interoperability between other platforms by utilizing ontology technology.

  • PDF

A Standard Time Management Scheme in the Internet of Things (사물인터넷에서 표준 시각 관리 방안)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.929-934
    • /
    • 2018
  • The Internet of Things (IoT) is the network of devices embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data without any human intervention. The importance of time information is increased in order to impose order on scattered sensor data streams, resolving conflicts through time stamp information and so on. Time information and time synchronization are critical building blocks in the IoT. They allow devices to share a consistent notion of time and it is easier to build efficient and robust collaborative services. This paper proposes a standard time management scheme in the Internet of Things. Many IoT applications involve collection and forwarding of event data. It is useful to know when an event occurs for the purposes of triggering an action. In order to verify the feasibility of the proposed scheme, it is implemented and evaluated in the Arduino development environment.

A Control Method of ASMR Contents through Attention and Meditation Detection Based on Internet of Things (사물인터넷 기반의 집중도 및 명상도 검출을 통한 ASMR 콘텐츠 제어 기법)

  • Kim, Minchang;Seo, Jeongwook
    • Journal of Digital Contents Society
    • /
    • v.19 no.9
    • /
    • pp.1819-1824
    • /
    • 2018
  • This paper proposes a control method of ASMR(autonomous sensory meridian response) contents to relieve user's stress and improve his attention. The proposed method measures EEG(electroencephalography), attention, meditation, and eyeblink data from an EEG device and sends them to an oneM2M-compliant IoT(internet of things) server platform through an Android IoT Application. Then a SVM(support vector machine) model is built to classify user's mental health status by using EEG, attention and meditation data collected in the server platform. The ASMR contents are controlled by the mental health status classified by a SVM model and the eyeblink data. When comparing the SVM models according to types of data used, the SVM model with attention and meditation data showed accuracy of 85.7%. It was verified that the proposed control algorithm of ASMR contents properly worked as the mental health status from the SVM model and the eyeblink data changed.

Research for RBAC of IoT Entities (사물인터넷 엔터티를 위한 역할기반 접근제어에 관한 연구)

  • Lee, Yon-Joo;Woo, Sung-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.564-565
    • /
    • 2019
  • The Internet of Things technology is regarded as the next major technology that will be the driving force behind the fourth industrial revolution. The characteristics of entities for Internet of Things application are changing more actively and actively, requiring a more detailed approach, but existing access control technologies are designed around users, requiring access control techniques that maintain efficiency and security with less system load to apply complex and variable content. Therefore, research on role-based access controls that are appropriate for Internet of Things entities is essential. In this study, the relevant research for the study of access control of the Internet of Things entities and the RBAC and AC methods that can define the properties of the various entities within the Internet of Things.

  • PDF

Recent Trends in Standards Related to the Internet of Things and Machine-to-Machine Communications

  • Husain, Syed;Prasad, Athul;Kunz, Andreas;Papageorgiou, Apostolos;Song, JaeSeung
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.228-236
    • /
    • 2014
  • One of major purposes of these standard technologies is to ensure interoperability between entities from different vendors and enable interworking between various technologies. As interoperability and interworking are essential for machine-to-machine communications (M2M) and Internet of Things (IoT) for them to achieve their ultimate goal, i.e., things to be connected each other, multiple standards organizations are now working on development M2M/IoT related specifications. This paper reviews the current activities of some of the most relevant standardization bodies in the area of M2M and IoT: third-generation partnership project (3GPP) core and radio network aspects, broadband forum, and oneM2M. The major features and issues being focused upon in these standards bodies are summarized. Finally, some key common trends among the different bodies are identified: a common service layer platform, new technologies mitigating an explosive growth of network traffic, and considerations and efforts related to the development of device management technologies.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.