• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.031 seconds

Investigation on the Design Method of a Energy Harvesting Power Supply for a Smart Sensor (스마트 센서의 에너지 하베스팅 전원 공급부 설계 방안 연구)

  • Ho-Deok Jang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.18-23
    • /
    • 2023
  • A smart sensor is the key element to implement IoT (Internet of Things) service, as a terminal equipment. This paper investigated the design method of a power supply using energy harvesting technique for a smart sensor. the performance of a power supply using a solar cell and a piezoelectric transducer as a energy harvesting device was verified and the method to optimize a power supply was analyzed depending on the operating condition of a smart sensor. Also the method to increase a battery life cycle as a auxiliary power supply was proposed.

Performance Evaluation of Low Power Communication Techniques Coverage for Internet of Things (IoT를 위한 저전력 통신 기술의 성능 평가)

  • Yoon, JeongHyeon;Kim, Seungku
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.9
    • /
    • pp.1211-1223
    • /
    • 2021
  • Internet of Things(IoT) services have increased the demand for connectivity among electronics devices. As a result, various types of novel wireless communication technologies have been standardized and developed. In this paper, we evaluate the performance of low power wireless communication technologies such as Bluetooth, IEEE 802.15.4, DASH 7, IEEE 802.15.4g, LoRa, and SigFox in various environments. This is the first experiment evaluating various low power wireless communication technologies in real testbed. We expect that the evaluation results will be useful data to other researchers in applying the IoT technology in the future.

A IoT simulation programs utilizing the Swing components (Swing 컴포넌트를 활용한 IoT 시스템 시뮬레이션 프로그램)

  • Hwang, Jong-sun;Lim, Hyeok;Jang, Jae-Myung;Kim, Han-Gyung;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.666-668
    • /
    • 2015
  • Recent domestic IoT (Internet Of Things) technologies and research is being actively conducted, it actually provides power control, heating control such services in the home or office. Depending on the interest of the IoT so as to provide convenient services to users also increased their users are increasingly questioning or wondering about the operation of IoT system. The system representing an easy to understand the operation of the IoT system is required in order to meet the requirements of those users. For this purpose this paper, Swing utilization by user, sensor, SNS (Social Network Service) when an event occurs, such as the relationship between devices bearing the collaboration process can be monitored with a simulation program was designed and implemented.

  • PDF

Compact implementations of Curve Ed448 on low-end IoT platforms

  • Seo, Hwajeong
    • ETRI Journal
    • /
    • v.41 no.6
    • /
    • pp.863-872
    • /
    • 2019
  • Elliptic curve cryptography is a relatively lightweight public-key cryptography method for key generation and digital signature verification. Some lightweight curves (eg, Curve25519 and Curve Ed448) have been adopted by upcoming Transport Layer Security 1.3 (TLS 1.3) to replace the standardized NIST curves. However, the efficient implementation of Curve Ed448 on Internet of Things (IoT) devices remains underexplored. This study is focused on the optimization of the Curve Ed448 implementation on low-end IoT processors (ie, 8-bit AVR and 16-bit MSP processors). In particular, the three-level and two-level subtractive Karatsuba algorithms are adopted for multi-precision multiplication on AVR and MSP processors, respectively, and two-level Karatsuba routines are employed for multi-precision squaring. For modular reduction and finite field inversion, fast reduction and Fermat-based inversion operations are used to mitigate side-channel vulnerabilities. The scalar multiplication operation using the Montgomery ladder algorithm requires only 103 and 73 M clock cycles on AVR and MSP processors.

A Study on Secure Interworking in Internet of Things (사물인터넷 보안 인터워킹에 관한 연구)

  • Oh, Se-Ra;Kim, Young-Gab
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.1283-1286
    • /
    • 2017
  • 사물인터넷(Internet of Things; IoT)이 발달하면서 FIWARE, oneM2M, AllJoyn 등의 많은 IoT 플랫폼이 개발되고 관련 표준들도 제정되고 있다. 이런 환경에서는 각 IoT 플랫폼의 통신 프로토콜, 보안정책 등이 상이하기 때문에 데이터가 연동되기 어렵고, 보안 인터워킹을 수행하는 것은 더욱 어려운 문제다. oneM2M과 FIWARE의 경우, Fi-Proxy 인터워킹 어댑터를 이용하여 상호간 인터워킹이 시연된 사례가 있지만 그 과정에서 보안이 고려되지는 않았다. oneM2M은 아직 보안 컴포넌트가 별도로 존재하지 않기 때문에, 본 논문에서는 oneM2M-FIWARE 보안 인터워킹 시나리오에 적용할 수 있는 OAuth 2.0 기반 oneM2M 보안 컴포넌트를 구현하고, FIWARE 보안 아키텍처를 분석 및 구현하여 시사점을 도출한다. 또한 본 논문은 oneM2M과 FIWARE 간의 보안 인터워킹 아키텍처를 제안하고, 이를 기반으로 향후 여러 도메인에 활용될 수 있는 구조를 가진 LED 예제를 개발한다.

Designing Secure IoT (Internet of Things) Environments with SDN and NFV

  • Kim, Yeon-Geun;Sin, Seung-Won
    • Information and Communications Magazine
    • /
    • v.32 no.7
    • /
    • pp.27-33
    • /
    • 2015
  • 오늘날 우리 사회는 정보통신기술의 발전으로 다양한 가능성들을 갖게 되었다. 그 중 다양한 사물들에 센싱 기술을 부여하고 네트워크에 연결시켜, 해당 사물들이 처리하는 데이터들을 손쉽게 활용 및 관리 하고자 하는 기술인 사물 인터넷(Internet of Things)이 활발하게 거론되고 있다. 현재 사물 인터넷은 스마트 홈, 헬스 케어 등의 형태로 우리 생활에 깊게 들어왔고, 그곳에서 개인 정보와 같은 매우 민감한 데이터를 다루기 때문에, 이러한 기기 및 데이터들에 대한 보안은 매우 중요하다. 하지만 현재의 사물 인터넷은 보안이 충분히 고려되지 않은 상태이다. 본고에서는 현재 보안 기술을 적용함에 있어서 사물 인터넷 환경이 어떠한 문제점을 가지고 있는지 알아보고, 이러한 문제점들을 해결하고 안전한 IoT 환경을 구축하기 위해 본고에서 제안하는 SDN/NFV 기술을 적용한 IoT 게이트웨이 디자인을 알아본다.

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

Improvement of SWoT-Based Real Time Monitoring System (SWoT 기반 실시간 모니터링 시스템 개선)

  • Yu, Myung-han;Kim, Sangkyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.7
    • /
    • pp.227-234
    • /
    • 2015
  • USN-based real-time monitoring systems, which receive raw data from sensor nodes and store the processed information in traditional servers, recently get to be replaced by IoT(Internet of Things)/WoT(Web of Things)-based ones. Especially, Social Web of Things(SWoT) paradigm can make use of cloud storage over Social Network Service(SNS) and enable the possibility of integrated access, management and sharing. This paper proposes an improved SWoT-based real-time monitoring system which makes up for weak points of existing systems, and implements monitoring service integrating a legacy sensor network and commercial SNS without requiring additional servers. Especially, the proposed system can reduce emergency propagation time by employing PUSH messages.

Adaptive Deadline-aware Scheme (ADAS) for Data Migration between Cloud and Fog Layers

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1002-1015
    • /
    • 2018
  • The advent of Internet of Things (IoT) and the evident inadequacy of Cloud networks concerning management of numerous end nodes have brought about a shift of paradigm giving birth to Fog computing. Fog computing is an extension of Cloud computing that extends Cloud resources at the edge of the network, closer to the user. Cloud computing has become one of the essential needs of people over the Internet but with the emerging concept of IoT, traditional Clouds seem inadequate. IoT entails extremely low latency and for that, the Cloud servers that are distant and unknown to the user appear to be unsuitable. With the help of Fog computing, the Fog devices installed would be closer to the user that will provide an immediate storage for the frequently needed data. This paper discusses data migration between different storage types especially between Cloud devices and then presents a mechanism to migrate data between Cloud and Fog Layer. We call this mechanism Adaptive Deadline-Aware Scheme (ADAS) for Data migration between Cloud and Fog. We will demonstrate that we can access and process latency sensitive "hot" data through the proposed ADAS more efficiently than with a traditional Cloud setup.

Concept Design of Download Over-the-Air functions for IoF-Cloud based distributed IoT device (IoF-Cloud 기반 분산된 IoT 장비들을 위한 Download Over-the-Air 기능의 개념 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, HyeongGyun;Kim, YongIl;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.9-17
    • /
    • 2016
  • Over the next 20 years it will begin the exodus from the Internet and smart phones to the Internet of Things. The heart of IoT gives new utility and value with connectivity among things around people to the human. In future, Industrial environment will be intimately connect all among machines and machines or factories and factories in all processing, and by digitizing of all goods and production life-cycle, which is a combination of virtual world and real world, the digital factory will become reality eventually. The proposed IoT or IIoT based Download OTA (Over-the-Air) provides a flexible mechanism for downloading Media objects of any type and size from a network. Moreover, proposed IoT based DLOTA provides a part of security by lightweight encryption, OTP, and CapBAC technique.