• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.027 seconds

IoT-Based Device Utilization Technology for Big Data Collection in Foundry (주물공장의 빅데이터 수집을 위한 IoT 기반 디바이스 활용 기술)

  • Kim, Moon-Jo;Kim, DongEung
    • Journal of Korea Foundry Society
    • /
    • v.41 no.6
    • /
    • pp.550-557
    • /
    • 2021
  • With the advent of the fourth industrial revolution, the interest in the internet of things (IoT) in manufacturing is growing, even at foundries. There are several types of process data that can be automatically collected at a foundry, but considerable amounts of process data are still managed based on handwriting for reasons such as the limited functions of outdated production facilities and process design based on operator know-how. In particular, despite recognizing the importance of converting process data into big data, many companies have difficulty adopting these steps willingly due to the burden of system construction costs. In this study, the field applicability of IoT-based devices was examined by manufacturing devices and applying them directly to the site of a centrifugal foundry. For the centrifugal casting process, the temperature and humidity of the working site, the molten metal temperature, and mold rotation speed were selected as process parameters to be collected. The sensors were selected in consideration of the detailed product specifications and cost required for each process parameter, and the circuit was configured using a NodeMCU board capable of wireless communication for IoT-based devices. After designing the circuit, PCB boards were prepared for each parameter, and each device was installed on site considering the working environment. After the on-site installation process, it was confirmed that the level of satisfaction with the safety of the workers and the efficiency of process management increased. Also, it is expected that it will be possible to link process data and quality data in the future, if process parameters are continuously collected. The IoT-based device designed in this study has adequate reliability at a low cast, meaning that the application of this technique can be considered as a cornerstone of data collecting at foundries.

Two Solutions for Unnecessary Path Update Problem in Multi-Sink Based IoT Networks (멀티 싱크 기반 IoT 네트워크에서 불필요한 경로 업데이트 문제와 두 가지 해결 기법)

  • Lee, Sungwon;Kang, Hyunwoo;Yoo, Hongsoek;Jeong, Yonghwan;Kim, Dongkyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2450-2460
    • /
    • 2015
  • Recently, as interest in IoT (Internet of Things) increase, research and standardization of a new protocol which reflects the characteristics of IoT has progressed. Among them, RPL(IPv6 for Low-Power Lossy Network) is a standardized routing protocol for IoT. RPL utilizes DIO (DODAG Information Object) messages which is flooded from the sink node to the whole network for path establish and maintenance. However, in large scale networks, not only a long time is required to propagate the DIO message to the whole networks but also a bottleneck effect around the sink node is occurred. Multi-sink based approaches which take advantage of reducing routing overhead and bottleneck effect are widely used to solve these problems. In this paper, we define 'unnecessary path update problems' that may arise when applying the RPL protocol to the multi sink based IoT networks and propose two methods namely Routing Metric based Path Update Decision method and Immediate Successor based Path Update Decision method for selective routing update.

Design of Improved Authentication Protocol for Sensor Networks in IoT Environment (사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계)

  • Kim, Deuk-Hun;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.467-478
    • /
    • 2015
  • Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. Especially sensor network area of the device is an increased using and diversified for a low specification devices because of characteristic of the Internet of Things. However, there is difficulty in directly applying the security technologies such as the current authentication technologies to a low specification device, so also increased security threats. Therefore, authentication protocol between entities on the sensor network communication in Internet of Things has being studied. In 2014, Porambage et al. suggested elliptic curve cryptography algorithm based on a sensor network authentication protocol for advance security of Internet of Things environment, but it is vulnerability exists. Accordingly, in this paper, we analyze the vulnerability in elliptic curve cryptography algorithm based on authentication protocol proposed by Porambage et al. and propose an improved authentication protocol for sensor networks in Internet of Things environment.

Analysis of Deep learning Quantization Technology for Micro-sized IoT devices (초소형 IoT 장치에 구현 가능한 딥러닝 양자화 기술 분석)

  • YoungMin KIM;KyungHyun Han;Seong Oun Hwang
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Deep learning with large amount of computations is difficult to implement on micro-sized IoT devices or moblie devices. Recently, lightweight deep learning technologies have been introduced to make sure that deep learning can be implemented even on small devices by reducing the amount of computation of the model. Quantization is one of lightweight techniques that can be efficiently used to reduce the memory and size of the model by expressing parameter values with continuous distribution as discrete values of fixed bits. However, the accuracy of the model is reduced due to discrete value representation in quantization. In this paper, we introduce various quantization techniques to correct the accuracy. We selected APoT and EWGS from existing quantization techniques, and comparatively analyzed the results through experimentations The selected techniques were trained and tested with CIFAR-10 or CIFAR-100 datasets in the ResNet model. We found out problems with them through experimental results analysis and presented directions for future research.

Analyzing Technological Convergence for IoT Business Using Patent Co-classification Analysis and Text-mining (특허 동시분류분석과 텍스트마이닝을 활용한 사물인터넷 기술융합 분석)

  • Moon, Jinhee;Gwon, Uijun;Geum, Youngjung
    • Journal of Technology Innovation
    • /
    • v.25 no.3
    • /
    • pp.1-24
    • /
    • 2017
  • With the rise of internet of things (IoT), there have been several studies to analyze the technological trend and technological convergence. However, previous work have been relied on the qualitative work that investigate the IoT trend and implication for future business. In response, this study considers the patent information as the proxy measure of technology, and conducts a quantitative and analytic approach for analyzing technological convergence using patent co-classification analysis and text mining. First, this study investigate the characteristics of IoT business, and characterize IoT business into four dimensions: device, network, platform, and services. After this process, total 923 patent classes are classified into four types of IoT technology group. Since most of patent classes are classified into device technology, we developed a co-classification network for both device technology and all technologies. Patent keywords are also extracted and these keywords are also classified into four types: device, network, platform, and services. As a result, technologies for several IoT devices such as sensors, healthcare, and energy management are derived as a main convergence group for the device network. For the total IoT network, base network technology plays a key role to characterize technological convergence in the IoT network, mediating the technological convergence in each application area such as smart healthcare, smart home, and smart grid. This work is expected to effectively be utilized in the technology planning of IoT businesses.

Study on key standardization Work Item derivation and strategies for IoT services (사물인터넷 서비스의 중점 표준화 항목 도출 및 전략에 관한 연구)

  • Kim, Jungsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.13-26
    • /
    • 2016
  • Service and technology for the future hyper-connected society, which is every information receive through the mobile internet, will be an Internet of Things. Thus, it is mandatory to derive key standardization work item and establish strategy for the global business with the standardization of device and service platform by the application service. In this study, by analyzing the domestic and international market trends, state of technical development, and standardization of technology, we identified the open platform is the stepping stone for achieving the goal which is establishing the virtuous circulation of IoT ecosystem. Also, we defined emphasized key standardization work item for achieving the open platform are network, server, access authentication, billing system, and software platform. After that, we proposed future strategy direction of standardization. This research could be contribute to the IoT service diffusion by realizing IP communication among low power wireless terminals and implementing light-weight standard internet protocol.

Design and Satisfaction Analysis of Embedded IoT Course (임베디드 IoT 과목 설계 및 만족도 분석)

  • Hong, Jun-Ki;Paik, Jong Ho;Kang, Mingoo;Hong, Sung-Chan
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.19-26
    • /
    • 2019
  • Recently, the importance of the internet of things (IoT) education has been emphasized due to the progress of research on IoT technology. Therefore, universities require an efficient IoT course. In this paper, we propose an undergraduate IoT course using the Bluetooth function of smartphone and Arduino kit. The proposed embedded IoT class uses the Bluetooth capabilities of the smartphone to connect Arduino and activate various sensors to encourage students to become interested in the class. According to students' midterm and final exam scores, students programming skills have been improved since students' projects were in progress during the course. Further, according to students' survey, the proposed IoT class is very effective in understanding the embedded IoT and 75% of the students satisfied with the proposed course.

Gateway Channel Hopping to Improve Transmission Efficiency in Long-range IoT Networks

  • Kim, Dae-Young;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1599-1610
    • /
    • 2019
  • Intelligent services have expanded as Internet of Things (IoT) technology has evolved and new requirements emerge to accommodate various services. One new requirement is transmitting data over long distances with low-power. Researchers have developed low power wide area (LPWA) network technology to satisfy the requirement; this can improve IoT network infrastructure and increase the range of services. However, network coverage expansion causes several problems. The traffic load is concentrated at a specific gateway, which causes network congestion and leads to decreased transmission efficiency. Therefore, the approach proposed in this paper attempts to recognize and then avoid congestion through gateway channel hopping. The LPWA network employs multiple channels, so wireless channel hopping is available in a gateway. Devices that are not delay sensitive wait for the gateway to reappear on their wireless channel; delay sensitive devices change the wireless channel along the hopping gateway. Thus, the traffic load and congestion in each wireless channel can be reduced improving transmission efficiency. The proposed approach's performance is evaluated by computer simulation and verified in terms of transmission efficiency.

A Study on SSDP protocol based IoT / IoL Device Discovery Algorithm for Energy Harvesting Interworking Smart Home

  • Lee, Jonghyeok;Han, Jungdo;Cha, Jaesang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.7-12
    • /
    • 2018
  • The spread of IoT (Internet of Things) technology that connects objects based on wired / wireless networks is accelerating, and IoT-based smart home technology that constitutes a super connected network connecting sensors and home appliances existing inside and outside the home is getting popular. In addition, demand for alternative energy technologies such as photovoltaic power generation is rapidly increasing due to rapid increase of consumption of energy resources. Recently, small solar power systems for general households as well as large solar power systems for installation in large buildings are being introduced, but they are effectively implemented due to limitations of small solar panels and lack of power management technology. In this paper, we have studied smart home structure and IoT / IoL device discovery algorithm for energy harvesting system based on photovoltaic power generation, It is possible to construct an efficient smart home system for device control.

Reaching Byzantine Agreement underlying VANET

  • Wang, Shu-Ching;Lin, Ya-Jung;Yan, Kuo-Qin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3351-3368
    • /
    • 2019
  • The Internet of Things (IoT) enables machines and devices in a global network to connect and provide applications. The Vehicular Ad-hoc NETwork (VANET) allows vehicles in the network to communicate with each other as an application of the IoT. The safety and comfort of passengers can be improved through VANET related applications. In order to be able to provide related applications, there must be a reliable VANET topology. As a result of the Byzantine agreement (BA), fault tolerance can be solved in VANET. In order to improve the reliability of the system, even if some components in the system are damaged, a protocol is needed to assist the system to perform normally. Therefore, the BA problem in VANET with multiple impairments is revisited in this research. The proposed protocol allows all normal processing elements (PEs) to reach agreement using the least amount of information exchange. Moreover, the proposed protocol can tolerate the largest number of damaged PEs in VANET.