• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.03 seconds

IoT parking system in applying discounts to vehicles with respect to the population of Carpools (카풀 인원수에 따른 차량 할인 적용 IoT 주차 시스템)

  • Cho, Young-Ju;Kim, Jin-Hyuk;No, Chang-Hee;Kwon, Soon-Pil;So, Yoon-Jeong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.63-66
    • /
    • 2017
  • 현대인의 실생활은 무수히 많은 사물간의 데이터를 주고받을 수 있는 연결고리로 이루어져 있다. 이러한 연결고리 속에서 우리는 IoT(Information of Things), 즉 사물인터넷을 쉽게 경험할 수 있다. 본 논문에서는 이러한 사물인터넷의 활용으로 인한 차량 내 각 시트에 무게를 측정할 수 있는 하드웨어 시스템 및 안전벨트 연결 확인 하드웨어 시스템을 부착하여, 차량 내 탑승인원을 파악하고 그에 대한 할인 시스템을 개발하여 차량감소 효과로 인한 주차공간 확보 및 대기오염으로부터 청정효과를 기대할 수 있는 시스템을 제안하고자 한다.

  • PDF

Lightweight IPsec protocol for IoT communication environments (IoT 통신 환경을 위한 경량 IPsec 프로토콜 연구)

  • Song, In-A;Oh, Jeong-Hyeon;Lee, Doo-Won;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.121-128
    • /
    • 2018
  • Internet of Things architecture connected to the Internet is a technology. However, Many paper research for the lightweight Protocol of IoT Environment. In these Paper excluded secure problem about protocol. So Light weight Protocol has weakness of secure in IoT environment. All of IoT devices need encryption algorithm and authentication message code for certain level of security. However, IoT environment is difficult to using existing security technology. For this reason, Studies for Lightweight IPsec is essential in IoT environment. For Study of Lightweight IPsec, We analyze existing protocols such as IPsec, 6LoWPAN for IEEE 802.15.4 layer and Lightweight IPsec based 6LoWPAN. The result is to be obtained for the lightweight IPsec protocols for IoT environment. This protocol can compatible with Internet network.

Performance Evaluation of Smoothing Algorithm for Efficient Use of Network Resources in IoT environments (IoT 환경에서 네트워크 자원의 효율적인 사용을 위한 스무딩 알고리즘의 성능평가)

  • Lee, MyounJae
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.47-53
    • /
    • 2021
  • In order to transmit video data stored in servers with limited bandwidth in IoT environments to many clients, a transmission plan must be established by considering factors such as the number of transmission rate changes, peak transmission rate, and transmission rate changes. This transmission plan is called smoothing, and includes CBA that minimizes the number of transmission rate increases, MCBA that minimizes the number of transmission rate changes, and MVBA to minimize the transmission rate changes. In this work, to evaluate the performance of the proposed algorithm[16], we compare the proposed algorithm with the existing smoothing algorithms with the peak rate, the number of transmission rate changes, the rate increase, the peak rate utilization, and the average transmission rate with various video data and buffer sizes. The evaluation results show that the proposed algorithm helps to efficiently use the server's finite network resources by establishing a transport plan with the lowest average transfer rate.

IoT-based D2D relation algorithms utilizing a Wi-Fi (Wi-Fi를 활용한 IoT기반 D2D 릴레이션 알고리즘)

  • Lim, Hyeok;Kim, Wung-Jun;Hwang, Jong-Sun;Jung, Dae-Jin;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.645-647
    • /
    • 2015
  • IoT (Internet of Things) technology has immense potential in our modern society. Generally when used in a consumer electronics environment, the IoT can continue to work more efficiently than the conventional method of home appliances. In order to use the IOT device's effectively in the environment, we need to determine the relationship between all device's based on their state and priority and compare it to find the suitable device based on the state and priority. In this paper I have done research on Wi-Fi devices in a network environment and I have observed relationships between them. Also I have proposed an algorithm to determine the device status and priority. This determines high-priority devices and they are identified on the basis of the state of the device associated with a particular operation and proceeds further.

  • PDF

DoS Attack Control Design of IoT System for 5G Era

  • Rim, Kwangcheol;Lim, Dongho
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.2
    • /
    • pp.93-98
    • /
    • 2018
  • The Internet of Things (IoT) is a form of the emerging 4th industry in the 5G era. IoT is expected to develop naturally in our daily life in the 5G era in which high-speed communication will be completed. Along with the rise of IoT, concerns about security and malicious attacks are also increasing. This paper examines DoS attacks, which are one of the representative security threats of IoT and proposes a local detection and blocking system that are suitable for response to such attacks. First, systems of the LoRaWAN type, which are most actively researched in the IoT system field and DoS attacks that can occur in such systems were examined. Then, the inverse order tree algorithm using regional characteristics was designed as a cluster analysis form. Finally, a system capable of defending denial-of-service attacks in the 5G IoT system using local detection and blocking with the Euclidean distance was designed.

A Study on the Blockchain 2.0 Ethereum Platform Analysis for DApp Development (DApp 개발을 위한 블록체인 2.0 이더리움 플랫폼 분석 연구)

  • Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.718-723
    • /
    • 2018
  • In a positive Internet of Medical Things (IoMT) environment, by combining the latest computer network technology with IoT technology, remote health care such as health care and monitoring is improved through the provision of quality medical information services. In this paper, we identified and compared the platforms applied with blockchain and presented the results of developing the product distribution de-centralized DApp. In the process, we developed a distribution platform that can use blockchain technology to identify product fraud, manage data, manage customers' information, prevent forgery, track transaction history, and facilitate product transactions.

Development of Facility Management System for Indoor Space Based on ICBM Technology (ICBM기반 실내 공간 유지관리 시스템 개발)

  • Jung, Yoo-Seok;Kang, Tae-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.49-55
    • /
    • 2019
  • An open office or a shared office is emerging as the emphasis on the collaborative and communicative work environments is increasing. In the past, the user maintained the space, but the maintenance of indoor space became difficult because there is no fixed user. Indoor space information can be collected using the ICBM framework system. The facility management can achieve this with data. Therefore, this study proposed a framework based on ICBM (Internet of Things, Cloud, Big Data, and Mobile) for verifying the possibility of a smart facility management system for indoor space. IoT (Internet of Things) technology was used to measure the indoor temperature, humidity, occupancy, and brightness continuously, and provided the data to Web API via WiFi. Data acquired automatically via IoT, existing maintenance data, and spatial information were integrated through the Cloud. Big data collected by sensors were processed as meaningful spatial information for maintenance. Indoor space information and maintenance information can be delivered to the manager through the mobile. Based on the collected data, room occupancy recognition is limited due to a range of ultrasonic wave sensors. On the other hand, brightness represents the space conditions. The difference between lighting on/off, weekday and weekend can be shown. The temperature data and the relative humidity data were collected steadily to evaluate the comfort.

Environmental IoT-Enabled Multimodal Mashup Service for Smart Forest Fires Monitoring

  • Elmisery, Ahmed M.;Sertovic, Mirela
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.163-170
    • /
    • 2017
  • Internet of things (IoT) is a new paradigm for collecting, processing and analyzing various contents in order to detect anomalies and to monitor particular patterns in a specific environment. The collected data can be used to discover new patterns and to offer new insights. IoT-enabled data mashup is a new technology to combine various types of information from multiple sources into a single web service. Mashup services create a new horizon for different applications. Environmental monitoring is a serious tool for the state and private organizations, which are located in regions with environmental hazards and seek to gain insights to detect hazards and locate them clearly. These organizations may utilize IoT - enabled data mashup service to merge different types of datasets from different IoT sensor networks in order to leverage their data analytics performance and the accuracy of the predictions. This paper presents an IoT - enabled data mashup service, where the multimedia data is collected from the various IoT platforms, then fed into an environmental cognition service which executes different image processing techniques such as noise removal, segmentation, and feature extraction, in order to detect interesting patterns in hazardous areas. The noise present in the captured images is eliminated with the help of a noise removal and background subtraction processes. Markov based approach was utilized to segment the possible regions of interest. The viable features within each region were extracted using a multiresolution wavelet transform, then fed into a discriminative classifier to extract various patterns. Experimental results have shown an accurate detection performance and adequate processing time for the proposed approach. We also provide a data mashup scenario for an IoT-enabled environmental hazard detection service and experimentation results.

Design of Algorithms for Unnecessary Sensor Barrier in IoT Environment (IoT 환경에서 불필요한 센서 차단 알고리즘 설계)

  • Lim, Hyeok;Shin, Yun-Ho;Yu, Dong-Gyun;Ryu, Seung-Han;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.607-608
    • /
    • 2016
  • Recently using a variety of sensors sensing the virtual(Virtual Sensing) technology that extracts specific data has been applied to IoT service interface. The utilization of such sensors while increasing IoT (Internet of Things) environmental sensor is an essential element. However, used in the IoT to the environment, while the increase in utilization of a specific sensor utilization falling sensors is generated. In this paper, we design unnecessary sensors removal algorithm as a way to solve this problem. Through the utilization of poor power to block the sensor can reduce the power consumption and user sensor control service through the monitoring by blocking the use of the sensor is considered that there can be provided a more effective and convenient.

  • PDF

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.