• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,916, Processing Time 0.029 seconds

Design of Variable Timeslot for Hybrid MAC (하이브리드 MAC을 위한 가변 타임슬롯 설계)

  • Ryu, Jeong-Kyu;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.613-619
    • /
    • 2020
  • Hybrid media access control (MAC) is used in internet of things (IoT) network, because of communication feature concern with data capacity and communication interval between gateway and sensor nodes and the cost efficiency. Hybrid MAC consists of TDMA and CSMA generally. The distance between gateway and sensor node is openly changed in marine IoT network. Therefore, it is needed to control the period of timeslot of hybrid MAC used in marine IoT network. In this paper, the design rule of TDMA timeslot with the variable period depending on communication distance was proposed. It was confirmed from the analysis that 72 times communication between gateway and sensor nodes is possible in LoRa network by using the proposed TDMA variable timeslot scheme.

Design of a Lightweight Security Protocol Using Post Quantum Cryptography (양자내성암호를 활용한 경량 보안 프로토콜 설계)

  • Jang, Kyung Bae;Sim, Min Joo;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.8
    • /
    • pp.165-170
    • /
    • 2020
  • As the IoT (Internet of Things) era is activated, a lot of information including personal information is being transmitted through IoT devices. For information protection, it is important to perform cryptography communication, and it is required to use a lightweight security protocol due to performance limitations. Currently, most of the encryption methods used in the security protocol use RSA and ECC (Elliptic Curve Cryptography). However, if a high performance quantum computer is developed and the Shor algorithm is used, it can no longer be used because it can easily solve the stability problems based on the previous RSA and ECC. Therefore, in this paper, we designed a security protocol that is resistant to the computational power of quantum computers. The code-based crypto ROLLO, which is undergoing the NIST (National Institute of Standards and Technology) post quantum cryptography standardization, was used, and a hash and XOR computation with low computational consumption were used for mutual communication between IoT devices. Finally, a comparative analysis and safety analysis of the proposed protocol and the existing protocol were performed.

Development of an Integrated IoT System for Searching Dependable Device based on User Property (사용자 요소 기반의 신뢰성 있는 기기 탐색을 위한 사물인터넷 통합 시스템 개발)

  • Ryu, Shinhye;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.791-799
    • /
    • 2017
  • With the development of the internet of things, sensor and device are can be applied to various scenario. Overall improving of the dependability index of internet of things is the ultimate goal. And reliability aims to increase the success rate of internet of things service delivery. Many studies about internet of things system have been made on the system to assess a dependability for providing reliable service to user, but it has difficult to reflect the user context for evaluating the device reliability. Also, most do not consider the availability of content information. In this paper, it proposed dependable device searching system in the internet of things environment. This system evaluates device dependability based on device status and measured data. Through the proposed system, it can be provided reliable context information for user-centric service.

An Internet of Things System Architecture for Aiding Firefighters in the Scene of Disaster

  • Lee, Hyesun;Hong, Sang Gi;Lee, Kang Bok
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1286-1292
    • /
    • 2018
  • To support and protect firefighters in the scene of disaster, this research suggests an Internet of Things (IoT) system architecture that can be configurable and applicable to firefighting and rescue in various disaster situations. The proposed approach provides increased adaptability and reusability of systems compared to existing approaches. To validate the feasibility of the approach, a system of systems based on the architecture was developed and successfully tested for a specific firefighting and rescue scenario in a given test environment.

The Study on Internet of Things(IoT) Ecosystem Analysis and Its Policy Direction in Gyeonggi Province (경기도 사물인터넷 생태계 분석을 통한 정책방향 수립에 관한 연구)

  • Kim, Myung Jin;Lee, Jihoon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.18-32
    • /
    • 2016
  • In the Hyper-connected society, each country set up its own policy and central government as well as provincial government makes a basic plan of developing IoT. Gyeonggi provincial government needs to cope actively with the changing international and national circumstances. The purpose of this paper is to frame policy as a provincial government with analysis IoT industry-academia-institute-governments ecosystem and in-depth interview. There are IoT related SMEs in Gyeonggi, especially manufacturing business and device fields. Universities are doing IoT researches by R&D funds from central as well as provincial governments. Central government-affiliated Institutions are researching. It is necessary for Gyeonggi provincial government to establish policy in order to actively operate IoT ecosystem while each innovation actors are cooperated in doing IoT; system/governce maintenance, environments and test-bed for the application.

  • PDF

Methods to Design IoT Applications with Heterogeneity (IoT 애플리케이션의 이질성을 고려한 설계 기법)

  • Lee, Johan;Park, Chun Woo;Kim, Moon Kwon;Choi, Kwang Sun;Kim, Soo Dong
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.353-356
    • /
    • 2013
  • IoT(Internet-of-Things)는 사람과 물리적 사물이 언제, 어디서나 소통할 수 있는 컴퓨팅 패러다임으로, IoT 디바이스의 역량이 높아짐에 따라, IoT 디바이스를 이용한 IoT 애플리케이션 개발에 관심이 높아지고 있다. 하지만 IoT 디바이스가 가지는 통신 프로토콜 이질성, API 이질성, 데이터 형식 이질성, 프로그래밍 언어 이질성이 IoT 애플리케이션 개발의 어려움으로 작용하고 있다. 본 논문은 이러한 이질성들을 분석하고 각 이질성을 해결하기 위한 설계 기법을 제안하고 실제로 이를 적용하여 IoT 애플리케이션을 설계 및 구현 함으로써 도출한 이질성 해결의 중요성과 제안한 설계 기법의 실효성을 검증한다.

PowMash: End-User Service Mashup Using a Presentation-Authoring Scheme (PowMash: 프레젠테이션 작성 스킴 기반 최종 사용자 서비스 매쉬업)

  • Nam, Sanggyu;Dominguez, Noe;Ko, In-Young
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.12
    • /
    • pp.684-690
    • /
    • 2017
  • Researchers have suggested several methods for utilizing various kinds of services in an Internet of Things (IoT) environment. These methods require users to learn some new kinds of tools or expertise in programming. In this paper, we propose a new paradigm, which allows end-users to build IoT-service mashups based on a presentation-authoring scheme. We have also included a framework for this procedure. The design of a mashup model in this framework was based on a task-oriented service framework. Users can build a mashup of this framework in the presentation-file format, convert it into a service flow, and deploy it for running in an IoT environment. In addition, we use a case study to show how PowMash supports end-users' service mashups in an IoT environment.

A Study on the Enterprise security convergence strategy in the IoT(the Internet of Things) Era (IoT시대의 기업 융합보안 전략에 대한 연구)

  • Noh, Jong-ho;Lee, Jong-hyeong;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • In the age of full scale IoT, concept of "security convergence" has been popularized widely. However, it is not clear whether current "security convergence" concept reflects IoT characteristics and traits. In this thesis, a new concept, complementing "security convergence" concept researches up to date, has been suggested considering IoT characteristics. Required governance methodology and key technical factors are suggested for re-establishment of "security convergence" concept and for enterprise security strategy development.

A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing

  • Saeed, Waqar;Ahmad, Zulfiqar;Jehangiri, Ali Imran;Mohamed, Nader;Umar, Arif Iqbal;Ahmad, Jamil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.35-57
    • /
    • 2021
  • Fog computing aims to provide the solution of bandwidth, network latency and energy consumption problems of cloud computing. Likewise, management of data generated by healthcare IoT devices is one of the significant applications of fog computing. Huge amount of data is being generated by healthcare IoT devices and such types of data is required to be managed efficiently, with low latency, without failure, and with minimum energy consumption and low cost. Failures of task or node can cause more latency, maximum energy consumption and high cost. Thus, a failure free, cost efficient, and energy aware management and scheduling scheme for data generated by healthcare IoT devices not only improves the performance of the system but also saves the precious lives of patients because of due to minimum latency and provision of fault tolerance. Therefore, to address all such challenges with regard to data management and fault tolerance, we have presented a Fault Tolerant Data management (FTDM) scheme for healthcare IoT in fog computing. In FTDM, the data generated by healthcare IoT devices is efficiently organized and managed through well-defined components and steps. A two way fault-tolerant mechanism i.e., task-based fault-tolerance and node-based fault-tolerance, is provided in FTDM through which failure of tasks and nodes are managed. The paper considers energy consumption, execution cost, network usage, latency, and execution time as performance evaluation parameters. The simulation results show significantly improvements which are performed using iFogSim. Further, the simulation results show that the proposed FTDM strategy reduces energy consumption 3.97%, execution cost 5.09%, network usage 25.88%, latency 44.15% and execution time 48.89% as compared with existing Greedy Knapsack Scheduling (GKS) strategy. Moreover, it is worthwhile to mention that sometimes the patients are required to be treated remotely due to non-availability of facilities or due to some infectious diseases such as COVID-19. Thus, in such circumstances, the proposed strategy is significantly efficient.

Distributed Trust Management for Fog Based IoT Environment (포그 기반 IoT 환경의 분산 신뢰 관리 시스템)

  • Oh, Jungmin;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.731-751
    • /
    • 2021
  • The Internet of Things is a huge group of devices communicating each other and the interconnection of objects in the network is a basic requirement. Choosing a reliable device is critical because malicious devices can compromise networks and services. However, it is difficult to create a trust management model due to the mobility and resource constraints of IoT devices. For the centralized approach, there are issues of single point of failure and resource expansion and for the distributed approach, it allows to expand network without additional equipment by interconnecting each other, but it has limitations in data exchange and storage with limited resources and is difficult to ensure consistency. Recently, trust management models using fog nodes and blockchain have been proposed. However, blockchain has problems of low throughput and delay. Therefore, in this paper, a trust management model for selecting reliable devices in a fog-based IoT environment is proposed by applying IOTA, a blockchain technology for the Internet of Things. In this model, Directed Acyclic Graph-based ledger structure manages trust data without falsification and improves the low throughput and scalability problems of blockchain.