• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,917, Processing Time 0.031 seconds

A Survey on Security Standards for IoT (사물인터넷 보안 표준화 동향 분석)

  • Na, Yoon Jong;Kim, Young-Gab
    • Annual Conference of KIPS
    • /
    • 2016.04a
    • /
    • pp.307-310
    • /
    • 2016
  • 최근 다양한 산업 분야에서 사물인터넷(Internet of Things; IoT)에 관련된 연구가 활발히 진행되고 있다. 기존 네트워크 환경에서와 같이 IoT 또한 DoS(Denial of Service), 도청, 변조, 중간자 공격 등의 여러 가지 공격으로부터의 공격 대상이 될 수 있으며, 이 외에도 다양한 보안 이슈가 존재한다. 본 논문에서는 이러한 보안 이슈들로부터 안전한 IoT 환경 구축을 위하여, 국내외 표준화 기구에서 제시하고 있는 IoT 보안 관련 표준 및 표준화 동향을 분석하여 문제점을 도출하고 개선 방안을 제안한다.

Internet of Things based Smart Energy Management for Smart Home

  • TASTAN, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2781-2798
    • /
    • 2019
  • Thanks to internet, as one of indispensable parts of our lives, many devices that we use in our daily lives like TV, air conditioner, refrigerator, washing machine, can be monitored and controlled remotely by becoming more intelligent via Internet of Things (IoT) technology. Smart Home applications as one of the elements of smart cities, are individually the most demanded application without question. In this study, Smart Energy Management (SEM) system, based on NodeMCU and Android, has been designed for SEM, which is a part of the smart home application. With this system, household energy consumption can be monitored in real time, as well as having the ability to record the data comprising of operation times and energy consumption information for each device. Additionally, it is ensured to meet the energy needs on a maximized level possible, during the hours when the energy costs are lower owing to the SEM system. The Android interface provides the users with the opportunity to monitor and change their electricity consumption habits in order to optimize the energy efficiency, along with the opportunity to draw up of a daily and weekly schedule.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

IoT-Based Health Big-Data Process Technologies: A Survey

  • Yoo, Hyun;Park, Roy C.;Chung, Kyungyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.974-992
    • /
    • 2021
  • Recently, the healthcare field has undergone rapid changes owing to the accumulation of health big data and the development of machine learning. Data mining research in the field of healthcare has different characteristics from those of other data analyses, such as the structural complexity of the medical data, requirement for medical expertise, and security of personal medical information. Various methods have been implemented to address these issues, including the machine learning model and cloud platform. However, the machine learning model presents the problem of opaque result interpretation, and the cloud platform requires more in-depth research on security and efficiency. To address these issues, this paper presents a recent technology for Internet-of-Things-based (IoT-based) health big data processing. We present a cloud-based IoT health platform and health big data processing technology that reduces the medical data management costs and enhances safety. We also present a data mining technology for health-risk prediction, which is the core of healthcare. Finally, we propose a study using explainable artificial intelligence that enhances the reliability and transparency of the decision-making system, which is called the black box model owing to its lack of transparency.

Geometric Optimization Algorithm for Path Loss Model of Riparian Zone IoT Networks Based on Federated Learning Framework

  • Yu Geng;Tiecheng Song;Qiang Wang;Xiaoqin Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1774-1794
    • /
    • 2024
  • In the field of environmental sensing, it is necessary to develop radio planning techniques for the next generation Internet of Things (IoT) networks over mixed terrains. Such techniques are needed for smart remote monitoring of utility supplies, with links situated close to but out of range of cellular networks. In this paper, a three-dimension (3-D) geometric optimization algorithm is proposed, considering the positions of edge IoT devices and antenna coupling factors. Firstly, a multi-level single linkage (MLSL) iteration method, based on geometric objectives, is derived to evaluate the data rates over ISM 915 MHz channels, utilizing optimized power-distance profiles of continuous waves. Subsequently, a federated learning (FL) data selection algorithm is designed based on the 3-D geometric positions. Finally, a measurement example is taken in a meadow biome of the Mexican Colima district, which is prone to fluvial floods. The empirical path loss model has been enhanced, demonstrating the accuracy of the proposed optimization algorithm as well as the possibility of further prediction work.

Trends of NB-IoT (협대역 사물인터넷 기술동향)

  • Seo, S.;Shin, E.J.;Jo, G.D.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.5
    • /
    • pp.11-20
    • /
    • 2016
  • 사물인터넷은 다양한 응용 및 융합 서비스를 창출할 새로운 기회의 장으로 떠오르고 있다. 가트너 등의 시장 조사기관 및 전문가 들의 예측에 따르면 2020년까지 사물인터넷 디바이스는 300~500억 대로 증가할 것이며, 시장 규모는 3,000억 달러를 초과할 것으로 전망하였다. 이러한 거대한 규모의 시장 선점을 위한 기술 간, 업체 간 경쟁도 한층 증대되고 있다. 비 3GPP 계열 LPWA 네트워크는 유럽을 중심으로 이미 서비스가 시작되었으며, 3GPP에서는 LPWA 네트워크 실현을 위해 Narrowband Internet-of-Things(NB-IoT)를 새롭게 소개하였다. NB-IoT는 비 3GPP 계열 LPWA 기술과의 경쟁 속에서도 빠르게 시장에 진입할 것으로 기대된다. 본고에서는 표준화가 완료된 3GPP Release 13 NB-IoT 기술과 Release 14을 목표로 표준화가 진행 중인 NB-IoT enhancement에 대해 기술한다.

  • PDF

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

UDP-Based Active Scan for IoT Security (UAIS)

  • Jung, Hyun-Chul;Jo, Hyun-geun;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.20-34
    • /
    • 2021
  • Today, IoT devices are flooding, and traffic is increasing rapidly. The Internet of Things creates a variety of added value through connections between devices, while many devices are easily targeted by attackers due to security vulnerabilities. In the IoT environment, security diagnosis has problems such as having to provide different solutions for different types of devices in network situations where various types of devices are interlocked, personal leakage of security solutions themselves, and high cost, etc. To avoid such problems, a TCP-based active scan was presented. However, the TCP-based active scan has limitations that it is difficult to be applied to real-time systems due to long detection times. To complement this, this study uses UDP-based approaches. Specifically, a lightweight active scan algorithm that effectively identifies devices using UPnP protocols (SSDP, MDNS, and MBNS) that are most commonly used by manufacturers is proposed. The experimental results of this study have shown that devices can be distinguished by more than twice the true positive and recall at an average time of 1524 times faster than Nmap, which has a firm position in the field.

A Design of Exploit Vulnerability Analysis Module for Open Source IoT Security (Open Source IoT 보안을 위한 익스플로잇 취약점 분석 모듈 설계)

  • Park, Geunil;Park, Sanghyeon;Jun, Moon-Seog
    • Annual Conference of KIPS
    • /
    • 2016.10a
    • /
    • pp.313-314
    • /
    • 2016
  • 최근 컴퓨터, 휴대폰 등 전자기기만 인터넷 연결이 가능하던 시대를 지나 냉장고, 에어컨, 현관문 등 모든 종류의 사물들 간 사람의 개입이 필요 없는 초연결사회로 발전하고 있다. 이러한 모든 사물들 간 인터넷기반으로 상호 연결되어있는 IoT(Internet of Things)환경이 급격히 성장 하고 있는 가운데 더불어 OSIoT(Open Source IoT)의 수요도 함께 급성장하고 있다. OSIoT의 소프트웨어는 보안에 대한 전문적인 개발자의 체계적인 설계에 의해 개발되어야만 하트블리드(HeartBleed), 쉘쇼크(ShellShock)와 같은 다양한 보안취약점에 안전하다. 하지만 OSIoT소프트웨어는 누구나 쉽게 접근 설계가 가능하기 때문에 일반적으로 배포되고 있는 OSIoT의 소프트웨어 검증이 필요하다. 따라서 본 논문에서는 다른 소프트웨어 점검 도구들과 연계 가능한 정적분석 도구인 취약점 별 익스플로잇 적용 모듈 설계를 제안한다.

Actual Cases for Smart Fusion Industry based on Internet of Thing (사물인터넷 기반의 스마트 융합 산업 사례 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.2
    • /
    • pp.1-6
    • /
    • 2016
  • Internet has been used by the unique space that users share various informations. Due to the development of Information communication technology(ICT), many devices were introduced. These devices are connected by Internet each other. The Internet of Things(IoT) use the Internet for the interconnection of the things. Studies for 'Internet of Things' progress extensively on today. Therefore, we studied the smart industries domain related with Internet of things. In this paper, three domains among the smart industries were described. These three domains such as smart city, smart home and smart health are related with our life. Therefore, we described many actual cases in three domains based on Internet of Things.