• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,917, Processing Time 0.032 seconds

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

MSMA/CA: Multiple Access Control Protocol for Cognitive Radio-Based IoT Networks

  • Muhammad Shafiq;Jin-Ghoo Choi
    • Journal of Internet Technology
    • /
    • v.20 no.1
    • /
    • pp.301-313
    • /
    • 2019
  • In this paper, we propose a new MAC protocol for Cognitive Radio (CR)-based IoT networks, called MSMA/CA. We extend the standard CSMA/CA, adopted in IEEE 802.11 WLANs, to the CR networks with the minimal modification since it works well in the real world. We resolve the classical hidden/exposed terminal problems by a variant of RTS/CTS mechanism and further, the hidden primary terminal problem by the mutual spectrum sensing at the transmitter and the receiver. We also modify the backoff process of CSMA/CA to incorporate the blocking of secondary transmitters, with the aim of protecting ongoing primary transmissions from aggressive secondary users. We analyze the throughput and delay of our proposed scheme using the Markov chain model on the backoff procedure, and verify its accuracy by simulations. Simulation results demonstrate that our protocol is suitable for IoT networks since the performance is insensitive to the number of users or devices.

Study of Machine Learning Method for Anormaly Detection Using Multivariate Gaussian Distribution in LPWA Network Environment (LPWA 네트워크 환경에서 다변량 가우스 분포를 활용하여 이상탐지를 위한 머신러닝 기법 연구)

  • Lee, Sangjin;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.309-311
    • /
    • 2017
  • With the recent development of the Internet (IoT) technology, we have come to a very connected society. This paper focuses on the security aspects that can occur within the LPWA Network environment of the Internet of things, and proposes a new machine learning method considering next generation IPS / IDS that can detect and block unexpected and unusual behavior of devices.

  • PDF

A Design of Smart Home IoT Device Remote Control Policy Management System based on CEP (CEP 기반의 스마트 홈 IoT 디바이스 원격 제어 정책 관리 시스템 설계)

  • Kim, KyeYoung;Moon, Daejin;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.576-578
    • /
    • 2016
  • Various smart home IoT devices and services while the Internet of things is the development has been provided. The core of the smart home IoT service is that user control the device via the Internet communication. Communication of IoT devices, because most with an IP address within the private network, there is a difficulty in the remote control to control access from outside the network. Any of the methods for remote control, to determine the IP address of each other, there is a UDP hole punching for communication. To ensure the data communication success rate closed to 100%, the UDP hole punching must undergo a process of three stages in some cases. In this paper, to provide a system for managing the remote control policy based on the CEP in order to omit the unnecessary steps on the remote control of IoT devices using UDP hole punching.

  • PDF

Probabilistic Method to Enhance ZigBee Throughput in Wi-Fi Interference Environment (Wi-Fi 간섭 환경에서 ZigBee 전송률 향상을 위한 확률적 방법)

  • Lee, Sujin;Yoo, Younghwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.606-613
    • /
    • 2014
  • The Internet of Things (IoT), which has recently attracted attention as next-generation IT industry, is based on a wired and wireless network platform that can connect various Things. However, it is challenging to implement the IoT platform because of the heterogeneity of the network. Particularly, the ZigBee transmission may be significantly harmed due to Wi-Fi with the relatively much higher power, and this is one of the reason making the platform implementation difficult. In this paper, the ZigBee transmission is measured and analyzed by the BEB algorithm for finding the slot time when ZigBee can transmit, and an actual transmission happens stochastically depending on the network environment. The simulation results show that it guarantees high success rate of the ZigBee transmission by overcoming Wi-Fi interference in the 2.4 GHz frequency band.

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.

Implementation of CoAP/6LoWPAN over BLE Networks for IoT Services (BLE 네트워크 상에서 사물인터넷 서비스 제공을 위한 CoAP과 6LoWPAN 구현)

  • Kim, Cheol-Min;Kang, Hyung-Woo;Choi, Sang-Il;Koh, Seok-Joo
    • Journal of Broadcast Engineering
    • /
    • v.21 no.3
    • /
    • pp.298-306
    • /
    • 2016
  • With the advent of Internet of Things (IoT) technology that allows the communications between things and devices over the Internet, a lot of researches on the IoT services, such as smart home or healthcare, have been progressed. In the existing machine-to-machine (M2M) communications, however, since the underlying link-layer technologies, such as Bluetooth or ZigBee, do not use the Internet Protocol (IP) communication, those technologies are not suitable to provide the IoT services. Accordingly, this paper discusses how to provide the Internet services in the M2M communication, and propose an implementation of the Constrained Application Protocol (CoAP) over 6LoWPAN for providing IoT services in the BLE networks. Based on the implementation, we compared the performance between HTTP and CoAP for IoT communications. From the experimental results, we can see that the CoAP protocol gives better performance than the HTTP protocol with two times higher throughput, 21% faster transmission time, and 22% smaller amount of generated packets.

A Study on the Efficiency Improving of Communication Protocols on the Internet of Things. (사물인터넷 통신프로토콜 성능 개선 연구)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Soh, Woo-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.427-430
    • /
    • 2016
  • Internet of Things is one of the technologies that become a hot topic in recent years, is a technology that connects objects with wired or wireless network and share a information between objects. Gartner predicts that spread rapidly devices for end users, also increase revenue from enterprise equipment through the Annual 'Internet of Things' reports. By this trend, Internet of Things is becoming the platform of various kinds, the platform and the protocol for that have been developed a new technique. In this paper, we compared the performance of the communication protocol between devices in the Internet of Things, and propose a way to improve performance efficiency.

  • PDF

Data Interworking Model Between DLMS and LwM2M Protocol (DLMS와 LwM2M 프로토콜 간 데이터 연동 모델 연구)

  • Myoung, Nogil;Park, Myunghye;Kim, Younghyun;Kang, Donghoon;Eun, Changsoo
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.1
    • /
    • pp.29-33
    • /
    • 2020
  • Despite the same system architecture and operation principle, Advanced Metering Infrastructure (AMI) and Internet of Things (IoT) are recognized as a heterogeneous system. This is due to the different object modeling and communication protocols used in smart meters and sensors. However, data interworking between AMI and IoT is expected to be inevitable in the future. In this paper, we propose Device Language Message Specification (DLMS) to Lightweight Machine to Machine (LwM2M) conversion model. The proposed interworking model can reduce the packet size by 46.5% compared to that of the encapsulation method.

Case Study on Nest's "Internet of Energy (IoE)" Business Model: Based on Strategic Choices for Connected Product

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.89-96
    • /
    • 2019
  • The purpose of this study is to investigate Nest Labs (Nest)'s business strategy. The activities based on strategic choices for monetizing connected product are investigated. Nest's capacity and functionality is to offer a seamless integration of devices, platforms, and services and the "Works with Nest" offers an ecosystem fulfilling the needs of different partners. For monetizing customer data, Nest provides a seamless customer experience supported by product incentives. Nest introduces open APIs to connect its connected products to the wider Internet of things (IoT) and open to "If This, Then That." The Nest app controls them from one single place. Nest partners with 32 energy providers as of 2017 and they provide energy from renewable and non-renewable energy sources. Nest also creates a sales channels in direct and indirect route and expands is business model to other industries such as home-rental service, 'AirBnB' to help consumers become more energy-efficient at home.