• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,917, Processing Time 0.035 seconds

Application cases of IoT using big data and its' direction of improvement. (빅데이터를 이용한 IoT 활용사례와 발전방향)

  • Cho, Young-Ju;Kim, Jin-Hyuk;So, Yoon-Jeong;No, Chang-Hee;Kwon, Soon-Pil
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.67-70
    • /
    • 2017
  • 빅데이터는 인터넷의 발달로 인하여 규모를 가늠할 수 없을 정도로 많은 양의 정보가 생산되어지는 데이터를 말한다. 빅데이터를 활용하는 다양한 사례 중 기업에서 활용된 사례로 사람들의 구매데이터를 분석하여 개인의 구매 취향을 분석한 뒤 구매자가 원하는 제품을 빠르게 안내하는 시스템이 있으며, 정부에서 빅데이터를 활용된 사례로는 사회복지 자금이 대상자들에게 제대로 지급되고 있는지 판단하여 부정수급자를 원천봉쇄 하는 시스템이 있다. 이처럼 빅테이터가 인간의 삶에 긍정적인 영향을 주는 등 다양한 분야에서 활용되고 있는데 본 논문에서는 빅데이터를 이용한 IoT의 활용사례를 알아보고, 긍정적 사례와 부정적인 활용사례를 분석한 뒤 그 발전방향에 대해 제시하고자 한다.

  • PDF

Task Scheduling in Fog Computing - Classification, Review, Challenges and Future Directions

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.89-100
    • /
    • 2022
  • With the advancement in the Internet of things Technology (IoT) cloud computing, billions of physical devices have been interconnected for sharing and collecting data in different applications. Despite many advancements, some latency - specific application in the real world is not feasible due to existing constraints of IoT devices and distance between cloud and IoT devices. In order to address issues of latency sensitive applications, fog computing has been developed that involves the availability of computing and storage resources at the edge of the network near the IoT devices. However, fog computing suffers from many limitations such as heterogeneity, storage capabilities, processing capability, memory limitations etc. Therefore, it requires an adequate task scheduling method for utilizing computing resources optimally at the fog layer. This work presents a comprehensive review of different task scheduling methods in fog computing. It analyses different task scheduling methods developed for a fog computing environment in multiple dimensions and compares them to highlight the advantages and disadvantages of methods. Finally, it presents promising research directions for fellow researchers in the fog computing environment.

Blockchain-based authentication for IoT

  • Alaa Alsubhi;Jawaher Alhrthi;Wajdi Alhakami
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.198-204
    • /
    • 2024
  • Correspondence security between IoT devices is a significant concern, and the blockchain makes the latest difference by reducing this matter. In the blockchain idea, the larger part or even all organization hubs check the legitimacy and precision of traded information before tolerating and recording them, regardless of whether this information is identified with monetary exchanges or estimations of a sensor or a confirmation message. In assessing the legitimacy of a traded information, hubs should agree to play out an uncommon activity. The chance to enter and record exchanges and problematic cooperation with the framework is fundamentally decreased. To share and access the executives of IoT devices data with disseminated demeanour, another confirmation convention dependent on block-chain is proposed, and it is guaranteed that this convention fulfils client protection saving and security. This paper highlights the recent approaches conducted by other researchers to secure the Internet of Things environments using blockchain. These approaches are studied and compared with each other to present their features and disadvantages.

Privacy of Capability Token in the IoT Service System

  • Jang, Deresa;Kim, Jin-bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.103-110
    • /
    • 2016
  • The recent development of the Internet of things (IoT) has led to the introduction of new access control measures. Even during the access control for security, however, there might be privacy infringements due to unwanted information provision and collection. Measures to control this process are therefore required. This paper defines the structure and policies of tokens to protect privacy that can be exposed through the token information when you use the capability token in the IoT service system.

Study of IoT Framework using NFV/SDN (NFV/SDN를 통한 IoT 프레임워크 연구)

  • Lim, Hwan-Hee;Kim, Se-Jun;Lee, Byung-Jun;Kim, Kyung-Tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.203-204
    • /
    • 2018
  • 소프트웨어 정의 네트워킹 (SDN)과 네트워크 기능 가상화는 최근들어 급부상 하고 있는 기술이며, Big Data 시대에 큰 잠재력을 가지고 있다. 네트워크 기능 가상화 (NFV)는 방화벽이나 스위치, 라우터와 같은 네트워크 장비를 가상화하는 개념이다. 가상화란 실제로 존재하지 않는 것을 실제로 존재하는 것처럼 하는 것을 의미한다. 가상화 기술을 사용하여 네트워크 노드 기능의 전체 클래스를 통신 서비스를 생성하기 위해 연결하는 네트워크 아키텍쳐 개념이다. 본 논문에서는 IoT 아키텍쳐 설계를 위해 NFV를 이용해 설계하며 SDN 기반 IoT 프레임 워크를 제안한다.

  • PDF

A Distributed Coexistence Mitigation Scheme for IoT-Based Smart Medical Systems

  • Kim, BeomSeok
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1602-1612
    • /
    • 2017
  • Since rapidly disseminating of Internet of Things (IoT) as the new communication paradigm, a number of studies for various applications is being carried out. Especially, interest in the smart medical system is rising. In the smart medical system, a number of medical devices are distributed in popular area such as station and medical center, and this high density of medical device distribution can cause serious performance degradation of communication, referred to as the coexistence problem. When coexistence problem occurs in smart medical system, reliable transmitting of patient's biological information may not be guaranteed and patient's life can be jeopardized. Therefore, coexistence problem in smart medical system should be resolved. In this paper, we propose a distributed coexistence mitigation scheme for IoT-based smart medical system which can dynamically avoid interference in coexistence situation and can guarantee reliable communication. To evaluate the performance of the proposed scheme, we perform extensive simulations by comparing with IEEE 802.15.4 MAC protocol which is a traditional low-power communication technology.

Development of U-Health System and Posture Corrector for Scoliosis Prevention based on Arduino combined IoT (IoT를 결합한 Arudino기반의 척추 측만증 예방을 위한 자세 교정기 및 U-Health System 개발)

  • Lee, Hak-Jun;Oh, Ryum-Duck
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.109-110
    • /
    • 2015
  • ICT 기술의 발달에 따라, 현대인들이 컴퓨터 앞에서 작업하는 시간은 증가했으며 장시간 의자에 앉아 한 자세 및 부적절한 자세와 생활 습관으로 인한 척추 측만증 및 허리 디스크 발병률은 점점 증가하고 있다. 척추는 몸을 지탱하는 기둥으로써 사람의 몸의 중추적인 역할을 하는데 척추가 여러 원인으로 꼬이고 굽어져 'S'형으로 흰 상태를 척추 측만증이라고 한다. 유비쿼터스 컴퓨팅 기술의 발달로 언제 어디서나 자신의 건강상태를 모니터링 할 수 있는 U-Health 시스템이 주목받고 있기 때문에 따라서 본 논문에서 일상 생활에서도 자신의 자세를 측정 및 교정이 가능하며 센서로부터 측정한 값은 사람의 체형마다 다르다는 단점을 보완하고 환자-의사가 통신 할 수 있는 IoT를 결합한 아두이노 기반의 척추 측만증 예방을 위한 자세 교정기 및 U-Health 시스템을 개발하였다.

  • PDF

Blockchain-based Federated Learning for Intrusion Detection in IoT Networks (IoT 네트워크에서 침입 탐지를 위한 블록체인 기반 연합 학습)

  • Md Mamunur Rashid;Philjoo Choi;Suk-Hwan Lee;Ki-Ryong Kwon
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.262-264
    • /
    • 2023
  • Internet of Things (IoT) networks currently employ an increased number of users and applications, raising their susceptibility to cyberattacks and data breaches, and endangering our security and privacy. Intrusion detection, which includes monitoring and analyzing incoming and outgoing traffic to detect and prohibit the hostile activity, is critical to ensure cybersecurity. Conventional intrusion detection systems (IDS) are centralized, making them susceptible to cyberattacks and other relevant privacy issues because all the data is gathered and processed inside a single entity. This research aims to create a blockchain-based architecture to support federated learning and improve cybersecurity and intrusion detection in IoT networks. In order to assess the effectiveness of the suggested approach, we have utilized well-known cybersecurity datasets along with centralized and federated machine learning models.

A Survey of the State-of-the-Art in Korean Commercial IoT Services for deriving Core elements of Curriculum for Major Courses of IoT using RaspberryPi3 (라즈베리파이3 활용 IoT 교육과정 핵심요소 도출을 위한 한국의 상용 서비스 현황 고찰)

  • Lee, Kang-Hee;Ganiev, Asilbek
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.4
    • /
    • pp.623-630
    • /
    • 2017
  • This paper surveys the state-of-the-art in korean commercial Internet of Things(IoT) services for deriving the core elements of a curriculum for major courses of IoT using RaspberryPi3. First, we survey the state-of-the-art of IoT researches and commercial services in three korean major telecommunication corporations such as Korean Telecommunications (KT), LGU+ Telecommunication (LGT), and SK Telecommunication(SKT). Second, we consider the components and advantages of the RaspberryPi3 which is popular as a representative educational tool. Concludingly, this paper derives the core elements of curriculum for major courses of IoT using RaspberryPi3 from above both processes. The corresponding elements consist of platforms, hardwares, softwares, and big-data network. Based on the important design elements of the IoT curriculum using Raspberry Pie 3, we taught embedded system course to junior students for one semester. It was successfully completed and more than 90% students were satisfied with its contents and amounts.

Blockchain-based IoT Authentication techniques for DDoS Attacks

  • Choi, Wonseok;Kim, Sungsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.87-91
    • /
    • 2019
  • In the IoT(Internet of Things) environment, various devices are utilized and applied for different sites. But attackers can access easy to IoT systems, and try to operate DDoS(Distributed Denial-of-Service) attacks. In this paper, Sensor nodes, Cluster heads, and Gateways operates lightweight mutual authentication each others. Since authenticated sensor nodes and cluster heads only send transactions to Gateways, proposed techniques prevent DDoS attacks. In addition, the blockchain system contains secure keys to decrypt data from sensor nodes. Therefore, attackers can not decrypt the data even if the data is eavesdropped.