• Title/Summary/Keyword: IoT (internet of things)

Search Result 1,917, Processing Time 0.036 seconds

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

Implementation and Design of Smart Reading Room Desk using IoT (IoT를 활용한 스마트 독서실 책상의 설계 및 구현)

  • Ha, Hye-Ju;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.71-76
    • /
    • 2020
  • Recently, the market of private study room continues to grow due to increased usage of private study room. However, old study room operators often have problems with cleanliness and theft, and cannot handle them in real time. Also, there is a problem of wasting power since users usually leave their desk for a long time with the lights on. Thus, in this paper, we intended to design a service which can prevent theft, clean up the user's desk, and adjust lighting system according to the user's condition based on Arduino system. Also, we tried to design a system which sends notifications from information of android-based IoT(Internet of Things), to the terminal when other people approach to the user's desk or try to steal user's item.

TLSA: A Two Level Scheduling Algorithm for Multiple packets Arrival in TSCH Networks

  • Asuti, Manjunath G.;Basarkod, Prabhugoud I.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3201-3223
    • /
    • 2020
  • Wireless communication has become the promising technology in the recent times because of its applications in Internet of Things( IoT) devices. The IEEE 802.15.4e has become the key technology for IoT devices which utilizes the Time-Slotted Channel Hopping (TSCH) networks for the communication between the devices. In this paper, we develop a Two Level Scheduling Algorithm (TLSA) for scheduling multiple packets with different arrival rate at the source nodes in a TSCH networks based on the link activated by a centralized scheduler. TLSA is developed by considering three types of links in a network such as link i with packets arrival type 1, link j with packets arrival type 2, link k with packets arrival type 3. For the data packets arrival, two stages in a network is considered.At the first stage, the packets are considered to be of higher priority.At the second stage, the packets are considered to be of lower priority.We introduce level 1 schedule for the packets at stage 1 and level 2 schedule for the packets at stage 2 respectively. Finally, the TLSA is validated with the two different energy functions i.e., y = eax - 1 and y = 0.5x2 using MATLAB 2017a software for the computation of average and worst ratios of the two levels.

Study on Enhancing National Defense Security based on RFID and Internet of Things Technology (RFID와 사물인터넷을 활용한 국방 보안 강화에 대한 연구)

  • Oh, Se-Ra;Kim, Young-Gab
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.175-188
    • /
    • 2017
  • Radio-frequency identification (RFID) is being used in various fields as a technology for identifying objects (people, things etc.) using radio frequencies. In the past, there was an attempt to apply RFID into national defense, but failed to spread RFID in the defense field because of some limitations of RFID in a specific situation (e.g., low recognition rate). Therefore, in this paper, we propose how to overcome the limitation of RFID by adopting the Internet of Things (IoT) technology which is considered as an important technology of the future. Furthermore, we propose four scenarios (i.e., healcare band and RFID, identification and anormal state detection, access control, and confidential document management) that can be used for enhancing national defense security. In addition, we analyze the basic characteristics and security requirements of RFID and IoT in order to effectively apply each technology and improve security level.

Performance Analysis of Implementation on IoT based Smart Wearable Mine Detection Device

  • Kim, Chi-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.51-57
    • /
    • 2019
  • In this paper, we analyzed the performance of IoT based smart wearable mine detection device. There are various mine detection methods currently used by the military. Still, in the general field, mine detection is performed by visual detection, probe detection, detector detection, and other detection methods. The detection method by the detector is using a GPR sensor on the detector, which is possible to detect metals, but it is difficult to identify non-metals. It is hard to distinguish whether the area where the detection was performed or not. Also, there is a problem that a lot of human resources and time are wasted, and if the user does not move the sensor at a constant speed or moves too fast, it is difficult to detect landmines accurately. Therefore, we studied the smart wearable mine detection device composed of human body antenna, main microprocessor, smart glasses, body-mounted LCD monitor, wireless data transmission, belt type power supply, black box camera, which is to improve the problem of the error of mine detection using unidirectional ultrasonic sensing signal. Based on the results of this study, we will conduct an experiment to confirm the possibility of detecting underground mines based on the Internet of Things (IoT). This paper consists of an introduction, experimental environment composition, simulation analysis, and conclusion. Introduction introduces the research contents such as mines, mine detectors, and research progress. It consists of large anti-personnel mine, M16A1 fragmented anti-mine, M15 and M19 antitank mines, plastic bottles similar to mines and aluminum cans. Simulation analysis is conducted by using MATLAB to analyze the mine detection device implementation performance, generating and transmitting IoT signals, and analyzing each received signal to verify the detection performance of landmines. Then we will measure the performance through the simulation of IoT-based mine detection algorithm so that we will prove the possibility of IoT-based detection landmine.

A Novel CNN and GA-Based Algorithm for Intrusion Detection in IoT Devices

  • Ibrahim Darwish;Samih Montser;Mohamed R. Saadi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.55-64
    • /
    • 2023
  • The Internet of Things (IoT) is the combination of the internet and various sensing devices. IoT security has increasingly attracted extensive attention. However, significant losses appears due to malicious attacks. Therefore, intrusion detection, which detects malicious attacks and their behaviors in IoT devices plays a crucial role in IoT security. The intrusion detection system, namely IDS should be executed efficiently by conducting classification and efficient feature extraction techniques. To effectively perform Intrusion detection in IoT applications, a novel method based on a Conventional Neural Network (CNN) for classification and an improved Genetic Algorithm (GA) for extraction is proposed and implemented. Existing issues like failing to detect the few attacks from smaller samples are focused, and hence the proposed novel CNN is applied to detect almost all attacks from small to large samples. For that purpose, the feature selection is essential. Thus, the genetic algorithm is improved to identify the best fitness values to perform accurate feature selection. To evaluate the performance, the NSL-KDDCUP dataset is used, and two datasets such as KDDTEST21 and KDDTEST+ are chosen. The performance and results are compared and analyzed with other existing models. The experimental results show that the proposed algorithm has superior intrusion detection rates to existing models, where the accuracy and true positive rate improve and the false positive rate decrease. In addition, the proposed algorithm indicates better performance on KDDTEST+ than KDDTEST21 because there are few attacks from minor samples in KDDTEST+. Therefore, the results demonstrate that the novel proposed CNN with the improved GA can identify almost every intrusion.

A Review Study of Interface Technology based Internet of Things (사물인터넷 기반 인터페이스 기술에 관한 문헌적 고찰)

  • Jin, Chan-Yong;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.115-117
    • /
    • 2016
  • Recently, many IoT(internet of things) products are emerging on the market and information technology companies are competing on the areas of internet of things standardization and platforms. This paper introduces many researches, standardizations, platforms on internet of things. Because of that, as the interest in this area out focused, many kinds of technology and new service are being exploited in this field. Therefore, we conducted a review research based on the internet of things. Also, this study was targeted a total of 34 research papers that are setting up the related internet of things among the research papers published in domestic academic journals since 2010. In this review, the studies related internet of things showed that the most is studied between 2014 and 2015. This study suggests practical and theoretical implications based on the results.

  • PDF

Logical Activity Recognition Model for Smart Home Environment

  • Choi, Jung-In;Lim, Sung-Ju;Yong, Hwan-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.67-72
    • /
    • 2015
  • Recently, studies that interact with human and things through motion recognition are increasing due to the expansion of IoT(Internet of Things). This paper proposed the system that recognizes the user's logical activity in home environment by attaching some sensors to various objects. We employ Arduino sensors and appreciate the logical activity by using the physical activitymodel that we processed in the previous researches. In this System, we can cognize the activities such as watching TV, listening music, talking, eating, cooking, sleeping and using computer. After we produce experimental data through setting virtual scenario, then the average result of recognition rate was 95% but depending on experiment sensor situation and physical activity errors the consequence could be changed. To provide the recognized results to user, we visualized diverse graphs.

Implementation of Actuator Control System based on Web (웹 기반 원격 액츄에이터 제어 시스템 구현)

  • Bae, Byeong Chae;Jeong, Dong Min;Lee, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.570-572
    • /
    • 2016
  • Recent people start to attention about IoT(Internet of Things) and applying IoT on many fields is rising. In this paper we have implemented to control things via web so we used SimpleHTTPServer with Python. Client was used POST, one of web request method which passes through web server and developed a remote control system.

  • PDF

3GPP 5G Core Network: An Overview and Future Directions

  • Husain, Syed;Kunz, Andreas;Song, JaeSeung
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.1
    • /
    • pp.8-15
    • /
    • 2022
  • The new 5G radio technology (NR) can provide ultra-reliable low latency communications. The supporting 5G network infrastructure will move away from the previous point-to-point network architecture to a service-based architecture. 5G can provide three new things, i.e., wider channels, lower latency and more bandwidth. These will allow 5G to support three main types of connected services, including enhanced mobile broadband, mission-critical communications, and the massive Internet of Things (IoT). In 2015, the 5th generation (5G) mobile communication was officially approved by the International Telecommunication Union (ITU) as IMT-2020. Since then, 3GPP, the international organization responsible for 5G standards, is actively developing specifications for 5G technologies. 3GPP Release 15 provides the first full set of 5G standards, and the evolution and expansion of 5G are now being standardized in Release 16 and 17, respectively. This paper provides an overview of 3GPP 5G technologies and key services.