• Title/Summary/Keyword: IoT 결함

Search Result 645, Processing Time 0.026 seconds

Design of Variable Timeslot for Hybrid MAC (하이브리드 MAC을 위한 가변 타임슬롯 설계)

  • Ryu, Jeong-Kyu;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.613-619
    • /
    • 2020
  • Hybrid media access control (MAC) is used in internet of things (IoT) network, because of communication feature concern with data capacity and communication interval between gateway and sensor nodes and the cost efficiency. Hybrid MAC consists of TDMA and CSMA generally. The distance between gateway and sensor node is openly changed in marine IoT network. Therefore, it is needed to control the period of timeslot of hybrid MAC used in marine IoT network. In this paper, the design rule of TDMA timeslot with the variable period depending on communication distance was proposed. It was confirmed from the analysis that 72 times communication between gateway and sensor nodes is possible in LoRa network by using the proposed TDMA variable timeslot scheme.

Analysis and Design of Cattle Management System based on IoT (사물인터넷 기반 소관리 시스템의 분석 및 설계)

  • Cho, Byung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.125-130
    • /
    • 2021
  • Implementation of livestock smart-farm can be done more effectively with IoT technology developing. An build of useful stock management system can be possibile if push messages of these judgement are notified on smart-phone after cattle's illness and estrus are judged using IoT technology. These judgement method of cattle's illness and estrus can be done with gathering living stock data using temperature sensor and 3 axis acceleration sensor and sending these data using IoT and internet network into server, and studying AI machine learning using these data. In this paper, to build this cattle management system based on IoT, effective system of the whole architecture is showed. Also an effective analysis and design method to develop this system software will be presented by showing user requirement analysis using object-oriented method, flowchart and screen design.

QoS-Aware Optimal SNN Model Parameter Generation Method in Neuromorphic Environment (뉴로모픽 환경에서 QoS를 고려한 최적의 SNN 모델 파라미터 생성 기법)

  • Seoyeon Kim;Bongjae Kim;Jinman Jung
    • Smart Media Journal
    • /
    • v.12 no.4
    • /
    • pp.19-26
    • /
    • 2023
  • IoT edge services utilizing neuromorphic hardware architectures are suitable for autonomous IoT applications as they perform intelligent processing on the device itself. However, spiking neural networks applied to neuromorphic hardware are difficult for IoT developers to comprehend due to their complex structures and various hyper-parameters. In this paper, we propose a method for generating spiking neural network (SNN) models that satisfy user performance requirements while considering the constraints of neuromorphic hardware. Our proposed method utilizes previously trained models from pre-processed data to find optimal SNN model parameters from profiling data. Comparing our method to a naive search method, both methods satisfy user requirements, but our proposed method shows better performance in terms of runtime. Additionally, even if the constraints of new hardware are not clearly known, the proposed method can provide high scalability by utilizing the profiled data of the hardware.

Development of IoT-based Can Compactor/PET Bottle Crusher Management System (IoT 기반의 캔/PET병 압착파쇄기 관리시스템 개발)

  • Dae-Hyun Ryu;Ye-Seong Kang;Tae-Wan Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1239-1244
    • /
    • 2023
  • In this study, we developed an IoT-based management system to manage a can/PET crusher. Various sensors such as two load cells, DHT22 temperature and humidity sensor, and fine dust meter were interfaced with ESP32 to construct an IoT device, and a management server was built using Node-RED. The system monitors the weight of pressed cans and shredded PET bottles in real time and sends a text message to the manager when the weight exceeds the predetermined threshold for timely collection. The results of the operational test confirmed that the system provides accurate monitoring and efficient notification functions, and offers the possibility of solving environmental problems by improving the efficiency of waste management such as cans and PET bottles.

초연결 환경에서 보안위협 대응을 위한 사물인터넷(IoT) 보안 기술 연구

  • Kim, Jeong-Nyeo;Jin, Seung-Heon
    • Information and Communications Magazine
    • /
    • v.34 no.3
    • /
    • pp.57-64
    • /
    • 2017
  • 각종 사물에 네트워크 기능이 탑재되어 초연결 통신으로 연결되는 사물인터넷(IoT, Internet of Things) 기술이 급속히 확산됨에 따라, 최근에는 그 사물 자체가 지능화되어 지능형 스마트 사물로 진화하고 있다. 기기들이 자신을 구별할 수 있는 유일한 IP를 보유하면서 사물인터넷에 연결되어, 모든 기기가 해킹의 대상이 될 수 있어 보안적인 측면에서도 취약하게 되었다. 본고에서는 최근들어 급증하는 초연결 네트워크 환경과 사물인터넷에 대하여 알아보고, 초연결 환경에서 보안 위협에 대응하는 사물인터넷 보안 기술에 대한 연구와 표준화 동향, 그리고 사물인터넷 보안 위협에 대응하는 보안 기술의 방향을 알아본다.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

Reduction of Inference time in Neuromorphic Based Platform for IoT Computing Environments (IoT 컴퓨팅 환경을 위한 뉴로모픽 기반 플랫폼의 추론시간 단축)

  • Kim, Jaeseop;Lee, Seungyeon;Hong, Jiman
    • Smart Media Journal
    • /
    • v.11 no.2
    • /
    • pp.77-83
    • /
    • 2022
  • The neuromorphic architecture uses a spiking neural network (SNN) model to derive more accurate results as more spike values are accumulated through inference experiments. When the inference result converges to a specific value, even if the inference experiment is further performed, the change in the result is smaller and power consumption may increase. In particular, in an AI-based IoT environment, power consumption can be a big problem. Therefore, in this paper, we propose a technique to reduce the power consumption of AI-based IoT by reducing the inference time by adjusting the inference image exposure time in the neuromorphic architecture environment. The proposed technique calculates the next inferred image exposure time by reflecting the change in inference accuracy. In addition, the rate of reflection of the change in inference accuracy can be adjusted with a coefficient value, and an optimal coefficient value is found through a comparison experiment of various coefficient values. In the proposed technique, the inference image exposure time corresponding to the target accuracy is greater than that of the linear technique, but the overall power consumption is less than that of the linear technique. As a result of measuring and evaluating the performance of the proposed method, it is confirmed that the inference experiment applying the proposed method can reduce the final exposure time by about 90% compared to the inference experiment applying the linear method.

Deep Learning based BER Prediction Model in Underwater IoT Networks (딥러닝 기반의 수중 IoT 네트워크 BER 예측 모델)

  • Byun, JungHun;Park, Jin Hoon;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.41-48
    • /
    • 2020
  • The sensor nodes in underwater IoT networks have practical limitations in power supply. Thus, the reduction of power consumption is one of the most important issues in underwater environments. In this regard, AMC(Adaptive Modulation and Coding) techniques are used by using the relation between SNR and BER. However, according to our hands-on experience, we observed that the relation between SNR and BER is not that tight in underwater environments. Therefore, we propose a deep learning based MLP classification model to reflect multiple underwater channel parameters at the same time. It correctly predicts BER with a high accuracy of 85.2%. The proposed model can choose the best parameters to have the highest throughput. Simulation results show that the throughput can be enhanced by 4.4 times higher than the conventionally measured results.

Data Storage and Security Model for Mobile Healthcare Service based on IoT (IoT 기반의 모바일 헬스케어 서비스를 위한 데이터 저장 및 보호 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.187-193
    • /
    • 2017
  • Objects Internet-based healthcare services provide healthcare and healthcare services, including measurement of user's vital signs, diagnosis and prevention of diseases, through a variety of object internet devices. However, there is a problem that new security vulnerability can occur when inter-working with the security weakness of each element technology because the internet service based on the object Internet provides a service by integrating various element technologies. In this paper, we propose a user privacy protection model that can securely process user's healthcare information from a third party when delivering healthcare information of users using wearable equipment based on IoT in a mobile environment to a server. The proposed model provides attribute values for each healthcare sensor information so that the user can safely handle, store, and store the healthcare information, thereby managing the privacy of the user in a hierarchical manner. As a result of the performance evaluation, the throughput of IoT device is improved by 10.5% on average and the server overhead is 9.9% lower than that of the existing model.