• Title/Summary/Keyword: IoT 결함

Search Result 645, Processing Time 0.032 seconds

Analytical Modelling and Heuristic Algorithm for Object Transfer Latency in the Internet of Things (사물인터넷에서 객체전송지연을 계산하기 위한 수리적 모델링 및 휴리스틱 알고리즘의 개발)

  • Lee, Yong-Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.1-6
    • /
    • 2020
  • This paper aims to integrate the previous models about mean object transfer latency in one framework and analyze the result through the computational experience. The analytical object transfer latency model assumes the multiple packet losses and the Internet of Things(IoT) environment including multi-hop wireless network, where fast re-transmission is not possible due to small window. The model also considers the initial congestion window size and the multiple packet loss in one congestion window. Performance evaluation shows that the lower and upper bounds of the mean object transfer latency are almost the same when both transfer object size and packet loss rate are small. However, as packet loss rate increases, the size of the initial congestion window and the round-trip time affect the upper and lower bounds of the mean object transfer latency.

AMI Network Failure Analysis based on Graph Database (그래프 데이터베이스 기반 AMI 네트워크 장애 분석)

  • Jeong, Woo-Cheol;Jun, Moon-Seog;Choi, Do-Hyeon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.41-48
    • /
    • 2020
  • Recently, the spreading business of AMI (Advanced Metering Infrastructure) remote metering systems in various regions of the country has been activated, and it provides various metering functions such as two-way communication and security plan functions for power demand management. Current AMI system is difficult to analyze based on the existing RDB(Relational Database) due to the increase in the size of new internal IoT devices and networks. This study proposes a new GDB(Graph Database) based failure analysis method that utilizes existing RDB data. It analyzes the correlation of new failure patterns through accumulated data such as internal thresholds and status values. As a result of GDB-based simulation, it was confirmed that RDB can predict to a new obstacle pattern that was difficult to analyze.

Resilient Routing Protocol Scheme for 6LoWPAN (6LoWPAN에서 회복력 있는 라우팅 프로토콜 기법)

  • Woo, Yeon Kyung;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.141-149
    • /
    • 2013
  • IETF 6LoWPAN standard technique has been studied in IoT environment to support the IPv6 packet communication. 6LoWPAN protocol for transmission of packets mainly in the AODV routing protocol and a variety of extended techniques have been investigated. In particular, consisting of nodes with limited resources in a network error occurs when the 6LoWPAN reliable data transfer and fast routing method is needed. To this end, in this paper, we propose resilient routing protocol and extension of IETF LOAD algorithm, for optimal recovery path, More specifically, the optimal recovery path setup algorithm, signal flow, and detailed protocols for the verification of the reliability of packet transmission mathematical model is presented. The proposed protocol techniques to analyze the performance of the NS-3 performance through the simulation results that is end-to-end delay, throughput, packet delivery fraction and control packet overhead demonstrated excellence in comparison with existing LOAD.

Efficient ID-Based Authentication and Key Exchange Protocol (효율적인 ID 기반 인증 및 키 교환 프로토콜)

  • Eom, Jieun;Seo, Minhye;Park, Jong Hwan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1387-1399
    • /
    • 2016
  • In a hyper-connected society realized through IoT-enabled technology, a large amount of data is collected by various devices and is processed to provide new services to users. While communicating through a network, it is essential for devices to execute mutual authentication since users' privacy can be infringed by malicious attackers. ID-based signature enables authentication and key exchange with a unique ID of a device. However, most of the previous ID-based signature schemes based on RSA require an additional step to share parameters for key exchange so that they are not suitable for resource-constrained devices in terms of efficiency. In this paper, we design an efficient ID-based signature and thereby propose an efficient ID-based authentication and key exchange protocol in which sessions for both an authentication and a key exchange are executed simultaneously. In addition, we prove the security of our scheme under the RSA onewayness problem and analyze the efficiency by comparing with the previous schemes.

Implementation of Facility Movement Recognition Accuracy Analysis and Utilization Service using Drone Image (드론 영상 활용 시설물 이동 인식 정확도 분석 및 활용 서비스 구현)

  • Kim, Gwang-Seok;Oh, Ah-Ra;Choi, Yun-Soo
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.5
    • /
    • pp.88-96
    • /
    • 2021
  • Advanced Internet of Things (IoT) technology is being used in various ways for the safety of the energy industry. At the center of safety measures, drones play various roles on behalf of humans. Drones are playing a role in reaching places that are difficult to reach due to large-scale facilities and space restrictions that are difficult for humans to inspect. In this study, the accuracy and completeness of movement of dangerous facilities were tested using drone images, and it was confirmed that the movement recognition accuracy was 100%, the average data analysis accuracy was 95.8699%, and the average completeness was 100%. Based on the experimental results, a future-oriented facility risk analysis system combined with ICT technology was implemented and presented. Additional experiments with diversified conditions are required in the future, and ICT convergence analysis system implementation is required.

Analysis of Technology Convergence of 'Internet of Things' Patents in the Electronic Commerce by the CPC Code Technology (전자상거래(G06Q) 분야에서 '사물인터넷' 기술의 CPC 코드 기반 기술 융복합 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.678-683
    • /
    • 2018
  • This study deals with the analysis of a technology convergence of the IoT(Internet of Things) which is the key technology of the fourth industrial revolution. For this purpose, 77 patents with the Main Category CPC code G06Q50/10(Electronic Commerce Service) among the IoT patents filed after 2014 were analyzed. As a result of the Main-Sub Category analysis of CPC codes, the IoT has a strong relationship between "Electronic Commerce Service (G06Q50/10)" and G06Q(49 cases), H04L(40 cases), G08B(24 cases), G05B(21 cases), H04W(21 cases), H04N(16 cases), and so on. By using the methodology in this study, we can contribute the establishment of technology strategy and new value creation from the prediction of the possibility of the combination of technologies and to develop new patents among various new technologies.

Implementation of a Sensor Network in a Welding Workplace Based on IoT for Smart Shipyards (스마트 조선소를 위한 사물인터넷 기반 용접 작업장 센서네트워크 구축)

  • Kim, Hyun Sik;Lee, Gi Seung;Kang, Seog Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.433-439
    • /
    • 2021
  • In this paper, we propose a method to implement an IoT-based sensor network for each workplace of a shipyard. Here, at the most common welding workplace in shipyards, the shipbuilding blocks are used as a communication medium to transmit information such as the worker's location, welding progress, and working hour to a server using LoRa and powerline communication. To achieve the data communication, inductive couplers and hybrid modems have been manufactured and installed on wire feeders and pin jigs to establish a sensor network. As a result of field test, the proposed system shows a success rate of data transmission and a rate of successful recognition of worker's location of about 98% or more. In addition, the process management system platform can record and display the work process data generated at the field in real time. The proposed system can be a starting point for enhancing the competitiveness of Korean shipbuilding industry through the establishment of a smart shipyard.

Performance Evaluation of Smoothing Algorithm Considering Network Bandwidth in IoT Environment (IoT 환경에서 네트워크 대역폭을 고려한 스무딩 알고리즘의 성능 평가)

  • Lee, MyounJae
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.41-47
    • /
    • 2022
  • Smoothing is a transmission plan that converts video data stored at a variable bit rate into a fixed bit rate. Algorithms for smoothing include CBA, which aims to minimize the number of transmission rate increases, MCBA, which minimizes the number of transmission rate changes, and MVBA algorithms that minimize the amount of transmission rate change. This paper compares the proposed algorithm with the CBA algorithm with various video data, buffer size, and performance evaluation factors as a follow-up to the proposed smoothing algorithm that minimizes (maximizes) the transmission rate increase (decrease) when the server requires more bandwidth The evaluation factors used were compared with the number of changes in the fps rate, the minimum fps, the average fps, fps variability, and the number of frames to be discarded. As a result of the comparison, the proposed algorithm showed superiority in comparing the number of fps rate changes and the number of frames discarded.

Abstraction Granularity of Sensors/Actuators (센서/구동기의 추상화 단위)

  • Song, Chi-Hwa;Park, Jisu;So, Sun Sup;Eun, Songbae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.94-96
    • /
    • 2022
  • Plug & Play techniques have been proposed in various ways to overcome the complexity of sensors/drivers in IoT application development. IEEE1451 standard abstracts sensors/drivers into a data structure called TEDS. As a result, characteristics of the sensor/driver are unnecessary when connecting the sensor/driver to the host device. The method proposed by ETRI is a format in which device drivers of sensors/drivers are dynamically loaded and connected to hosts, and there is no particular abstraction data structure. Both schemes are located at both ends in terms of the abstraction unit of the sensor/driver. We present the problem based on this fact, and what optimized methods can exist in the middle of it. In this paper, we analyze existing Plug&Play techniques. Also, we specify abstraction units of sensors/drivers, and analyze them.

  • PDF

Performance Evaluation of Smoothing Algorithm Considering Network Bandwidth in IoT Environment (IoT 환경에서 가용 전송률을 고려한 스무딩 알고리즘의 성능 평가)

  • MyounJae Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.11-17
    • /
    • 2023
  • Smoothing is to creating a transmission plan consisting of sections of frames that can be sent at the same transmission rate for compressed and stored video data. Various algorithms have been studied for the smoothing to minimize the number of transmission rate changes, the number of transmission rate changes, and the amount of transmission rate increase. This study evaluates the performance of a smoothing algorithm that minimizes the increase in transmission rates and maximizes the increase in transmission rates when the transmission rate is required to maximize the excess bandwidth to be secured by the server in an environment with limited server bandwidth. The available transmission rates and buffer sizes available in the server are set in various ways and evaluated by the number of fps changes, the minimum fps, the average fps, and fps variability. As a result of the comparison, the proposed algorithm showed excellent average fps and fps variability.