• Title/Summary/Keyword: IoT 융합

Search Result 701, Processing Time 0.033 seconds

Analyzing Technological Convergence for IoT Business Using Patent Co-classification Analysis and Text-mining (특허 동시분류분석과 텍스트마이닝을 활용한 사물인터넷 기술융합 분석)

  • Moon, Jinhee;Gwon, Uijun;Geum, Youngjung
    • Journal of Technology Innovation
    • /
    • v.25 no.3
    • /
    • pp.1-24
    • /
    • 2017
  • With the rise of internet of things (IoT), there have been several studies to analyze the technological trend and technological convergence. However, previous work have been relied on the qualitative work that investigate the IoT trend and implication for future business. In response, this study considers the patent information as the proxy measure of technology, and conducts a quantitative and analytic approach for analyzing technological convergence using patent co-classification analysis and text mining. First, this study investigate the characteristics of IoT business, and characterize IoT business into four dimensions: device, network, platform, and services. After this process, total 923 patent classes are classified into four types of IoT technology group. Since most of patent classes are classified into device technology, we developed a co-classification network for both device technology and all technologies. Patent keywords are also extracted and these keywords are also classified into four types: device, network, platform, and services. As a result, technologies for several IoT devices such as sensors, healthcare, and energy management are derived as a main convergence group for the device network. For the total IoT network, base network technology plays a key role to characterize technological convergence in the IoT network, mediating the technological convergence in each application area such as smart healthcare, smart home, and smart grid. This work is expected to effectively be utilized in the technology planning of IoT businesses.

Trends in detection based on deep learning for IoT security threats (IoT 보안 위협에 대한 딥러닝 기반의 탐지 동향)

  • Kim, Hyun-Ji;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.862-865
    • /
    • 2020
  • 최근 5G, 인공지능(AI) 등과 함께 사물인터넷 (IoT) 기술이 주목받고 있으며, 보안 위협 또한 증가하고 있다. IoT 기기에 대한 다양한 공격 기법들이 존재하는 만큼 IoT 보안에 관한 연구 또한 활발하게 진행되고 있다. 본 논문에서는 IoT 환경에서의 보안 위협에 대응하기 위한 딥러닝 기반의 탐지기법들의 최신 연구 동향과 앞으로의 방향을 살펴본다.

Probability-based IoT management model using blockchain to expand multilayered networks (블록체인을 이용하여 다층 네트워크를 확장한 확률 기반의 IoT 관리 모델)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.33-39
    • /
    • 2020
  • Interest in 5G communication security has been growing recently amid growing expectations for 5G technology with faster speed and stability than LTE. However, 5G has so far included disparate areas, so it has not yet fully supported the issues of security. This paper proposes a blockchain-based IoT management model in order to efficiently provide the authentication of users using IoT in 5G In order to efficiently fuse the authentication of IoT users with probabilistic theory and physical structure, the proposed model uses two random keys in reverse direction at different layers so that two-way authentication is achieved by the managers of layers and layers. The proposed model applied blockchain between grouped IoT devices by assigning weights to layer information of IoT information after certification of IoT users in 5G environment is stratified on a probabilistic basis. In particular, the proposed model has better functions than the existing blockchain because it divides the IoT network into layered, multi-layered networks.

A Study of Smart IT convergence Framework applying a Lego-typed Sensor Module (레고형 센서 모듈을 활용한 스마트 IT 융합 프레임워크에 관한 연구)

  • Park, Jung-min;Kim, Hye-Young
    • Journal of Korea Game Society
    • /
    • v.16 no.3
    • /
    • pp.87-96
    • /
    • 2016
  • As use of Internet increase, IoT(Internet Of Things), a interaction between connected devices, is widely used throughout industrial area. In this paper, we discussed what to consider when planning framework for contents using user's mobile devices and various sensors in IoT environment and suggest related techniques. Also, using the techniques suggested in this paper, we showed the prototype of the framework. Finally, we showed the possibility of games in the IoT environment by creating game in the IoT environment.

Implementation of Safety management broadcasting system for IoT based in IP PBX (IP PBX기반 안전관리 IoT 방송 시스템 구현)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.9-14
    • /
    • 2019
  • Currently, with the success of 5G commercialization, a server system that integrates various Internet public safety services should be developed. In this paper, we developed a public safety integrated server, which is an IoT platform connecting IoT device and IoT gateway based on IP PBX. This server is based on embedded OS and various IoT services are executed in one system and call processing / broadcasting server function that processes emergency call and emergency broadcasting in public places is built in. This system collects IoT sensor data and emergency bell information and automatically sends out emergency alarms, emergency evacuation broadcasts, etc. at an accident site in an emergency situation, and transmits the daily information to the upper IoT service server, Provide public safety management services.

사물인터넷 융합 서비스 보안 요구사항

  • Gang, Nam-Hui
    • Information and Communications Magazine
    • /
    • v.32 no.12
    • /
    • pp.45-50
    • /
    • 2015
  • 최근 다양한 산업 군에서 ICT 융합 서비스가 활발히 개발되고 있고 사물인터넷(IoT: Internet of Things) 기술이 신성장 동력의 핵심 기술로 주목받고 있다. IoT는 기존에 연결을 고려하지 않았던 생활 속 모든 것들을(daily life objects) 상호 연결시켜주는 기술이다. 가트너는 현재 1% 미만의 사물만이 인터넷에 연결된 상황으로 보고하고 있고 Cisco의 자료에 따르면 2020년에는 연결된 장치 수가 500억 개 이상으로 증가할 것으로 예측하고 있다. 많은 장치가 연결되는 IoT 환경에는 많은 취약점과 보안 위협이 존재할 것이므로 보안과 개인정보 보호 기술은 반드시 제공되어야 하는 핵심기술이다. 본고에서는 IoT 기반 융합 서비스에서 발생했던 침해 사례를 살펴보고, 안전한 서비스 개발을 위한 기본적인 보안 요구사항을 제시한다.

A Study on improving manufacturing environment using IoT technology in small business environment (중소기업 환경에서 IoT 기술을 이용한 제조 환경 개선에 관한 분석 연구)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.83-90
    • /
    • 2017
  • To launch the product recently attached to IoT consumer electronics, smart phones and healthcare products around the large companies is a trend that is growing interest in the IoT. However, the country's small business environment is what the environmental improvement process that is easily accessible to the small business environment because the IoT technologies are difficult to apply the IoT technologies than any other country environment than desperate situation. In this paper, we propose a service operating model to improve production efficiency when the fusion manufacturing process is currently operating in the country SMEs and IoT technology. Proposed model using the manufacturing product information and sensor / dabayiseu information in the entire manufacturing process has as its object to utilize the IoT technology. Performance evaluation, the proposed model is more efficient than the previous model and 23.1% of the manufacturing process. In addition, it is increasing the manufacturing process was reduced by 17.3%, the average processing time as compared to the previous model. Finally, the personnel cost to be used in the manufacturing process was found to be an average decrease of 19.8% than previous model.

IoT data processing techniques based on machine learning optimized for AIoT environments (AIoT 환경에 최적화된 머신러닝 기반의 IoT 데이터 처리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Industrial Convergence
    • /
    • v.20 no.3
    • /
    • pp.33-40
    • /
    • 2022
  • Recently, IoT-linked services have been used in various environments, and IoT and artificial intelligence technologies are being fused. However, since technologies that process IoT data stably are not fully supported, research is needed for this. In this paper, we propose a processing technique that can optimize IoT data after generating embedded vectors based on machine learning for IoT data. In the proposed technique, for processing efficiency, embedded vectorization is performed based on QR such as index of IoT data, collection location (binary values of X and Y axis coordinates), group index, type, and type. In addition, data generated by various IoT devices are integrated and managed so that load balancing can be performed in the IoT data collection process to asymmetrically link IoT data. The proposed technique processes IoT data to be orthogonalized based on hash so that IoT data can be asymmetrically grouped. In addition, interference between IoT data may be minimized because it is periodically generated and grouped according to IoT data types and characteristics. Future research plans to compare and evaluate proposed techniques in various environments that provide IoT services.

Active-Passive Ranging Method for Effective Positioning in Massive IoT Environment (대규모 IoT 환경에서의 효과적 측위를 위한 능동적-수동적 거리 추정 기법)

  • Byungsun Hwang;Seongwoo Lee;Kyoung-Hun Kim;Young-Ghyu Sun;Jin-Young Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.41-47
    • /
    • 2024
  • With the advancement and proliferation of the Internet of Things (IoT), a wide range of location-based services are being offered, and various ranging methods are being researched to meet the objectives of the required services. Conventional ranging methods involve the direct exchange of signals between tags and anchors to estimate distance, presenting a limitation in efficiently utilizing communication resources in large-scale IoT environments. To overcome these limitations, active-passive ranging methods have been proposed. However, there is a lack of theoretical convergence guarantees against clock drift errors and a detailed analysis of the characteristics of ranging estimation techniques, making it challenging to derive precise positioning results. In this paper, an improved active-passive ranging method that accounts for clock drift errors is proposed for precise positioning in large-scale IoT environments. The simulation results confirmed that the proposed active-passive ranging method can enhance distance estimation performance by up to 94.4% and 14.4%, respectively, compared to the existing active-passive ranging methods.

An efficient access control techniques between different IoT devices in a cloud environment (클라우드 환경에서 서로 다른 IoT 장치간 효율적인 접근제어 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.57-63
    • /
    • 2018
  • IoT devices are used in many areas to perform various roles and functions in a cloud environment. However, a method of access control that can stably control the IoT device has not been proposed yet. In this paper, we propose a hierarchical multi-level property access control scheme that can perform stable access of IoT devices used in a cluster environment. In order to facilitate the access of the IoT device, the proposed method not only provides the ID key (security token) unique to the IoT device by providing the IoT Hub, but also allows the IoT Hub to authenticate the X.509 certificate and the private key, So that the private key of the IoT device can not be seen outside the IoT device. As a result of the performance evaluation, the proposed method improved the authentication accuracy by 10.5% on average and the processing time by 14.3%. The overhead of IoT Hub according to the number of IoT attributes was 9.1% lower than the conventional method.