• Title/Summary/Keyword: IoT 환경

Search Result 1,414, Processing Time 0.029 seconds

An Efficient IoT Platform for Fog Computing (포그 컴퓨팅을 위한 효율적인 IoT 플랫폼)

  • Lee, Han Sol;Choi, Jeong Woo;Byeon, Gi Beom;Hong, Ji Man
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2019
  • With IoT device technology developments, such devices now can perceive the surrounding environment and operate upon the condition, but a method for efficiently processing an enormous amount of IoT device data is required. The existing cloud computing has a transmission delay problem due to load and distance. Fog Computing, an environment to control IoT devices, therefore, emerged to solve this problem. In Fog Computing, IoT devices are located close to each other to solve the shortcomings of the cloud system. While many earlier studies on Fog Computing for IoT mainly focus on its structure and framework, we would like to propose an integrated Fog Computing platform that monitors, analyzes, and controls IoT devices.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment (IoT 환경에 적용 가능한 경량화 블록 암호알고리즘에 관한 연구)

  • Lee, Seon-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.1-7
    • /
    • 2018
  • The IoT environment provides an infinite variety of services using many different devices and networks. The development of the IoT environment is directly proportional to the level of security that can be provided. In some ways, lightweight cryptography is suitable for IoT environments, because it provides security, higher throughput, low power consumption and compactness. However, it has the limitation that it must form a new cryptosystem and be used within a limited resource range. Therefore, it is not the best solution for the IoT environment that requires diversification. Therefore, in order to overcome these disadvantages, this paper proposes a method suitable for the IoT environment, while using the existing block cipher algorithm, viz. the lightweight cipher algorithm, and keeping the existing system (viz. the sensing part and the server) almost unchanged. The proposed BCL architecture can perform encryption for various sensor devices in existing wire/wireless USNs (using) lightweight encryption. The proposed BCL architecture includes a pre/post-processing part in the existing block cipher algorithm, which allows various scattered devices to operate in a daisy chain network environment. This characteristic is optimal for the information security of distributed sensor systems and does not affect the neighboring network environment, even if hacking and cracking occur. Therefore, the BCL architecture proposed in the IoT environment can provide an optimal solution for the diversified IoT environment, because the existing block cryptographic algorithm, viz. the lightweight cryptographic algorithm, can be used.

Designing a data based school with Internet of Things (데이터 기반 학교 운영을 위한 사물인터넷(IoT) 활용 환경 설계)

  • Kye, Bo-kyung
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.20 no.3
    • /
    • pp.25-32
    • /
    • 2021
  • This study analyzed the application articles of the Internet of Things (IoT) in the educational environment. It defined learning environmental data, utilization scenarios, and models that IoT can improve teaching and learning through Focus Group Interviews for academic experts, teachers, and technicians in related fields. In addition, the IoT pilot prototype was developed, verified, and drew implications from the perspective of collection, analysis, and utilization of real-time data based on the actual school settings. This study has significance as a priori case of building and applying a learning environment using the Internet of Things in real school settings considering relevant restrictions.

Development of IoT Home Gateway Environment based on ACOME using Open Source Hardware (오픈소스 하드웨어를 활용한 ACOME 기반의 IoT 홈 게이트웨이 환경 개발)

  • Kim, Seong-Min;Choi, Hoan-Suk;Rhee, Woo-Seop
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.296-304
    • /
    • 2016
  • Recently in domestic market, the telecommunication and appliance companies actively provide IoT home service through their dedicated smart device and communication network. But because their service should use only their own devices and be payed by monthly, it does not satisfy user's needs. So, users want device and service environment that can be easily configured according to user needs. Therefore, in this paper, we propose IoT home service environment architecture and ACOME(Auto-Configuration of MQTT and REST) mechanism. The proposed architecture consists of IoT platform and IoT home gateway. And the ACOME provides the automatic registration using DPWS function and interface construction using MQTT. This implements as a library for open-source hardware such as Arduino that is easy to get on the market. So the user easy to make own IoT device. Finally, we provide performance evaluation about service and device discovery between ACOME and DPWS.

사물인터넷을 위한 DNS 네이밍 서비스 기술동향

  • Lee, Geun-Tae;Jeong, Jae-Hun
    • Information and Communications Magazine
    • /
    • v.33 no.12
    • /
    • pp.3-11
    • /
    • 2016
  • 본고에서는 최근 가장 주목 받고 있는 연구 분야 중 하나인 사물인터넷(Internet of Things, IoT)을 위한 Domain Name System(DNS) 네이밍 서비스 기술동향에 대해 소개한다. IoT 환경에서 IoT 디바이스를 관리하기 위해 DNS 네임을 일일이 수동적으로 설정하는 것은 비효율적이다. 따라서 본고에서는 IoT 환경에서 수많은 IoT 디바이스의 관리를 위한 IoT 디바이스의 DNS 네임 자동설정 및 네이밍 서비스 기술에 대해 소개하고 분석한다. 본고에서 소개하는 IoT 네이밍 서비스 기술은 Internet Engineering Task Force(IETF)에서 제정된 표준 프로토콜을 이용하므로 구현이 용이하고 성능적인 면에서도 우수하다. IoT 디바이스의 DNS 네임이 사용자들에게 가독성 있으면서도 기계적으로 파싱이 용이하면 IoT 디바이스 관리를 효과적으로 수행할 수 있다. 즉 설정된 IoT 디바이스 DNS 네임으로 인터넷 사용자가 스마트폰과 태블릿과 같은 모바일 스마트 디바이스로 IoT 디바이스를 원격에서 모니터링 및 원격제어 할 수 있다. 본고에서는 IoT 디바이스에 연관된 네이밍 서비스 기술들을 비교 분석하고, 본 저자가 제안하는 IoT 디바이스 DNS 네이밍 기술을 소개하고자 한다.

Institutional Improvements for Security of IoT Devices (IoT 기기의 보안성 확보를 위한 제도적 개선방안)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.607-615
    • /
    • 2017
  • Recently, IoT products with various functions are being developed. Through the combination of objects and information technology, convenient services that have not been imagined before are emerging. For a secure IoT environment, product security must be considered. However, the existing IoT products have various problems such as security vulnerability. In order to secure the security of IoT products, technical countermeasures as well as policy responses are needed. However, the legislation related to current IoT products has a limit to guarantee safety in IoT environment. In this paper, we analyze the limitations of the current legal system of IoT, and suggests ways to improve it.

사물인터넷 보안 표준화 동향

  • Kim, Yeong-Gap;Hwang, In-Tae
    • Information and Communications Magazine
    • /
    • v.34 no.3
    • /
    • pp.90-100
    • /
    • 2017
  • 최근 다양한 산업 분야에서 사물인터넷(Internet of Things; IoT)에 관련된 연구가 활발히 진행되고 있다. 기존 네트워크 환경에서와 같이 IoT 또한 다양한 보안 공격으로부터 노출 되어 있으며, 여러 가지 보안 이슈가 존재한다. IoT 환경에서는 디바이스, 플랫폼, 통신프로토콜의 이종성 문제로 인하여 공통의 보안 서비스 제공이 힘들게 되고 이를 해결하기 위하여 상호운용성 제공이 가능한 표준이 필요하게 된다. 본고에서는 다양한 보안 이슈들로부터 안전한 IoT 환경 구축을 위하여, IoT 보안 관련 국내외 표준화 기관를 분석하고, 각 기관에서 제시하고 있는 IoT 보안 관련 표준 및 표준화 동향을 분석하고자 한다.

NAAL: Software for controlling heterogeneous IoT devices based on neuromorphic architecture abstraction (NAAL: 뉴로모픽 아키텍처 추상화 기반 이기종 IoT 기기 제어용 소프트웨어)

  • Cho, Jinsung;Kim, Bongjae
    • Smart Media Journal
    • /
    • v.11 no.3
    • /
    • pp.18-25
    • /
    • 2022
  • Neuromorphic computing generally shows significantly better power, area, and speed performance than neural network computation using CPU and GPU. These characteristics are suitable for resource-constrained IoT environments where energy consumption is important. However, there is a problem in that it is necessary to modify the source code for environment setting and application operation according to heterogeneous IoT devices that support neuromorphic computing. To solve these problems, NAAL was proposed and implemented in this paper. NAAL provides functions necessary for IoT device control and neuromorphic architecture abstraction and inference model operation in various heterogeneous IoT device environments based on common APIs of NAAL. NAAL has the advantage of enabling additional support for new heterogeneous IoT devices and neuromorphic architectures and computing devices in the future.

Different Heterogeneous IoT Data Management Techniques for IoT Cloud Environments (IoT 클라우드 환경을 위한 서로 다른 이기종의 IoT 데이터 관리 기법)

  • Cho, Sung-Nam;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.15-21
    • /
    • 2020
  • Although IoT systems are used in a variety of heterogeneous environments as cloud environments develop, all IoT devices are not provided with reliable protocols and services. This paper proposes an IoT data management technique that can extend the IoT cloud environment to an n-layer multi-level structure so that information collected from different heterogeneous IoT devices can be efficiently sorted and processed. The proposed technique aims to classify and process IoT information by transmitting routing information and weight information through wireless data link data collected from heterogeneous IoT devices. The proposed technique not only delivers information classified from IoT devices to the corresponding routing path but also improves the efficiency of IoT data processing by assigning priority according to weight information. The IoT devices used in the proposed technique use each other's reliable protocols, and queries for other IoT devices locally through a local cloud composed of hierarchical structures have features that ensure scalability because they maintain a certain cost.y channels of IoT information in order to make the most of the multiple antenna technology.