• Title/Summary/Keyword: IoT Applications

Search Result 478, Processing Time 0.023 seconds

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

  • Chang, Kai-Di;Chen, Jiann-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.5-23
    • /
    • 2012
  • Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.

A lightweight true random number generator using beta radiation for IoT applications

  • Park, Kyunghwan;Park, Seongmo;Choi, Byoung Gun;Kang, Taewook;Kim, Jongbum;Kim, Young-Hee;Jin, Hong-Zhou
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.951-964
    • /
    • 2020
  • This paper presents a lightweight true random number generator (TRNG) using beta radiation that is useful for Internet of Things (IoT) security. In general, a random number generator (RNG) is required for all secure communication devices because random numbers are needed to generate encryption keys. Most RNGs are computer algorithms and use physical noise as their seed. However, it is difficult to obtain physical noise in small IoT devices. Since IoT security functions are required in almost all countries, IoT devices must be equipped with security algorithms that can pass the cryptographic module validation programs of each country. In this regard, it is very cumbersome to embed security algorithms, random number generation algorithms, and even physical noise sources in small IoT devices. Therefore, this paper introduces a lightweight TRNG comprising a thin-film beta-radiation source and integrated circuits (ICs). Although the ICs are currently being designed, the IC design was functionally verified at the board level. Our random numbers are output from a verification board and tested according to National Institute of Standards and Technology standards.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

Design Patterns for Mitigating Incompatibility of Context Acquisition Schemes for IoT Devices (사물인터넷 컨텍스트 획득 비호환성 중재를 위한 디자인 패턴)

  • La, Hyun Jung;An, Ku Hwan;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.8
    • /
    • pp.351-360
    • /
    • 2016
  • Sensors equipped in Internet-of-Thing (IoT) devices are used to measure the surrounding contexts, and IoT applications analyze the contexts to infer situations and provide situation-specific smart services. There are different context acquisition schemes including pulling, pushing, and broadcasting. Most IoT devices support only one of the schemes. Hence, there can be an incompatible issue on data acquisition schemes between applications and devices, and consequently it could result in an increased development cost and inefficiency on application maintenance. This paper presents design patterns which can effectively remedy the incompatibility problem. By applying the patterns, IoT applications with incompatibility can be systematically and effectively developed. And, also its maintainability is expected to increase.

Internet of Things: An Overview and its Applications in Aviation (항공 분야에서의 사물인터넷 기술 현황)

  • Hyun, WooSeok
    • Korean journal of aerospace and environmental medicine
    • /
    • v.30 no.3
    • /
    • pp.100-107
    • /
    • 2020
  • Internet of Things (IoT) is a technology that communicates data between devices, which are things, using an embedded sensor connected through network backbone such as the internet. Here, data communication technology, sensor technology, and actuator (interface) technology are fused into IoT and it turns devices into smart things. As a result, vast sized data are being generated and that data is being processed into useful actions that can control the things that are devices to make our lives much fruitful. Nowadays, the IoT, early defined as Machine-to-Machine (M2M) connection, becomes a key technology powered by growing innovation of wireless communication trends in the internet connectivity through mobile networking. This paper gives an overview of Internet of Things and brief information about major technologies and its applications in various fields focusing aviation.

Research study on cognitive IoT platform for fog computing in industrial Internet of Things (산업용 사물인터넷에서 포그 컴퓨팅을 위한 인지 IoT 플랫폼 조사연구)

  • Sunghyuck Hong
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.69-75
    • /
    • 2024
  • This paper proposes an innovative cognitive IoT framework specifically designed for fog computing (FC) in the context of industrial Internet of Things (IIoT). The discourse in this paper is centered on the intricate design and functional architecture of the Cognitive IoT platform. A crucial feature of this platform is the integration of machine learning (ML) and artificial intelligence (AI), which enhances its operational flexibility and compatibility with a wide range of industrial applications. An exemplary application of this platform is highlighted through the Predictive Maintenance-as-a-Service (PdM-as-a-Service) model, which focuses on real-time monitoring of machine conditions. This model transcends traditional maintenance approaches by leveraging real-time data analytics for maintenance and management operations. Empirical results substantiate the platform's effectiveness within a fog computing milieu, thereby illustrating its transformative potential in the domain of industrial IoT applications. Furthermore, the paper delineates the inherent challenges and prospective research trajectories in the spheres of Cognitive IoT and Fog Computing within the ambit of Industrial Internet of Things (IIoT).

Heterogeneous Device Packaging Technology for the Internet of Things Applications (IoT 적용을 위한 다종 소자 전자패키징 기술)

  • Kim, Sarah Eunkyung
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.23 no.3
    • /
    • pp.1-6
    • /
    • 2016
  • The Internet of Things (IoT) is a new technology paradigm demanding one packaged system of various semiconductor and MEMS devices. Therefore, the development of electronic packaging technology with very high connectivity is essential for successful IoT applications. This paper discusses both fan-out wafer level packaging (FOWLP) and 3D stacking technologies to achieve the integrattion of heterogeneous devices for IoT. FOWLP has great advantages of high I/O density, high integration, and design flexibility, but ultra-fine pitch redistribution layer (RDL) and molding processes still remain as main challenges to resolve. 3D stacking is an emerging technology solving conventional packaging limits such as size, performance, cost, and scalability. Among various 3D stacking sequences wafer level via after bonding method will provide the highest connectivity with low cost. In addition substrates with ultra-thin thickness, ultra-fine pitch line/space, and low cost are required to improve system performance. The key substrate technologies are embedded trace, passive, and active substrates or ultra-thin coreless substrates.

A Design of an AES-based Security Chip for IoT Applications using Verilog HDL (IoT 애플리케이션을 위한 AES 기반 보안 칩 설계)

  • Park, Hyeon-Keun;Lee, Kwangjae
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.1
    • /
    • pp.9-14
    • /
    • 2018
  • In this paper, we introduce an AES-based security chip for the embedded system of Internet of Things(IoT). We used Verilog HDL to implement the AES algorithm in FPGA. The designed AES module creates 128-bit cipher by encrypting 128-bit plain text and vice versa. RTL simulations are performed to verify the AES function and the theory is compared to the results. An FPGA emulation was also performed with 40 types of test sequences using two Altera DE0-Nano-SoC boards. To evaluate the performance of security algorithms, we compared them with AES implemented by software. The processing cycle per data unit of hardware implementation is 3.9 to 7.7 times faster than software implementation. However, there is a possibility that the processing speed grow slower due to the feature of the hardware design. This can be solved by using a pipelined scheme that divides the propagation delay time or by using an ASIC design method. In addition to the AES algorithm designed in this paper, various algorithms such as IPSec can be implemented in hardware. If hardware IP design is set in advance, future IoT applications will be able to improve security strength without time difficulties.

Implementation of IoT Home System based on MQTT (MQTT 기반 IoT 홈 시스템 구현)

  • Kim, U-zo;Choi, Jin-ku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.231-237
    • /
    • 2020
  • In this paper, we implemented a home IoT system based on MQTT protocol. In this system, data are collected from sensors in real time and transmitted to the server system. Based on collected data, home devices could be controlled automatically or manually. By using the MQTT protocol, we were able to see the data values of sensors collected in real time according to the topic setting. We implemented a system that automatically sets up home devices based on topic data, and it worked. The system is expected to be useful in applications that require monitoring and tracking of data in real time.