• Title/Summary/Keyword: IoT Applications

Search Result 478, Processing Time 0.03 seconds

A study to detect and leaked personal information on the smartphone. (Web을 이용한 안드로이드 기기 제어 시스템 설계)

  • Kim, Wung-Jun;He, Yi-Lun;Park, Sung-Hyun;Ban, Tae-Hak;Kim, Yong-Un;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.845-847
    • /
    • 2014
  • In recent years, the mobile OS market, enlargement and, at the same time, Android has mounted various smart phones and feature air conditioning, smart TV, cleaning robot, camera, etc. that the number is being spread at a rapid pace. But a lot of devices to control the modules and applications at once, this is not a device for controlling the dissemination of applications all in one place, and in charge of the devices that allow you to manage applications are lacking. Accordingly, in this paper, use the Web Server registered in the appliance can be controlled by management, Web access, is proposing and designing the system. This is the current research is actively in progress in the field of IoT (Internet of Things) would be utilized.

  • PDF

The Current Telecommunications Infrastructure in Ecuador is Ready to Start with the Implementation of IoT Applications?

  • Yepez, Johanna Fernandez;Kim, Yun Seon
    • Asia Pacific Journal of Business Review
    • /
    • v.3 no.1
    • /
    • pp.57-76
    • /
    • 2018
  • The "Internet of things" (IoT) is becoming an increasingly growing topic of conversation, it is a new emergent technology that can be present in almost every field and application. It's a concept that not only has the potential to impact how people live but also how people work. Broadband Internet and Mobile Internet are becoming more widely available, the cost of the service is decreasing, more devices are being created with Wi-Fi capabilities and sensors built into them, technology costs are going down, and smartphone penetration is growing so fast. All of these facts are creating the best environment for the IoT applications. In a country like Ecuador, is important to have a previous analysis about the feasibility of the implementation of this new technology in order to know what are the challenges the country has to face, and also to not stay behind as the other countries in the region are advancing. Currently, this kind of analysis does not exist. The Internet of Things is an innovation where business and technology models in Ecuador are relatively unexplored. The current infrastructure deployed in Ecuador and the available devices in the market are the central facts to initiate with the research, which is a starting point to show if Ecuador is ready to this technology, and if is not ready what is missing. This study shows the current telecommunications status in Ecuador, and its strengths and weaknesses to start the deployment of Internet of Things. Besides, it also will show the most likely applications that can be easily adopted for the Ecuadorian market with its respective availability, affordability, and adaptability.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

User Targerting SaaS Application Mash-Up Service Framework using Complex-Context and Rule-Martix (복합 콘텍스트 및 Rule-Matrix를 활용한 사용자 맞춤형 SaaS 어플리케이션 연동 서비스 프레임워크)

  • Jung, Jong Jin;Cui, Yun;Kwon, Kyung Min;Lee, Han Ku
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.7
    • /
    • pp.1054-1064
    • /
    • 2017
  • With the development of cloud computing, internet technology and Internet of Things(IoT), most of applications are being smarter and changing from native application to SaaS (Software as a Service) application. New versatile SaaS applications are being released through various app portals (e.g. appstore, googleplay, T-Store, and so on). However, a user has a difficulty in searching, choosing an suitable application to him. It is also hard for him to know what functions of each SaaS application are useful. He wants to be recommended something inter-operated SaaS service according to his personality and his situation. Therefore, this paper presents a way of making mash-up of SaaS applications in order to provide the most convenient inter-operated SaaS service to user. This paper also presents SaaS Application Mash-up Framework (SAMF), complex context and rule matrix. The proposed SAMF is a main system that totally manage SaaS application mash-up service. Complex context and rule matrix are key components in order to recommend what SaaS applications are needed and how those SaaS applications are inter-operated. The SAMF collects complex contexts (User Description, Status Description, SaaS Service Description) in order to choose which SaaS applications are useful, analyze what functions to use, how to mash-up.

A Technical Planning for Emotion Evaluation of Art Performance using the Human Emotional Data (공연에 대한 고객감동 평가를 위한 감성데이터 활용 방안)

  • Moon, Hyo-Jung;Ko, Hee-Kyung;Park, Young-Ho
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.87-91
    • /
    • 2017
  • Recently, several kinds of researches using IoT wearable devices are active in the field of sports, design, emotional sciences and so on. The human bio data such as blood pulse, ECG, SKT signal, and GSR Signal producing from IoT wearable devices such as Watch, Smart-band, Grass can adapt to the meaningful future applications. Using the human's emotional data and a physical status with variation and so on, we can individually get the personal status. Due to knowing the personal emotion or physical status is related and connected to the valuable wallet of customers, the approach is more important in nowadays. Therefore, the personal information can effectively adapt to the marketing of the culture industry, which deals with emotions of customers. The research shows implementation steps for explaining overall architecture of the convergence research between Art and Technologies.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.

Analytical model for mean web object transfer latency estimation in the narrowband IoT environment (협대역 사물 인터넷 환경에서 웹 객체의 평균 전송시간을 추정하기 위한 해석적 모델)

  • Lee, Yong-Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.1-4
    • /
    • 2015
  • This paper aims to present the mathematical model to find the mean web object transfer latency in the slow-start phase of TCP congestion control mechanism, which is one of the main control techniques of Internet. Mean latency is an important service quality measure of end-user in the network. The application area of the proposed latency model is the narrowband environment including multi-hop wireless network and Internet of Things(IoT), where packet loss occurs in the slow-start phase only due to small window. The model finds the latency considering initial window size and the packet loss rate. Our model shows that for a given packet loss rate, round trip time and initial window size mainly affect the mean web object transfer latency. The proposed model can be applied to estimate the mean response time that end user requires in the IoT service applications.

An Analysis of IoT Service using Sentiment Analysis on Online Reviews: Focusing on the Characteristics of Service Providers (감성분석을 활용한 사물인터넷(IoT) 서비스 리뷰 분석: 사업자 특성에 따른 차이를 중심으로)

  • Ryu, Min Ho;Cho, Hosoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.5
    • /
    • pp.91-102
    • /
    • 2020
  • The Internet of Things (IoT) is characterized as the market where various companies compete for the same consumers. Thus, there are differences in functions and performance provided by the main business area and other characteristics of the service providers. This paper investigates whether satisfaction with the service provided depends on the characteristics of the operator by using sentiment analysis of comments. To achieve this goal, word importance analysis and sensitivity analysis are conducted on 34,310 reviews of 41 applications registered in the Google Play. The review analysis was conducted at various levels, including TD-IDF (Term frequency-inverse document frequency) value of keywords, service sectors, the origin of providers, and domestic/foreign providers. The results show that users' overall assessment of IoT services was found to be low, and smart homes received relatively high reviews compared to other services, and manufacturing-based and overseas providers received relatively higher evaluations than others.

The Internet of Things(IoT) applications and value creation in the retail industry: focusing on consumer decision-making stages (리테일 산업에서의 구매단계별 사물인터넷 활용과 가치 창출)

  • Park, In-hyoung;Jeong, So Won
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.187-198
    • /
    • 2021
  • This study aims to understand the current status of the use of IoT-based products and services from the perspective of consumers and analyze the role and consumption value of each service-generated from the products and services. Their features and generated consumption value have been identified The decision-making process was divided into based on three stages (pre-purchase, purchase, and post-purchase) stages, and IoT services were classified in stages. In the pre-purchase stage, the IoT service provides information and alternatives, and is used for interaction and automatic payment systems in the purchasing stage. In the post-purchase stage, repetitive purchases are encouraged and after-sale services are provided. Throughout the decision-making process, smart retai application and servicel provides epistemic and functional value. In addition, it provides conditional and social value in the pre-purchase stage, and conditional value in the post-purchase stage. This study aims to provideprovides marketers and retailers an insight advice for the enhanced satisfaction of consumersimproving the satisfaction of consumers and the development of smart retail by examining the consumer-centered consumption value.

A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing

  • Saeed, Waqar;Ahmad, Zulfiqar;Jehangiri, Ali Imran;Mohamed, Nader;Umar, Arif Iqbal;Ahmad, Jamil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.35-57
    • /
    • 2021
  • Fog computing aims to provide the solution of bandwidth, network latency and energy consumption problems of cloud computing. Likewise, management of data generated by healthcare IoT devices is one of the significant applications of fog computing. Huge amount of data is being generated by healthcare IoT devices and such types of data is required to be managed efficiently, with low latency, without failure, and with minimum energy consumption and low cost. Failures of task or node can cause more latency, maximum energy consumption and high cost. Thus, a failure free, cost efficient, and energy aware management and scheduling scheme for data generated by healthcare IoT devices not only improves the performance of the system but also saves the precious lives of patients because of due to minimum latency and provision of fault tolerance. Therefore, to address all such challenges with regard to data management and fault tolerance, we have presented a Fault Tolerant Data management (FTDM) scheme for healthcare IoT in fog computing. In FTDM, the data generated by healthcare IoT devices is efficiently organized and managed through well-defined components and steps. A two way fault-tolerant mechanism i.e., task-based fault-tolerance and node-based fault-tolerance, is provided in FTDM through which failure of tasks and nodes are managed. The paper considers energy consumption, execution cost, network usage, latency, and execution time as performance evaluation parameters. The simulation results show significantly improvements which are performed using iFogSim. Further, the simulation results show that the proposed FTDM strategy reduces energy consumption 3.97%, execution cost 5.09%, network usage 25.88%, latency 44.15% and execution time 48.89% as compared with existing Greedy Knapsack Scheduling (GKS) strategy. Moreover, it is worthwhile to mention that sometimes the patients are required to be treated remotely due to non-availability of facilities or due to some infectious diseases such as COVID-19. Thus, in such circumstances, the proposed strategy is significantly efficient.