• Title/Summary/Keyword: IoT Applications

Search Result 478, Processing Time 0.03 seconds

NIST Lightweight Cryptography Standardization Process: Classification of Second Round Candidates, Open Challenges, and Recommendations

  • Gookyi, Dennis Agyemanh Nana;Kanda, Guard;Ryoo, Kwangki
    • Journal of Information Processing Systems
    • /
    • v.17 no.2
    • /
    • pp.253-270
    • /
    • 2021
  • In January 2013, the National Institute of Standards and Technology (NIST) announced the CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) contest to identify authenticated ciphers that are suitable for a wide range of applications. A total of 57 submissions made it into the first round of the competition out of which 6 were announced as winners in March 2019. In the process of the competition, NIST realized that most of the authenticated ciphers submitted were not suitable for resource-constrained devices used as end nodes in the Internet-of-Things (IoT) platform. For that matter, the NIST Lightweight Cryptography Standardization Process was set up to identify authenticated encryption and hashing algorithms for IoT devices. The call for submissions was initiated in 2018 and in April 2019, 56 submissions made it into the first round of the competition. In August 2019, 32 out of the 56 submissions were selected for the second round which is due to end in the year 2021. This work surveys the 32 authenticated encryption schemes that made it into the second round of the NIST lightweight cryptography standardization process. The paper presents an easy-to-understand comparative overview of the recommended parameters, primitives, mode of operation, features, security parameter, and hardware/software performance of the 32 candidate algorithms. The paper goes further by discussing the challenges of the Lightweight Cryptography Standardization Process and provides some suitable recommendations.

UniPy: A Unified Programming Language for MGC-based IoT Systems

  • Kim, Gayoung;Choi, Kwanghoon;Chang, Byeong-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.77-86
    • /
    • 2019
  • The advent of Internet of Things (IoT) makes common nowadays computing environments involving programming not a single computer but several heterogeneous distributed computers together. Developing programs separately, one for each computer, increases programmer burden and testing all the programs become more complex. To address the challenge, this paper proposes an RPC-based unified programming language, UniPy, for development of MGC (eMbedded, Gateway, and Cloud) applications in IoT systems configured with popular computers such as Arduino, Raspberry Pi, and Web-based DB server. UniPy offers programmers a view of classes as locations and a very simple form of remote procedure call mechanism. Our UniPy compiler automatically splits a UniPy program into small pieces of the program at different locations supporting the necessary RPC mechanism. An advantage of UniPy programs is to permit programmers to write local codes the same as for a single computer requiring no extra knowledge due to having unified programming models, which is very different from the existing research works such as Fabryq and Ravel. Also, the structure of UniPy programs allows programmers to test them by directly executing them before splitting, which is a feature that has never been emphasized yet.

An Efficient Markov Chain Based Channel Model for 6G Enabled Massive Internet of Things

  • Yang, Wei;Jing, Xiaojun;Huang, Hai;Zhu, Chunsheng;Jiang, Qiaojie;Xie, Dongliang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4203-4223
    • /
    • 2021
  • Accelerated by the Internet of Things (IoT), the need for further technical innovations and developments within wireless communications beyond the fifth generation (B5G) networks is up-and-coming in the past few years. High altitude platform station (HAPS) communication is expected to achieve such high levels that, with high data transfer rates and low latency, millions of devices and applications can work seamlessly. The HAPS has emerged as an indispensable component of next-generations of wireless networks, which will therefore play an important role in promoting massive IoT interconnectivity with 6G. The performance of communication and key technology mainly depend on the characteristic of channel, thus we propose an efficient Markov chain based channel model, then analyze the HAPS communication system's uplink capability and swing effect through experiments. According to the simulation results, the efficacy of the proposed scheme is proven to meet the requirements of ubiquitous connectivity in future IoT enabled by 6G.

Design and Implementation of a Dynamic IoT Device Management System (동적 사물인터넷 장치 관리 시스템 설계 및 구현)

  • Wang, Xinghui;Moon, Nammee;Min, Hong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.97-101
    • /
    • 2021
  • With the development of the Internet of Things technology, new devices are being developed and used to provide various applications and services. Most IoT devices have a high probability of error because they operate in harsh environments with limited resources. In addition, it is necessary to manage the Internet of Things devices dynamically because new devices are constantly deployed. In this paper, we design a system that allows users to monitor the mounting of new devices to perform the necessary tasks and implement prototypes to validate their operability. Our system also provides a web-based programming interface to direct work on new modules and share work content with each other.

Intelligent Smart Wheelchiars Using IoT (IoT를 활용한 지능형 스마트 휠체어)

  • Choi, Yu-Ree;Ko, Kyung-Eun;Park, Hee-Joo;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.89-94
    • /
    • 2022
  • With the recent acceleration of an aging society, the use of wheelchairs is increasing, and wheelchair accidents are also increasing. However, despite this situation, the domestic wheelchair market is lacking in deveolpment of additional functions to prevent wheechair collisions and falls. Therefore, this paper aims to design and implement intelligent smart wheelchairs equipped with functions such as stair wheels and automatic illumination sensor headlights that allow wheelchairs to automatically avoid obstacles, notify interlocking applications when falls are detected. Accordingly, it is expected to increase the convenience of wheelchair users and prevent frequent wheelchair accidents.

A Learning-based Power Control Scheme for Edge-based eHealth IoT Systems

  • Su, Haoru;Yuan, Xiaoming;Tang, Yujie;Tian, Rui;Sun, Enchang;Yan, Hairong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4385-4399
    • /
    • 2021
  • The Internet of Things (IoT) eHealth systems composed by Wireless Body Area Network (WBAN) has emerged recently. Sensor nodes are placed around or in the human body to collect physiological data. WBAN has many different applications, for instance health monitoring. Since the limitation of the size of the battery, besides speed, reliability, and accuracy; design of WBAN protocols should consider the energy efficiency and time delay. To solve these problems, this paper adopt the end-edge-cloud orchestrated network architecture and propose a transmission based on reinforcement algorithm. The priority of sensing data is classified according to certain application. System utility function is modeled according to the channel factors, the energy utility, and successful transmission conditions. The optimization problem is mapped to Q-learning model. Following this online power control protocol, the energy level of both the senor to coordinator, and coordinator to edge server can be modified according to the current channel condition. The network performance is evaluated by simulation. The results show that the proposed power control protocol has higher system energy efficiency, delivery ratio, and throughput.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

A Cyber-Physical Information System for Smart Buildings with Collaborative Information Fusion

  • Liu, Qing;Li, Lanlan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1516-1539
    • /
    • 2022
  • This article shows a set of physical information fusion IoT systems that we designed for smart buildings. Its essence is a computer system that combines physical quantities in buildings with quantitative analysis and control. In the part of the Internet of Things, its mechanism is controlled by a monitoring system based on sensor networks and computer-based algorithms. Based on the design idea of the agent, we have realized human-machine interaction (HMI) and machine-machine interaction (MMI). Among them, HMI is realized through human-machine interaction, while MMI is realized through embedded computing, sensors, controllers, and execution. Device and wireless communication network. This article mainly focuses on the function of wireless sensor networks and MMI in environmental monitoring. This function plays a fundamental role in building security, environmental control, HVAC, and other smart building control systems. The article not only discusses various network applications and their implementation based on agent design but also demonstrates our collaborative information fusion strategy. This strategy can provide a stable incentive method for the system through collaborative information fusion when the sensor system is unstable in the physical measurements, thereby preventing system jitter and unstable response caused by uncertain disturbances and environmental factors. This article also gives the results of the system test. The results show that through the CPS interaction of HMI and MMI, the intelligent building IoT system can achieve comprehensive monitoring, thereby providing support and expansion for advanced automation management.

Integrating Advanced Technologies in Elderly Care: Lessons from Nursing Homes in Tongling City, China

  • Guo Rui;Anura Amarasena
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.89-100
    • /
    • 2024
  • Integrating advanced technologies such as the Internet of Things (IoT), artificial intelligence (AI), and big data is transforming elderly care services, particularly in nursing homes. This study explores the impact of these technologies on the quality of care in nursing homes in Tongling City, China. Using a mixed-methods approach, data were collected from 298 elderly residents across 12 nursing homes through detailed surveys and interviews. The findings indicate that smart platforms and intelligent terminals significantly enhance service quality, with institutional conditions and social participation emerging as the most influential factors. Although the study's regional focus may limit the generalizability of the findings, it introduces novel applications of AI in dietary management and IoT in personalized environmental monitoring, which contribute original insights to the broader field of smart elderly care. These results underscore the transformative potential of advanced technologies in improving elderly care and offer a model that can be adapted to similar contexts globally. Future research should focus on longitudinal studies to assess the long-term impact of these technologies and explore their applicability in diverse cultural and regional settings.