• Title/Summary/Keyword: IoT Applications

Search Result 478, Processing Time 0.025 seconds

Quantum Communication Technology for Future ICT - Review

  • Singh, Sushil Kumar;Azzaoui, Abir El;Salim, Mikail Mohammed;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1459-1478
    • /
    • 2020
  • In the last few years, quantum communication technology and services have been developing in various advanced applications to secure the sharing of information from one device to another. It is a classical commercial medium, where several Internet of Things (IoT) devices are connected to information communication technology (ICT) and can communicate the information through quantum systems. Digital communications for future networks face various challenges, including data traffic, low latency, deployment of high-broadband, security, and privacy. Quantum communication, quantum sensors, quantum computing are the solutions to address these issues, as mentioned above. The secure transaction of data is the foremost essential needs for smart advanced applications in the future. In this paper, we proposed a quantum communication model system for future ICT and methodological flow. We show how to use blockchain in quantum computing and quantum cryptography to provide security and privacy in recent information sharing. We also discuss the latest global research trends for quantum communication technology in several countries, including the United States, Canada, the United Kingdom, Korea, and others. Finally, we discuss some open research challenges for quantum communication technology in various areas, including quantum internet and quantum computing.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

Development of 2W-Level Wireless Powered Energy Harvesting Receiver using 60Hz power line in Electricity Cable Tunnel (전력구 내 지중선을 이용한 2W급 상용주파수 무선전력 수신장치 개발)

  • Jang, Gi-Chan;Choi, Bo-Hwan;Rim, Chun-Taek
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.21 no.4
    • /
    • pp.296-301
    • /
    • 2016
  • Using high magnetic flux from a 60 Hz high-current cable, a 2 W wireless-powered energy harvesting receiver for sensor operation, internet of things (IoT) devices, and LED lights inside electrical cable tunnels is proposed. The proposed receiver comprises a copper coil with a high number of turns, a ring-shaped ferromagnetic core, a capacitor for compensating for the impedance of the coil in series, and a rectifier with various types of loads, such as sensors, IoT devices, and LEDs. To achieve safe and easy installation around the power cable, the proposed ring-shaped receiver is designed to easily open or close using a clothespin-shaped handle, which is made of highly-insulated plastic. Laminated silicon steel plates are assembled and used as the core because of their mechanical robustness and high saturation flux density characteristic, in which the thickness of each isolated plate is 0.3 mm. The series-connected resonant capacitor, which is appropriate for low-voltage applications, is used together with the proposed receiver coil. The concept of the figure of merit, which is the product weight and cost of both the silicon steel plate and the copper wire, is used for an optimized design; therefore, the weight of the fabricated receiver and the price of raw material is 750 gf and USD $2 each, respectively. The 2.2 W powering capability of the fabricated receiver was experimentally verified with a power cable current of $100A_{rms}$ at 60Hz.

Development of an Interface for Data Visualization and Controlling of Classified Objects based on User Conditions (사용 상황에 맞게 분류된 사물의 데이터 시각화와 제어를 위한 인터페이스 개발)

  • Park, Heesung;Han, Minseok;Choi, Yuri
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.320-325
    • /
    • 2016
  • By developing the IoT(Internet of Things) technology, devices for smart home environment have rapidly increased. With respect to mobiles, these applications are used to control and manage the various smart devices effectively. However, the existing mechanisms only provide simple information, and hence a difficulty to search or control the smart devices persists, since there is no meaningful relationship between them. In this research, we suggest an interface which visualizes the device's data and controls them effectively, based on the user's device using pattern. As a solution for this problem, we classify the user pattern based on a timeline for the associated circumstance, and visualize the device's data to make a group or to control individually in an easier approach. Also, all meaningful information could be confirmed by summarizing all the data of smart devices.

An Effective Malware Detection Mechanism in Android Environment (안드로이드 환경에서의 효과적인 악성코드 탐지 메커니즘)

  • Kim, Eui Tak;Ryu, Keun Ho
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.305-313
    • /
    • 2018
  • With the explosive growth of smart phones and efficiency, the Android of an open mobile operating system is gradually increasing in the use and the availability. Android systems has proven its availability and stability in the mobile devices, the home appliances's operating systems, the IoT products, and the mechatronics. However, as the usability increases, the malicious code based on Android also increases exponentially. Unlike ordinary PCs, if malicious codes are infiltrated into mobile products, mobile devices can not be used as a lock and can be leaked a large number of personal contacts, and can be lead to unnecessary billing, and can be cause a huge loss of financial services. Therefore, we proposed a method to detect and delete malicious files in real time in order to solve this problem. In this paper, we also designed a method to detect and delete malicious codes in a more effective manner through the process of installing Android-based applications and signature-based malicious code detection method. The method we proposed and designed can effectively detect malicious code in a limited resource environment, such as mobile environments.

An Analysis of Packet Collision Probability due to Inter-piconet Interference in the Bluetooth Low Energy Networks (저전력 블루투스 네트워크에서 피코넷 간 간섭으로 인한 패킷충돌 확률 분석)

  • Kim, Myoung Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.8
    • /
    • pp.3-11
    • /
    • 2017
  • Research and development are being conducted to apply low-power Bluetooth (BLE) technology to IoT (Internet of Things) applications. The characteristic of this application environment is that many piconets can operate in the same space. Therefore, interference between homogeneous networks is likely to occur. In the BLE data channel, adaptive frequency hopping (AFH) scheme is used among the 37 frequency channels, and the master and the slave communicate while changing the carrier frequency. If there are multiple BLE piconets in the same space, there is a risk of frequency collision and packet errors will occur. In this paper, we analyze the packet collision probability due to cochannel interference in multiple asynchronous BLE piconet environments. Specifically, we analyzed packet collision probability according to the number of concurrently operating BLE piconets with the ratio of connection interval to connection event length as the main parameters. The analysis result can be used to set connection event related parameters for a desired packet collision probability according to the number of users having BLE devices in a given space.

Transient Multipath routing protocol for low power and lossy networks

  • Lodhi, Muhammad Ali;Rehman, Abdul;Khan, Meer Muhammad;Asfand-e-yar, Muhammad;Hussain, Faisal Bashir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2002-2019
    • /
    • 2017
  • RPL routing protocol for low-power and lossy networks is an Internet Engineering Task Force (IETF) recommended IPv6 based protocol for routing over Low power Lossy Networks (LLNs). RPL is proposed for networks with characteristics like small packet size, low bandwidth, low data rate, lossy wireless links and low power. RPL is a proactive routing protocol that creates a Directed Acyclic Graph (DAG) of the network topology. RPL is increasingly used for Internet of Things (IoT) which comprises of heterogeneous networks and applications. RPL proposes a single path routing strategy. The forwarding technique of RPL does not support multiple paths between source and destination. Multipath routing is an important strategy used in both sensor and ad-hoc network for performance enhancement. Multipath routing is also used to achieve multi-fold objectives including higher reliability, increase in throughput, fault tolerance, congestion mitigation and hole avoidance. In this paper, M-RPL (Multi-path extension of RPL) is proposed, which aims to provide temporary multiple paths during congestion over a single routing path. Congestion is primarily detected using buffer size and packet delivery ratio at forwarding nodes. Congestion is mitigated by creating partially disjoint multiple paths and by avoiding forwarding of packets through the congested node. Detailed simulation analysis of M-RPL against RPL in both grid and random topologies shows that M-RPL successfully mitigates congestion and it enhances overall network throughput.

Mobile Guidance System for Evacuation based on Wi-Fi System and Node Architecture

  • Raju, Timalsina;Kim, Woo Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.5
    • /
    • pp.41-56
    • /
    • 2019
  • Recently great loss of life and property is occurring because of fire, natural disaster, earth quake, tsunami and so on. People spend 80~90% of their time indoor environment like office, supermarket, campus. Therefore Indoor navigation and guidelines system became so essential for most of all. Incase of emergency we must be careful earlier, in such a cases 5G kind of new technology may also cannot work. So immediate action and quick routing notification for guidelines and protection is the most. Considering this issue We proposed indoor evacuating guidance system based on microcontroller Wi-Fi board for Indoor APP using mobile. Focusing various kind of technology like, ok google, voice search APP we purposed node architecture based system. When we listen fire alarm while living inside the room. Then to be safe we connect with server and start Arduino UNO+IoT ESP8266 Wi-Fi shield version1-IoT module to store data in MySQL DB server. We make application to escape out from the building up-to the three exits giving information from source point to destination. Our program can send information to the users emergency location and situations. For this when the user get sound or vibration in their mobile device it indicate fire out near by. At that time we update message from Arduino to DB server for the fixed current position inside the building which give routing signal for that fire out location by changing values from 0 to 1. We have user in point 10 where user is near by. Later we detect Wi-Fi signal form Nodemcu as room of each floor and try to connect with user. Main purpose of this paper is to save life of people in short time and find out the shortest path up to nearest exits in the time of emergencies and rescue them.

A Design and Implementation of the Light-Weight Random Number Generator Using Sensors (센서를 이용한 경량 난수발생기 설계 및 구현)

  • Kang, Hana;Yoo, Taeil;Yeom, Yongjin;Kang, Ju-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.307-315
    • /
    • 2017
  • Random number generator(RNG) is essential in cryptographic applications. As recently a system using small devices such as IoT, Sensor Network, SmartHome appears, the lightweight cryptography suitable for this system is being developed. However due to resource limitations and difficulties in collecting the entropy, RNG designed for the desktop computer are hardly applicable to lightweight environment. In this paper, we propose a lightweight RNG to produce cryptographically strong random number using sensors. Our design uses a Hankel matrix, block cipher as the structure and sensors values as noise source. Futhermore, we implement the lightweight RNG in Arduino that is one of the most popular lightweight devices and estimate the entropy values of sensors and random number to demonstrate the effectiveness and the security of our design.

A SPECK Crypto-Core Supporting Eight Block/Key Sizes (8가지 블록/키 크기를 지원하는 SPECK 암호 코어)

  • Yang, Hyeon-Jun;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.468-474
    • /
    • 2020
  • This paper describes the hardware implementation of SPECK, a lightweight block cipher algorithm developed for the security of applications with limited resources such as IoT and wireless sensor networks. The block cipher SPECK crypto-core supports 8 block/key sizes, and the internal data-path was designed with 16-bit for small gate counts. The final round key to be used for decryption is pre-generated through the key initialization process and stored with the initial key, enabling the encryption/decryption for consecutive blocks. It was also designed to process round operations and key scheduling independently to increase throughput. The hardware operation of the SPECK crypto-core was validated through FPGA verification, and it was implemented with 1,503 slices on the Virtex-5 FPGA device, and the maximum operating frequency was estimated to be 98 MHz. When it was synthesized with a 180 nm process, the maximum operating frequency was estimated to be 163 MHz, and the estimated throughput was in the range of 154 ~ 238 Mbps depending on the block/key sizes.