• Title/Summary/Keyword: IoT Device Class

Search Result 7, Processing Time 0.023 seconds

Coverage Class Adaptation Schemes Considering Device Characteristics in a 3GPP Narrowband IoT System (3GPP 협대역 사물인터넷 시스템에서 단말의 특징을 고려한 커버리지 클래스 적응 기법)

  • Nam, Yujin;So, Jaewoo;Na, Minsoo;Choi, Changsoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1026-1037
    • /
    • 2016
  • 3rd Generation Partnership Project (3GPP) is the progressing standardization of the narrowband IoT (NB-IoT) system to support massive devices for the Internet of Things (IoT) services. The NB-IoT system uses a coverage class technique to increase the performance of the NB-IoT system while serving massive devices in very wide coverage area. A moving device can change the coverage class according to the distance or the channel state between the base station and the moving device. However, in the conventional NB-IoT standard, the performance of the NB-IoT system degrades because the coverage class is changed based on the fixed criterion. This paper proposes the coverage class adaptation schemes to increase the performance of the NB-IoT system by dynamically change the coverage class according to the location or the channel state of the device. Simulation results show that the proposed coverage class adaptation scheme decreases both the signaling overhead and the PDCCH decoding error rate in comparison with the conventional coverage class adaptation scheme in the 3GPP standard.

Selective encryption technique according to class classification in LoRa environment (LoRa 환경에서의 Class 분류에 따른 선택적 암호화 기술)

  • Lee, Nam-gon;Kim, Keecheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.285-287
    • /
    • 2017
  • Currently, the world of data communication is not simply communication between server and user in a wired way, but using wireless environment, various devices communicate with each other in a wider and diverse environment to generate a large amount of data. In this environment, IoT is now located deep in our lives, and IoT technologies are used in many tasks, but the data used in IoT is exposed without sufficient protection from malicious behavior. Most of these devices do not have enough computing power to cope with malicious attacks. In this paper, we aim to make all devices that have sufficient computing power and safety from simple sensors to be able to have security according to the situation. The proposed technology is based on the importance of the device and computing power, and it is possible to select the encryption technology selectively and to improve security.

  • PDF

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Slotted ALOHA Random Access with Multiple Coverage Classes for IoT Applications (사물인터넷 응용을 위한 다중 커버리지 클래스를 지원하는 슬롯화된 알로하 랜덤 접속)

  • Kim, Sujin;Chae, Seungyeob;Cho, Sangjin;Rim, Minjoong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.3
    • /
    • pp.554-561
    • /
    • 2017
  • IoT (Internet of Things) devices are often located in environments where indoor or underground, signals are difficult to reach. In addition, the transmission power is low, the base station should be designed to be able to receive signals even at low reception sensitivity. For this reason, a device having a poor channel condition can be transmitted at a low data rate using a low coding rate or repetition. When the coverage class is divided according to the channel condition and the data rate, the packet length may vary from one coverage class to another, and the performance of the slotted aloha random access may be degraded. We will focus on two methods of using shared-resource and seperate resources among multiple slotted aloha methods. In particular, when devices with different coverage classes use shared resources, performance of a device with a bad channel condition may deteriorate. Conversely, when using separate resources for each coverage class, there is a problem that congestion may occur which increases the number of devices that perform random access to one resource area. In this paper, we propose some methods to overcome this problem. This study is mainly focused on MTC devices, and is considered to be a high possibility of future development.

Homomorphic Encryption as End-to-End Solution for Smart Devices

  • Shanthala, PT;Annapurna, D;Nittala, Sravanthi;Bhat, Arpitha S;Aishwarya, Aishwarya
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.57-62
    • /
    • 2022
  • The recent past has seen a tremendous amount of advancement in the field of Internet of Things (IoT), allowing the influx of a variety of devices into the market. IoT devices are present in almost every aspect of our daily lives. While this increase in usage has many advantages, it also comes with many problems, including and not limited to, the problem of security. There is a need for better measures to be put in place to ensure that the users' data is protected. In particular, fitness trackers used by a vast number of people, transmit important data regarding the health and location of the user. This data is transmitted from the fitness device to the phone and from the phone onto a cloud server. The transmission from device to phone is done over Bluetooth and the latest version of Bluetooth Light Energy (BLE) is fairly advanced in terms of security, it is susceptible to attacks such as Man-in-the-Middle attack and Denial of Service attack. Additionally, the data must be stored in an encrypted form on the cloud server; however, this proves to be a problem when the data must be decrypted to use for running computations. In order to ensure protection of data, measures such as end-to-end encryption may be used. Homomorphic encryption is a class of encryption schemes that allow computations on encrypted data. This paper explores the application of homomorphic encryption for fitness trackers.

Basic Study on 250KW-class IoT Electric Heater for Ship Fuel Heating (선박연료 가열용 250KW급 판형 IoT 전기히터의 기초연구)

  • Jang, Sung-Cheol
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.63-68
    • /
    • 2021
  • Domestic electric heater manufacturers are focusing on technology development to improve the efficiency of existing products. The electric heater for ship fuel is large in size and has high difficulty in miniaturization/high efficiency, so there are not many companies that try to develop technology yet. The existing electric heater has a structure of low heating efficiency because the contact time with the heat exchange tube of the heating medium is very short because the flow path of the ship engine fuel is monotonous. Since it is manufactured in a tubular shape, the volume is very large regardless of the heating efficiency. As a result, the tubular electric heater device applied by overseas advanced companies has difficulty in maintaining and repairing because it is necessary to decompose all tubular heaters when a specific part of the inside is damaged and if the heat exchange tube is damaged, all the heat exchange tubes must be decomposed. In this study, a basic study on plate type electric heaters capable of heating 10 tons of ship engine fuel per hour and setting a maximum temperature of up to 150℃ was conducted through a 250kW capacity plate type electric heater.

Beacon-Less Operation and Idle Ping Slot Control for Low Power Communication in LoRaWAN (LoRaWAN의 저전력 통신을 위한 Beacon-Less 동작 및 유휴 Ping 슬롯 억제 기법)

  • Kim, Kyungtae;Yoo, Younghwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.5
    • /
    • pp.231-238
    • /
    • 2017
  • A Class B device in LoRaWAN periodically receives a Beacon message from a gateway for synchronization, and it also periodically activates a ping slot to receive data from the server. In this paper, we save energy consumption by controlling the beacon-less operation which is immediately started on the packet loss. In addition, we propose a method that the server inactivates the ping slots of a device according to the amount of messages, which have to be received from the server, to save energy consumption resulting from activated but unused empty slots. The experiment with the 20% of packet loss rate showed that the reduced beacon-less operation and the inactivation of the ping slot decrease the energy consumption by 96.7% and 60% as compared to the existing method.