• 제목/요약/키워드: IoT Devices

검색결과 1,169건 처리시간 0.023초

Graph Assisted Resource Allocation for Energy Efficient IoT Computing

  • Mohammed, Alkhathami
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.140-146
    • /
    • 2023
  • Resource allocation is one of the top challenges in Internet of Things (IoT) networks. This is due to the scarcity of computing, energy and communication resources in IoT devices. As a result, IoT devices that are not using efficient algorithms for resource allocation may cause applications to fail and devices to get shut down. Owing to this challenge, this paper proposes a novel algorithm for managing computing resources in IoT network. The fog computing devices are placed near the network edge and IoT devices send their large tasks to them for computing. The goal of the algorithm is to conserve energy of both IoT nodes and the fog nodes such that all tasks are computed within a deadline. A bi-partite graph-based algorithm is proposed for stable matching of tasks and fog node computing units. The output of the algorithm is a stable mapping between the IoT tasks and fog computing units. Simulation results are conducted to evaluate the performance of the proposed algorithm which proves the improvement in terms of energy efficiency and task delay.

A Secure Healthcare System Using Holochain in a Distributed Environment

  • Jong-Sub Lee;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.261-269
    • /
    • 2023
  • We propose to design a Holochain-based security and privacy protection system for resource-constrained IoT healthcare systems. Through analysis and performance evaluation, the proposed system confirmed that these characteristics operate effectively in the IoT healthcare environment. The system proposed in this paper consists of four main layers aimed at secure collection, transmission, storage, and processing of important medical data in IoT healthcare environments. The first PERCEPTION layer consists of various IoT devices, such as wearable devices, sensors, and other medical devices. These devices collect patient health data and pass it on to the network layer. The second network connectivity layer assigns an IP address to the collected data and ensures that the data is transmitted reliably over the network. Transmission takes place via standardized protocols, which ensures data reliability and availability. The third distributed cloud layer is a distributed data storage based on Holochain that stores important medical information collected from resource-limited IoT devices. This layer manages data integrity and access control, and allows users to share data securely. Finally, the fourth application layer provides useful information and services to end users, patients and healthcare professionals. The structuring and presentation of data and interaction between applications are managed at this layer. This structure aims to provide security, privacy, and resource efficiency suitable for IoT healthcare systems, in contrast to traditional centralized or blockchain-based systems. We design and propose a Holochain-based security and privacy protection system through a better IoT healthcare system.

Dynamic Service Composition and Development Using Heterogeneous IoT Systems

  • Ryu, Minwoo;Yun, Jaeseok
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권9호
    • /
    • pp.91-97
    • /
    • 2017
  • IoT (Internet of Things) systems are based on heterogeneous hardware systems of different types of devices interconnected each other, ranging from miniaturized and low-power wireless sensor node to cloud servers. These IoT systems composed of heterogeneous hardware utilize data sets collected from a particular set of sensors or control designated actuators when needed using open APIs created through abstraction of devices' resources associated to service applications. However, previously existing IoT services have been usually developed based on vertical platforms, whose sharing and exchange of data is limited within each industry domain, for example, healthcare. Such problem is called 'data silo', and considered one of crucial issues to be solved for the success of establishing IoT ecosystems. Also, IoT services may need to dynamically organize their services according to the change of status of connected devices due to their mobility and dynamic network connectivity. We propose a way of dynamically composing IoT services under the concept of WoT (Web of Things) where heterogeneous devices across different industries are fully integrated into the Web. Our approach allows developers to create IoT services or mash them up in an efficient way using Web objects registered into multiple standardized horizontal IoT platforms where their resources are discoverable and accessible. A Web-based service composition tool is developed to evaluate the practical feasibility of our approach under real-world service development.

IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구 (A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure)

  • 황송이;김정녀
    • 정보보호학회논문지
    • /
    • 제31권4호
    • /
    • pp.617-635
    • /
    • 2021
  • 네트워크에 연결된 사물인터넷(Internet of Things, IoT) 기기는 보안 솔루션이 적용되지 않아 ICT(Information & Communications Technology) 인프라의 심각한 보안 위협으로 전락했다. 더군다나 IoT 기기의 특성상 자원제약이 많아 기존의 보안 솔루션을 적용하기 어렵다. 그 결과 사물인터넷 기기는 사이버 공격자의 공격 대상이 됐으며, 실제로도 사물인터넷 기기를 대상으로 한 악성코드 공격이 해마다 꾸준히 증가하고 있다. 이에 IoT 인프라를 보호하기 위해 여러 보안 솔루션이 개발되고 있지만, 기능이 검증되지 않은 보안 솔루션을 실제 환경에 적용하기엔 큰 위험이 따른다. 따라서 보안 솔루션의 기능과 성능을 검증할 검증 도구도 필요하다. 보안 솔루션이 다양한 보안 위협에 대응하는 방법도 다양하므로, 각 보안 솔루션의 특징을 기반으로 한 최적의 검증 도구가 필요하다. 본 논문에서는 IoT 인프라에 빠른 속도로 악성코드를 전파하는 악성코드 고속 확산 도구를 제안한다. 또한, IoT 인프라에서 확산하는 공격을 빠르게 탐지하고 차단하는 보안 솔루션의 기능과 성능을 검증하기 위해 개발된 악성코드 고속 확산 도구를 이용한다.

에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜 (Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments)

  • 최정희
    • 융합정보논문지
    • /
    • 제12권2호
    • /
    • pp.23-29
    • /
    • 2022
  • 최근 사물인터넷(Internet of Things, IoT) 기기 사용 증가로 인해 클라우드 컴퓨팅 서버로 전송해 처리하는 데이터양이 급증하고, 그 결과 네트워크 관련 문제점(지연, 서버의 과부하 및 보안 위협)들이 크게 대두되고 있다. 특히, 연산 능력이 클라우드 컴퓨팅보다 낮은 에지 컴퓨팅은 수많은 IoT 기기들을 손쉽게 인증할 수 있는 경량화된 인증 알고리즘이 필요하다. 본 논문에서는 IoT와 에지 장치 간 익명성과 순방향·역방향의 비밀성을 보장하고 중간자 공격과 재전송 공격에 안정적이며, 에지 장치와 IoT 기기 특성에 적합한 경량화 알고리즘의 키 동의 프로토콜을 제안하였고, 제안한 키 동의 프로토콜을 기존 연구와 비교·분석한 결과 IoT 기기와 에지 장치에서 효율적으로 사용 가능한 경량화 프로토콜임을 보였다.

IoT Delegate: Smart Home Framework for Heterogeneous IoT Service Collaboration

  • Kum, Seung Woo;Kang, Mingoo;Park, Jong-Il
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3958-3971
    • /
    • 2016
  • With Internet of Things (IoT) technology, home environment becomes smarter than ever. Not only smart devices such as smart phone or smart TV, but also various IoT devices including sensor, smart thermostat, and smart scale has now become very common on the market. These devices have connectivity to the Internet, so that user can read data from the device or control the device using Internet technology. However, due to diversity of smart home requirements, device collaboration in smart home remains a challenging task still. Usually smart home is built with various technologies to fulfill its own purpose, and these purposes cover very wide area from controlling low-power sensor devices to controlling high-performance devices like smart TV and smart phone. This variety of smart home requirements makes smart home very complicated due to mixed network architecture, protocol and technology. In this paper, a framework to enable managing and collaborating heterogeneous IoT devices in smart home environment is proposed. Several programming models are defined in the proposed framework to make application development for heterogeneous devices more intuitive. The proposed framework has been implemented as a web service, and a case study with real-world smart home IoT devices is presented.

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권9호
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.

IoT 태그 및 소셜 메시지 기반 사물 제어 시스템 (An IoT Tag and Social Message-based Device Control System)

  • 백승민;진연주;하권우;한상욱;정진우
    • 정보과학회 컴퓨팅의 실제 논문지
    • /
    • 제23권9호
    • /
    • pp.550-556
    • /
    • 2017
  • 사물 인터넷 기술의 발달로 인하여 언제 어디서든지 손쉽게 다양한 기기들의 상태를 조회하거나 제어 할 수 있는 환경으로 발전하고 있다. 그러나 현재의 IoT 관련 시스템을 이용하여 사물을 제어하려면 어플리케이션 실행, 공간 및 사물 선택, 사물 제어 등의 여러 단계에 걸친 복잡한 조작이 필요하기 때문에 손쉽고 빠르게 사물을 제어하거나 사물 제어에 대한 요청을 발송하는 부분에 여전히 많은 한계점을 가지고 있다. 본 논문에서는 보다 효율적인 사물 인터넷 제어를 위하여 IoT 태그 및 소셜 메시지 기반의 IoT 제어 프레임워크를 제안한다. 제안하는 시스템에서는 IoT 태깅을 수행한 사용자의 사물 소유권에 따라 사물을 직접 제어하거나 사물 소유주에게 IoT 메시지 전송을 통하여 간편하게 사물을 제어 할 수 있다. 본 논문에서는 프로토타입 구현을 통하여 IoT 환경에서 보다 직관적이고 효율적인 사물 제어가 가능함을 보였다.

태양 에너지 수집형 IoT 엣지 컴퓨팅 환경에서 효율적인 오디오 딥러닝을 위한 에너지 적응형 데이터 전처리 기법 (Energy-Aware Data-Preprocessing Scheme for Efficient Audio Deep Learning in Solar-Powered IoT Edge Computing Environments)

  • 유연태;노동건
    • 대한임베디드공학회논문지
    • /
    • 제18권4호
    • /
    • pp.159-164
    • /
    • 2023
  • Solar energy harvesting IoT devices prioritize maximizing the utilization of collected energy due to the periodic recharging nature of solar energy, rather than minimizing energy consumption. Meanwhile, research on edge AI, which performs machine learning near the data source instead of the cloud, is actively conducted for reasons such as data confidentiality and privacy, response time, and cost. One such research area involves performing various audio AI applications using audio data collected from multiple IoT devices in an IoT edge computing environment. However, in most studies, IoT devices only perform sensing data transmission to the edge server, and all processes, including data preprocessing, are performed on the edge server. In this case, it not only leads to overload issues on the edge server but also causes network congestion by transmitting unnecessary data for learning. On the other way, if data preprocessing is delegated to each IoT device to address this issue, it leads to another problem of increased blackout time due to energy shortages in the devices. In this paper, we aim to alleviate the problem of increased blackout time in devices while mitigating issues in server-centric edge AI environments by determining where the data preprocessed based on the energy state of each IoT device. In the proposed method, IoT devices only perform the preprocessing process, which includes sound discrimination and noise removal, and transmit to the server if there is more energy available than the energy threshold required for the basic operation of the device.

IoT 환경에서의 안전한 키 업데이트를 위한 하드웨어 연동 보안 시스템 (Hardware Interlocking Security System with Secure Key Update Mechanisms In IoT Environments)

  • 잠시드 사이드오브;김봉근;이종협;이광
    • 한국전자통신학회논문지
    • /
    • 제12권4호
    • /
    • pp.671-678
    • /
    • 2017
  • 최근 사물인터넷(IoT)의 발전에 따라 IoT장비가 실생활에 적극적으로 사용되고 있다. 하지만 IoT장비의 사용이 늘어남에 따라서, IoT 보안 사고에 의한 사생활 침해의 문제 또한 늘어나고 있다. 키 관리는 보안 서비스에서 기본적이면서도 중요한 작업이다. 보안성 강화를 위해 인증 과정에서 동일한 키의 재사용은 제한되어야 하지만 다양한 키들을 기억하며 수동으로 업데이트하는 일은 어려운 일이다. 본 논문에서는 자동화된 키 관리 하드웨어 보안 모듈인 HSM을 제안한다. 제안하는 HSM은 IoT장치에 부착하여 장비와 직접 통신하며, 사용자의 개입 없이 안전하고 자동화된 키관리 과정을 제공한다. 제안된 기법을 통해서 제공되는 키는 인터넷 서비스에서의 사용자와 기기의 인증에 사용될 수 있다.