• Title/Summary/Keyword: IoT Devices Security

Search Result 383, Processing Time 0.025 seconds

Precision Agriculture using Internet of Thing with Artificial Intelligence: A Systematic Literature Review

  • Noureen Fatima;Kainat Fareed Memon;Zahid Hussain Khand;Sana Gul;Manisha Kumari;Ghulam Mujtaba Sheikh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.155-164
    • /
    • 2023
  • Machine learning with its high precision algorithms, Precision agriculture (PA) is a new emerging concept nowadays. Many researchers have worked on the quality and quantity of PA by using sensors, networking, machine learning (ML) techniques, and big data. However, there has been no attempt to work on trends of artificial intelligence (AI) techniques, dataset and crop type on precision agriculture using internet of things (IoT). This research aims to systematically analyze the domains of AI techniques and datasets that have been used in IoT based prediction in the area of PA. A systematic literature review is performed on AI based techniques and datasets for crop management, weather, irrigation, plant, soil and pest prediction. We took the papers on precision agriculture published in the last six years (2013-2019). We considered 42 primary studies related to the research objectives. After critical analysis of the studies, we found that crop management; soil and temperature areas of PA have been commonly used with the help of IoT devices and AI techniques. Moreover, different artificial intelligence techniques like ANN, CNN, SVM, Decision Tree, RF, etc. have been utilized in different fields of Precision agriculture. Image processing with supervised and unsupervised learning practice for prediction and monitoring the PA are also used. In addition, most of the studies are forfaiting sensory dataset to measure different properties of soil, weather, irrigation and crop. To this end, at the end, we provide future directions for researchers and guidelines for practitioners based on the findings of this review.

An Investigation Study to Reduce Security Threat in the Internet of Things Environment (IoT 환경에서 보안위협을 최소화하기 위한 방안 연구)

  • Shin, Seung-Soo;Chae, Gyoo-Soo;Lee, Tae-Hyun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • Recently, the necessity of Internet of Things in conjunction between devices is increasing. However, there are increasing security threats while applying various communication technologies in the Internet of Things. In this paper, we propose a security countermeasures to minimize damage to the security of a variety of security technologies used in the Internet of Things in order to improve the efficiency of the Internet of Things. The proposed method defined the environment to minimize security damage between home devices such as TV, washing machine, refrigerator, boiler and medical devices such as Analyzers, blood glucose meters, blood pressure monitors that are used in daily life. In addition, a variety of technologies(Zigbee, Wi-Fi, NFC, RFID, etc.) that are used in the Internet of Things may be under integrated management.

  • PDF

Updated SSDP Scheme for DDoS Attack Defense

  • Huang, Haiou;Hu, Liang;Chu, Jianfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4599-4617
    • /
    • 2018
  • Abusing the Simple Server Discovery Protocol (SSDP) can induce an SSDP attack (including SSDP DoS, DDoS, DRDoS) posing a significant threat to UPnP devices. Rapid and extensive developments in computer technology, especially in regards to IoT, have made Upnp devices an indispensable part of our daily lives - but also render them susceptible to a variety of SSDP attacks without suitable countermeasures. This paper proposes the Two-dimensional table scheme, which provides high security at a reasonable computational cost. The feasibility and effectiveness of the proposed scheme are also validated by comparison against four other schemes (Stateless connections, Failing-together, Cookie, and Client puzzle).

Analyses of Security into End-to-End Point Healthcare System based on Internet of Things (사물인터넷 기반의 헬스케어 시스템의 종단간 보안성 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.871-880
    • /
    • 2017
  • Recently, service based on internet is inter-connected and integrated with a variety of connection. This kind of internet of things consist of heterogenous devices such as sensor node, devices and end-to end equipment which used in conventional protocols and services. The representative system is healthcare system. From healthcare appliance used by IoT, patient and doctor can utilize healthcare information with safety and high speed management. It is very convenient management to operate mobility. But it induced security and vulnerability issues because it has small memory capacity, low power supply and low computing power. This made impossible to implement security algorithm with embedded engine based on hardware. Nowdays, we can't realize conventional standard algorithm due to these kinds of reasons. From the critical issues, it occurred security and vulnerability issues. Therefore, we analysed and compared with conventional method and proposed techniques. Finally, we evaluated security issues and requirement for end-to-end point healthcare system based on internet of things.

A Study on the Improvement Measures of Drowning Accident in South Korea (물놀이 안전사고 개선방안에 관한 연구)

  • Kim, Jung-Gon;Lim, Hojung;Kim, Tae-Hwan;Lee, Dae-Sung
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.153-164
    • /
    • 2019
  • Purpose: This paper aims to derive improvement measures, in terms of legal and technical aspects, which can reduce effectively the casualties caused by drowing accidents. Method: Firstly, we checked the status of drowing accident management and carried out the interview of field private safety guards. field private safety guards. In addition, surveys were conducted on safety personnel and managers. Based on survey results, we are lastly analyzed the specific problems and reviews the improvement measures from technical and legal aspects. Result: As an analytical result, it was considered that supplementary supporting tools such as CCTV, monitoring devices using IoT and artificial intelligence technologies were necessary to prevent drowning accident, and qualification with limited authority should be added to the private safety guard because of the lack of regulation. Conclusion: In order to manage water safety effectively, a comprehensive water safety management system should be established that integrates people and equipment through systemic education of security personnel, authorization of enforcement, and introduction of surveillance equipment.

Comparison and analysis of chest X-ray-based deep learning loss function performance (흉부 X-ray 기반 딥 러닝 손실함수 성능 비교·분석)

  • Seo, Jin-Beom;Cho, Young-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1046-1052
    • /
    • 2021
  • Artificial intelligence is being applied in various industrial fields to the development of the fourth industry and the construction of high-performance computing environments. In the medical field, deep learning learning such as cancer, COVID-19, and bone age measurement was performed using medical images such as X-Ray, MRI, and PET and clinical data. In addition, ICT medical fusion technology is being researched by applying smart medical devices, IoT devices and deep learning algorithms. Among these techniques, medical image-based deep learning learning requires accurate finding of medical image biomarkers, minimal loss rate and high accuracy. Therefore, in this paper, we would like to compare and analyze the performance of the Cross-Entropy function used in the image classification algorithm of the loss function that derives the loss rate in the chest X-Ray image-based deep learning learning process.

Analysis on Lightweight Methods of On-Device AI Vision Model for Intelligent Edge Computing Devices (지능형 엣지 컴퓨팅 기기를 위한 온디바이스 AI 비전 모델의 경량화 방식 분석)

  • Hye-Hyeon Ju;Namhi Kang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.1-8
    • /
    • 2024
  • On-device AI technology, which can operate AI models at the edge devices to support real-time processing and privacy enhancement, is attracting attention. As intelligent IoT is applied to various industries, services utilizing the on-device AI technology are increasing significantly. However, general deep learning models require a lot of computational resources for inference and learning. Therefore, various lightweighting methods such as quantization and pruning have been suggested to operate deep learning models in embedded edge devices. Among the lightweighting methods, we analyze how to lightweight and apply deep learning models to edge computing devices, focusing on pruning technology in this paper. In particular, we utilize dynamic and static pruning techniques to evaluate the inference speed, accuracy, and memory usage of a lightweight AI vision model. The content analyzed in this paper can be used for intelligent video control systems or video security systems in autonomous vehicles, where real-time processing are highly required. In addition, it is expected that the content can be used more effectively in various IoT services and industries.

Designing a Remote Electronic Irrigation and Soil Fertility Managing System Using Mobile and Soil Moisture Measuring Sensor

  • Asim Seedahmed Ali, Osman;Eman Galaleldin Ahmed, Kalil
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.71-78
    • /
    • 2022
  • Electronic measuring devices have an important role in agricultural projects and in various fields. Electronic measuring devices play a vital role in controlling and saving soil information. They are designed to measure the temperature, acidity and moisture of the soil. In this paper, a new methodology to manage irrigation and soil fertility using an electronic system is proposed. This is designed to operate the electronic irrigation and adds inorganic fertilizers automatically. This paper also explains the concept of remote management and control of agricultural projects using electronic soil measurement devices. The proposed methodology is aimed at managing the electronic irrigation process, reading the moisture percentage, elements of soil and controlling the addition of inorganic fertilizers. The system also helps in sending alert messages to the user when an error occurs in measuring the percentage of soil moisture specified for crop and a warning message when change happens to the fertility of soil as many workers find difficulty in daily checking of soil and operating agricultural machines such as irrigation machine and soil fertilizing machine, especially in large projects.

Development of Internet of Things Sensor-based Information System Robust to Security Attack (보안 공격에 강인한 사물인터넷 센서 기반 정보 시스템 개발)

  • Yun, Junhyeok;Kim, Mihui
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.95-107
    • /
    • 2022
  • With the rapid development of Internet of Things sensor devices and big data processing techniques, Internet of Things sensor-based information systems have been applied in various industries. Depending on the industry in which the information systems are applied, the accuracy of the information derived can affect the industry's efficiency and safety. Therefore, security techniques that protect sensing data from security attacks and enable information systems to derive accurate information are essential. In this paper, we examine security threats targeting each processing step of an Internet of Things sensor-based information system and propose security mechanisms for each security threat. Furthermore, we present an Internet of Things sensor-based information system structure that is robust to security attacks by integrating the proposed security mechanisms. In the proposed system, by applying lightweight security techniques such as a lightweight encryption algorithm and obfuscation-based data validation, security can be secured with minimal processing delay even in low-power and low-performance IoT sensor devices. Finally, we demonstrate the feasibility of the proposed system by implementing and performance evaluating each security mechanism.

Management and Security of User in Linux Server (리눅스 서버의 사용자 관리 및 보안)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.587-594
    • /
    • 2015
  • Open operating system, Linux is the traditional Web, E-mail, DNS, FTP server, as well as being used in Cloud and Big data infrastructure. In addition, Linux is also used like a desktop or mobile devices, smart TV and cars. In particular, stepping up to the IoT era at this time is expected to be greater proportion occupied by Linux. As the use of Linux has increased security has emerged as an important factor. User management is core of Linux system security. In this paper, Classifying Linux user and analyzed the role of the user-specific file. Finally, we analyzed the linux management technologies and useful user security tools.