• Title/Summary/Keyword: IoT Home

Search Result 327, Processing Time 0.027 seconds

Recent Progress in Magneto-Mechano-Electric Generators (자기-기계-전기 변환소자를 이용한 에너지 하베스팅 기술)

  • Hwang, Geon-Tae;Ryu, Jungho;Yoon, Woon-Ha
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.34 no.5
    • /
    • pp.271-282
    • /
    • 2021
  • The internet of things (IoT) technology is a key component for the advent of 4th industrial revolution, which is the network of home appliances, infrastructures, and vehicles to remotely investigate these systems. For the operation of compact IoT devices, batteries are widely used as electric power, and the limited lifetime of batteries inevitably leads to periodic replacement. Magneto-mechano-electric (MME) generators may be alternatives to batteries inside the IoT devices by converting stray magnetic field into electric energy, since we are always surrounded by ambient alternating current (AC) magnetic fields induced from electric power transmission lines everywhere. This article reviews the recent domestic research progress in high-performance MME generators and their application field for IoT and electronic devices.

Edge Computing-Based Voice Command Smart Home Control System (에지 컴퓨팅 기반 음성 명령 스마트홈 제어 시스템 구축)

  • Kim, So-Chul;Yoon, Seo-Jeong;Ko, Hyungyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.764-766
    • /
    • 2022
  • 본 시스템은 스마트폰에서 사용자의 음성을 이용해 집 안이나 밖에서 IoT 단말을 효율적으로 제어할 수 있는 시스템으로, 인식된 음성에 맞춰 가전제품 기동, 조명 조절 등 IoT 단말을 컨트롤한다. 사용자의 음성은 Json 형태의 명령으로 변환되어 에지 컴퓨팅 기술을 통해 저사양 단말이 고사양 단말의 유휴자원을 활용하며 명령에 따른 IoT 단말 컨트롤이 진행된다. 이러한 아키텍처는 IoT 단말 데이터를 외부에 노출하지 않고 컴퓨팅 자원을 효율적으로 운용할 수 있는 시스템을 제공한다.

Cloud-based IoT Smart Home Intrusion Detection and Monitoring System (클라우드를 활용한 IoT 스마트 홈 침입탐지 모니터링 시스템)

  • Dong-Ju Kim;Min-Ju Choi;Hyeon-Kyeong Lee;Hye-Ju Jeong;Sung-Wook Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.231-232
    • /
    • 2024
  • 홈 IoT 사용의 확대로 우리의 생활이 편리해진 반면, 보안 취약점을 통해 사생활을 침해하는 문제가 다수 발생하고 있다. 따라서 사용자들이 안전하게 사용할 수 있는 스마트 홈 보안 시스템이 필수적이다. 본 논문에서는 웹 페이지에 홈 IoT 환경을 구성한 후, AWS 서비스를 활용하여 로그를 수집하고 이상 징후를 찾는다. 침입 및 공격이 탐지되면 웹 페이지를 통해 사용자에게 알림을 전송한다. 사용자에게 경고와 조치 안내를 제공하여 빠른 대응이 가능하도록 한다.

Development of augmented reality based IoT control platform using marker (마커를 이용한 증강현실 기반 사물인터넷 제어 플랫폼 개발)

  • Shin, Kwang-Seong;Youm, Sungkwan;Park, YoungJoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1053-1059
    • /
    • 2021
  • In order to realize a smart home, a new type of service that converges the two technologies is required as a method to overcome the respective limitations of augmented reality and IoT technologies. Augmented reality recognizes objects and projects augmented content with the recognized objects on the screen. This technology mainly uses image processing methods such as markers as a method for recognizing objects. In this paper, an augmented reality-based IoT control platform using markers was developed. By defining a marker unique to the object, a unique identifier displayed on the camera was distinguished. A smart home system was implemented by calling a controller to control things. The proposed system receives state information of objects through symptom reality and transmits control commands. The proposed platform was verified by manipulating household lights.

Design and Implementation of Home IoT Cultivation System with iOS Interface (iOS 인터페이스를 지원하는 가정용 IoT 재배 시스템 설계 및 구현)

  • Jeong, Seung Gyun;Kim, Gyu Dong;Kim, Byeong Chang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.2
    • /
    • pp.61-68
    • /
    • 2023
  • Demand for "pet plants" and "planteriers" is increasing due to the increase in COVID-19 and fine dust. In this paper, Smart pots for planterior should be small in size while providing the functions for cultivation without any problems. They should provide a user interface for long-range control for user's convenience. We implemented smart pots by incorporating IoT into pots. In response to the growing number of iPhone users, we developed an iOS app for user interface and UX/UI design. By communicating with the smartphone app and a home pot server over the Internet, users can check and control the state of the pot anytime, anywhere. The server and the pot module were separated to reduce the size of the pot itself. By locating a water bottle at the bottom of the pot, we expect that it is suitable for a "planterier" because it adopts a circulating structure in which drainage flows down to the water bottle as it is.

Network Forensics and Intrusion Detection in MQTT-Based Smart Homes

  • Lama AlNabulsi;Sireen AlGhamdi;Ghala AlMuhawis;Ghada AlSaif;Fouz AlKhaldi;Maryam AlDossary;Hussian AlAttas;Abdullah AlMuhaideb
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.95-102
    • /
    • 2023
  • The emergence of Internet of Things (IoT) into our daily lives has grown rapidly. It's been integrated to our homes, cars, and cities, increasing the intelligence of devices involved in communications. Enormous amount of data is exchanged over smart devices through the internet, which raises security concerns in regards of privacy evasion. This paper is focused on the forensics and intrusion detection on one of the most common protocols in IoT environments, especially smart home environments, which is the Message Queuing Telemetry Transport (MQTT) protocol. The paper covers general IoT infrastructure, MQTT protocol and attacks conducted on it, and multiple network forensics frameworks in smart homes. Furthermore, a machine learning model is developed and tested to detect several types of attacks in an IoT network. A forensics tool (MQTTracker) is proposed to contribute to the investigation of MQTT protocol in order to provide a safer technological future in the warmth of people's homes. The MQTT-IOT-IDS2020 dataset is used to train the machine learning model. In addition, different attack detection algorithms are compared to ensure the suitable algorithm is chosen to perform accurate classification of attacks within MQTT traffic.

Case Study on Nest's "Internet of Energy (IoE)" Business Model: Based on Strategic Choices for Connected Product

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.89-96
    • /
    • 2019
  • The purpose of this study is to investigate Nest Labs (Nest)'s business strategy. The activities based on strategic choices for monetizing connected product are investigated. Nest's capacity and functionality is to offer a seamless integration of devices, platforms, and services and the "Works with Nest" offers an ecosystem fulfilling the needs of different partners. For monetizing customer data, Nest provides a seamless customer experience supported by product incentives. Nest introduces open APIs to connect its connected products to the wider Internet of things (IoT) and open to "If This, Then That." The Nest app controls them from one single place. Nest partners with 32 energy providers as of 2017 and they provide energy from renewable and non-renewable energy sources. Nest also creates a sales channels in direct and indirect route and expands is business model to other industries such as home-rental service, 'AirBnB' to help consumers become more energy-efficient at home.

One Time Password-Based SEED Algorithm for IoT Systems (IoT 시스템을 위한 시간 동기화 방식 기반 SEED 알고리즘)

  • Lee, Sung-Won;Park, Seung-Min;Sim, Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.9
    • /
    • pp.766-772
    • /
    • 2016
  • Recent advances in networking and computers, especially internet of things (IoT) technologies, have improved the quality of home life and industrial sites. However, the security vulnerability of IoT technologies causes life-threatening issues and information leakage concerns. Studies regarding security algorithms are being conducted. In this paper, we proposed SEED algorithms based on one time passwords (OTPs). The specified server sent time data to the client every 10 seconds. The client changed the security key using time data and generated a ciphertext by combining the changed security key and the matrix. We applied the SEED algorithms with enhanced security to Linux-based embedded boards and android smart phones, then conducted a door lock control experiment (door lock & unlock). In this process, the power consumed for decryption was measured. The power consumption of the OTP-based algorithm was measured as 0.405-0.465W. The OTP-based algorithm didn't show any difference from the existing SEED algorithms, but showed a better performance than the existing algorithms.

Logical Activity Recognition Model for Smart Home Environment

  • Choi, Jung-In;Lim, Sung-Ju;Yong, Hwan-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.67-72
    • /
    • 2015
  • Recently, studies that interact with human and things through motion recognition are increasing due to the expansion of IoT(Internet of Things). This paper proposed the system that recognizes the user's logical activity in home environment by attaching some sensors to various objects. We employ Arduino sensors and appreciate the logical activity by using the physical activitymodel that we processed in the previous researches. In this System, we can cognize the activities such as watching TV, listening music, talking, eating, cooking, sleeping and using computer. After we produce experimental data through setting virtual scenario, then the average result of recognition rate was 95% but depending on experiment sensor situation and physical activity errors the consequence could be changed. To provide the recognized results to user, we visualized diverse graphs.

Task Management System According to Changes in the Situation Based on IoT

  • Kerang, Cao;Lee, Hyunju;Jung, Hoekyung
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1459-1466
    • /
    • 2017
  • Recently, the development of the smart home field provides a range of services to install and keep the smart home appliance in a user's residential environment pleasantly. However, the conventional system method is not convenient enough to use properly because users have to select a device and manually operate the device on their own. In this paper, we propose a system to set the priority of the devices selected by the user and proceed with the task. When a user selects a device, the system recommends an optimal device associated with the device. The system compares and sets the priority of each device, carrying out the task one by one according to the set priority. Therefore, the proposed system is expected to provide users with increased convenience and more efficient task management.