• Title/Summary/Keyword: IoT Resource

Search Result 187, Processing Time 0.023 seconds

A Secure Healthcare System Using Holochain in a Distributed Environment

  • Jong-Sub Lee;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.261-269
    • /
    • 2023
  • We propose to design a Holochain-based security and privacy protection system for resource-constrained IoT healthcare systems. Through analysis and performance evaluation, the proposed system confirmed that these characteristics operate effectively in the IoT healthcare environment. The system proposed in this paper consists of four main layers aimed at secure collection, transmission, storage, and processing of important medical data in IoT healthcare environments. The first PERCEPTION layer consists of various IoT devices, such as wearable devices, sensors, and other medical devices. These devices collect patient health data and pass it on to the network layer. The second network connectivity layer assigns an IP address to the collected data and ensures that the data is transmitted reliably over the network. Transmission takes place via standardized protocols, which ensures data reliability and availability. The third distributed cloud layer is a distributed data storage based on Holochain that stores important medical information collected from resource-limited IoT devices. This layer manages data integrity and access control, and allows users to share data securely. Finally, the fourth application layer provides useful information and services to end users, patients and healthcare professionals. The structuring and presentation of data and interaction between applications are managed at this layer. This structure aims to provide security, privacy, and resource efficiency suitable for IoT healthcare systems, in contrast to traditional centralized or blockchain-based systems. We design and propose a Holochain-based security and privacy protection system through a better IoT healthcare system.

Development of IoT-Based Automatic Paddy Inlet for Efficient Water Management (효율적 물관리를 위한 IoT 기반 논 관개수로 자동 물꼬 개발)

  • Song, Soekho;Ahn, Chiyong;Song, Chulmin
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.66 no.2
    • /
    • pp.13-24
    • /
    • 2024
  • This study aims to contribute to efficient paddy field water management by developing an IoT-based automatic paddy inlet that can consider water level changes according to variations in the supplied water quantity through irrigation channels. This IoT-based automatic paddy inlet not only ensures water level changes based on the supply of irrigation water but also secures irrigation efficiency. The effectiveness and efficiency of the developed IoT-based automatic paddy inlet were presented to contribute to efficient paddy field water management. As a result, the IoT-based automatic paddy inlet demonstrated the capability to maintain the optimal water level in the paddy field. Particularly, it exhibited up to 18.4% higher water resource usage efficiency compared to conventional paddy inlet, emphasizing the IoT-based automatic paddy inlet's advantage in terms of water resource usage.

A Resource Planning Policy to Support Variable Real-time Tasks in IoT Systems (사물인터넷 시스템에서 가변적인 실시간 태스크를 지원하는 자원 플래닝 정책)

  • Hyokyung Bahn;Sunhwa Annie Nam
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.47-52
    • /
    • 2023
  • With the growing data size and the increased computing load in machine learning, energy-efficient resource planning in IoT systems is becoming increasingly important. In this paper, we suggest a new resource planning policy for real-time workloads that can be fluctuated over time in IoT systems. To handle such situations, we categorize real-time tasks into fixed tasks and variable tasks, and optimize the resource planning for various workload conditions. Based on this, we initiate the IoT system with the configuration for the fixed tasks, and when variable tasks are activated, we update the resource planning promptly for the situation. Simulation experiments show that the proposed policy saves the processor and memory energy significantly.

Resource Management Strategies in Fog Computing Environment -A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.310-328
    • /
    • 2022
  • Internet of things (IoT) has emerged as the most popular technique that facilitates enhancing humans' quality of life. However, most time sensitive IoT applications require quick response time. So, processing these IoT applications in cloud servers may not be effective. Therefore, fog computing has emerged as a promising solution that addresses the problem of managing large data bandwidth requirements of devices and quick response time. This technology has resulted in processing a large amount of data near the data source compared to the cloud. However, efficient management of computing resources involving balancing workload, allocating resources, provisioning resources, and scheduling tasks is one primary consideration for effective computing-based solutions, specifically for time-sensitive applications. This paper provides a comprehensive review of the source management strategies considering resource limitations, heterogeneity, unpredicted traffic in the fog computing environment. It presents recent developments in the resource management field of the fog computing environment. It also presents significant management issues such as resource allocation, resource provisioning, resource scheduling, task offloading, etc. Related studies are compared indifferent mentions to provide promising directions of future research by fellow researchers in the field.

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things (사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술)

  • Park, Jiye;Shin, Saemi;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.9
    • /
    • pp.707-714
    • /
    • 2013
  • IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

Hierarchical Service Binding and Resource Allocation Design for Context-based IoT Service in MEC Networks (상황인지 기반 IoT-MEC 서비스를 위한 계층적 서비스 바인딩 및 자원관리 구조 설계)

  • Noh, Wonjong
    • Journal of IKEEE
    • /
    • v.25 no.4
    • /
    • pp.598-606
    • /
    • 2021
  • In this paper, we presents a new service binding and resource management model for context based services in mobile edge computing (MEC) networks. The proposed control is composed of two layers: MEC service bindng control layer (MCL) and user context control layer (UCL). The MCL manages service binding construction, resource allocation, and service policy construction from a system point of view; and the UCL manages real-time service adaptation using meta-objects. Through simulations, we confirmed that the proposed control offers enhanced throughput and content transfer time when it is compared to the legacy computing and control models. The proposed control model can be employed as a key component for the context based various internet-of-things (IoT) services in MEC environments.

Development of an IoT-Based Human Interactive Advertising Service for Sharing Economy (공유경제를 위한 IoT 기반의 휴먼 인터랙티브 광고 서비스 구현)

  • Jung, Wonseok;Lee, Chang-Kyo;Ko, Wan-Jin;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.413-415
    • /
    • 2019
  • In this paper, we develop IoT-HiAS(IoT-Human Interactive Advertising Service) for sharing economy. The HiAS device shooting the front of the device via a webcam and recognizes the person in real time through the SSD model using MobileNet. If the number of persons above the set threshold is recognized by counting the recognized person, the advertisement is reproduced on the idle resource through the beam projector. At the same time as the advertisement is reproduced, the captured image of the advertisement start time in the front of the device and the number of recognized persons are sends the IoT server of an oneM2M-compliant HiAS server using the IoT client. When the advertisement is finish, the webcam is shooting the front of the device and the image is sends the IoT server. We implemented the IoT-based human interactive advertising service by transmitting the received data to the advertiser and the advertising producers through the SNS(Social Network Service) agent of the HiAS server.

  • PDF

The Capacity Increase Scheme for Cellular based LPWA (Low Power Wade Area) IoT (이동통신 기반 LPWA (Low Power Wade Area) IoT를 위한 용량 증대 방안)

  • Park, Bok-Nyong;Jung, Il-Do
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.17-23
    • /
    • 2022
  • NB-IoT and LTE Cat.M1 based on LPWA(Low Power Wide Area) are commercialized and serviced by mobile carriers. As the demand for IoT devices is increased, the number of subscribers to these services is also increasing. In the beginning of service, there was no issue that eNB capacity for NB-IoT and LTE Cat.M1. However, as the number of subscribers increases, there is an issue that the eNB capacity for these service is insufficient. Active UE capacity issue may cause overload by continuous increase and temporary increase. In this paper, we propose a solution to solve the problem of LTE RRC(Radio Resource Control) Active UE capacity shortage and base station overload caused by the increase of NB-IoT and LTE Cat.M1 UE in same eNB. The proposed solution can increase a cell capacity without cell division and additional eNB, and can also improve the service quality of these UEs.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.