• Title/Summary/Keyword: IoT Services

Search Result 799, Processing Time 0.02 seconds

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

A Framework for Provisioning Internet of Things Context-aware Services (사물인터넷 기반의 상황인지 서비스를 위한 프레임워크 설계)

  • Cheun, Du Wan
    • Journal of Service Research and Studies
    • /
    • v.2 no.2
    • /
    • pp.91-98
    • /
    • 2012
  • The emergence of new types of embedded computing devices and developments in wireless networking are broadening the domain of computing from the work place and home office to other facets of everyday life. This trend is expected to lead to a proliferation of Internet of Things (IoT) environments, in which inexpensive and interconnected computing devices are capable of supporting users in a range of tasks. Context-aware computing is a key source to develop such smart services. However, there are many challenges to enable services to be smart; Heterogeneous Computing Environments, Resource Limitations, Large Amount of Data Produced, and Different Requirements for Context Interpretation. Because of these challenges, there are difficulties in providing smart service by utilizing IoT devices. Currently, many researchers are conducting researches on mobile-computing based smart service development and provisioning and network infrastructure for interconnected IoT devices. Still, there are some limitations on developing core technologies for IoT computing based smart service development. In order to remedy this situation, this thesis presents a reusable framework that provides unique and noble features which are required in developing advanced context-aware IoT applications.

  • PDF

A Study on the Successful Adoption of IoT Services : Focused on iBeacon and Nearby (IoT 서비스의 성공적 수용에 관한 연구 : iBeacon과 Nearby를 중심으로)

  • Kim, Yonghee;Choi, Byeongmoo;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.14 no.1
    • /
    • pp.217-236
    • /
    • 2015
  • The purpose of this study is to propose the effective location-based IoT service acceptance model by integrating ELM (Elaboration Likelihood Model) with UTAUT (Unified Theory of Acceptance and Use of Technology). The Partial Least Squares was used to analyze the causal relationships with respect to the effects of central route and peripheral route on acceptance intention. The results shows that central route has more significant impacts on perceived usefulness than peripheral route and CFIP (Concern for Information Privacy) weaken the relationship of acceptance intention and perceived usefulness. Our findings indicate some meaningful implications in the acceptance research of IOT services. First, we noted that the easy of use significantly affects the adoption of location-based IoT service. Furthermore, it is important to build the secured mechanism of privacy protection to adopt of location-based IoT service. Second, we tried to attempt the newly integrated approach to technical acceptance using UTAUT's variables and ELM by Petty and Cacioppo (1986). Finally this research empirically analyzed the adoption case of location-based IoT service which is not well-known yet within our country.

Smart Sensor Management System Supporting Service Plug-In in MQTT-Based IIoT Applications

  • Lee, Young-Ran;Kim, Sung-Ki
    • Journal of Multimedia Information System
    • /
    • v.9 no.3
    • /
    • pp.209-218
    • /
    • 2022
  • Industrial IoT applications, including smart factories, require two problem-solving to build data monitoring systems required by services from distributed IoT sensors (smart sensors). One is to overcome proprietary protocols, data formats, and hardware differences and to uniquely identify and connect IoT sensors, and the other is to overcome the problem of changing the server-side data storage structure and sensor data transmission format according to the addition or change of service or IoT sensors. The IEEE 1451.4 standard-based or IPMI specification-based smart sensor technology supports the development of plug-and-play sensors that solve the first problem. However, there is a lack of research that requires a second problem-solving, which requires support for the plug-in of IoT sensors into remote services. To propose a solution for the integration of these two problem-solving, we present a IoT sensor platform, a service system architecture, and a service plugin protocol for the MQTT-based IIoT application environment.

Secure Multicast using Proxy Re-Encryption in an IoT Environment

  • Kim, SuHyun;Hwang, YongWoon;Seo, JungTaek
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.946-959
    • /
    • 2018
  • Recently interest in Internet of Things(IoT) has attracted significant attention at national level. IoT can create new services as a technology to exchange data through connections among a huge number of objects around the user. Data communication between objects provides not only information collected in the surrounding environment but also various personalized information. IoT services which provide these various types of data are exposed to numerous security vulnerabilities. If data is maliciously collected and used by an attacker in an IoT environment that deals with various data, security threats are greater than those in existing network environments. Therefore, security of all data exchanged in the IoT environment is essential. However, lightweight terminal devices used in the IoT environment are not suitable for applying the existing encryption algorithm. In addition, IoT networks consisting of many sensors require group communication. Therefore, this paper proposes a secure multicast scheme using the proxy re-encryption method based on Vehicular ad-hoc networks(VANET) environment. The proposed method is suitable for a large-scale dynamic IoT network environment using unreliable servers.

SRS: Social Correlation Group based Recommender System for Social IoT Environment

  • Kang, Deok-Hee;Choi, Hoan-Suk;Choi, Sang-Gyu;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.53-61
    • /
    • 2017
  • Recently, the Social Internet of Things (IoT), the follow-up of the IoT, has been studied to expand the existing IoT services, by integrating devices into the social network of people. In the Social IoT environment, humans, devices and digital contents are connected with social relationships, to guarantee the network navigability and establish levels of trustworthiness. However, this environment handles massive data, including social data of humans (e.g., profile, interest and relationship), profiles of IoT devices, and digital contents. Hence, users and service providers in the Social IoT are exposed to arbitrary data when searching for specific information. A study about the recommender system for the Social IoT environment is therefore needed, to provide the required information only. In this paper, we propose the Social correlation group based Recommender System (SRS). The SRS generates a target group, depending on the social correlation of the service requirement. To generate the target group, we have designed an architecture, and proposed a procedure of the SRS based on features of social interest similarity and principles of the Collaborative Filtering and the Content-based Recommender System. With simulation results of the target scenario, we present the possibility of the SRS to be adapted to various Social IoT services.

Development of an oneM2M-compliant IoT Platform for Wearable Data Collection

  • Ahn, Il Yeup;Sung, Nak-Myoung;Lim, Jae-Hyun;Seo, Jeongwook;Yun, Il Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.1-15
    • /
    • 2019
  • Internet of Things (IoT) is commonly referred to as a future internet technology to provide advanced services by interconnecting physical and virtual things, collecting and using many data from them. The IoT platform is a server platform with a common architecture to collect and share the data independent of the IoT devices and services. Recently, oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT announced the availability of oneM2M Release 2 specifications. Accordingly, this paper presents a new oneM2M-compliant IoT platform called Mobius 2.0 and proposes its application to collect the biosignal data from wearable IoT devices for emotion recognition. Experimental results show that we can collect various biosignal data seamlessly and extract meaningful features from the biosignal data to recognize two emotions of joy and sadness.

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.

User satisfaction analysis for layer-specific differences using the IoT services (IoT 서비스를 사용하는 사용자 계층별 차이에 대한 만족도 분석)

  • Park, Chong-Woon;Kwon, Chang-Hui
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.90-98
    • /
    • 2017
  • Since 2010, SNS was holding the explosive spread of smartphones has created a place of public advertising platform, and it entered the Internet of Things (IoT) is born gradually countdown of the era came to us already. In utilizing a variety of location-based services IoT services (beacon, O2O) The focus of this paper to analyze the differences in satisfaction with the oil layer by experienced users of what is being used. We consider the type and overall utilization of the concepts typical IoT service in the current service is made to expand the contents of the paper. Hypothesis was reconstructed ease, attractiveness, a survey reliability, value four kinds of models, called Honeycomb UX, User Experience Honeycomp Peter Mobil. Company that provides the service IoT in this study are expected to be used as basic data to help provide a more accurate personalized service according to the user's satisfaction difference.

Smart IoT Home Data Analysis and Device Control Algorithm Using Deep Learning (딥 러닝 기반 스마트 IoT 홈 데이터 분석 및 기기 제어 알고리즘)

  • Lee, Sang-Hyeong;Lee, Hae-Yeoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.4
    • /
    • pp.103-110
    • /
    • 2018
  • Services that enhance user convenience by using various IoT devices are increasing with the development of Internet of Things(IoT) technology. Also, since the price of IoT sensors has become cheaper, companies providing services by collecting and utilizing data from various sensors are increasing. The smart IoT home system is a representative use case that improves the user convenience by using IoT devices. To improve user convenience of Smart IoT home system, this paper proposes a method for the control of related devices based on data analysis. Internal environment measurement data collected from IoT sensors, device control data collected from device control actuators, and user judgment data are learned to predict the current home state and control devices. Especially, differently from previous approaches, it uses deep neural network to analyze the data to determine the inner state of the home and provide information for maintaining the optimal inner environment. In the experiment, we compared the results of the long-term measured data with the inferred data and analyzed the discrimination performance of the proposed method.