• Title/Summary/Keyword: IoT Smart Home

Search Result 234, Processing Time 0.028 seconds

Research on Secure IoT Lightweight Protocols (사물인터넷용 경량 프로토콜 비교 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • The use of Internet of Things(IoT) in smart cities and smart homes is essential. The security of the sensor nodes, which are the core of the IoT, is weak and hacking attacks are severe enough to have a fatal impact on real life. This research is conducted to improve the security of the Internet of Things by developing a lightweight secure communication protocol for the Internet of Things, and to build a safe Internet of Things environment suitable for the era of the 4th Industrial Revolution. It contributes to building a safe and convenient smart city and smart home by proposing key management and identifier development to increase the confidentiality of communication and the establishment of an Internet authentication system.

A Moving Terminal's Coordinates Prediction Algorithm and an IoT Application

  • Kim, Daewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.63-74
    • /
    • 2017
  • Recently in the area of ICT, the M2M and IoT are in the spotlight as a cutting edge technology with the help of advancement of internet. Among those fields, the smart home is the closest area to our daily lives. Smart home has the purpose to lead a user more convenient living in the house with WLAN (Wireless Local Area Network) or other short-range communication environments using automated appliances. With an arrival of the age of IoT, this can be described as one axis of a variety of applications as for the M2H (Machine to Home) field in M2M. In this paper, we propose a novel technique for estimating the location of a terminal that freely move within a specified area using the RSSI (Received Signal Strength Indication) in the WLAN environment. In order to perform the location estimation, the Fingerprint and KNN methods are utilized and the LMS with the gradient descent method and the proposed algorithm are also used through the error correction functions for locating the real-time position of a moving user who is keeping a smart terminal. From the estimated location, the nearest fixed devices which are general electric appliances were supposed to work appropriately for self-operating of virtual smart home. Through the experiments, connection and operation success rate, and the performance results are analyzed, presenting the verification results.

A Design of IoT based Automatic Control System for Intelligent Smart Home Network (지능형 스마트 홈네트워크를 위한 IoT기반 자동조절시스템 설계)

  • Shim, JeongYon
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.21-25
    • /
    • 2015
  • The Internet of Thing (IoT) will be a very important core technology to implement Intelligent Smart Home Network and it will take charge of an important role connected to Smart Phone, Cloud Computing in the Ubiquitous environment. In this paper, Internal Autonomous Regulation by human autonomic nervous system was studied and its core mechanism was applied to the design of IoT based Autonomous Regulation System for Intelligent Smart Home Network. We proposed an autonomous regulating mechanism in which the factors of Temperature, Humidity and Illumination are automatically adjusted as they communicate with the connected things.

A Study on Enhanced 3PAKE Scheme against Password Guessing Attack in Smart Home Environment (스마트홈 환경에서 패스워드 추측 공격에 안전한 개선된 3PAKE 기법에 대한 연구)

  • Lee, Dae-Hwi;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1471-1481
    • /
    • 2016
  • As concern about IoT is increasing recently, various IoT services are being launched. Smart home is closely related to our daily life by combining IoT with user's residential space. Therefore, if an unauthorized user accesses a device inside a Smart home, it can cause more serious damage to user as it is related with daily lives. For instance executing the command allowing unauthenticated access for the internal locking device can be a real harm to user's property like a home invasion. To prevent this problem, this paper introduces 3PAKE Techniques, which provides authenticated Key exchange through Home gateway using Password-based Authenticated Key Exchange(PAKE).

A Study on Business Types of IoT-based Smarthome: Based on the Theory of Platform Typology (IoT 기반 스마트홈 비즈니스 유형 연구: 플랫폼유형론을 근간으로)

  • Song, Minzheong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.27-40
    • /
    • 2016
  • This paper aims to analyze the business types of 237 IoT based smart home companies in the world (launched during 1999~2014) which got global investment last few years. For this, the previous literatures trying to analze technology and service types of smart home are searched and the typology of the platform is discussed. Based on it, this research conceptualizes an analysis framework that includes three areas of smart home like home automation, home security, and energy efficiency with the three platform types like product, software, and service. This study concludes that the development of business type for IoT based smart home ecosystem is from the product to software and it can be a platform or not. In current status, there are a few platforms of product and software, but in the device management (16%) and thermostat (11%), companies are persuing more platform like. It is difficult to find the service platform in overall areas, for application based service has a few attractions in the investment market due to the lack of cloud infrastructure and data analytics. The following three are the implication to domestic market: 1) More active offering of API and SDK, 2) more active introduction of wireless Intenet network protocols, and 3) more active interoperability efforts and alliance activities are needed.

A Survey on Role of Block Chain in Smart Cities

  • Chokkanathan, K;Shanmugaraja, P;Ramasamy, Siva Shankar;Ouncharoen, Rujira;Chakpitak, Nopasit
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.1-7
    • /
    • 2021
  • An amazing growth in the field of Internet of Things (IoT) and Blockchain based smart cities from both industry and academia has been witnessed in the recent years. There are many smart applications such as intelligent transportation, smart banking, improving the life style of citizen, energy consumption and managing the waste in the city, handling home needs are supporting the Smart city concept. These applications are profoundly supported by the advanced technologies like Blockchain as well as IoT in the recent past. Smart cities can be supported by the Blockchain core concepts such as secure, transparent, decentralized and immutable nature. Still, Blockchain and IoT technologies implementation in smart cities are in their early stages and significant research efforts are desirable to integrate them. This review article explores the roles and responsibilities of Blockchain and IoT in building smart cities.

A Study on The Marketing Strategy of IoT (Internet of Things)-based Smart Home Service Companies Focusing on The Case of Xiaomi

  • Liang, Jinle;Kang, Min Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.20-25
    • /
    • 2021
  • In the background of the rapid development of the IoT, smart home work is becoming more and more important to each science and technology company. Smart home provides a safe, comfortable, high-quality, high-performance smart home living space compared to general homes, and at the same time It is responding to the low-carbon, eco-friendly global trend. Growth drivers driving the smart home market are increasing the number of Internet users, increasing disposable income in developing countries, increasing the importance of remote home monitoring, and increasing the need for energy saving and low carbon. In 2013-2014, Xiaomi launched a series of smart routers and smart home hardware devices. In 2015, it announced the latest product of the Xiaomi Ecological Chain, the "Smart Home Package," and in 2016 launched the MIJIA brand to invest in various smart product companies. In 2017, Xiaomi announced a plan to build an open smart hardware MIOT platform. We investigated the management strategy of Xiaomi home smart service based on IOT. The management strategy was divided into cost lead strategy, differentiation strategy of Xiaomi home service, and AIOT strategy of Xiaomi smart home.

Minimize the ZigBee RSSI noise using mean filter (Mean Filter 기반 ZigBee RSSI 노이즈 최소화 방안)

  • Jeong, Jae-won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.162-163
    • /
    • 2017
  • IoT 기술의 발달로 지능적 관계를 형성하는 사물 공간 연결망으로 다양한 산업분야에 활용되고 있으며, IoT 시스템을 구축하기 위한 무선 통신 기술들도 연구되고 있다. Zigbee는 대표적인 무선 통신 표준 기술로 IoT의 Smart Home, Smart Led와 같은 분야에서 활용되고 있다. Zigbee 장비의 commissioning 기법은 사용자를 고려한 IoT 환경에서는 해결해야 할 과제이며, RSSI를 통하여 각각의 장비를 식별돼야 할 필요성이 있다. 본 논문에서는 RSSI 신호세기를 필터를 통하여 정렬하는 Zigbee Commissioning 기법을 제안한다.

  • PDF

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

A Design of Smart Home IoT Device Remote Control Policy Management System based on CEP (CEP 기반의 스마트 홈 IoT 디바이스 원격 제어 정책 관리 시스템 설계)

  • Kim, KyeYoung;Moon, Daejin;Cho, Dae-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.576-578
    • /
    • 2016
  • Various smart home IoT devices and services while the Internet of things is the development has been provided. The core of the smart home IoT service is that user control the device via the Internet communication. Communication of IoT devices, because most with an IP address within the private network, there is a difficulty in the remote control to control access from outside the network. Any of the methods for remote control, to determine the IP address of each other, there is a UDP hole punching for communication. To ensure the data communication success rate closed to 100%, the UDP hole punching must undergo a process of three stages in some cases. In this paper, to provide a system for managing the remote control policy based on the CEP in order to omit the unnecessary steps on the remote control of IoT devices using UDP hole punching.

  • PDF