• 제목/요약/키워드: IoT Systems

검색결과 906건 처리시간 0.023초

건설현장의 위험구역 설정을 통한 안전 사고 예방 IoT Cone 시스템 개발 기초 연구 (Preliminary study for development of safety accident prevention IoT(Internet of Things) Cone system through dangerous area setting in construction site)

  • 류한국
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2018년도 춘계 학술논문 발표대회
    • /
    • pp.76-77
    • /
    • 2018
  • Under industry 4.0, Internet of Things (IoT) is advancing a new breed of smart manufacturing environment. However IoT has not been widely applied in construction industry compared with manufacturing environment. IoT enables operational systems that deliver more accurate and useful information for managing construction accidents. IoT enables operational systems that deliver more accurate and useful information for managing construction accidents. In order to apply well IoT for construction safety management, as a preliminary study, this paper presents e safety accident prevention IoT Cone system through dangerous area setting in construction site.

  • PDF

Ontology Based-Security Issues for Internet of Thing (IoT): Ontology Development

  • Amir Mohamed Talib
    • International Journal of Computer Science & Network Security
    • /
    • 제23권8호
    • /
    • pp.168-176
    • /
    • 2023
  • The use of sensors and actuators as a form of controlling cyber-physical systems in resource networks has been integrated and referred to as the Internet of Things (IoT). However, the connectivity of many stand-alone IoT systems through the Internet introduces numerous security challenges as sensitive information is prone to be exposed to malicious users. In this paper, IoT based-security issues ontology is proposed to collect, examine, analyze, prepare, acquire and preserve evidence of IoT security issues challenges. Ontology development has consists three main steps, 1) domain, purpose and scope setting, 2) important terms acquisition, classes and class hierarchy conceptualization and 3) instances creation. Ontology congruent to this paper is method that will help to better understanding and defining terms of IoT based-security issue ontology. Our proposed IoT based-security issue ontology resulting from the protégé has a total of 44 classes and 43 subclasses.

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

대규모 IoT 응용에 효과적인 주문형 하드웨어의 재구성을 위한 엣지 기반 변성적 IoT 디바이스 플랫폼 (Edge-Centric Metamorphic IoT Device Platform for Efficient On-Demand Hardware Replacement in Large-Scale IoT Applications)

  • 문현균;박대진
    • 한국정보통신학회논문지
    • /
    • 제24권12호
    • /
    • pp.1688-1696
    • /
    • 2020
  • 기존 클라우드 기반 Internet-of-Things(IoT) 시스템의 네트워크 정체와 서버 과부하로 인한 지연, 데이터 이동으로 인한 보안 및 프라이버시 이슈를 해결하기 위하여 엣지 기반의 IoT 시스템으로 IoT의 패러다임이 움직이고 있다. 하지만 엣지 기반의 IoT 시스템은 여러 제약으로 인하여 처리 성능과 동작의 유연성이 부족한 치명적인 문제점을 가지고 있다. 처리 성능을 개선하기 위하여 응용 특화 하드웨어를 엣지 디바이스에 구현할 수 있지만, 고정된 기능으로 인하여 특정 응용 이외에는 성능 향상을 보여줄 수 없다. 본 논문은 엣지 디바이스의 제한된 하드웨어 자원에서 다양한 응용 특화 하드웨어를 주문형 부분 재구성을 통해 사용할 수 있고, 이를 통해 엣지 디바이스의 처리 성능과 동작의 유연성을 증가시킬 수 있는 엣지 중심의 Metamorphic IoT(mIoT) 플랫폼을 소개한다. 실험 결과에 따르면, 재구성 알고리즘을 엣지에서 실행하는 엣지 중심의 mIoT 플랫폼은 재구성 알고리즘을 서버에서 실행하는 이전 연구에 비해 엣지의 서버 접근 횟수를 최대 82.2% 줄일 수 있었다.

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

IoT 분야의 다양한 기기/앱 간 상호작용 검출에 관한 연구동향 (A Survey on Detecting Interactions among Different Devices/Apps in IoT)

  • 전이정;이연준
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 춘계학술발표대회
    • /
    • pp.101-103
    • /
    • 2023
  • With the recent advances in communication technology and Internet of Things (IoT) infrastructure, home automation systems have emerged as a new paradigm for providing users with convenient smart home services. The IoT ecosystem has merged digital systems with the physical world, dramatically changing the way people live and work. However, at the same time, security remains one of the most significant research issues in IoT, as the deployment and application of high-availability systems come with various security risks that cause serious threats to users. Among them, the security issues arising from the interaction among devices/applications should not be underestimated. Attackers can exploit interactions among devices/applications to hack into the user's home. In this paper, we present a survey of research on detecting various types of interactions among devices/applications in IoT.

ARMv7 Thumb Architecture 취약성 분석 (Vulnerability analysis on the ARMv7 Thumb Architecture)

  • 김시완;성기택
    • 한국정보통신학회논문지
    • /
    • 제21권5호
    • /
    • pp.1003-1008
    • /
    • 2017
  • 최근 몇 년간 사물인터넷은 중요한 연구적 관심을 끌어왔다. 새로운 IoT 기술이 널리 이용되기 위해서는 정보의 신뢰성과 보호가 전적으로 요구된다. IoT 시스템은 그 특성상 직접적인 접근이 쉬우므로 이로 인한 물리적인 보안에 매우 취약하다. SoC 기술의 발달과 함께 운영체제에 대한 기술도 많이 이루어졌으며 많은 새로운 운영체제가 소개되고 있다. 본 연구에서는 ARMv7 Thumb Architecture 하드웨어 플랫폼에서 동작하는 운영체제에 대한 취약성분석 결과에 대하여 기술하였다. 최근에 소개된 "Windows 10 IoT Core" 운영체제에 대하여, 연구를 통하여 개발된 침투코드를 특정 IoT 시스템에 이식시켜 Zero-Day Attack을 구현하였다. 결과의 침투코드에 대한 바이러스 검출 여부를 "virustotal" 사이트에 의뢰하여 유효성을 입증하였다.

Design and Implementation of Data Processing Middleware and Management System for IoT based Services

  • Lee, Yon-Sik;Mun, Young-Chae
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권2호
    • /
    • pp.95-101
    • /
    • 2019
  • Sensor application systems for remote monitoring and control are required, such as the establishment of databases and IoT service servers, to process data being transmitted and received through radio communication modules, controllers and gateways. This paper designs and implements database server, IoT service server, data processing middleware and IoT management system for IoT based services based on the controllers, communication modules and gateway middleware platform developed. For this, we firstly define the specification of the data packet and control code for the information classification of the sensor application system, and also design and implement the database as a separate server for data protection and efficient management. In addition, we design and implement the IoT management system so that functions such as status information verification, control and modification of operating environment information of remote sensor application systems are carried out. The implemented system can lead to efficient operation and reduced management costs of sensor application systems through site status analysis, setting operational information, and remote control and management.

A Secure Healthcare System Using Holochain in a Distributed Environment

  • Jong-Sub Lee;Seok-Jae Moon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.261-269
    • /
    • 2023
  • We propose to design a Holochain-based security and privacy protection system for resource-constrained IoT healthcare systems. Through analysis and performance evaluation, the proposed system confirmed that these characteristics operate effectively in the IoT healthcare environment. The system proposed in this paper consists of four main layers aimed at secure collection, transmission, storage, and processing of important medical data in IoT healthcare environments. The first PERCEPTION layer consists of various IoT devices, such as wearable devices, sensors, and other medical devices. These devices collect patient health data and pass it on to the network layer. The second network connectivity layer assigns an IP address to the collected data and ensures that the data is transmitted reliably over the network. Transmission takes place via standardized protocols, which ensures data reliability and availability. The third distributed cloud layer is a distributed data storage based on Holochain that stores important medical information collected from resource-limited IoT devices. This layer manages data integrity and access control, and allows users to share data securely. Finally, the fourth application layer provides useful information and services to end users, patients and healthcare professionals. The structuring and presentation of data and interaction between applications are managed at this layer. This structure aims to provide security, privacy, and resource efficiency suitable for IoT healthcare systems, in contrast to traditional centralized or blockchain-based systems. We design and propose a Holochain-based security and privacy protection system through a better IoT healthcare system.

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권2호
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.