• Title/Summary/Keyword: IoT Testing

Search Result 66, Processing Time 0.025 seconds

A Design and Implementation of Testing and Management System for IoT Sensors (IoT 센서 시험 운용 시스템 설계 및 구현)

  • Chae, Sung-Yoon;Park, Jinhee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.151-156
    • /
    • 2016
  • The IoT technology and sensors used for collecting the environment information has rapidly increased the number and type. With the increasing need for this type of sensor effective system for selecting and testing the sensor nodes for the IoT to develop products and services. In this study, we design and implement IoT sensor testing system for IoT service and product. In order to support rapid prototyping, the proposed system provides testing and management tools for IoT sensor nodes. We analyze the requirements of the proposed system and design the system based on the functional component-specific design. Finally, we implement testing application to verify the functional elements of the proposed system.

A Developer Support Tool for Efficient Testing of IoT Applications (IoT 애플리케이션의 효율적인 테스팅을 위한 개발자 지원 도구)

  • Lee, Euihyeok;Kim, Dongwoo;Kang, Seungwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1216-1227
    • /
    • 2019
  • We propose TITAN (Tool for IoT ApplicatioN testing), a developer support tool that enables efficient testing of IoT applications. TITAN is designed to allow IoT application developers to run their applications under the development environment without being restricted by physical environments and users' behaviors required to test application logic being developed. Using TITAN, IoT application developers can save the time and effort needed to repeatedly perform the testing of application logic while they develop their applications. In this paper, we present the system architecture of TITAN and its current prototype implementation. We evaluate the usefulness and usability of TITAN through a small user study with two example IoT applications. The study participants show their positive perception about the usefulness of TITAN. We further discuss the limitations of the current study and future research directions.

IoT Device Testing for Efficient IoT Device Framework

  • Gong, Dong-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.77-82
    • /
    • 2020
  • IoT devices frequently require input resources to communicate with various sensors or IoT platforms. IoT device wastes a lot of time as idle time or waiting time to check the data of the input resource and use the input resource. In addition, IoT devices use various input resources. We compares and analyzes input idle time and input waiting time generated from hardware serial input resource, software serial input resource, digital port input resource, and analog port input resource using Arduino widely used as IoT device. In order to design the IoT device framework, it is necessary to understand the characteristics of input resources and to design them to minimize unnecessary input idle time and input waiting time. The analog input wait time has a much larger input wait time than the digital input wait time, so it must be designed to receive analog information periodically at the appropriate timing. The characteristics of the input resources analyzed in this way help to design an efficient IoT device.

A Study on the Penetratrion Testing Next-generation IoT environment(ARMv7 Thumb Architecture) (차세대 IoT환경(ARMv7 Thumb Architecture) 침투테스트에 관한 연구)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.585-588
    • /
    • 2016
  • Due to the nature IoT Device (or Sensor) of the IoT System it may be susceptible (or attached) to our daily lives, so easy to direct physical access to IoT Device, which caused physical security is very weak. In this study, we implemented "Zero-Day Attack" on the ARMv7 Thumb Architecture as a direct target local system.

  • PDF

Design and Implementation of Hadoop-based Big-data processing Platform for IoT Environment (사물인터넷 환경을 위한 하둡 기반 빅데이터 처리 플랫폼 설계 및 구현)

  • Heo, Seok-Yeol;Lee, Ho-Young;Lee, Wan-Jik
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.194-202
    • /
    • 2019
  • In the information society represented by the Fourth Industrial Revolution, various types of data and information that are difficult to see are produced, processed, and processed and circulated to enhance the value of existing goods. The IoT(Internet of Things) paradigm will change the appearance of individual life, industry, disaster, safety and public service fields. In order to implement the IoT paradigm, several elements of technology are required. It is necessary that these various elements are efficiently connected to constitute one system as a whole. It is also necessary to collect, provide, transmit, store and analyze IoT data for implementation of IoT platform. We designed and implemented a big data processing IoT platform for IoT service implementation. Proposed platform system is consist of IoT sensing/control device, IoT message protocol, unstructured data server and big data analysis components. For platform testing, fixed IoT devices were implemented as solar power generation modules and mobile IoT devices as modules for table tennis stroke data measurement. The transmission part uses the HTTP and the CoAP, which are based on the Internet. The data server is composed of Hadoop and the big data is analyzed using R. Through the emprical test using fixed and mobile IoT devices we confirmed that proposed IoT platform system normally process and operate big data.

Test Case Generation Technique for IoT Mobile Application

  • Jaffari, Aman;Lee, Jihyun;Yoo, Cheol-Jung;Jo, Jun Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.618-620
    • /
    • 2017
  • Currently, IoT mobile applications are growing fast in number and complexity. As a result, the applications quality issue became crucial, hence to ensure their quality a proper testing is highly required. Testing such mobile applications is always tedious, time-consuming and expensive. To cope with these issues, we propose a testing approach using activity diagram with data flow information. The main functionality of IoT applications is exposing the meaningful data obtained from the sensors to the users by doing a lot of analysis, comparison, and computation. Therefore, our focus is on identifying and selecting the most appropriate paths at which calculation is taking place and the paths at which predicate exists. In our case study, we have used a real-world IoT mobile application and identified a total of ten test paths with two predicate uses and two computation uses through an example. With applying only this four critical paths, we can adequately test the application's core functionalities while significantly reduce the testing effort and cost.

A Study on the Development and Testing of Ringer Injection IoT System (링거 주입 IoT 시스템 개발 및 시험에 관한 연구)

  • Cho, Chung-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.787-796
    • /
    • 2019
  • In this paper, we propose the design and test measure of Ringer injection IoT system for controling the ringer injection status and notifying the server system of the collected status informations such as the completion of injection, the remaining liquid, the injection status, and the emergency alarming of the urgent patients. We design the circuit diagrams composed of linger injection sensors, switches, status indicators, wireless communication functionalities, and propose the controlling and monitoring algorithms for sensing the linger injection status and notifying the collected status informations to a server system. Furthermore, we derive the testing criteria, such as linger liquid sensing time, sensing distance, operating temperature, input power, power consumption, and wireless communication speed, and analyze the test results.

A Study on the Design of Test Item Framework for the Reliability of Frozen and Refrigerated Products with IoT Function (IoT 기능을 보유한 냉동·냉장 제품의 신뢰성 확보를 위한 시험항목 프레임워크 설계에 관한 연구)

  • Cho, Kyoung Rok;Lee, Jung Jae;Lee, Eun-Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.6
    • /
    • pp.211-222
    • /
    • 2021
  • Recently, frozen and refrigerated appliances on the market are being released with additional IoT functions, but there are few tests on IoT functions. In particular, the existing test system does not have IoT test items for IoT-based frozen and refrigerated appliances, making it difficult for companies to find the cause even if defects occur, and test institutions are also restricted from selecting IoT-related test items and conducting correct performance tests. In this paper, we design a test item framework that can identify product defects and identify causes in the performance test process of frozen and refrigerated products with IoT functions among products in the home appliance field, and propose test methods and management measures using them. Through the proposed research, manufacturers and testing institutions can test the correct performance of IoT-based frozen and refrigerated products, thereby enhancing the completeness and securing reliability of the products.

A Study on Priority of Certification Criteria for IoT Security Certification Service (IoT 보안인증서비스 인증기준 중요도 우선순위에 관한 연구)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.13-21
    • /
    • 2019
  • Because security of Internet of Things(IoT) products and others is poor, there are many hacking incidents To prevent security threats, it is important for companies to first make products with high security levels and choose products that are safe for users. In response, the Korea Internet & Security Agency is testing the security of IoT products and linked mobile apps to impose ratings. Security certification service is a service that tests IoT products and linked mobile apps to ensure certain levels of security and issues certificates when they meet the criteria. It can induce autonomous security enhancement of IoT products, contribute to strengthening security capabilities of IoT companies in Korea and vitalizing their overseas advancement, and have the expected effect of resolving public anxiety over IoT products. In this study, the criteria for IoT security certification are presented, but the importance priority is sought to be derived for assessment items that need to be strengthened. This will help to provide guidelines that can contribute to strengthening the security capabilities of domestic Internet companies and boosting their overseas advancement.

A Study on Security Requirments Analysis through Security Threat Modeling of Home IoT Appliance (Home IoT 가전의 보안위협모델링을 통한 보안요구사항 분석에 관한 연구)

  • Yun, Suk-Jin;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • Today many companies are offering IoT-enabled products and place emphasis on security from the planning stage to protect their products and user information from external threats. The present security levels, however, remain low because the time and resources invested in developing security requirements for each device are far from enough to meet the needs of a wide range of IoT products. Nevertheless, vulnerabilities of IoT devices have been reported continuously, which calls for more detailed security requirements for home IoT devices. In this context, this research identified threats of home IoT systems by using Microsoft Threat Modeling Tool. It then suggested measures to enhance the security of home IoT devices by developing security assessment items through comparative analysis of the identified threats, domestic and global vulnerability assessment standards and related research. It also verified the effectiveness of the developed security requirements by testing them against the existing ones, and the results revealed the security requirements developed in this research proved to be more effective in identifying vulnerabilities.