• Title/Summary/Keyword: IoT devices

Search Result 1,177, Processing Time 0.03 seconds

Characterization of photonic quantum ring devices manufactured using wet etching process (습식 식각 공정을 이용하여 제작된 광양자테 소자의 특성 분석)

  • Kim, Kyoung-Bo;Lee, Jongpil;Kim, Moojin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.28-34
    • /
    • 2020
  • A structure in which GaAs and AlGaAs epilayers are formed with a metal organic chemical vapor deposition equipment on a GaAs wafer similar to the structure of making a vertical cavity surface emitting laser is used. Photonic Quantum Ring (PQR) devices that are naturally generated by 3D resonance are manufactured by chemically assisted ion beam etching technology, which is a dry etching method. A new technology that can be fabricated has been studied, and as a result, the possibility of wet etching of a solution containing phosphoric acid, hydrogen peroxide and methanol was investigated, and the device fabrication by applying this method are also discussed. In addition, the spectrum of the fabricated optical device was measured, and the results were theoretically analyzed and compared with the wavelength value obtained by the measurement. It is expected that the PQR device will be able to model cells in a three-dimensional shape or be applied to the display field.

Performance Evaluation of Motorcycle's Anti-theft Device using NFC Authentication and Solenoid Valve (NFC 보안인증과 솔레노이드 밸브를 이용한 이륜차 이동제한장치 성능평가)

  • Moon, Boram;Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.82-86
    • /
    • 2016
  • This paper proposes a method for the immobilization of motorbike brakes in conjunction with near-field communication (NFC) technology in order to meet the increasing demand for security and convenience of motorbike drivers. We thought about the concept of wireless key, NFC security devices and automatic solenoid valve for setting the lock and unlock module. This paper propose the design and development of an innovative anti-theft alarm system for motorcycles using NFC smart devices based on RFID system, the basis of IoT and AES(advanced encryption standard) encryption Algorithm. The design concept is based on NFC communication strategy between the vehicle and owner. To do this concept, we designed motorcycle smart key system with general-purpose NFC system and the automatic solenoid valve for setting the lock and unlock module. First, we designed control unit and NFC card reader for motorcycle smart key system. Then we propose an AES encryption algorithm and prove that the motorcycle key system is controllable by showing the result of implementing and testing, after installing.

Data anomaly detection and Data fusion based on Incremental Principal Component Analysis in Fog Computing

  • Yu, Xue-Yong;Guo, Xin-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.3989-4006
    • /
    • 2020
  • The intelligent agriculture monitoring is based on the perception and analysis of environmental data, which enables the monitoring of the production environment and the control of environmental regulation equipment. As the scale of the application continues to expand, a large amount of data will be generated from the perception layer and uploaded to the cloud service, which will bring challenges of insufficient bandwidth and processing capacity. A fog-based offline and real-time hybrid data analysis architecture was proposed in this paper, which combines offline and real-time analysis to enable real-time data processing on resource-constrained IoT devices. Furthermore, we propose a data process-ing algorithm based on the incremental principal component analysis, which can achieve data dimensionality reduction and update of principal components. We also introduce the concept of Squared Prediction Error (SPE) value and realize the abnormal detection of data through the combination of SPE value and data fusion algorithm. To ensure the accuracy and effectiveness of the algorithm, we design a regular-SPE hybrid model update strategy, which enables the principal component to be updated on demand when data anomalies are found. In addition, this strategy can significantly reduce resource consumption growth due to the data analysis architectures. Practical datasets-based simulations have confirmed that the proposed algorithm can perform data fusion and exception processing in real-time on resource-constrained devices; Our model update strategy can reduce the overall system resource consumption while ensuring the accuracy of the algorithm.

Study on IoT Controller for Smart Home Service (스마트홈 서비스를 위한 사물인터넷 컨트롤러에 관한 연구)

  • Kwon, Dong-hyun;Lim, Ji-yong;Heo, Sung-uk;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.590-591
    • /
    • 2017
  • In the existing smart home, a separate platform was set up for each manufacturer to provide services through terminals. However, due to the development of Internet technology, various Internet devices and services have been launched, and there is a limit to the existing closed platforms for each manufacturer. Therefore, in this paper, we propose an object internet controller that integrates control of Internet devices in a smart home environment and provides various services through IFTTT. The proposed Internet controller is connected to the server via WiFi, and can control the Internet device and service of objects through the button input event. In addition, we expect to be able to provide a service environment that can create various smart home services by registering DIY products through open platform of oneM2M standard method.

  • PDF

An Approach to Constructing an Efficient Entropy Source on Multicore Processor (멀티코어 환경에서 효율적인 엔트로피 원의 설계 기법)

  • Kim, SeongGyeom;Lee, SeungJoon;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.61-71
    • /
    • 2018
  • In the Internet of Things, in which plenty of devices have connection to each other, cryptographically secure Random Number Generators (RNGs) are essential. Particularly, entropy source, which is the only one non-deterministic part in generating random numbers, has to equip with an unpredictable noise source(or more) for the required security strength. This might cause an requirement of additional hardware extracting noise source. Although additional hardware resources has better performance, it is needed to make the best use of existing resources in order to avoid extra costs, such as area, power consumption. In this paper, we suggest an entropy source which uses a multi-threaded program without any additional hardware. As a result, it reduces the difficulty when implementing on lightweight, low-power devices. Additionally, according to NIST's entropy estimation test suite, the suggested entropy source is tested to be secure enough for source of entropy input.

Access Control Mechanism for Secure CoAP Applications Based on DTLS (DTLS 기반의 안전한 CoAP 응용을 위한 접근제어 메커니즘)

  • Jeong, Yeon-seong;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1307-1315
    • /
    • 2017
  • While the PSK mode of the DTLS is the most efficient in terms of the performance, it is not easy to pre-distribute and manage the symmetric key pairs as the number of sensor devices increases. On the other hand, both the RPK and certificate modes offer a convenient key management tool, but they do not guarantee a good computational performance. In this paper, the end-to-end security protocol suitable for the constrained devices is proposed, based on both the ECQV certificate and the PSK mode. Namely, the initial DTLS handshake is performed using the ECQV certificate, and the subsequent DTLS handshakes with the other CoAP servers in the same group are performed using the PSK mode for the purpose of reducing the overall computational load. Furthermore, a fine-grained access control for the CoAP client can be enforced to allow access to the limited number of CoAP servers.

According to the User's Device Selection Priority Automatic Algorithm (사용자 기기 선택에 따른 우선순위 자동 설정 알고리즘)

  • Jeong, Do-Hyeong;Choi, Hyung-Wook;Jang, Ki-Man;Jeong, Dae-Jin;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.891-892
    • /
    • 2016
  • Recent research has become a smart home for operating the joining operation of the relationships between the device progress. However, Existing systems, there is a problem that the efficiency of the work can be degrade by the interference occurs when the operation of the other device, and triggered if the device is operating. In this paper, we designed a priority automatically set algorithm according to a user selection device to solve this problem. The user selects the device used by the application and by comparing between devices, select whether or not to set the priority of the tasks in. This allows the user can configure the working environment of only the desired device, and less chance of interference from other devices that are not selected during the work in progress can expect a more efficient productivity.

  • PDF

Anomaly Detection System of Smart Farm ICT Device (스마트팜 ICT기기의 이상탐지 시스템)

  • Choi, Hwi-Min;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.169-174
    • /
    • 2019
  • This paper propose a system to notify the user that detects failure of malfunction of smart farm ICT devices. As the fourth industrial revolution approaches, agriculture is also fused with ICT technology to improve competitiveness. Smart farming market is rapidly growing every year, but there is still a lack of standardization and certification systems. Especially, smart farm devices that are widely used in Korea are different in product specifications, software and hardware are developed separately, and quality and compatibility are poor. Therefore, a system that can recognize the abnormality of the equipment due to the frequent damage of farmers using low cost smart farm equipment is needed. In this paper, we review smart farm domestic and overseas policy trends and domestic smart agriculture trends, analyze smart farm failure or malfunctions and proactively prevent them, and propose a system to inform users when problems occur.

Optimal Node Analysis in LoRaWAN Class B (LoRaWAN Class B에서의 최적 노드 분석)

  • Seo, Eui-seong;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.100-103
    • /
    • 2019
  • Due to the fourth industrial revolution called 'fusion and connection', interest in 'high connectivity society' and 'highland society' is increasing, and related objects are not limited to automation and connected cars. The Internet of Things is the main concern of the 4th Industrial Revolution and it is expected to play an important role in establishing the basis of the next generation mobile communication service. Several domestic and foreign companies have been studying various types of LPWANs for the construction of the Internet based on things, and there is Semtech's LoRaWAN technology as representative. LoRaWAN is a long-distance, low-power network designed to manage a large number of devices and sensors, with communications from hundreds to thousands to thousands of devices and sensors. In this paper, we analyze the optimum node capacity of gateway for maximum performance while reducing resource waste in using LoRaWAN.

  • PDF

Development of Internet of Things Sensor-based Information System Robust to Security Attack (보안 공격에 강인한 사물인터넷 센서 기반 정보 시스템 개발)

  • Yun, Junhyeok;Kim, Mihui
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.95-107
    • /
    • 2022
  • With the rapid development of Internet of Things sensor devices and big data processing techniques, Internet of Things sensor-based information systems have been applied in various industries. Depending on the industry in which the information systems are applied, the accuracy of the information derived can affect the industry's efficiency and safety. Therefore, security techniques that protect sensing data from security attacks and enable information systems to derive accurate information are essential. In this paper, we examine security threats targeting each processing step of an Internet of Things sensor-based information system and propose security mechanisms for each security threat. Furthermore, we present an Internet of Things sensor-based information system structure that is robust to security attacks by integrating the proposed security mechanisms. In the proposed system, by applying lightweight security techniques such as a lightweight encryption algorithm and obfuscation-based data validation, security can be secured with minimal processing delay even in low-power and low-performance IoT sensor devices. Finally, we demonstrate the feasibility of the proposed system by implementing and performance evaluating each security mechanism.