• Title/Summary/Keyword: IoT environments

Search Result 323, Processing Time 0.026 seconds

Designing Secure IoT (Internet of Things) Environments with SDN and NFV

  • Kim, Yeon-Geun;Sin, Seung-Won
    • Information and Communications Magazine
    • /
    • v.32 no.7
    • /
    • pp.27-33
    • /
    • 2015
  • 오늘날 우리 사회는 정보통신기술의 발전으로 다양한 가능성들을 갖게 되었다. 그 중 다양한 사물들에 센싱 기술을 부여하고 네트워크에 연결시켜, 해당 사물들이 처리하는 데이터들을 손쉽게 활용 및 관리 하고자 하는 기술인 사물 인터넷(Internet of Things)이 활발하게 거론되고 있다. 현재 사물 인터넷은 스마트 홈, 헬스 케어 등의 형태로 우리 생활에 깊게 들어왔고, 그곳에서 개인 정보와 같은 매우 민감한 데이터를 다루기 때문에, 이러한 기기 및 데이터들에 대한 보안은 매우 중요하다. 하지만 현재의 사물 인터넷은 보안이 충분히 고려되지 않은 상태이다. 본고에서는 현재 보안 기술을 적용함에 있어서 사물 인터넷 환경이 어떠한 문제점을 가지고 있는지 알아보고, 이러한 문제점들을 해결하고 안전한 IoT 환경을 구축하기 위해 본고에서 제안하는 SDN/NFV 기술을 적용한 IoT 게이트웨이 디자인을 알아본다.

A Novel Mobility Management Scheme for Building Smart Home IoT Environments (스마트 홈의 IoT 환경 구축을 위한 이동성관리 기법)

  • Jang, HA NA;Lee, Sung Gil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.346-349
    • /
    • 2015
  • 무선 센서 네트워크(WSN)는 의사소통의 수단이었던 기존 네트워크와는 달리 자동화된 원격 정보 수집을 기본으로 하여 다양한 응용 개발에 활용되면서 센서의 이동성이 중요한 문제로 다루어진다. 이를 바탕으로 본 논문에서는 센서기반 PMIPv6 네트워크에서 IoT 기술을 이용한 스마트 홈의 이동성 관리 기법을 제안한다. 시그널링 비용, 이동성 비용 등을 고려하여 성능분석을 실시하였고 [1,2], 분석결과 기존의 PMIPv6와 SPMIPv6에 비하여 제안하는 기법이 전체적으로 개선되었음을 알 수 있다.

Performance Evaluation of Low Power Communication Techniques Coverage for Internet of Things (IoT를 위한 저전력 통신 기술의 성능 평가)

  • Yoon, JeongHyeon;Kim, Seungku
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.9
    • /
    • pp.1211-1223
    • /
    • 2021
  • Internet of Things(IoT) services have increased the demand for connectivity among electronics devices. As a result, various types of novel wireless communication technologies have been standardized and developed. In this paper, we evaluate the performance of low power wireless communication technologies such as Bluetooth, IEEE 802.15.4, DASH 7, IEEE 802.15.4g, LoRa, and SigFox in various environments. This is the first experiment evaluating various low power wireless communication technologies in real testbed. We expect that the evaluation results will be useful data to other researchers in applying the IoT technology in the future.

An Efficient Software Defined Data Transmission Scheme based on Mobile Edge Computing for the Massive IoT Environment

  • Kim, EunGyeong;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.974-987
    • /
    • 2018
  • This paper presents a novel and efficient data transmission scheme based on mobile edge computing for the massive IoT environments which should support various type of services and devices. Based on an accurate and precise synchronization process, it maximizes data transmission throughput, and consistently maintains a flow's latency. To this end, the proposed efficient software defined data transmission scheme (ESD-DTS) configures and utilizes synchronization zones in accordance with the 4 usage cases, which are end node-to-end node (EN-EN), end node-to-cloud network (EN-CN), end node-to-Internet node (EN-IN), and edge node-to-core node (EdN-CN); and it transmit the data by the required service attributes, which are divided into 3 groups (low-end group, medium-end group, and high-end group). In addition, the ESD-DTS provides a specific data transmission method, which is operated by a buffer threshold value, for the low-end group, and it effectively accommodates massive IT devices. By doing this, the proposed scheme not only supports a high, medium, and low quality of service, but also is complied with various 5G usage scenarios. The essential difference between the previous and the proposed scheme is that the existing schemes are used to handle each packet only to provide high quality and bandwidth, whereas the proposed scheme introduces synchronization zones for various type of services to manage the efficiency of each service flow. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of throughput, control message overhead, and latency. Therefore, the proposed ESD-DTS is very suitable for upcoming 5G networks in a variety of massive IoT environments with supporting mobile edge computing (MEC).

Deep Learning-Based Dynamic Scheduling with Multi-Agents Supporting Scalability in Edge Computing Environments (멀티 에이전트 에지 컴퓨팅 환경에서 확장성을 지원하는 딥러닝 기반 동적 스케줄링)

  • JongBeom Lim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.399-406
    • /
    • 2023
  • Cloud computing has been evolved to support edge computing architecture that combines fog management layer with edge servers. The main reason why it is received much attention is low communication latency for real-time IoT applications. At the same time, various cloud task scheduling techniques based on artificial intelligence have been proposed. Artificial intelligence-based cloud task scheduling techniques show better performance in comparison to existing methods, but it has relatively high scheduling time. In this paper, we propose a deep learning-based dynamic scheduling with multi-agents supporting scalability in edge computing environments. The proposed method shows low scheduling time than previous artificial intelligence-based scheduling techniques. To show the effectiveness of the proposed method, we compare the performance between previous and proposed methods in a scalable experimental environment. The results show that our method supports real-time IoT applications with low scheduling time, and shows better performance in terms of the number of completed cloud tasks in a scalable experimental environment.

Development of an IoT Device for Detecting Escherichia coli from Various Agri-Foods and Production Environments (IoT 적용 대장균 검출기 개발과 농식품 및 생산환경에 적용)

  • Nguyen, Bao Hung;Chu, Hyeonjin;Kim, Won-Il;Hwang, Injun;Kim, Hyun-Ju;Kim, Hwangyong;Ryu, Kyoungyul;Kim, Se-Ri
    • Journal of Food Hygiene and Safety
    • /
    • v.34 no.6
    • /
    • pp.542-550
    • /
    • 2019
  • To detect Escherichia coli from agri-food and production environments, a device based on IoT (internet of things) technology that can check test results in real time on a mobile phone has been developed. The efficiency of the developed device, which combines an incubator equipped with a UV lamp, a high-resolution camera and software to detect E. coli in the field, was evaluated by measuring the device's temperature, detection limit, and detection time. The device showed a difference between its programmed temperature setting and actual temperature of about 1.0℃. In a detection limit test performed with a single-colony inoculation, a color change to yellow and a florescent signal were detected after 12 and 15 h incubations, respectively. The incubation time also decreased along with increasing bacteria levels. When applying the developed method and device to various samples, including utensils, gloves, irrigation water, seeds, and vegetables, detection rates of E. coli using the device were higher than those of the Korean Food Code method. These results show that the developed protocol and device can efficiently detect E. coli from agri-food production environments and vegetables.

Bus-only Lane and Traveling Vehicle's License Plate Number Recognition for Realizing V2I in C-ITS Environments (C-ITS 환경에서 V2I 실현을 위한 버스 전용 차선 및 주행 차량 번호판 인식)

  • Im, Changjae;Kim, Daewon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.87-104
    • /
    • 2015
  • Currently the IoT (Internet of Things) environments and related technologies are being developed rapidly through the networks for connecting many intelligent objects. The IoT is providing artificial intelligent services combined with context recognition based knowledge and communication methods between human and objects and objects to objects. With the help of IoT technology, many research works are being developed using the C-ITS (Cooperative Intelligent Transport System) which uses road infrastructure and traveling vehicles as traffic control infrastructures and resources for improving and increasing driver's convenience and safety through two way communication such as bus-only lane and license plate recognition and road accidents, works ahead reports, which are eventually for advancing traffic effectiveness. In this paper, a system for deciding whether the traveling vehicle is possible or not to drive on bus-only lane in highway is researched using the lane and number plate recognition on the road in C-ITS traffic infrastructure environments. The number plates of vehicles on the straight ahead and sides are identified after the location of bus-only lane is discovered through the lane recognition method. Research results and experimental outcomes are presented which are supposed to be used by traffic management infrastructure and controlling system in future.

A Moving Terminal's Coordinates Prediction Algorithm and an IoT Application

  • Kim, Daewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.63-74
    • /
    • 2017
  • Recently in the area of ICT, the M2M and IoT are in the spotlight as a cutting edge technology with the help of advancement of internet. Among those fields, the smart home is the closest area to our daily lives. Smart home has the purpose to lead a user more convenient living in the house with WLAN (Wireless Local Area Network) or other short-range communication environments using automated appliances. With an arrival of the age of IoT, this can be described as one axis of a variety of applications as for the M2H (Machine to Home) field in M2M. In this paper, we propose a novel technique for estimating the location of a terminal that freely move within a specified area using the RSSI (Received Signal Strength Indication) in the WLAN environment. In order to perform the location estimation, the Fingerprint and KNN methods are utilized and the LMS with the gradient descent method and the proposed algorithm are also used through the error correction functions for locating the real-time position of a moving user who is keeping a smart terminal. From the estimated location, the nearest fixed devices which are general electric appliances were supposed to work appropriately for self-operating of virtual smart home. Through the experiments, connection and operation success rate, and the performance results are analyzed, presenting the verification results.

A Method of Test Coverage Measurement Based on BitTorrent for Internet of Things Environment (사물 인터넷 환경을 위한 BitTorrent 알고리즘 기반의 테스트 커버리지 측정기법)

  • Ryu, Hodong;Lee, Woo Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.365-370
    • /
    • 2014
  • Although Internet of Things already became a new paradigm on service on network, we should pay more effort for studying about its testing method, since humans, things and environments in IoT are connected to each other without any restrictions. Earlier researches based on emulators showed that such virtual devices on emulators had unavoidable gap between them and real things. Furthermore, growth of connection complexity between the devices and loosing of restrictions make the gap wider. Accordingly, in this paper, we suppose a method of test coverage measurement based on BitTorrent for IoT environment. It has cooperation features among homogeneous devices with avoiding the overlapping on each part of whole test process.

Efficient Authentication for Convergence of IoT and Mobile IP (사물인터넷과 모바일 IP의 융합을 위한 효율적 인증 메커니즘)

  • Lee, YunJung;Cho, Jungwon;Kim, Chul-Soo;Lee, Bong-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.13-18
    • /
    • 2019
  • This paper proposes efficient and secure two-way authentication protocol for binding update messages between mobile devices and home agents / correspondent nodes in IoT and Mobile IPv6 (MIPv6) environments with limited computing power and resources. Based on the MIPv6 message exchange, the proposed protocol satisfies both the authentication and the public key exchange optimized for both sides of the communication with minimum modification. In the future, we will carry out a performance analysis study by implementing the proposed protocol in detail.