• Title/Summary/Keyword: IoT environments

Search Result 321, Processing Time 0.029 seconds

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.892-905
    • /
    • 2018
  • In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.

IP Configuration Scheme for Self-Contraction Network in IoT environments (사물인터넷 환경에서 자율-구성 네트워크를 위한 주소 설정 기법)

  • Youn, Joosang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.412-414
    • /
    • 2018
  • 본 논문에서는 서비스 기반 자율-구성 네트워크 구축 시 활용 가능한 새로운 주소 설정 기법을 제안하다. 제안하는 주소 설정 기법은 IPv6를 기반으로 제안되었다. 일반적인 IPv6 구조는 자율-구성 네트워크를 구성하는 주소 설정 방식으로는 부족하다. 이유는 일반적인 IPv6 구조는 글로벌 주소에 개념을 가지고 있으며 주소에 대한 중복성 평가에 대한 오버헤드가 크다. 이는 자원-제약적 노드로 구성되는 사물인터넷 환경에 사용할 시 저전력 및 노드 메모리 문제를 유발할 수 있다. 또한 노드에 서비스를 정의할 수 있는 필드가 존재하지 않으므로 이를 위한 필드가 추가적으로 필요하다. 따라서 본 논문에서는 NAT 개념을 적용하여 만들어진 IPv6 기반의 ULA 주소 체계를 활용한 경량화 주소 설정기법을 제안한다.

  • PDF

On Power Calculation for First and Second Strong Channel Users in M-user NOMA System

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.9 no.3
    • /
    • pp.49-58
    • /
    • 2020
  • Non-orthogonal multiple access (NOMA) has been recognized as a significant technology in the fifth generation (5G) and beyond mobile communication, which encompasses the advanced smart convergence of the artificial intelligence (AI) and the internet of things (IoT). In NOMA, since the channel resources are shared by many users, it is essential to establish the user fairness. Such fairness is achieved by the power allocation among the users, and in turn, the less power is allocated to the stronger channel users. Especially, the first and second strong channel users have to share the extremely small amount of power. In this paper, we consider the power optimization for the two users with the small power. First, the closed-form expression for the power allocation is derived and then the results are validated by the numerical results. Furthermore, with the derived analytical expression, for the various channel environments, the optimal power allocation is investigated and the impact of the channel gain difference on the power allocation is analyzed.

Real-time Virtual Integration of heterogeneous system and Union Query System

  • Min, Seong-Hyeon;Lee, Sang-Joon;Kwak, Ho-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.107-114
    • /
    • 2016
  • In this paper, we propose the building method for the unified IoT service platform between the variety of legacy systems with the heterogeneous structures and the operating environments. To accommodate the structural diversity of legacy systems, we develop a virtual integrated structure and interface abstracting method. By this, the new platform can use the data sources of the legacy systems as if the data source is in the new platform. In a manner without modification of the legacy systems with performing minimum tasks, we proposes a model that can be integrated without affecting the availabilities of the legacy systems.

A Study on the Lightening of the Block Chain for Improving Congestion Network in M2M Environment (M2M 환경의 혼잡 네트워크 개선을 위한 블록체인 경량화에 대한 연구)

  • Kim, Sanggeun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.3
    • /
    • pp.69-75
    • /
    • 2018
  • Recently, various convergence technologies are attracting attention due to the block chain innovation technology in the M2M environment. Although the block-chain-based technology is known to be secure in its own right, there are various problems such as security and weight reduction in various M2M environments connected with this. In this paper, we propose a new lightweight method for the hash tree generation of block chains to solve the lightweight problem. It is designed considering extensibility without affecting the existing block chain. Performance analysis shows that the computation performance increases with decreasing the existing hash length.

Low Power SoC Design Trends Using EDA Tools (설계툴을 사용한 저전력 SoC 설계 동향)

  • Park, Nam Jin;Joo, Yu Sang;Na, Jung-Chan
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.2
    • /
    • pp.69-78
    • /
    • 2020
  • Small portable devices such as mobile phones and laptops currently display a trend of high power consumption owing to their characteristics of high speed and multifunctionality. Low-power SoC design is one of the important factors that must be considered to increase portable time at limited battery capacities. Popular low power SoC design techniques include clock gating, multi-threshold voltage, power gating, and multi-voltage design. With a decreasing semiconductor process technology size, leakage power can surpass dynamic power in total power consumption; therefore, appropriate low-power SoC design techniques must be combined to reduce power consumption to meet the power specifications. This study examines several low-power SoC design trends that reduce semiconductor SoC dynamic and static power using EDA tools. Low-power SoC design technology can be a competitive advantage, especially in the IoT and AI edge environments, where power usage is typically limited.

Customized Resource Collaboration System based on Ontology and User Model in Resource Sharing Environments

  • Park, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.107-114
    • /
    • 2018
  • Recently, various wearable personal devices such as a smart watch have been developed and these personal devices are being miniaturized. The user desires to receive new services from personal devices as well as services that have been received from personal computers, anytime and anywhere. However, miniaturization of devices involves constraints on resources such as limited input and output and insufficient power. In order to solve these resource constraints, this paper proposes a resource collaboration system which provides a service by composing sharable resources in the resource sharing environment like IoT. the paper also propose a method to infer and recommend user-customized resources among various sharable resources. For this purpose, the paper defines an ontology for resource inference. This paper also classifies users behavior types based on a user model and then uses them for resource recommendation. The paper implements the proposed method as a prototype system on a personal device with limited resources developed for resource collaboration and shows the effectiveness of the proposed method by evaluating user satisfaction.

Objective Material analysis to the device with IoT Framework System

  • Lee, KyuTae;Ki, Jang Geun
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.289-296
    • /
    • 2020
  • Software copyright are written in text form of documents and stored as files, so it is easy to expose on an illegal copyright. The IOT framework configuration and service environment are also evaluated in software structure and revealed to replication environments. Illegal copyright can be easily created by intelligently modifying the program code in the framework system. This paper deals with similarity comparison to determine the suspicion of illegal copying. In general, original source code should be provided for similarity comparison on both. However, recently, the suspected developer have refused to provide the source code, and comparative evaluation are performed only with executable code. This study dealt with how to analyze the similarity with the execution code and the circuit configuration and interface state of the system without the original source code. In this paper, we propose a method of analyzing the data of the object without source code and verifying the similarity comparison result through evaluation examples.

A Firewall System for IoT Environments (사물인터넷 보호를 위한 방화벽 구현)

  • Lee, Jeong-Hui;Kim, Ji-Won;Shin, Weon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.222-224
    • /
    • 2018
  • 최근 다양한 사물인터넷 기기들이 출시되어 일상생활은 물론 다양한 환경에서도 널리 활용되고 있다. 이로 인해 기존의 사이버 위협들이 사물인터넷 환경에서도 고스란히 적용되어 심각한 위협으로 나타나고 있으나, 사물인터넷 기기를 대상으로 하는 침입차단과 대응은 부족한 실정이다. 본 논문에서는 사물인터넷 기기로 들어오는 패킷을 분석하여 사물인터넷 기기에 해당하는 이미 등록된 기능과 다른 이상행위를 하는 통신을 차단할 수 있는 방화벽 시스템을 개발한다. 이를 위하여 사물인터넷 환경을 구축하고, 오픈소스 공유기 환경에서 방화벽 시스템을 구현하였다.

A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • Recently, IoT and Big Data dealing with voluminous and complex sensitive information is one of the key issues in the era of the 4th industrial revolution. There have been a lot of studies to store the collected and processed sensitive information safely in storage data. Especially biometric information, if it is leaked and becomes identity theft, is hard to be corrected and results in serious event. To fix the problem, methods such as FIDO or KFTC have been proposed. In this paper, we propose a modified method of TTAK.KO-12.0098 according to the environment of this paper and propose a method of safely storing the generated disposable template in a block chain. We show that our method is better by comparing the existing method and the security analysis.