• 제목/요약/키워드: IoT verification

Search Result 79, Processing Time 0.191 seconds

A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure (IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구)

  • Hwang, Song-yi;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.617-635
    • /
    • 2021
  • Internet of Things (IoT) devices connected to the network without appropriate security solutions have become a serious security threat to ICT infrastructure. Moreover, due to the nature of IoT devices, it is difficult to apply currently existing security solutions. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are actually increasing every year. Even though several security solutions are being developed to protect IoT infrastructure, there is a great risk to apply unverified security solutions to real-world environments. Therefore, verification tools to verify the functionality and performance of the developed security solutions are also needed. Furthermore, just as security threats vary, there are several security solution s that defend against them, requiring suitable verification tools based on the characteristics of each security solution. In this paper, we propose an high-speed malware propagation tool that spreads malware at high speed in the IoT infrastructure. Also, we can verify the functionality of the security solution that detect and quickly block attacks spreading in IoT infrastructure by using the high-speed malware propagation tool.

Blockchain-based multi-IoT verification model for overlay cloud environments (오버레이 클라우드 환경을 위한 블록체인 기반의 다중 IoT 검증 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.151-157
    • /
    • 2021
  • Recently, IoT technology has been applied to various cloud environments, requiring accurate verification of various information generated by IoT devices. However, due to the convergence of IoT technologies and 5G technologies, accurate analysis is required as IoT information processing is rapidly processed. This paper proposes a blockchain-based multi-IoT verification model for overlay cloud environments. The proposed model multi-processes IoT information by further classifying IoT information two layers (layer and layer) into bits' blockchain to minimize the bottleneck of overlay networks while ensuring the integrity of information sent and received from embedded IoT devices within local IoT groups. Furthermore, the proposed model allows the layer to contain the weight information, allowing IoT information to be easily processed by the server. In particular, transmission and reception information between IoT devices facilitates server access by distributing IoT information from bits into blockchain to minimize bottlenecks in overlay networks and then weighting IoT information.

Development and Verification of a Fishing Gear Monitoring System based on Marine IoT Technology (해상 IoT 기술 기반 어구 부이 통합 관리시스템 개발 및 검증)

  • Nam, Gyeungtae;Lee, Younggeun;Kim, Namsoo;Lim, Daeseop
    • Journal of Navigation and Port Research
    • /
    • v.45 no.4
    • /
    • pp.181-185
    • /
    • 2021
  • This study deals with the development of a phrase buoy control system that can receive and analyze phrase information using an IoT-based communication network to determine whether a phrase is normal or missing, to manage the current state of the phrase, check the status of the phrase in case of abnormal conditions in the phrase, and conduct management of the phrase. The fishing gear management system and integrated control structure design using an IoT-based communication network were developed, and a system test and verification were carried out to verify the effectiveness of the system.

GTS-Visual Logic: Visual Logic and Tool for Analysis and Verification of Secure Requirements in Smart IoT Systems (GTS-VL: 스마트 IoT에서 안전 요구사항 분석과 검증을 위한 시각화 논리 언어 및 도구)

  • Lee, SungHyeon;Lee, MoonKun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.289-304
    • /
    • 2022
  • It is necessary to apply process algebra and logic in order to analyze and verify safety requirements for Smart IoT Systems due to distributivity and mobility of the systems over some predefined geo-temporal space. However the analysis and verification cannot be fully intuitive over the space due to the fact that the existing process algebra and logic are very limited to express the distributivity and the mobility. In order to overcome the limitations, the paper presents a new logic, namely for GTS-VL (Geo-Temporal Space-Visual Logic), visualization of the analysis and verification over the space. GTS-VL is the first order logic that deals with relations among the different types of blocks over the space, which is the graph that visualizes the system behaviors specified with the existing dTP-Calculus. A tool, called SAVE, was developed over the ADOxx Meta-Modeling Platform in order to demonstrate the feasibility of the approach, and the advantages and practicality of the approach was shown with the comparative analysis of PBC (Producer-Buffer-Consumer) example between the graphical analysis and verification method over the textual method with SAVE tool.

Big Data-based Sensor Data Processing and Analysis for IoT Environment (IoT 환경을 위한 빅데이터 기반 센서 데이터 처리 및 분석)

  • Shin, Dong-Jin;Park, Ji-Hun;Kim, Ju-Ho;Kwak, Kwang-Jin;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.117-126
    • /
    • 2019
  • The data generated in the IoT environment is very diverse. Especially, the development of the fourth industrial revolution has made it possible to increase the number of fixed and unstructured data generated in manufacturing facilities such as Smart Factory. With Big Data related solutions, it is possible to collect, store, process, analyze and visualize various large volumes of data quickly and accurately. Therefore, in this paper, we will directly generate data using Raspberry Pi used in IoT environment, and analyze using various Big Data solutions. Collected by using an Sqoop solution collected and stored in the database to the HDFS, and the process is to process the data by using the solutions available Hive parallel processing is associated with Hadoop. Finally, the analysis and visualization of the processed data via the R programming will be used universally to end verification.

A Design for Security Functional Requirements of IoT Middleware System (IoT(Internet of Things) 시스템 미들웨어 보안기능요구사항 설계)

  • Jung, Hyun Mi;Jeong, Kimoon;Cho, Han Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.63-69
    • /
    • 2017
  • The middleware in the IoT system is software that acts as a messenger to connect and exchange data between humans and objects, objects and objects. IoT middleware exists in various forms in all areas, including hardware, protocol, and communication of different kinds, which are different in form and purpose. However, IoT middleware exists in various forms across different areas, including hardware, protocol, and communication of different types and purposes. Therefore, even if the system is designed differently for each role, it is necessary to strengthen the security in common. In this paper, we analyze the structure of IoT middleware using Service Oriented Architecture(SOA) approach and design system security requirements based on it. It was defined: Target Of Evaluation(TOE) existing system development method and the object is evaluated by Common Criteria(CC) for verification based otherwise. The proposed middleware system will be correlated with the security problem definition and the security purpose, which will be the basis for implementing the security enhanced IoT system.

Ultra-light Mutual Authentication Scheme based on Text Steganography Communication

  • Lee, Wan Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.11-18
    • /
    • 2019
  • Previous mutual authentication schemes operate on the basis of validated cryptographic functions and hash functions, but these functions require a certain amount of memory capacity. However, since ultra-lightweight IoT devices have a very small amount of memory capacity, these functions can not be applied. In this paper, we first propose a text steganography communication scheme suitable for ultra-lightweight IoT devices with limited resources, and then propose a mutual authentication scheme based on the text steganography communication. The proposed scheme performs mutual authentication and integrity verification using very small amount of memory. For evaluation, we implemented the proposed scheme on Arduino boards and confirmed that the proposed scheme performs well the mutual authentication and the integrity verification functions.

Design and Implementation of Data Processing Middleware and Management System for IoT based Services

  • Lee, Yon-Sik;Mun, Young-Chae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.95-101
    • /
    • 2019
  • Sensor application systems for remote monitoring and control are required, such as the establishment of databases and IoT service servers, to process data being transmitted and received through radio communication modules, controllers and gateways. This paper designs and implements database server, IoT service server, data processing middleware and IoT management system for IoT based services based on the controllers, communication modules and gateway middleware platform developed. For this, we firstly define the specification of the data packet and control code for the information classification of the sensor application system, and also design and implement the database as a separate server for data protection and efficient management. In addition, we design and implement the IoT management system so that functions such as status information verification, control and modification of operating environment information of remote sensor application systems are carried out. The implemented system can lead to efficient operation and reduced management costs of sensor application systems through site status analysis, setting operational information, and remote control and management.

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

Design and Implementation of IoT-Based Intelligent Platform for Water Level Monitoring (IoT 기반 지능형 수위 모니터링 플랫폼 설계 및 구현)

  • Park, Jihoon;Kang, Moon Seong;Song, Jung-Hun;Jun, Sang Min
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.4
    • /
    • pp.177-186
    • /
    • 2015
  • The main objective of this study was to assess the applicability of IoT (Internet of Things)-based flood management under climate change by developing intelligent water level monitoring platform based on IoT. In this study, Arduino Uno was selected as the development board, which is an open-source electronic platform. Arduino Uno was designed to connect the ultrasonic sensor, temperature sensor, and data logger shield for implementing IoT. Arduino IDE (Integrated Development Environment) was selected as the Arduino software and used to develop the intelligent algorithm to measure and calibrate the real-time water level automatically. The intelligent water level monitoring platform consists of water level measurement, temperature calibration, data calibration, stage-discharge relationship, and data logger algorithms. Water level measurement and temperature calibration algorithm corrected the bias inherent in the ultrasonic sensor. Data calibration algorithm analyzed and corrected the outliers during the measurement process. The verification of the intelligent water level measurement algorithm was performed by comparing water levels using the tape and ultrasonic sensor, which was generated by measuring water levels at regular intervals up to the maximum level. The statistics of the slope of the regression line and $R^2$ were 1.00 and 0.99, respectively which were considered acceptable. The error was 0.0575 cm. The verification of data calibration algorithm was performed by analyzing water levels containing all error codes in a time series graph. The intelligent platform developed in this study may contribute to the public IoT service, which is applicable to intelligent flood management under climate change.