• 제목/요약/키워드: IoTs

검색결과 36건 처리시간 0.02초

Security Threats and Attacks in Internet of Things (IOTs)

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.107-118
    • /
    • 2021
  • The term Internet of Things (IoTs) refers to the future where things are known daily through the Internet, whether in one way or another, as it is done by the method of collecting various information from various sensors to form a huge network through which people, things and machines are helped to make a link between them at all time and anywhere. The IoTs is everywhere around us such as connected appliances, smart homes security systems and wearable health monitors. However, the question is what if there is a malfunction or outside interference that affects the work of these IoTs based devises? This is the reason of the spread of security causes great concern with the widespread availability of the Internet and Internet devices that are subject to many attacks. Since there aren't many studies that combines requirements, mechanisms, and the attacks of the IoTs, this paper which explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality Additionally, the paper addresses the different types of attacks in IoTs. We have also addressed the different approaches aim to prevention mechanisms according to several researchers' conclusions and recommendations.

사물인터넷의 사회적 영향: 시나리오 플래닝을 통한 일자리 영향 전망 (Social Impacts of IoT: Job Prospects through Scenario Planning)

  • 유소영;한인구
    • 경영정보학연구
    • /
    • 제18권4호
    • /
    • pp.173-187
    • /
    • 2016
  • 본 연구는 사물인터넷의 사회적 파급 중 일자리에 미치는 영향을 미래 분석 기법인 시나리오 플래닝을 통해 탐색하였다. 컴퓨팅성능의 기하급수적 발전과 단가 하락에 힘입어 사물인터넷 및 유관 기술의 혁신이 가속화되면서 기존에 인간의 고유한 영역으로 여겨졌던 비정형적, 인지적 영역까지 도전 받게 되었다. 시나리오분석을 통해 미래의 불확실한 경계를 정의, 잠재된 기회와 위협의 영역을 전망함으로써, 주요 의사결정자들에게 사물인터넷의 확장이 기존 일자리 구조에 어떤 영향을 미칠 것인가에 대한 마인드맵(Mind map)을 제공할 수 있을 것으로 기대된다. 또한 시나리오를 통해 전반적으로 기술한 일자리 영향의 정도를 가늠하기 위하여, 국내 고용노동 구조를 살펴보고 52개 중분류 표준직업군별로 향후 감소 또는 성장 가능성이 높은 분야에 대하여 기존 연구 및 시나리오분석을 바탕으로 직종별 전망을 논의한다.

Cloud of Things (CoTs): Security Threats and Attacks

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.229-237
    • /
    • 2021
  • Cloud of things (CoTs) is a newer idea which combines cloud computing (CC) with the Internet of Things (IoT). IoT capable of comprehensively producing data, and cloud computing can be presented pathways that allow for the progression towards specific destinations. Integrating these technologies leads to the formation of a separate element referred to as the Cloud of Things (CoTs). It helps implement ideas that make businesses more efficient. This technology is useful for monitoring a device or a machine and managing or connecting them. Since there are a substantial amount of machines that can run the IoT, there is now more data available from the IoT that would have to be stored on a local basis for a provisional period, and this is impossible. CoTs is used to help manage and analyze data to additionally create usable information by permitting and applying the development of advanced technology. However, combining these elements has a few drawbacks in terms of how secure the process is. This investigation aims to recent study literature from the past 3 years that talk about how secure the technology is in terms of protecting by authentication, reliability, availability, confidentiality, and access control. Additionally, this investigation includes a discussion regarding some kinds of potential attacks when using Cloud of Things. It will also cover what the various authors recommend and conclude with as well as how the situation can be approached to prevent an attack.

IoT에서 중요한 데이터를 위한 쿼럼 기반 적응적 전파 알고리즘의 설계 및 평가 (Design and Evaluation of a Quorum-Based Adaptive Dissemination Algorithm for Critical Data in IoTs)

  • 배인한;노흥태
    • 한국멀티미디어학회논문지
    • /
    • 제22권8호
    • /
    • pp.913-922
    • /
    • 2019
  • The Internet of Things (IoT) envisions smart objects collecting and sharing data at a massive scale via the Internet. One challenging issue is how to disseminate data to relevant data consuming objects efficiently. In such a massive IoT network, Mission critical data dissemination imposes constraints on the message transfer delay between objects. Due to the low power and communication range of IoT objects, data is relayed over multi-hops before arriving at the destination. In this paper, we propose a quorum-based adaptive dissemination algorithm (QADA) for the critical data in the monitoring-based applications of massive IoTs. To design QADA, we first design a new stepped-triangular grid structures (sT-grid) that support data dissemination, then construct a triangular grid overlay in the fog layer on the lower IoT layer and propose the data dissemination algorithm of the publish/subscribe model that adaptively uses triangle grid (T-grid) and sT-grid quorums depending on the mission critical in the overlay constructed to disseminate the critical data, and evaluate its performance as an analytical model.

Open Hardware Platforms for Internet of Things : Evaluation & Analysis

  • Seo, Jae-Yeon;Kim, Myung-Hwi;Jang, Beakcheol
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권8호
    • /
    • pp.47-53
    • /
    • 2017
  • In this paper, we present open hardware platforms for Internet of Things (IoTs) emphasizing their strengths and weaknesses. We introduce six representative platforms, Raspberry PI, Arduino, Garileo, Edison, Beagle board and Artik. We define important performance issues for open hardware platforms for IoTs and analyze recent platforms according to the performance issues. We present recent research project using open hardware platforms introduced in this paper. We believe that this paper provide wise view and necessary information for open hardware platforms for Internet of Things (IoT).

Anti-complementary Activities of Exo- and Endo-biopolymer Produced by Submerged Mycelial Culture of Eight Different Mushrooms

  • Yang, Byung-Keun;Gu, Young-Ah;Jeong, Yong-Tae;Song, Chi-Hyun
    • Mycobiology
    • /
    • 제35권3호
    • /
    • pp.145-149
    • /
    • 2007
  • The Elfvingia applanata (EA), Hericium erinaceum (HE), Grifola frondosa (GF), Pholiota nameko (PN), Pleurotus eryngii (PE), Trametes suaveolens (TS), Fomes fomentarius (FF), and Inonotus obliquus (IO) could produce the endo- (EN) and exo-biopolymer (EX) in submerged culture. The highest anti-complementary activity of the EN was exhibited by PN (49.1%), followed by HE (38.6%), TS (37.0%), and FF (33.0%), whereas the high activity of the EX was found with GF (59.8%), followed by HE (36.3%), TS (30.8%), and IO (28.8%). The EN of P. nameko (EN-PN) and EX of G. frondosa (EX-GF) were found to contain 78.6% and 41.2% carbohydrates, while 21.4% and 58.8% protein, respectively. The sugar and amino acid compositions of EN-PN and EX-GF were also analyzed in detail.

해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책 (Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things)

  • 정소원;최유림;이일구
    • 디지털융복합연구
    • /
    • 제16권9호
    • /
    • pp.179-185
    • /
    • 2018
  • 4차 산업 혁명의 정보통신기술 산업 분야의 새로운 성장 동력으로 주목받는 사물인터넷 기술은 단순한 보안 기술을 넘어 신뢰성이 필요하다. 이러한 신뢰성은 IoT 제품의 기획 및 설계 단계부터 고려되어 제품을 개발하고 평가하며 사용하는 모두가 보안성을 측정하고 신뢰할 수 있는 시스템이 구축되어야 한다. 사용되는 IoT 기기 수의 급격한 증가와 사용 생명주기의 증가는 소프트웨어 패치와 업데이트 및 관리의 어려움으로 인한 보안 취약성 증가로 이어진다. 본 논문에서는 IoT 산업 분야의 기술적 정책적 동향을 분석하고 이를 통해 IoT 기기의 보안성과 확장성의 한계점을 분석한다. 이러한 한계점을 보완하기 위해 블록체인의 요소 기술인 해시를 활용해 소프트웨어의 무결성을 자동 검증하는 방법을 제안한다. 해시를 활용한 소프트웨어 무결성 자동 검증 방법으로 사물인터넷의 보안성과 확장성을 강화하고, 제안하는 보안 기술 적용을 위한 정책적 솔루션을 제시한다.

골반압박벨트가 앉아서 일어서기와 일어서서 앉기 동작 시 체간근육 근활성도에 미치는 영향 (Effects of the Pelvic Compression Belt on Trunk Muscles Activities During Sit-to-Stand, and Stand-to-Sit Tasks)

  • 장현정;김선엽;박현주
    • 한국전문물리치료학회지
    • /
    • 제20권1호
    • /
    • pp.1-9
    • /
    • 2013
  • The purpose of this study was to determine the effect of the pelvic compression belt (PCB) on the electromyography (EMG) activities of trunk muscles during sit-to-stand (SitTS), and stand-to-sit (StandTS) tasks. Twenty healthy subjects (7 men and 13 women) were recruited for this study. The subjects performed SitTS, and StandTS tasks, with and without a PCB. Surface EMG was used to record activity of the internal oblique (IO), external oblique (EO), rectus abdominis (RA), erector spinae (ES), and multifidus (MF) of the dominant limb. EMG activity significantly decreased in the RA (without the PCB, $8.34{\pm}6.04$ %maximal voluntary isometric contraction [%MVIC]; with the PCB, $7.64{\pm}5.11$ %MVIC), EO (without the PCB, $14.83{\pm}11.82$ %MVIC; with the PCB, $11.98{\pm}7.60$ %MVIC), MF (without the PCB, $21.74{\pm}7.76$ %MVIC; with the PCB, $18.50{\pm}8.04$ %MVIC), and ES (without the PCB, $18.39{\pm}7.16$ %MVIC; with the PCB, $16.63{\pm}6.31$ %MVIC) during the SitTS task and in the IO (without the PCB, $20.58{\pm}15.60$ %MVIC; with the PCB, $17.27{\pm}12.32$ %MVIlC), RA (without the PCB, $8.04{\pm}5.68$ %MVIC; with the PCB, $7.40{\pm}4.71$ %MVIC), EO (without the PCB, $13.29{\pm}8.80$ %MVIC; with the PCB, $11.24{\pm}6.14$ %MVIC), MF (without the PCB, $18.59{\pm}7.64$ %MVIC; with the PCB, $15.86{\pm}6.48$ %MVIC), and ES (without the PCB, $17.14{\pm}6.44$ %MVIC; with the PCB, $15.46{\pm}5.62$ %MVIC) during the StandTS task when a PCB was used (p<.05). In men the EMG activity of the MF significantly decreased during the SitTS task when a PCB was used (p<.05): in women, the EMG activity of the RA, EO, MF, and ES during the SitTS task and that of the EO, MF, and ES during the SitTS task significantly decreased when a PCB was used (p<.05). In addition, the rates of change in the EMG activity of each muscle differed significantly during the SitTS and StandTS tasks before and after the use of the PCB. However, the EMG activity did not significantly differ between the male and female subjects. These findings suggest that the PCB may contribute to the modification of activation patterns of the trunk muscles during SitTS, and StandTS tasks.

IoT Industry & Security Technology Trends

  • Park, Se-Hwan;Park, Jong-Kyu
    • International journal of advanced smart convergence
    • /
    • 제5권3호
    • /
    • pp.27-31
    • /
    • 2016
  • High-tech industries in a state well enough to troubleshoot hacking information introduction a big barrier to delay the growth of the market related to IoT(Internet of Things) as is likely to be on the rise. This early on, security issues introduced in the solution, a comprehensive solution, including the institutional laws/precautions needed. Recent examples of frequent security threats while IoT is the biggest issue of introducing state-of-the-art industry information due to the vulnerable security hacking. This high-tech industries in order to bridge the information responsible for the target attribute, target range, and the protection of security and how to protect the subject, IoT environment (domestic industrial environment) considering the approach is needed. IoTs with health care and a wide variety of services, such as wearable devices emerge. This ensures that RFID/USN-based P2P/P2M/M2M connection is the implementation of the community. In this study, the issue on the high-tech industrial information and the vulnerable security issues of IoT are described.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.