• Title/Summary/Keyword: Mobile IoT

Search Result 478, Processing Time 0.029 seconds

An Emergency-Alert Delivery Approach Based on Cell Broadcast for Smart-City IoT Devices (스마트 시티 용 IoT 단말기를 위한 셀 방송 기반의 경보 전송기법)

  • Chang, Sekchin
    • Journal of Broadcast Engineering
    • /
    • v.27 no.5
    • /
    • pp.762-772
    • /
    • 2022
  • Current disaster alert broadcasting based on mobile communication systems targets personal mobile terminals such as smartphones. However, smart cities require IoT-based services such as smart homes and offices. Therefore, when severe disasters such as earthquakes occur, smart cities must quickly perform appropriate control and respond to buildings and factories. For this, a disaster warning broadcasting technique for IoT terminals for smart cities is required. In this paper, we propose a disaster alert transmission method based on 4G/5G mobile communication for IoT terminals for smart cities. The proposed method effectively utilizes the image display method for CBS, a cell-based broadcasting service, and shows the superiority of the proposed approach through simulation.

A Meta-Model for Development Process of IoT Application by Using UML

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.121-128
    • /
    • 2019
  • An Internet of Things(IoT) technology which provides intelligent services by combining context-awareness based intelligences, inter-communication is made of between things and things or between things and person through the network connected with intelligent things is spreading rapidly. Especially as this technology is converged into smart device, mobile, cloud, big data technologies, it is applied into various domains. Therefore, this is different from existing Web or Mobile Application. New types of IoT applications are emerging by adapting IoT into Web or mobile. Because IoT application is not only focused on software but also considering hardware or things aspect, there are limitations existing development process. Existing development processes don't consider analysis and design techniques considering both hardware and things. We propose not only a meta-model for development process which can support IoT application's development but also meta-models for main activities in this paper. Especially we define modeling elements by using UML's extension mechanisms, provide development process, and suggest design techniques how to apply those elements into IoT application's modeling phase. Because there are many types of IoT application's type, we propose an Android and Arduino-based on IoT application as a case study. We expect that proposed technique can be applied into many of various IoT application development and design with a form of flexible and extensible as well as main functionalities or elements are more concretely described. As a result, it brings IoT application's flexibility and the effect of quality improvement.

Development of IoT-based Mobile Application for Livestock Healthcare and Breeding Management in real time (IoT 기반의 실시간 가축 건강 및 번식 관리를 위한 모바일 어플리케이션 개발)

  • Kim, Heejin;Oh, Seeun;Ahn, Sehyeok;Choi, Byoungju
    • Journal of Software Engineering Society
    • /
    • v.27 no.1
    • /
    • pp.15-17
    • /
    • 2018
  • Fast response to livestock disease and raising the reproductive success rate contribute to the improvement of farm productivity and profit margins. Due to the decrease in farm workforce and aging population, efficient livestock healthcare and breeding management are needed. In this study, we developed a mobile application for livestock healthcare and breeding management based on the collected body temperature data by IoT sensors. In case of livestock health problem, users are notified immediately via a mobile application warning message. It also provides users with a livestock breeding date function, allowing them to respond without missing the breeding season.

  • PDF

Threats Analysis and Mobile Key Recovery for Internet of Things (IoT 환경에서의 보안위협 분석과 모바일 키 복구)

  • Lee, Yunjung;Park, Yongjoon;Kim, Chul Soo;Lee, Bongkyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.918-923
    • /
    • 2016
  • IoT should be considered security risk environments such as various platforms and services including smart devices that can be mounted on household electric appliances, healthcare, car, and heterogeneous networks that are connected to the Internet, cloud services and mobile Apps.. In this paper, we provide analysis of new security threats, caused by open-platform of IoT and sensors via the Internet. Also, we present the key recovery mechanism that is applied to IoT. It results to have compatibility with given research, reduces network overhead, and performs key recovery without depending on key escrow agencies or authorized party.

Dynamic Computation Offloading Based on Q-Learning for UAV-Based Mobile Edge Computing

  • Shreya Khisa;Sangman Moh
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.68-76
    • /
    • 2023
  • Emerging mobile edge computing (MEC) can be used in battery-constrained Internet of things (IoT). The execution latency of IoT applications can be improved by offloading computation-intensive tasks to an MEC server. Recently, the popularity of unmanned aerial vehicles (UAVs) has increased rapidly, and UAV-based MEC systems are receiving considerable attention. In this paper, we propose a dynamic computation offloading paradigm for UAV-based MEC systems, in which a UAV flies over an urban environment and provides edge services to IoT devices on the ground. Since most IoT devices are energy-constrained, we formulate our problem as a Markov decision process considering the energy level of the battery of each IoT device. We also use model-free Q-learning for time-critical tasks to maximize the system utility. According to our performance study, the proposed scheme can achieve desirable convergence properties and make intelligent offloading decisions.

Performance Analysis of Urban Railway Rolling Stock Condition-based Maintenance Process Redesign Applying Mobile-IoT (모바일 사물인터넷을 적용한 도시철도 차량 상태기반 유지보수 프로세스 재 설계안 성과 분석)

  • Hyun-Soo Han;Kyoung-Soo Seo;Tae-Wook Kang
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.6
    • /
    • pp.63-80
    • /
    • 2022
  • In this paper, we study structural changes and performance gains in condition-based maintenance process redesign when mobile IoT technology is embedded into urban railway rolling stock. We first develop condition-based maintenance To-Be process model in accordance with the IoT deployment scheme. Secondly, we draw upon theoretical framework of redesign process analysis to develop performance evaluation method suitable to predictive maintenance shift from As-Is ordinary maintenance practice. Subsequently, To-Be process performance evaluations are conducted adopting both the quantitative and qualitative method for time, cost, and dependability dimensions. The results ascertain the considerable benefits captured through detection abnormality prior to actual rolling stock failure occurrence, and details of performance improvements and enhancement of standardization level is revealed. The procedures and results presented in this paper offers useful insights in the fields of IoT economic analysis, condition based maintenance, and business process redesign.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

A Study on Uses Case of IoT Mobile Toilet (IoT가 접목된 이동형 임대 화장실의 활용량 측정 사례 연구)

  • Kim, Yu-Doo;Jung, Yong-jin;Kwon, Soon-bum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.729-730
    • /
    • 2017
  • There are many events such as festival or assembly. Toilets are needed in these events. Therefore, there are many companies that rental of mobile toilets. But these companies provide only rental of toilet. So in this research, we provide IT services using sensor into mobile toilets. And then has analysed that how to using sensor data from mobile toilets.

  • PDF

Industrial IoT Standardization Trend of the 5G Mobile Network (5G 모바일 네트워크의 Industrial IoT 표준기술 동향)

  • Kim, K.S.;Kang, Y.H.;Kim, C.K.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.13-24
    • /
    • 2021
  • Industrial networks has been developing various technologies from fieldbus technology to industrial Ethernet and time-sensitive networking. The industry expects that the 5G mobile network will solve the diverse and highly specific industrial site requirements. Accordingly, 3GPP has been developing standard functions to provide ultra-high reliability, ultra-high speed, ultra-connection, and ultra-low latency services, and 3GPP Rel-16 began developing ultra-low latency and ultra-high reliability communication functions for 5G mobile networks to support vertical industries. In this paper, we show the related standardization trends and requirements to apply industrial IoT service scenarios to 5G mobile networks, and in particular, we introduce 5G system features and extended 5G system architecture to provide time sensitive communication and time synchronization services.

A Study on Priority of Certification Criteria for IoT Security Certification Service (IoT 보안인증서비스 인증기준 중요도 우선순위에 관한 연구)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.13-21
    • /
    • 2019
  • Because security of Internet of Things(IoT) products and others is poor, there are many hacking incidents To prevent security threats, it is important for companies to first make products with high security levels and choose products that are safe for users. In response, the Korea Internet & Security Agency is testing the security of IoT products and linked mobile apps to impose ratings. Security certification service is a service that tests IoT products and linked mobile apps to ensure certain levels of security and issues certificates when they meet the criteria. It can induce autonomous security enhancement of IoT products, contribute to strengthening security capabilities of IoT companies in Korea and vitalizing their overseas advancement, and have the expected effect of resolving public anxiety over IoT products. In this study, the criteria for IoT security certification are presented, but the importance priority is sought to be derived for assessment items that need to be strengthened. This will help to provide guidelines that can contribute to strengthening the security capabilities of domestic Internet companies and boosting their overseas advancement.