• Title/Summary/Keyword: Mobile IoT

Search Result 478, Processing Time 0.033 seconds

Design of sewage facility monitoring system using IoT technology in mobile device environment (모바일 디바이스 환경에서 IoT 기술을 활용한 하수시설 모니터링 시스템 설계)

  • Kwon, Young-Woo;Jeon, Young-joon;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.86-88
    • /
    • 2018
  • 스마트시티 개념의 등장과 함께 국민의 삶의 질에 대한 정부의 관심이 증가하고 있다. 국민의 삶의 질을 향상시키는 것은 하수도와 같은 도시기반시설이며, 정부에서는 이를 지속적으로 유지관리 하여 주거환경 개선, 공중위생관리, 침수방지 등을 위해 노력하고 있다. 최근에는 하수시설의 노후화 와 서비스 범위의 변화에 따른 하수 서비스 품질에 대해 국민적 관심이 증가하고 있다. 또한 급격한 기후변화에 따른 도시 침수와 같은 재해가 빈번하게 발생함에 따라 재난 관리 측면에서도 하수도는 매우 중요한 비중을 차지하고 있다. 본 논문에서는 모바일 디바이스와 IoT 기술을 활용하여 하수시설 모니터링 시스템을 설계하였다. 제시하고 있는 시스템은 하수시설의 데이터를 수집하고 모바일 어플리케이션을 통해 사용자에게 알려준다.

  • PDF

A Study on Real-time Monitoring System of Indoor Fire Detector using IoT (IoT를 활용한 옥내 화재감지기 실시간 모니터링 시스템에 관한 연구)

  • Lee, Hae-Keon;Kwak, Dong-Kurl;Lee, Bong-Seob
    • Proceedings of the KIPE Conference
    • /
    • 2018.07a
    • /
    • pp.267-269
    • /
    • 2018
  • This paper is a study to solve the malfunction of Fire Detection System and to react swiftly in case of fire. if a fire occurs because of malfunction of the fire receiver, it may not be possible to respond appropriately. in order to solve this problem, Fire Detection System using IoT, the manager studied the method of confirming the fire occurrence with mobile phone Application. We propose a wireless Fire Detection System by building a server and a client using a micom and a mobile phone application. This is to reduce the damage caused by the fire.

  • PDF

Research on a Mobile-aware Service Model in the Internet of Things

  • An, Jian;Gui, Xiao-Lin;Yang, Jian-Wei;Zhang, Wen-Dong;Jiang, Jin-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1146-1165
    • /
    • 2013
  • Collaborative awareness between persons with various smart multimedia devices is a new trend in the Internet of Things (IoT). Because of the mobility, randomness, and complexity of persons, it is difficult to achieve complete data awareness and data transmission in IoT. Therefore, research must be conducted on mobile-aware service models. In this work, we first discuss and quantify the social relationships of mobile nodes from multiple perspectives based on a summary of social characteristics. We then define various decision factors (DFs). Next, we construct a directed and weighted community by analyzing the activity patterns of mobile nodes. Finally, a mobile-aware service routing algorithm (MSRA) is proposed to determine appropriate service nodes through a trusted chain and optimal path tree. The simulation results indicate that the model has superior dynamic adaptability and service discovery efficiency compared to the existing models. The mobile-aware service model could be used to improve date acquisition techniques and the quality of mobile-aware service in the IoT.

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

Geometric Optimization Algorithm for Path Loss Model of Riparian Zone IoT Networks Based on Federated Learning Framework

  • Yu Geng;Tiecheng Song;Qiang Wang;Xiaoqin Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1774-1794
    • /
    • 2024
  • In the field of environmental sensing, it is necessary to develop radio planning techniques for the next generation Internet of Things (IoT) networks over mixed terrains. Such techniques are needed for smart remote monitoring of utility supplies, with links situated close to but out of range of cellular networks. In this paper, a three-dimension (3-D) geometric optimization algorithm is proposed, considering the positions of edge IoT devices and antenna coupling factors. Firstly, a multi-level single linkage (MLSL) iteration method, based on geometric objectives, is derived to evaluate the data rates over ISM 915 MHz channels, utilizing optimized power-distance profiles of continuous waves. Subsequently, a federated learning (FL) data selection algorithm is designed based on the 3-D geometric positions. Finally, a measurement example is taken in a meadow biome of the Mexican Colima district, which is prone to fluvial floods. The empirical path loss model has been enhanced, demonstrating the accuracy of the proposed optimization algorithm as well as the possibility of further prediction work.

An Efficient Software Defined Data Transmission Scheme based on Mobile Edge Computing for the Massive IoT Environment

  • Kim, EunGyeong;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.974-987
    • /
    • 2018
  • This paper presents a novel and efficient data transmission scheme based on mobile edge computing for the massive IoT environments which should support various type of services and devices. Based on an accurate and precise synchronization process, it maximizes data transmission throughput, and consistently maintains a flow's latency. To this end, the proposed efficient software defined data transmission scheme (ESD-DTS) configures and utilizes synchronization zones in accordance with the 4 usage cases, which are end node-to-end node (EN-EN), end node-to-cloud network (EN-CN), end node-to-Internet node (EN-IN), and edge node-to-core node (EdN-CN); and it transmit the data by the required service attributes, which are divided into 3 groups (low-end group, medium-end group, and high-end group). In addition, the ESD-DTS provides a specific data transmission method, which is operated by a buffer threshold value, for the low-end group, and it effectively accommodates massive IT devices. By doing this, the proposed scheme not only supports a high, medium, and low quality of service, but also is complied with various 5G usage scenarios. The essential difference between the previous and the proposed scheme is that the existing schemes are used to handle each packet only to provide high quality and bandwidth, whereas the proposed scheme introduces synchronization zones for various type of services to manage the efficiency of each service flow. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of throughput, control message overhead, and latency. Therefore, the proposed ESD-DTS is very suitable for upcoming 5G networks in a variety of massive IoT environments with supporting mobile edge computing (MEC).

Security Core Technology Implementation for Hardware-based Smart Devices (HW기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.501-505
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study inspects features of hardware-based smart device security technology. Furthermore, this study proposes a realization method in MTM hardware-based secure smart device execution environment for an application software that runs in smart devices. While existing MTM provides the root of trust function only for the mobile device, the MTM-based mobile security environment technology proposed in this paper can provide numerous security functions that application program needs in mobile device. The further researches on IoT devices that are compatible with security hardware, gateway security technology and methods that secure reliability and security applicable to varied IoT devices by advancing security hardware are the next plan to proceed.

Implementation of Object Identifier, Mobile RFID and QR Code Exploiting End-of-Life Treatment Information of Internet of Things Devices (사물인터넷 디바이스의 폐기 처리 정보를 활용한 객체 식별자, 모바일 RFID 및 QR 코드 구현)

  • Seo, Jeongwook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.441-447
    • /
    • 2020
  • In a situation in which around 50 million metric tons of electrical and electronic products is generated globally per year, the total installed base of Internet of Things (IoT) devices is projected to amount to around 75 billion worldwide by 2025. However, there is very little research on identification schemes for end-of-life treatment (EoLT) of IoT devices. To address this issue, this paper proposes new identifiers including EoLT information such as recyclability rate (Rcyc) and recoverability rate (Rcov) of an IoT device, recycling rate (RCR) and recovery rate (RVR) of each part in the IoT device, etc. and implements them by using object identifier (OID), mobile radio frequency identification (RFID) and quick response (QR) code. The implemented OID and mobile RFID can be used with cooperation of a remote server via communication networks and the implemented QR code can be used simply with a smartphone app.

Smart Fog : Advanced Fog Server-centric Things Abstraction Framework for Multi-service IoT System (Smart Fog : 다중 서비스 사물 인터넷 시스템을 위한 포그 서버 중심 사물 추상화 프레임워크)

  • Hong, Gyeonghwan;Park, Eunsoo;Choi, Sihoon;Shin, Dongkun
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.710-717
    • /
    • 2016
  • Recently, several research studies on things abstraction framework have been proposed in order to implement the multi-service Internet of Things (IoT) system, where various IoT services share the thing devices. Distributed things abstraction has an IoT service duplication problem, which aggravates power consumption of mobile devices and network traffic. On the other hand, cloud server-centric things abstraction cannot cover real-time interactions due to long network delay. Fog server-centric things abstraction has limits in insufficient IoT interfaces. In this paper, we propose Smart Fog which is a fog server-centric things abstraction framework to resolve the problems of the existing things abstraction frameworks. Smart Fog consists of software modules to operate the Smart Gateway and three interfaces. Smart Fog is implemented based on IoTivity framework and OIC standard. We construct a smart home prototype on an embedded board Odroid-XU3 using Smart Fog. We evaluate the network performance and energy efficiency of Smart Fog. The experimental results indicate that the Smart Fog shows short network latency, which can perform real-time interaction. The results also show that the proposed framework has reduction in the network traffic of 74% and power consumption of 21% in mobile device, compared to distributed things abstraction.

Privacy Protection for 5G Mobile-based IoT Users (5G 이동 통신 기반의 IoT 사용자를 위한 프라이버시 보호 기법)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Recently 5G technology is one of the technologies that has been receiving much positive responses from users as it is integrated with virtual technology. However, 5G's security issues have not been fully resolved and more security is soon required. In this paper, an approach technique is proposed as a probability-based hierarchy to provide personal privacy for 5G-based IoT users more safely. The proposed technique is aimed at not exposing the privacy of IoT users to third parties by using two random keys created personally by IoT users. In order to satisfy both safety and efficiency, the proposed technology divides the privacy of IoT users into two layers. In the first stage, IoT users will control access to intermediate media using anonymous keys generated by IoT users, and in the second stage, information of IoT users registered with servers will be darkened and replicated. The proposed technique has improved the accuracy of the privacy protection of IoT users as they assign weights to layered information after layering users' privacy information on a probabilistic basis.