• Title/Summary/Keyword: Mobile IoT environment

Search Result 132, Processing Time 0.028 seconds

Hybrid Offloading Technique Based on Auction Theory and Reinforcement Learning in MEC Industrial IoT Environment (MEC 산업용 IoT 환경에서 경매 이론과 강화 학습 기반의 하이브리드 오프로딩 기법)

  • Bae Hyeon Ji;Kim Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.263-272
    • /
    • 2023
  • Industrial Internet of Things (IIoT) is an important factor in increasing production efficiency in industrial sectors, along with data collection, exchange and analysis through large-scale connectivity. However, as traffic increases explosively due to the recent spread of IIoT, an allocation method that can efficiently process traffic is required. In this thesis, I propose a two-stage task offloading decision method to increase successful task throughput in an IIoT environment. In addition, I consider a hybrid offloading system that can offload compute-intensive tasks to a mobile edge computing server via a cellular link or to a nearby IIoT device via a Device to Device (D2D) link. The first stage is to design an incentive mechanism to prevent devices participating in task offloading from acting selfishly and giving difficulties in improving task throughput. Among the mechanism design, McAfee's mechanism is used to control the selfish behavior of the devices that process the task and to increase the overall system throughput. After that, in stage 2, I propose a multi-armed bandit (MAB)-based task offloading decision method in a non-stationary environment by considering the irregular movement of the IIoT device. Experimental results show that the proposed method can obtain better performance in terms of overall system throughput, communication failure rate and regret compared to other existing methods.

Self-organization Scheme of WSNs with Mobile Sensors and Mobile Multiple Sinks for Big Data Computing

  • Shin, Ahreum;Ryoo, Intae;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.943-961
    • /
    • 2020
  • With the advent of IoT technology and Big Data computing, the importance of WSNs (Wireless Sensor Networks) has been on the rise. For energy-efficient and collection-efficient delivery of any sensed data, lots of novel wireless medium access control (MAC) protocols have been proposed and these MAC schemes are the basis of many IoT systems that leads the upcoming fourth industrial revolution. WSNs play a very important role in collecting Big Data from various IoT sensors. Also, due to the limited amount of battery driving the sensors, energy-saving MAC technologies have been recently studied. In addition, as new IoT technologies for Big Data computing emerge to meet different needs, both sensors and sinks need to be mobile. To guarantee stability of WSNs with dynamic topologies as well as frequent physical changes, the existing MAC schemes must be tuned for better adapting to the new WSN environment which includes energy-efficiency and collection-efficiency of sensors, coverage of WSNs and data collecting methods of sinks. To address these issues, in this paper, a self-organization scheme for mobile sensor networks with mobile multiple sinks has been proposed and verified to adapt both mobile sensors and multiple sinks to 3-dimensional group management MAC protocol. Performance evaluations show that the proposed scheme outperforms the previous schemes in terms of the various usage cases. Therefore, the proposed self-organization scheme might be adaptable for various computing and networking environments with big data.

Development of AR-based Coding Puzzle Mobile Application Using Command Placement Recognition (명령어 배치 인식을 활용한 AR 코딩퍼즐 모바일앱 개발)

  • Seo, Beomjoo;Cho, Sung Hyun
    • Journal of Korea Game Society
    • /
    • v.20 no.3
    • /
    • pp.35-44
    • /
    • 2020
  • In this study, we propose a reliable command placement recognition algorithm using tangible commands blocks developed for our coding puzzle platform, and present its performance measurement results on an Augmented Reality testbed environment. As a result, it can recognize up to 30 tangible blocks simultaneously and their placements within 5 seconds reliably. It is successfully ported to an existing coding puzzle mobile app and can operate an IoT attached robot via bluetooth connected mobile app.

Trends of Block Chain Cryptography in Wireless Mobile Security Environments (무선모바일 보안 환경에서 블록체인 암호기술의 동향)

  • Hong, Dong-sung;Cho, Young-bok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.67-70
    • /
    • 2019
  • Blockchain, which emerged with the development of IT technology, has emerged as a new technology in security in recent years, although it has only been known as a technology associated with digital currencies, such as bitcoin. In particular, various studies have been conducted involving biometric technology and blockchain in the security of the mobile environment, and blockchain-based certifications between different devices are also presented in the IoT base of the wireless mobile environment. In this paper, we want to analyze the trends that are currently being applied to various wireless mobile environments and set up guidelines for future blockchain research.

  • PDF

Why Dynamic Security for the Internet of Things?

  • Hashemi, Seyyed Yasser;Aliee, Fereidoon Shams
    • Journal of Computing Science and Engineering
    • /
    • v.12 no.1
    • /
    • pp.12-23
    • /
    • 2018
  • The Internet of Things (IoT) ecosystem potentially includes heterogeneous devices with different processing mechanisms as well as very complicated network and communication models. Thus, analysis of data associated with adverse conditions is much more complicated. Moreover, mobile things in the IoT lead to dynamic alteration of environments and developments of a dynamic and ultra-large-scale (ULS) environment. Also, IoT and the services provided by that are mostly based on devices with limited resources or things that may not be capable of hosting conventional controls. Finally, the dynamic and heterogeneous and ULS environment of the IoT will lead to the emergence of new security requirements. The conventional preventive and diagnostic security controls cannot sufficiently protect it against increasing complication of threats. The counteractions provided by these methods are mostly dependent on insufficient static data that cannot sufficiently protect systems against sophisticated and dynamically evolved attacks. Accordingly, this paper investigates the current security approaches employed in the IoT architectures. Moreover, we define the dynamic security based on dynamic event analysis, dynamic engineering of new security requirements, context awareness and adaptability, clarify the need for employment of new security mechanism, and delineate further works that need to be conducted to achieve a secure IoT.

Reliable Mobility Management Using CoAP in Internet of Things Environments (사물 인터넷 환경에서 CoAP 기반의 신뢰성 있는 이동성 관리 방법)

  • Chun, Seung Man;Kim, Hyun Su;Ham, Chang Gyun;Chung, Yun Seok;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.13-18
    • /
    • 2016
  • In Internet of Things (IoT) environment, a variety of smart devices are connected to Internet through various network technologies such as 4G/5G, WiBro, Bluetooth, etc. in order to provide the remote monitoring service such as smart healthcare service, etc. Most standard mobility management protocols based on IETF Mobile IP may not be suitable for Internet of Things (IoT) environments due to constrained power, constrained CPU processing and memory capacity, and large signalling overhead which are inherently accompanied by various devices in IoT environments. In this article, we propose a new mobility management protocol CoMP (CoAP-based Mobility Managemenbt Protocol) for reliable mobility management in IoT environments. The architecture and algorithm to achieve both reliability and simplicity for IoT mobility management are proposed. Finally, performance has been evaluated by both mathematical analysis and simulation.

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

Low-cost System with Handheld Analyzer for Optimizing the Position of Indoor Base Stations

  • Lee, C.C.;Xu, Degang;Chan, George
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.404-420
    • /
    • 2021
  • In this paper, an automatic system of locating the indoor area with weak or no mobile signal was proposed and demonstrated experimentally by using the Internet of Things (IoT) technology. Nowadays, the technicians of mobile services providers need to go along with numerous heavy equipment to measure and record the mobile signal strength at outside environment. Recently, there are systems proposed to do such measurement at outdoor area by using the IoT technology automatically. However, these works could not be applied in the indoor area since there are difficulties to do the indoor mapping and positioning. In this work, the Bluetooth Low Energy (BLE) was used to tackle these two difficulties. After a proper placement of BLE in the testing site, while the technician walk around with a handheld analyzer, the data can be obtained accordingly for further analysis in the proposed system which includes the construction of floor plan, detection of mobile signal strength and suggestion of indoor base stations. The gift wrapping and centroid algorithms were used during the analysis. The experimental results showed that the proposed system successfully demonstrated the indoor mapping, positioning of weak mobile signal area and suggestion of indoor base stations for the normal rectangular rooms with an area of 100 m2 on single floor.

A Study on IoT Service for Game Development (게임 개발을 위한 IoT 서비스)

  • Lee, MyounJae
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.291-297
    • /
    • 2015
  • The basic idea of IoT(Internet of Things) is interconnection and cooperation with a variety of things in real life such as Radio-Frequency Identification(RFID) tags, sensors, mobile phone, etc, through internet. IoT technologies which applied to these fields consist of sensor network technology and middleware, application. Currently, IoT technology is applied to various fields such as health care, home care, automotive, transportation, construction, agriculture, environment, food, and etc, based on its technologies. This paper focuses on discussion of the IoT development trend in game field. In order to achieve this purpose, first, the IoT technologies for game development based on sensor network technology and middleware, application is mentioned. Second, covers serious game and gamification that is expected to be a growing that is expected to be a growing, by applying IoT technologies to the game field. It can help for game developers by using IoT technologies.

Design of Multiple Floors Autonomous Navigation System Based On ROS Enabled Mobile Robots (ROS 기반 모바일 로봇을위한 다중 층 자율 주행 시스템 설계)

  • Ahmed, Hamdi A.;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.55-57
    • /
    • 2018
  • In Simultaneous Localization and Mapping (SLAM), the robot acquire its map of environment while simultaneously localize itself relative to the map. Now a day, a map acquired by the mobile robots limit to specific area, in an indoor environment and cannot able to navigate autonomous between different floors. We propose a design that could able to overcome this issue in order to navigate multiple floors with one end goal mission to a target destination in the course of autonomous navigation. In this research, we consider all the floors have identical structural arrangement. Internet of Things (IoT) playing crucial role in bridging between "things" and Robot Operating System (ROS) enabled mobile robots.

  • PDF