• 제목/요약/키워드: The Internet of Things

검색결과 2,746건 처리시간 0.045초

Analysis of Key Fourth Industrial Revolution Technologies and Their Applications

  • Leen, Byeong Hyeon;Seo, Kiwon;Jo, Sung-Hun
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 춘계학술대회
    • /
    • pp.552-553
    • /
    • 2022
  • Key technologies of Fourth Industrial Revolution and their innovative applications are expected to bring another technological revolution going forward. The present study takes a close look at the Internet of Things (IoT) among the key technologies of the Fourth Industrial Revolution. In particular, sensor devices, which serve as the core of IoT-based application systems, are analyzed. This study also examines various applications and solutions using IoT-based systems.

  • PDF

사물 인터넷망을 이용한 스마트 홈에서의 기기 인증 메카니즘 (Authentication Mechanism of Devices in Smart Home Using Internet of Things)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 춘계학술대회
    • /
    • pp.258-259
    • /
    • 2017
  • 최근 들어 과학기술의 발전으로 인하여 유무선 통신 환경이 통합되는 형태로 발전되고 있다. 인터넷의 발전으로 인하여 사물들이 서로 상호 연결하여 융합하는 사물인터넷 환경으로 발전되고 있다. 이러한 사물인터넷 환경 하에서의 대표적인 응용 시스템으로 홈 네트워크가 그 실 예이다. 사물인터넷을 이용한 센서 노드에서의 통신 환경은 작은 메모리 용량, 낮은 컴퓨팅 파워 등과 같은 제한적인 자원으로 인하여 기존의 암호 알고리즘을 사용을 할 수 없다. 따라서 본 논문에서는 이러한 IoT 환경 기반의 홈 네트워크 하에서의 보안을 위한 기기간의 인증을 분석하였다.

  • PDF

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

  • Chang, Kai-Di;Chen, Jiann-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.5-23
    • /
    • 2012
  • Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.

IoT 통신 시스템 설계 (Design of the Communication System for IoT)

  • 장선주;김규석
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2013년도 제47차 동계학술대회논문집 21권1호
    • /
    • pp.231-232
    • /
    • 2013
  • 현대사회는 기술의 발전으로 우리가 의식하지 않아도 모든 사물과 사람이 통신을 하는 시대로 바뀌고 있다. 이런 기술을 Internet of things 줄여서 IoT라고 부른다. IoT기술의 핵심은 인간의 개입 없이 모든 사물들이 상호 협력적으로 센싱, 정보 처리 등을 수행한다는 점이다. 본 논문은 IoT기술의 지속적인 발전과 함께 기술의 실현을 위해서 필요한 시스템을 제안한다.

  • PDF

보로노이 다이어그램의 사물인터넷 적용에 관한 연구 (A Study on the Application of Voronoi Diagram for Internet of Thing)

  • 김인범
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2016년도 제53차 동계학술대회논문집 24권1호
    • /
    • pp.283-284
    • /
    • 2016
  • 사물인터넷이란 인간의 일상생활에 사용 중인 가전제품, 의료기기, 기타 센서 부착 기기들이 인터넷에 연결되어 스스로 통신하고 제어하는 환경이다. 본 논문에서는 사물인터넷을 구성하는 각 사물들 간의 효율적인 통신을 위해 센터노드를 설정하고 각 사물들이 센터 노드를 중계기로 활용하여 다른 사물들과 효과적인 통신할 때 보로노이 다이어그램을 적용하는 방법을 제안한다.

  • PDF

사물인터넷의 헬스케어 주요 적용 동향 : 특허분석을 중심으로 (Healthcare in the Internet of Things Major Applications Trends ; Focusing on Patient Analysis)

  • 김진희;이명선;김현철
    • 한국기술혁신학회:학술대회논문집
    • /
    • 한국기술혁신학회 2017년도 추계학술대회 논문집
    • /
    • pp.1437-1451
    • /
    • 2017
  • 4차 산업혁명의 주요 기술 중 하나로 언급되는 사물인터넷 기술은 헬스케어분야에서 질병의 예측, 관리뿐만 아니라 보건의료 산업 전반에까지 영향을 미치고 있으며, 기술의 고도화 및 적용 분야가 점차 확대되고 있다. 이에 본고에서는 사물인터넷이 헬스케어 산업 분야에 적용 동향을 살펴보고, 한국, 미국, 일본, 유럽 특허청의 특허분석을 통해 공백 기술 및 분야에 대한 분석과 함께 향후 기술 개발이 요구되는 분야에 대해 논하고자 한다.

  • PDF

Reaching Byzantine Agreement underlying VANET

  • Wang, Shu-Ching;Lin, Ya-Jung;Yan, Kuo-Qin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3351-3368
    • /
    • 2019
  • The Internet of Things (IoT) enables machines and devices in a global network to connect and provide applications. The Vehicular Ad-hoc NETwork (VANET) allows vehicles in the network to communicate with each other as an application of the IoT. The safety and comfort of passengers can be improved through VANET related applications. In order to be able to provide related applications, there must be a reliable VANET topology. As a result of the Byzantine agreement (BA), fault tolerance can be solved in VANET. In order to improve the reliability of the system, even if some components in the system are damaged, a protocol is needed to assist the system to perform normally. Therefore, the BA problem in VANET with multiple impairments is revisited in this research. The proposed protocol allows all normal processing elements (PEs) to reach agreement using the least amount of information exchange. Moreover, the proposed protocol can tolerate the largest number of damaged PEs in VANET.

Hybrid Resource Allocation Scheme in Secure Intelligent Reflecting Surface-Assisted IoT

  • Su, Yumeng;Gao, Hongyuan;Zhang, Shibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3256-3274
    • /
    • 2022
  • With the rapid development of information and communications technology, the construction of efficient, reliable, and safe Internet of Things (IoT) is an inevitable trend in order to meet high-quality demands for the forthcoming 6G communications. In this paper, we study a secure intelligent reflecting surface (IRS)-assisted IoT system where malicious eavesdropper trying to sniff out the desired information from the transmission links between the IRS and legitimate IoT devices. We discuss the system overall performance and propose a hybrid resource allocation scheme for maximizing the secrecy capacity and secrecy energy efficiency. In order to achieve the trade-off between transmission reliability, communication security, and energy efficiency, we develop a quantum-inspired marine predator algorithm (QMPA) for realizing rational configuration of system resources and prevent from eavesdropping. Simulation results demonstrate the superiority of the QMPA over other strategies. It is also indicated that proper IRS deployment and power allocation are beneficial for the enhancement of system overall capacity.

사물 인터넷망에서의 보안 위협 기술 동향 분석 (Analyses of Trend of Threat of Security in Internet of Things)

  • 신윤구;정승화;도태훈;김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2015년도 춘계학술대회
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

A Study on Log Collection to Analyze Causes of Malware Infection in IoT Devices in Smart city Environments

  • 김동현;신지호;서정택
    • 인터넷정보학회논문지
    • /
    • 제24권1호
    • /
    • pp.17-26
    • /
    • 2023
  • A smart city is a massive internet of things (IoT) environment, where all terminal devices are connected to a network to create and share information. In accordance with massive IoT environments, millions of IoT devices are connected, and countless data are generated in real time. However, since heterogeneous IoT devices are used, collecting the logs for each IoT device is difficult. Due to these issues, when an IoT device is invaded or is engaged in malicious behavior, such as infection with malware, it is difficult to respond quickly, and additional damage may occur due to information leakage or stopping the IoT device. To solve this problem, in this paper, we propose identifying the attack technique used for initial access to IoT devices through MITRE ATT&CK, collect the logs that can be generated from the identified attack technique, and use them to identify the cause of malware infection.