• Title/Summary/Keyword: The Internet of Things

Search Result 2,746, Processing Time 0.034 seconds

Modeling and Optimization of the IEEE 802.15.4 Protocol for Internet of Things (사물인터넷 환경을 위한 IEEE 802.15.4 프로토콜 모델링과 최적화 방안)

  • Kim, Tae-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.299-310
    • /
    • 2016
  • In this paper, we perform analysis of the performance of low-power communication technology, IEEE 802.15.4 MAC (Media Access Control) protocol used in internet of things. Wide variety of devices in internet of things generate different kinds of traffic characteristics and heterogeneous traffic environment is therefore considered in contrast to existing works. With the help of the Markov chain the performance of the protocol is derived as a function of the MAC parameters and based on the results a framework to determine energy-efficient optimal MAC parameters for applications in real time is proposed. Proposed method is shown to be more efficient in terms of energy consumption through performance comparison over application scenarios compared to operation with fixing MAC parameters, and its practicability on small devices with limited computing power is verified through evaluating the accuracy and speed of the proposed framework.

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.

Analytical Modelling and Heuristic Algorithm for Object Transfer Latency in the Internet of Things (사물인터넷에서 객체전송지연을 계산하기 위한 수리적 모델링 및 휴리스틱 알고리즘의 개발)

  • Lee, Yong-Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.1-6
    • /
    • 2020
  • This paper aims to integrate the previous models about mean object transfer latency in one framework and analyze the result through the computational experience. The analytical object transfer latency model assumes the multiple packet losses and the Internet of Things(IoT) environment including multi-hop wireless network, where fast re-transmission is not possible due to small window. The model also considers the initial congestion window size and the multiple packet loss in one congestion window. Performance evaluation shows that the lower and upper bounds of the mean object transfer latency are almost the same when both transfer object size and packet loss rate are small. However, as packet loss rate increases, the size of the initial congestion window and the round-trip time affect the upper and lower bounds of the mean object transfer latency.

Analysis of the utility of intelligent speakers in the Internet of Things environment (사물인터넷 환경에서 지능형 스피커의 활용성 분석)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.3
    • /
    • pp.41-46
    • /
    • 2022
  • Smart home in the Internet of Things (IoT) environment aims to provide an optimal living environment for users by connecting all devices in the home. In such a smart home environment, artificial intelligence speakers are being used as a way to manage and control all devices. The existing speaker function is changing from simple music playback to the role of an interface that controls and manages all devices in the smart home space. This study dealt with the market status and usability analysis in the US and Korea, the leader in artificial intelligence speakers. The main target companies were Amazon, Google, and Apple in the US, as well as Kakao, SKT, and KT in Korea. In addition, based on the reaction results of domestic users to artificial intelligence speakers, the derivation of major problems and directions for improvement were described.

A Standard Time Management Scheme in the Internet of Things (사물인터넷에서 표준 시각 관리 방안)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.929-934
    • /
    • 2018
  • The Internet of Things (IoT) is the network of devices embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data without any human intervention. The importance of time information is increased in order to impose order on scattered sensor data streams, resolving conflicts through time stamp information and so on. Time information and time synchronization are critical building blocks in the IoT. They allow devices to share a consistent notion of time and it is easier to build efficient and robust collaborative services. This paper proposes a standard time management scheme in the Internet of Things. Many IoT applications involve collection and forwarding of event data. It is useful to know when an event occurs for the purposes of triggering an action. In order to verify the feasibility of the proposed scheme, it is implemented and evaluated in the Arduino development environment.

A Virtual Object Hosting Technology for IoT Device Controlling on Wireless AP's (무선 인터넷 공유기에서 사물 인터넷 장치 제어를 위한 가상 오브젝트 호스팅 기술 연구)

  • Yang, Jinhong;Park, Hyojin;Kim, Yongrok;Choi, Jun Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.164-172
    • /
    • 2014
  • Recently, as the number of IoT (Internet of Things) devices for personal or home intelligence increases, the need for unified control and cooperative utilization is required. This paper presents a novel idea, proposes methods for virtualizing Internet of Things (IoT) devices and hosting them on the home AP instead of relying on a cloud service or purchasing a new device to do so. For this, the process and profile of the IoT gadgets need to be virtualized into JavaScript-based objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method and their interfaces are designed. The implementation and performance section demonstrates the proposed system's stability and operability by showing the stress test results while the wireless AP is running for its wireless routing.

Proposition of System Algorithm for Implement Machine Socialization Environment (Machine Socialization 환경 구현을 위한 시스템 알고리즘 제안)

  • Kim, Wung-Jun;Im, Hyeok;Hwang, Jong-Seon;Jeong, Ji-O;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.595-597
    • /
    • 2015
  • In recent years, global Internet of Things is being fostered by strategic industry in major countries (IoT: Internet of Things) technology is the future Internet -based context-aware infrastructure capable of communication between objects and things. Existing technology was only a single device control via P2M (Puman to Machine) method and simple sensor data to someone directly control the devices down command. However, a kind of IoT Machine Socialization of devices, each device uses an internal feature information, and M2M (Machine to Machine) devices in ways that expand the overall scenario collaboration system through the Device Manager. In this paper, an algorithm of the whole system of the Machine Socialization for changing the system of the conventional system of P2M by M2M, and analysis.

  • PDF

Cases Analysis in Smart, Connected Toys Based on the Characteristics of ICBM Technologies (ICBM 기술 특성 기반 스마트, 커넥티드 완구의 사례 분석)

  • Jeon, Bienil;Park, Jae Wan
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.9
    • /
    • pp.27-35
    • /
    • 2016
  • Today, with the advance of Information and communication technology, 'Smart, connected' toys, which apply technologies related to IoT (Internet of Things) to traditional toys, are emerging and rapidly growing. This research aims to analyze the tendencies and limitations of smart, connected toys through exploring the representative cases of smart, connected toys based on characteristics of ICBM (Internet of Things, Cloud, Big-data, and Mobile) technology. For this study, we begin by understanding literature research about smart, connected toys and ICBM technology. Then, we extracted the characteristics of ICBM technology for connecting physical and digital environments through investigating cases to which ICBM technologies are applied. Based on the extracted characteristics, the case studies of smart, connected toys were conducted. In this research, we explore the level of ICBM technology application and limitation to smart, connected toys. We expect this research will contribute to providing guidelines for developing smart, connected toys based on the characteristics of the latest technology.

A Scheme for Information Protection using Blockchain in IoT Environment (사물인터넷 환경에서 블록체인을 이용한 정보보호 기법)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.33-39
    • /
    • 2019
  • Entering the 4th industrial revolution, many technologies are developing and various threats are emerging. In order to cope with such threats, research is being conducted in many fields. Even in the development of various fields, the threats caused by the development of medical technology and intelligent vehicles are the threats to life due to misinformation about medical care and the threats to life by preventing the safe operation of people through intelligent vehicles. In this paper, as the patient's information is important, the private blockchain is used to increase the safety, efficiency, and scalability of the patient's medical records. We propose an information protection technique using blockchain technology to hack the car system and threaten the driver's life, solve privacy problems by identifying personal information and differences, and prevent forgery in the Internet of Things.

Implementation of Hair Style Recommendation System Based on Big data and Deepfakes (빅데이터와 딥페이크 기반의 헤어스타일 추천 시스템 구현)

  • Tae-Kook Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.13-19
    • /
    • 2023
  • In this paper, we investigated the implementation of a hairstyle recommendation system based on big data and deepfake technology. The proposed hairstyle recommendation system recognizes the facial shapes based on the user's photo (image). Facial shapes are classified into oval, round, and square shapes, and hairstyles that suit each facial shape are synthesized using deepfake technology and provided as videos. Hairstyles are recommended based on big data by applying the latest trends and styles that suit the facial shape. With the image segmentation map and the Motion Supervised Co-Part Segmentation algorithm, it is possible to synthesize elements between images belonging to the same category (such as hair, face, etc.). Next, the synthesized image with the hairstyle and a pre-defined video are applied to the Motion Representations for Articulated Animation algorithm to generate a video animation. The proposed system is expected to be used in various aspects of the beauty industry, including virtual fitting and other related areas. In future research, we plan to study the development of a smart mirror that recommends hairstyles and incorporates features such as Internet of Things (IoT) functionality.