• Title/Summary/Keyword: The Internet of Things

Search Result 2,763, Processing Time 0.028 seconds

Development of a System for Field-data Collection Transmission and Monitoring based on Low Power Wide Area Network (저전력 광역통신망 기반 현장데이터 수집 전송 및 모니터링 시스템 개발)

  • Yeong-Tae, Ju;Jong-Sil, Kim;Eung-Kon, Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1105-1112
    • /
    • 2022
  • Field data monitoring systems such as renewable energy generation and smart farm integrated control are developing from PC and server to mobile first, and various wireless communication and application services have emerged with the development of IoT technology. Low-power wide-area networks are services optimized for low-power, low-capacity, and low-speed data transmission, and data collected in the field is transmitted to designated storage servers or cloud-based data platforms, enabling data monitoring. In this paper, we implement an IoT repeater that collects field data with a single device and transmits it to a wireless carrier cloud data flat using a low-power wide-area network, and a monitoring app using it. Using this, the system configuration is simpler, the cost of deployment and operation is lower, and effective data accumulation is possible.

A Indoor Management System using Raspberry Pi (라즈베리 파이를 이용한 실내관리 시스템)

  • Jeong, Soo;Lee, Jong Jin;Jung, Won Ki
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.745-752
    • /
    • 2016
  • In the era of the Internet of Things, where all physical objects are connected to the Internet, we suggest a remote control system using a Raspberry Pi single-board computer with ZigBee, which can turn an indoor light-emitting diode (LED) and a multiple-tap on and off, and with a smart phone can control the brightness of the LED as well as an electronic door lock. By connecting an infrared (IR) transmitter module to the Raspberry Pi, we can control home appliances, such as an air conditioner, and we can also monitor indoor images, indoor temperatures, and illumination by using a smart phone app. We developed a method of finding out IR transmission codes required for remote-controllable appliances with an AVR micro-controller. We suggest a method to remotely open and shut an office door by novating the door lock. The brightness level of an LED (between 0 and 10) can be controlled through a PWM signal generated by an ATmega88 microcontroller. A mutiple-tap is controlled using an ATmega32, a photo-coupler, and a TRIAC. The signals for measured temperature and illumination are converted from analog to digital by using the ATtiny44A microcontroller transmitting to a Raspberry Pi through SPI communication. Then, we connect a camera to the CSI head of the Raspberry Pi. We can turn on the smart multiple-tap for a certain period of time, or we can schedule the multi-tap to turn on at a specific time. To reduce standby power, people usually pull out a power code from multiple-taps or turn off a switch. Our method helps people do the same thing with a smart phone, if they are away from home.

Development of a safety accident prevention system for construction equipment utilizing IoT and RTLS technology (사물인터넷과 실시간 위치추적 기술을 활용한 건설 장비의 안전 사고 방지 시스템 개발)

  • Ryu, Han Guk;Kim, Tae Wan
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.9
    • /
    • pp.179-186
    • /
    • 2019
  • Identifying potential accidents at construction sites is a major concern for the construction industry, and, according to the Korea Occupational Safety and Health Agency, the death rate of safety accidents caused by construction equipment is particularly high at 19.8% as of 2016. Although Internet of Things (IoT) has not been applied widely in construction sites, it can build an operating system that feeds accurate and useful information to construction accident management for identifying potential accidents. In this context, this study proposes an IoT- and RTLS-based construction equipment safety accident prevention system, which can be useful for preventing and managing safety accidents caused by construction equipment. Future deployment of such system would contribute not only to the safety of workers but also to efficient equipment and manpower operation.

A Pre-Study on the Open Source Prometheus Monitoring System (오픈소스 Prometheus 모니터링 시스템의 사전연구)

  • An, Seong Yeol;Cha, Yoon Seok;Jeon, Eun Jin;Gwon, Gwi Yeong;Shin, Byeong Chun;Cha, Byeong Rae
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.110-118
    • /
    • 2021
  • The Internet of Things (IoT) technology, a key growth engine of the 4th industrial revolution, has grown to a stage where it can autonomously communicate with each other and process data according to space and circumstances. Accordingly, the IT infrastructure becomes increasingly complex and the importance of the monitoring field for maintaining the system stably is increasing. Monitoring technology has been used in the past, but there is a need to find a flexible monitoring system that can respond to the rapidly changing ICT technology. This paper conducts research on designing and testing an open source-based Prometheus monitoring system. We builds a simple infrastructure based on IoT devices and collects data about devices through the Exporter. Prometheus collects data based on pull and then integrates into one dashboard using Grafana and visualizes data to monitor device information.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

Policy Suggestions on Personal Data Utilization by Analyzing Domestic and International De-identification Policy (국내외 비식별화 현황 분석을 통한 개인정보 활용 정책 제언)

  • Kang, Hye-young;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.41-48
    • /
    • 2019
  • In the era of Internet of Things and Artificial Intelligence, it has become essential to digitize mass data, which leads 'data-driven economy'. Digitalized personal data can be easily collected, stored, duplicated and analyzed. As ICT technology is evolving the concept of traditional personal data has changed. The United States, the European Union, Japan, Korea and many countries have introduced new concept of personal data into law such as de-identification, anonymization, and pseudonymization to protect and utilize digitalized personal information. These concepts are distinguishable depending on countries. Therefore, this study will be done by researching and analyzing personal data related policies of several countries. Based on this study, this paper will suggest policy on di-identification to draw the right balance between personal data protection and use, which contributes to the development of digital economy.

Power Charge Scheduling and Charge-Ready Battery Allocation Algorithms for Real-Time Drones Services (실시간 드론 서비스를 위한 전원 충전 스케쥴링과 충전 배터리 할당 알고리즘)

  • Tajrian, Mehedi;Kim, Jai-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.277-286
    • /
    • 2019
  • The Unmanned Aerial Vehicle (UAV) is one of the most precious inventions of Internet of things (IOT). UAV faces the necessity to charge battery or replace battery from the charging stations during or between services. We propose scheduling algorithms for drone power charging (SADPC). The basic idea of algorithm is considering both a deadline (for increasing deadline miss ratio) and a charging time (for decreasing waiting time) to decide priority on charging station among drones. Our simulation results show that our power charging algorithm for drones are efficient in terms of the deadline miss ratio as well as the waiting time in general in compare to other conventional algorithms (EDF or SJF). Also, we can choose proper algorithms for battery charge scheduling and charge ready battery allocation according to system parameters and user requirements based on our simulation.

Security Improvement of User Authentication Protocol for Heterogeneous Wireless Sensor Networks for the Internet of Things Environment (Heterogeneous Wireless Sensor Networks 환경에서의 안전한 사용자 인증 프로토콜)

  • Lee, Young sook
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • Recently, the use of sensor devices is gradually increasing. As various sensor device emerge and the related technologies advance, there has been a dramatic increase in the interest in heterogeneous wireless sensor networks (WSNs). While sensor device provide us many valuable benefits, automatically and remotely supported services offered and accessed remotely through WSNs also exposes us to many different types of security threats. Most security threats were just related to information leakage and the loss of authentication among the involved parties: users, sensors and gateways. An user authentication protocol for wireless sensor networks is designed to restrict access to the sensor data only to user. In 2019, Chen et al. proposed an efficient user authentication protocol. However, Ryu et al. show that it's scheme still unstable and inefficient. It cannot resist offline password guessing attack and session key attack. In this paper, we propose an improved protocol to overcome these security weaknesses by storing secret data in device. In addition, security properties like session-key security, perfect forward secrecy, known-key security and resistance against offline password attacks are implied by our protocol.

Development of Log-Based Testing Framework for Unit Testing of Embedded Software (임베디드 소프트웨어의 단위 테스팅을 위한 로그 기반 테스팅 프레임워크 개발)

  • Ryu, Hodong;Jeong, Sooyong;Lee, Woo Jin;Kim, Hwangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.419-424
    • /
    • 2015
  • As Internet of Things (IoT) is recently serviced in several fields, the reliability and safety issues for IoT embedded systems are emerged. During the development of embedded systems, it is not easy to build the virtual execution environment and to test the developing version. Therefore, it is difficult to ensure its reliability due to lack of unit testing. In this paper, we propose a log-based unit testing framework for embedded software, which performs on real target board by extracting information of function execution. And, according to execution paths, duplicated logs are eliminated to keep a minimal log size. As a result, during system testing, testers can efficiently decide whether the executed paths of each function are correctly performed or not.

A Study on Measures to Reduce Traffic Accidents caused by Using Smartphones While Driving (운전 중 스마트폰 사용으로 인한 교통사고 저감대책 연구)

  • You, Seung-Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.175-184
    • /
    • 2016
  • The purpose of the study focuses on increasing dangers of using smartphones while driving recently, and then is to come up with measures to reduce traffic accidents caused by using devices like a smartphone. This study conducted a survey of drivers using their smartphones while driving to understand risks caused by using a smartphones while operating vehicles. Results showed that a lot of activities may lead to distracted driving, such as texting, making phone calls, using GPS or road maps, game, etc. In this paper, we presented that functions of smartphone should be controlled partially while driving for safe driving performance. These results suggest that using IoT-based smart devices like a beacon and a smartphone application implemented, tentatively called "Safe driving solution", while driving can reduce traffic accidents. Thus, in order to effectively prevent dangerous driving due to the use of smartphones, a "Safe driving solution" which restricts all functions except for calls and driver assistance functions is suggested.