• Title/Summary/Keyword: The Internet of Things

Search Result 2,746, Processing Time 0.03 seconds

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

Application of Responsive Identity Design in Sejong City: Focusing on Minimalism (세종특별자치시 반응형 아이덴티티 디자인 적용: 미니멀리즘을 중심으로)

  • Cha, Hyun-Ji
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.656-668
    • /
    • 2020
  • The Sejong City was launched in July 2012 and was initially focused on the relocation of central administrative agencies, but it has been changing from an administrative city to a fourth industrial city since 2019 to a smart city and the implementation of Korea's New Deal in 2020. Identity design needs to be reevaluated accordingly. In particular, the web environment is also calling for an optimized identity design due to rapid changes in information technology such as various wearables and the Internet of Things. As the number of responsive web sites where information and communication technologies can be developed and optimized screens can be viewed increased, identity was intuitively communicated to users and designs were applied to make them more distinct and empathetic to other cities. Prior to the study, we looked at prior studies on the changing times in the web environment and the reactive web, and analyzed the identity design of the reactive web and applied minimalism characteristics step by step. Based on this, we surveyed experts and non-experts on the proposed survey by applying minimalist characteristics (simple, repeatability, and spatiality) of reactive identity and found that it was easily and intuitively recognizable in a small web environment such as mobile. Therefore, we hope that Sejong City's identity will continue to be studied in various ways and efficient management so that identity can be established in accordance with the changes of the times.

A Web-based Monitoring of Electrical Energy Consumption and Data Analysis of Smart Farm Facilities (스마트팜 전기 사용에 대한 웹기반 실시간 모니터링 시스템 운영 및 전력사용량 분석)

  • Lee, Mu Yeol;Sim, Sojeong;Kim, Eun-jeong;Han, Young-Soo
    • Journal of Bio-Environment Control
    • /
    • v.31 no.4
    • /
    • pp.366-375
    • /
    • 2022
  • The monitoring of electricity consumption using Internet of Things (IoT) technology is attracting attention as a technology to reduce operation costs of smart farms. In this study, we propose a method to apply a real-time electrical consumption monitoring system (the e-Gauge system) and utilization of the collected data real-time while a melon-producing smart farm is in operation. For this purpose, the electrical consumption data for the individual smart-farm facilities such as boilers, nutrient distribution systems, automatic controllers, circulation fans, boiler controllers, and other IoT-related utilities were collected during three months of melon cultivation period. By using the monitoring results, the electrical energy consumption pattern was analyzed as an example, and necessary considerations needed to optimally utilize the measurement data were suggested. This paper will be useful in lowering the technological implementation barriers for new researchers to build a electrical consumption monitoring system and reducing trial and errors in the usage of the generated data.

Environmental Equity Analysis of Fine Dust in Daegu Using MGWR and KT Sensor Data (다중 스케일 지리가중회귀 모형과 KT 측정기 자료를 활용한 대구시 미세먼지에 대한 환경적 형평성 분석)

  • Euna CHO;Byong-Woon JUN
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.4
    • /
    • pp.218-236
    • /
    • 2023
  • This study attempted to analyze the environmental equity of fine dust(PM10) in Daegu using MGWR(Multi-scale Geographically Weighted Regression) and KT(Korea Telecom Corporation) sensor data. Existing national monitoring network data for measuring fine dust are collected at a small number of ground-based stations that are sparsely distributed in a large area. To complement these drawbacks, KT sensor data with a large number of IoT(Internet of Things) stations densely distributed were used in this study. The MGWR model was used to deal with spatial heterogeneity and multi-scale contextual effects in the spatial relationships between fine dust concentration and socioeconomic variables. Results indicate that there existed an environmental inequity by land value and foreigner ratio in the spatial distribution of fine dust in Daegu metropolitan city. Also, the MGWR model showed better the explanatory power than Ordinary Least Square(OLS) and Geographically Weighted Regression(GWR) models in explaining the spatial relationships between the concentration of fine dust and socioeconomic variables. This study demonstrated the potential of KT sensor data as a supplement to the existing national monitoring network data for measuring fine dust.

A study on the Revitalization of Traditional Market with Smart Platform (스마트 플랫폼을 이용한 전통시장 활성화 방안 연구)

  • Park, Jung Ho;Choi, EunYoung
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.127-143
    • /
    • 2023
  • Currently, the domestic traditional market has not escaped the swamp of stagnation that began in the early 2000s despite various projects promoted by many related players such as the central government and local governments. In order to overcome the crisis faced by the traditional market, various R&Ds have recently been conducted on how to build a smart traditional market that combines information and communication technologies such as big data analysis, artificial intelligence, and the Internet of Things. This study analyzes various previous studies, users of traditional markets, and application cases of ICT technology in foreign traditional markets since 2012 and proposes a model to build a smart traditional market using ICT technology based on the analysis. The model proposed in this study includes building a traditional market metaverse that can interact with visitors, certifying visits to traditional markets through digital signage with NFC technology, improving accuracy of fire detection functions using IoT and AI technology, developing smartphone apps for market launch information and event notification, and an e-commerce system. If a smart traditional market platform is implemented and operated based on the smart traditional market platform model presented in this study, it will not only draw interest in the traditional market to MZ generation and foreigners, but also contribute to revitalizing the traditional market in the future.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

Service Issues and Policy Directions for Promoting the O2O Industry in Korea (국내 O2O 서비스 이슈 진단 및 산업활성화 정책 방향 제안)

  • Kim, Dongsoo;Kim, Kwanho;Choe, Donguk;Jung, Jae-Yoon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.137-150
    • /
    • 2016
  • A variety of O2O (Online to Offline) services such as Uber, Airbnb, and KakaoTaxi that create new values by connecting offline and online have emerged in the world. O2O services support the convenience of online services and the real-life capability of offline services simultaneously. Thanks to the development of ICTs such as mobility, IoT (Internet of Things), Fin-tech, and big data technologies, the market size of O2O industry is growing very rapidly. This paper reviews various O2O services and industry trends in Korea. In addition, important issues on O2O services and industry promotion are reviewed and presented. Specifically, legislative issues regulating the O2O industry in Korea, interest conflicts between new O2O platform providers and existing traditional offline service providers, current technology infrastructures for O2O services, and negative or side effects of O2O services are reviewed and summarized. Finally, comprehensive policy directions are proposed based on these reviewed issues. It is expected that the proposed policy directions would be adopted by the government and this research could consequently contribute to strengthening the competitiveness of the O2O industry in Korea.

IoT data trust techniques based on auto-encoder through IoT-linked processing (오토인코더 기반의 IoT 연계 처리를 통한 IoT 데이터 신뢰 기법)

  • Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.351-357
    • /
    • 2021
  • IoT devices, which are used in various ways in distributed environments, are becoming more important in data transmitted and received from IoT devices as fields of use such as medical, environment, transportation, bio, and public places are diversified. In this paper, as a method to ensure the reliability of IoT data, an autoencoder-based IoT-linked processing technique is proposed to classify and process numerous data by various important attributes. The proposed technique uses correlation indices for each IoT data so that IoT data is grouped and processed by blockchain by characteristics for IoT linkage processing based on autoencoder. The proposed technique expands and operates into a blockchain-based n-layer structure applied to the correlation index to ensure the reliability of IoT data. In addition, the proposed technique can not only select IoT data by applying weights to IoT collection data according to the correlation index of IoT data, but also reduce the cost of verifying the integrity of IoT data in real time. The proposed technique maintains the processing cost of IoT data so that IoT data can be expanded to an n-layer structure.

A Study on the Improvement Scheme of University's Software Education

  • Lee, Won Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.243-250
    • /
    • 2020
  • In this paper, we propose an effective software education scheme for universities. The key idea of this software education scheme is to analyze software curriculum of QS world university rankings Top 10, SW-oriented university, and regional main national university. And based on the results, we propose five improvements for the effective SW education method of universities. The first is to enhance the adaptability of the industry by developing courses based on the SW developer's job analysis in the curriculum development process. Second, it is necessary to strengthen the curriculum of the 4th industrial revolution core technologies(cloud computing, big data, virtual/augmented reality, Internet of things, etc.) and integrate them with various fields such as medical, bio, sensor, human, and cognitive science. Third, programming language education should be included in software convergence course after basic syntax education to implement projects in various fields. In addition, the curriculum for developing system programming developers and back-end developers should be strengthened rather than application program developers. Fourth, it offers opportunities to participate in industrial projects by reinforcing courses such as capstone design and comprehensive design, which enables product-based self-directed learning. Fifth, it is necessary to develop university-specific curriculum based on local industry by reinforcing internship or industry-academic program that can acquire skills in local industry field.