• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.027 seconds

Development of an oneM2M-compliant IoT Platform for Wearable Data Collection

  • Ahn, Il Yeup;Sung, Nak-Myoung;Lim, Jae-Hyun;Seo, Jeongwook;Yun, Il Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.1-15
    • /
    • 2019
  • Internet of Things (IoT) is commonly referred to as a future internet technology to provide advanced services by interconnecting physical and virtual things, collecting and using many data from them. The IoT platform is a server platform with a common architecture to collect and share the data independent of the IoT devices and services. Recently, oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT announced the availability of oneM2M Release 2 specifications. Accordingly, this paper presents a new oneM2M-compliant IoT platform called Mobius 2.0 and proposes its application to collect the biosignal data from wearable IoT devices for emotion recognition. Experimental results show that we can collect various biosignal data seamlessly and extract meaningful features from the biosignal data to recognize two emotions of joy and sadness.

Sequential fusion to defend against sensing data falsification attack for cognitive Internet of Things

  • Wu, Jun;Wang, Cong;Yu, Yue;Song, Tiecheng;Hu, Jing
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.976-986
    • /
    • 2020
  • Internet of Things (IoT) is considered the future network to support wireless communications. To realize an IoT network, sufficient spectrum should be allocated for the rapidly increasing IoT devices. Through cognitive radio, unlicensed IoT devices exploit cooperative spectrum sensing (CSS) to opportunistically access a licensed spectrum without causing harmful interference to licensed primary users (PUs), thereby effectively improving the spectrum utilization. However, an open access cognitive IoT allows abnormal IoT devices to undermine the CSS process. Herein, we first establish a hard-combining attack model according to the malicious behavior of falsifying sensing data. Subsequently, we propose a weighted sequential hypothesis test (WSHT) to increase the PU detection accuracy and decrease the sampling number, which comprises the data transmission status-trust evaluation mechanism, sensing data availability, and sequential hypothesis test. Finally, simulation results show that when various attacks are encountered, the requirements of the WSHT are less than those of the conventional WSHT for a better detection performance.

Global Manager - A Service Broker In An Integrated Cloud Computing, Edge Computing & IoT Environment

  • Selvaraj, Kailash;Mukherjee, Saswati
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1913-1934
    • /
    • 2022
  • The emergence of technologies like Big data analytics, Industrial Internet of Things, Internet of Things, and applicability of these technologies in various domains leads to increased demand in the underlying execution environment. The demand may be for compute, storage, and network resources. These demands cannot be effectively catered by the conventional cloud environment, which requires an integrated environment. The task of finding an appropriate service provider is tedious for a service consumer as the number of service providers drastically increases and the services provided are heterogeneous in the specification. A service broker is essential to find the service provider for varying service consumer requests. Also, the service broker should be smart enough to make the service providers best fit for consumer requests, ensuring that both service consumer and provider are mutually beneficial. A service broker in an integrated environment named Global Manager is proposed in the paper, which can find an appropriate service provider for every varying service consumer request. The proposed Global Manager is capable of identification of parameters for service negotiation with the service providers thereby making the providers the best fit to the maximum possible extent for every consumer request. The paper describes the architecture of the proposed Global Manager, workflow through the proposed algorithms followed by the pilot implementation with sample datasets retrieved from literature and synthetic data. The experimental results are presented with a few of the future work to be carried out to make the Manager more sustainable and serviceable.

The Impact of the Internet Channel Introduction Depending on the Ownership of the Internet Channel (도입주체에 따른 인터넷경로의 도입효과)

  • Yoo, Weon-Sang
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.1
    • /
    • pp.37-46
    • /
    • 2009
  • The Census Bureau of the Department of Commerce announced in May 2008 that U.S. retail e-commerce sales for 2006 reached $ 107 billion, up from $ 87 billion in 2005 - an increase of 22 percent. From 2001 to 2006, retail e-sales increased at an average annual growth rate of 25.4 percent. The explosive growth of E-Commerce has caused profound changes in marketing channel relationships and structures in many industries. Despite the great potential implications for both academicians and practitioners, there still exists a great deal of uncertainty about the impact of the Internet channel introduction on distribution channel management. The purpose of this study is to investigate how the ownership of the new Internet channel affects the existing channel members and consumers. To explore the above research questions, this study conducts well-controlled mathematical experiments to isolate the impact of the Internet channel by comparing before and after the Internet channel entry. The model consists of a monopolist manufacturer selling its product through a channel system including one independent physical store before the entry of an Internet store. The addition of the Internet store to this channel system results in a mixed channel comprised of two different types of channels. The new Internet store can be launched by the independent physical store such as Bestbuy. In this case, the physical retailer coordinates the two types of stores to maximize the joint profits from the two stores. The Internet store also can be introduced by an independent Internet retailer such as Amazon. In this case, a retail level competition occurs between the two types of stores. Although the manufacturer sells only one product, consumers view each product-outlet pair as a unique offering. Thus, the introduction of the Internet channel provides two product offerings for consumers. The channel structures analyzed in this study are illustrated in Fig.1. It is assumed that the manufacturer plays as a Stackelberg leader maximizing its own profits with the foresight of the independent retailer's optimal responses as typically assumed in previous analytical channel studies. As a Stackelberg follower, the independent physical retailer or independent Internet retailer maximizes its own profits, conditional on the manufacturer's wholesale price. The price competition between two the independent retailers is assumed to be a Bertrand Nash game. For simplicity, the marginal cost is set at zero, as typically assumed in this type of study. In order to explore the research questions above, this study develops a game theoretic model that possesses the following three key characteristics. First, the model explicitly captures the fact that an Internet channel and a physical store exist in two independent dimensions (one in physical space and the other in cyber space). This enables this model to demonstrate that the effect of adding an Internet store is different from that of adding another physical store. Second, the model reflects the fact that consumers are heterogeneous in their preferences for using a physical store and for using an Internet channel. Third, the model captures the vertical strategic interactions between an upstream manufacturer and a downstream retailer, making it possible to analyze the channel structure issues discussed in this paper. Although numerous previous models capture this vertical dimension of marketing channels, none simultaneously incorporates the three characteristics reflected in this model. The analysis results are summarized in Table 1. When the new Internet channel is introduced by the existing physical retailer and the retailer coordinates both types of stores to maximize the joint profits from the both stores, retail prices increase due to a combination of the coordination of the retail prices and the wider market coverage. The quantity sold does not significantly increase despite the wider market coverage, because the excessively high retail prices alleviate the market coverage effect to a degree. Interestingly, the coordinated total retail profits are lower than the combined retail profits of two competing independent retailers. This implies that when a physical retailer opens an Internet channel, the retailers could be better off managing the two channels separately rather than coordinating them, unless they have the foresight of the manufacturer's pricing behavior. It is also found that the introduction of an Internet channel affects the power balance of the channel. The retail competition is strong when an independent Internet store joins a channel with an independent physical retailer. This implies that each retailer in this structure has weak channel power. Due to intense retail competition, the manufacturer uses its channel power to increase its wholesale price to extract more profits from the total channel profit. However, the retailers cannot increase retail prices accordingly because of the intense retail level competition, leading to lower channel power. In this case, consumer welfare increases due to the wider market coverage and lower retail prices caused by the retail competition. The model employed for this study is not designed to capture all the characteristics of the Internet channel. The theoretical model in this study can also be applied for any stores that are not geographically constrained such as TV home shopping or catalog sales via mail. The reasons the model in this study is names as "Internet" are as follows: first, the most representative example of the stores that are not geographically constrained is the Internet. Second, catalog sales usually determine the target markets using the pre-specified mailing lists. In this aspect, the model used in this study is closer to the Internet than catalog sales. However, it would be a desirable future research direction to mathematically and theoretically distinguish the core differences among the stores that are not geographically constrained. The model is simplified by a set of assumptions to obtain mathematical traceability. First, this study assumes the price is the only strategic tool for competition. In the real world, however, various marketing variables can be used for competition. Therefore, a more realistic model can be designed if a model incorporates other various marketing variables such as service levels or operation costs. Second, this study assumes the market with one monopoly manufacturer. Therefore, the results from this study should be carefully interpreted considering this limitation. Future research could extend this limitation by introducing manufacturer level competition. Finally, some of the results are drawn from the assumption that the monopoly manufacturer is the Stackelberg leader. Although this is a standard assumption among game theoretic studies of this kind, we could gain deeper understanding and generalize our findings beyond this assumption if the model is analyzed by different game rules.

  • PDF

Implementation of a QoS routing path control based on KREONET OpenFlow Network Test-bed (KREONET OpenFlow 네트워크 테스트베드 기반의 QoS 라우팅 경로 제어 구현)

  • Kim, Seung-Ju;Min, Seok-Hong;Kim, Byung-Chul;Lee, Jae-Yong;Hong, Won-Taek
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.9
    • /
    • pp.35-46
    • /
    • 2011
  • Future Internet should support more efficient mobility management, flexible traffic engineering and various emerging new services. So, lots of traffic engineering techniques have been suggested and developed, but it's impossible to apply them on the current running commercial Internet. To overcome this problem, OpenFlow protocol was proposed as a technique to control network equipments using network controller with various networking applications. It is a software defined network, so researchers can verify their own traffic engineering techniques by applying them on the controller. In addition, for high-speed packet processing in the OpenFlow network, programmable NetFPGA card with four 1G-interfaces and commercial Procurve OpenFlow switches can be used. In this paper, we implement an OpenFlow test-bed using hardware-accelerated NetFPGA cards and Procurve switches on the KREONET, and implement CSPF (Constraint-based Shortest Path First) algorithm, which is one of popular QoS routing algorithms, and apply it on the large-scale testbed to verify performance and efficiency of multimedia traffic engineering scheme in Future Internet.

Renewable Iris Authentication Algorithm in Mobile System

  • Lee Kwang Je;Lee Soon Seok;Kim Sin Hong;Cho Do Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.592-595
    • /
    • 2004
  • Recently the numbers of patent about the technology for mobile payment with Ie or bluetooth-chip are being increased more and more. The reasons of patent increment for mobile payment are advancement of wireless internet technology and rising of customer's request for it. The customer wants to be able to pay for purchase, tax and aid with own mobile phone. So every mobile service provider applies for patents about that competitively. And in the near future the biometrics is generalized in the mobile payment system. Especially the payment service of iris recognition is significant technique in this area for the future prospect. The biometrics of iris is an accurate authentication method because it has about 250 distinguish parameters to the finger print's 30. The biometrics of iris can recognize and identify a person for 2 seconds. But the image of iris is changed by transformation of body in the life. And the existing iris authentication system has problem that can be miss-recognized. In this paper, we propose the new method that reduces miss-recognizing rate with Renewable Iris Authentication Algorithm(RIAA) in mobile system.

  • PDF

A Study on the use factor of the Cyber Home Learning Service (학습자의 사이버 가정학습 사용 요인에 관한 분석 연구)

  • Heo, Gyun
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.159-167
    • /
    • 2008
  • The purpose of this study is finding factors affecting the students' use of the Cyber Home Learning Service System and exploring the direction of this system. It is based on the TAM(Technology Acceptance Model) and the result of the previous studies, six external and three internal factors influencing the sue of Cyber Home Learning Service System were extracted. The participants were 201 elementary school students in Pusan. The response of the questionnaire was gathered by online survey system. To analyze the data and the hypothesis, multiple regression and factor analysis were explored. The result indicated that (a) "usefulness" and "future-intention" affected statically to the use, (b) "usefulness" to the future-intention, (c) "subjective judgement", "fun", and "ease of use" to the usefulness, (d) "self-efficiency" and "contents quality" to the ease of use.

  • PDF

A Review of Intelligent Self-Driving Vehicle Software Research

  • Gwak, Jeonghwan;Jung, Juho;Oh, RyumDuck;Park, Manbok;Rakhimov, Mukhammad Abdu Kayumbek;Ahn, Junho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5299-5320
    • /
    • 2019
  • Interest in self-driving vehicle research has been rapidly increasing, and related research has been continuously conducted. In such a fast-paced self-driving vehicle research area, the development of advanced technology for better convenience safety, and efficiency in road and transportation systems is expected. Here, we investigate research in self-driving vehicles and analyze the main technologies of driverless car software, including: technical aspects of autonomous vehicles, traffic infrastructure and its communications, research techniques with vision recognition, deep leaning algorithms, localization methods, existing problems, and future development directions. First, we introduce intelligent self-driving car and road infrastructure algorithms such as machine learning, image processing methods, and localizations. Second, we examine the intelligent technologies used in self-driving car projects, autonomous vehicles equipped with multiple sensors, and interactions with transport infrastructure. Finally, we highlight the future direction and challenges of self-driving vehicle transportation systems.

The Future Direction of Information Literacy for the Aged in the Lifelong Learning : Centering on Gumi Senior Welfare Center (평생교육으로서 노인정보화 교육의 발전 방향 : 구미시 노인종합복지회관의 정보화교육을 중심으로)

  • Kim, Hwa Suk;Kim, Jin Wook;Chung, Kwang Sik
    • Journal of Digital Contents Society
    • /
    • v.15 no.4
    • /
    • pp.491-500
    • /
    • 2014
  • The Internet is being used in daily life, information literacy for the aged is become necessary. For the aged, they can communicate with different age groups and can improve their lives as a component of the society through information literacy. In this paper, we first analyze the computer class of Gumi Senior Welfare Center of Gyeongsangbuk-Do and then present the questionnaire including their needs for education and their changes after receiving information literacy. We also give the future direction of information literacy for the aged. The results of this paper will be useful to improve the lives of the local aged.

Short Term Spectrum Trading in Future LTE Based Cognitive Radio Systems

  • Singh, Hiran Kumar;Kumar, Dhananjay;Srilakshmi, R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.34-49
    • /
    • 2015
  • Market means of spectrum trading have been utilized as a vital method of spectrum sharing and access in future cognitive radio system. In this paper, we consider the spectrum trading with multiple primary carrier providers (PCP) leasing the spectrum to multiple secondary carrier providers (SCP) for a short period of time. Several factors including the price of the resource, duration of leasing, and the spectrum quality guides the proposed model. We formulate three trading policies based on the game theory for dynamic spectrum access in a LTE based cognitive radio system (CRS). In the first, we consider utility function based resource sharing (UFRS) without any knowledge of past transaction. In the second policy, each SCP deals with PCP using a non-cooperative resource sharing (NCRS) method which employs optimal strategy based on reinforcement learning. In variation of second policy, third policy adopts a Nash bargaining while incorporating a recommendation entity in resource sharing (RERS). The simulation results suggest overall increase in throughput while maintaining higher spectrum efficiency and fairness.