Browse > Article
http://dx.doi.org/10.14400/JDC.2017.15.5.235

A Study on LED Energy Efficiency in Buildings through Cloud-based User Authentication in IoT Network Environment  

Ahn, Ye-Chan (Dept. of Information and Communication, Baekseok University)
Lee, Keun-Ho (Dept. of Information and Communication, Baekseok University)
Publication Information
Journal of Digital Convergence / v.15, no.5, 2017 , pp. 235-240 More about this Journal
Abstract
Recently, Internet of things have been applied to various fields and are becoming common in our everyday life. Everything in our daily lives is networked, interacting with each other and giving us more useful effects. In this paper, we implemented an algorithm that can illuminate the LED lighting to the authorized person 's place in the network environment connected with the authentication device only once with the user authentication. User authentication in one building User authenticated through a single user search for the location of the user's lab stored in the database using the certified information and LED lights up to the lab where the user works. Through this, unnecessary energy is generated because people do not pass frequently.
Keywords
IoT; Authentication; Cloud; Energy; Efficiency;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Gartner, "Gartner identifies the top 10 strategic technologies for 2011," http://www.gartner.com, 2010.
2 Y. J. Jang, "Technology trend of Smart-home Security System ," Vol. 30, No. 30, pp. 117-138, 2012.
3 P. Viola, M. Jones, "Rapid Object Detection using a Boosted Cascade of Simple Feature," Proceedings of the IEEE Conf. Computer Vsion and Pattern Recognition,, Kauai, HI, pp. 511-518, 2001.
4 Y. G. Bae, “A study on the Smart Home focused on the change of Housing Space,” Korea International Society for Space Design, Vol. 3, No. 2, pp. 49-59, 2008.
5 Min-Shiang Hwang, Li-Hua Li, "A New Remote User Authentication Scheme Using Smart Cards".
6 J. J. Lee, K. T. Kim, H. Y. Yun, “Design and Implementation of Context-aware Inference Framework for IoT Smart Home Environment ,” Korea Computer Information Society, Vol. 23, No. 1, pp. 247-250, 2015.
7 Li-Hua Li, Juon-Chang Lin, Min-Shiang Hwang, "A Remote Password Authentication Scheme for Multiserver Architecture Using Neural Networks," IEEE TRANSACTIONS ON NEURAL NETWORKS, Vol. 12, No. 6, pp. 1498-1504. 2001.   DOI
8 Leslie Lamport, "Password Authentication with Insecure Communication," Communication of the ACM, Vol. 24, No. 11, pp. 770-720. 1981.   DOI
9 "Communication technology for wireless sensor network-based IoT," Korea Communication Agency, Broadcasting Technology Issue & Outlook, Vol. 37, 2014.
10 Anul K. Jain, Lin Hong, Sharath Pankanti, Ruud Bolle, "An Identity-Authentication System Using Fingerprints," PROCEEDINGS OF THE IEEE, Vol. 85, No. 9, pp 1365-1388. 1997.   DOI
11 Y. C. Park, Thang Le Duc, S. G. Jung, S. G. Yeoum, M. H. Son, H. S. Choo, "Gateway and application for connection of IoT and WSNs," Korea Information Science Society, pp. 531-532, 2015.
12 J. H. Kim, D. B. Park, H. Y. Song, “Network Coding-Based Information Sharing Strategy for Reducing Energy Consumption in IoT Environments,” The Journal of Korean Institute of Communications and Information Sciences, Vol. 41, No. 4, pp. 433-440, 2016.   DOI
13 Robison S., A Bright "Future in the Cloud" Financial Times, March 4, 2008.
14 Fu-yi group to talk about cloud computing pan development path, in November, 2008.
15 J. S. Park, Y. M. Bae, S. J. Jung, “Technical analysis of Cloud Storage for Cloud Computing,” Journal of the Korea Institute of Information and Communication Engineering, Vol. 17, No. 5, pp. 1129-1137, 2013.   DOI