• Title/Summary/Keyword: 사물인터넷 기술

Search Result 1,394, Processing Time 0.04 seconds

Secret Key-Dimensional Distribution Mechanism Using Deep Learning to Minimize IoT Communication Noise Based on MIMO (MIMO 기반의 IoT 통신 잡음을 최소화하기 위해서 딥러닝을 활용한 비밀키 차원 분배 메커니즘)

  • Cho, Sung-Nam;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.23-29
    • /
    • 2020
  • As IoT devices increase exponentially, minimizing MIMO interference and increasing transmission capacity for sending and receiving IoT information through multiple antennas remain the biggest issues. In this paper, secret key-level distribution mechanism using deep learning is proposed to minimize MIMO-based IoT communication noise. The proposed mechanism minimizes resource loss during transmission and reception process by dispersing IoT information sent and received through multiple antennas in batches using deep learning. In addition, the proposed mechanism applied a multidimensional key distribution processing process to maximize capacity through multiple antenna multiple stream transmission at base stations without direct interference between the APs. In addition, the proposed mechanism synchronizes IoT information by deep learning the frequency of use of secret keys according to the number of IoT information by applying the method of distributing secret keys in dimension according to the number of frequency channels of IoT information in order to make the most of the multiple antenna technology.

An analysis on the influence of the China government's software support policy on the revenue of software export (중국 소프트웨어 지원정책이 중국 소프트웨어 수출액에 미치는 영향 분석)

  • Choi, JeongHo;Zhang, YongAn
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.4
    • /
    • pp.875-886
    • /
    • 2016
  • In this study, we investigate an influence of the China government's software support policy on the revenue of software export. In the analysis in the areas of technology development, manpower development, quality control and marketing reinforcement from 2008 to 2014, it has been found that the amounts of the policy influence and annual revenue of software export increase simultaneously, proving that the China government's support policy has a close relationship with the software export revenue. However, the annual ratio of the software export revenue to the gross software production revenue has decreased over the period, which indicates that the growth of software industry in China has been mainly driven by domestic market.

Efficient ID-Based Authentication and Key Exchange Protocol (효율적인 ID 기반 인증 및 키 교환 프로토콜)

  • Eom, Jieun;Seo, Minhye;Park, Jong Hwan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1387-1399
    • /
    • 2016
  • In a hyper-connected society realized through IoT-enabled technology, a large amount of data is collected by various devices and is processed to provide new services to users. While communicating through a network, it is essential for devices to execute mutual authentication since users' privacy can be infringed by malicious attackers. ID-based signature enables authentication and key exchange with a unique ID of a device. However, most of the previous ID-based signature schemes based on RSA require an additional step to share parameters for key exchange so that they are not suitable for resource-constrained devices in terms of efficiency. In this paper, we design an efficient ID-based signature and thereby propose an efficient ID-based authentication and key exchange protocol in which sessions for both an authentication and a key exchange are executed simultaneously. In addition, we prove the security of our scheme under the RSA onewayness problem and analyze the efficiency by comparing with the previous schemes.

Design of Algorithms for Unnecessary Sensor Barrier in IoT Environment (IoT 환경에서 불필요한 센서 차단 알고리즘 설계)

  • Lim, Hyeok;Shin, Yun-Ho;Yu, Dong-Gyun;Ryu, Seung-Han;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.607-608
    • /
    • 2016
  • Recently using a variety of sensors sensing the virtual(Virtual Sensing) technology that extracts specific data has been applied to IoT service interface. The utilization of such sensors while increasing IoT (Internet of Things) environmental sensor is an essential element. However, used in the IoT to the environment, while the increase in utilization of a specific sensor utilization falling sensors is generated. In this paper, we design unnecessary sensors removal algorithm as a way to solve this problem. Through the utilization of poor power to block the sensor can reduce the power consumption and user sensor control service through the monitoring by blocking the use of the sensor is considered that there can be provided a more effective and convenient.

  • PDF

De-identification Techniques for Big Data and Issues (빅데이타 비식별화 기술과 이슈)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.750-753
    • /
    • 2017
  • Recently, the processing and utilization of big data, which is generated by the spread of smartphone, SNS, and the internet of things, is emerging as a new growth engine of ICT field. However, in order to utilize such big data, De-identification of personal information should be done. De-identification removes identifying information from a data set so that individual data cannot be linked with specific individuals. De-identification can reduce the privacy risk associated with collecting, processing, archiving, distributing or publishing information, thus it attempts to balance the contradictory goals of using and sharing personal information while protecting privacy. De-identified information has also been re-identified and has been controversial for the protection of personal information, but the number of instances where personal information such as big data is de-identified and processed is increasing. In addition, many de-identification guidelines have been introduced and a method for de-identification of personal information has been proposed. Therefore, in this study, we describe the big data de-identification process and follow-up management, and then compare and analyze de-identification methods. Finally we provide personal information protection issues and solutions.

  • PDF

A Study on the Platform for Big Data Analysis of Manufacturing Process (제조 공정 빅데이터 분석을 위한 플랫폼 연구)

  • Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.177-182
    • /
    • 2017
  • As major ICT technologies such as IoT, cloud computing, and Big Data are being applied to manufacturing, smart factories are beginning to be built. The key of smart factory implementation is the ability to acquire and analyze data of the factory. Therefore, the need for a big data analysis platform is increasing. The purpose of this study is to construct a platform for big data analysis of manufacturing process and propose integrated method for analysis. The proposed platform is a RHadoop-based structure that integrates analysis tool R and Hadoop to distribute a large amount of datasets. It can store and analyze big data collected in the unit process and factory in the automation system directly in HBase, and it has overcome the limitations of RDB - based analysis. Such a platform should be developed in consideration of the unit process suitability for smart factories, and it is expected to be a guide to building IoT platforms for SMEs that intend to introduce smart factories into the manufacturing process.

The Design of IoT Device System for Disaster Prevention using Sound Source Detection and Location Estimation Algorithm (음원탐지 및 위치 추정 알고리즘을 이용한 방재용 IoT 디바이스 시스템 설계)

  • Ghil, Min-Sik;Kwak, Dong-Kurl
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.53-59
    • /
    • 2020
  • This paper relates to an IoT device system that detects sound source and estimates the sound source location. More specifically, it is a system using a sound source direction detection device that can accurately detect the direction of a sound source by analyzing the difference of arrival time of a sound source signal collected from microphone sensors, and track the generation direction of a sound source using an IoT sensor. As a result of a performance test by generating a sound source, it was confirmed that it operates very accurately within 140dB of the acoustic detection area, within 1 second of response time, and within 1° of directional angle resolution. In the future, based on this design plan, we plan to commercialize it by improving the reliability by reflecting the artificial intelligence algorithm through big data analysis.

Medical Information Management Scheme of Healthcare Service Patient through 2-way Access Control (2-way 접근제어를 통한 헬스케어 서비스 환자의 의료 정보 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.185-191
    • /
    • 2016
  • Recently, various medical services are provided with the advance of IT. However, there is a problem that a third party would exploit medical information when the information is sent and received through wired or wireless connection. In this paper, a patient information management scheme using group index information for the third party not to illegally exploit a patient's medical information without his consent is proposed. This proposed scheme creates index information in each hierarchical level to be used with access information so that not only medical staff can have access to patient's medical information hierarchically but also it can manage access level in groups. The scheme aims to enable the medical staff to minimize the time spent to analyze the type of disease and to prescribe for it so that they can improve patients' satisfaction. Plus, the scheme aims to improve work efficiency by minimizing the medical staff's workload according to the authority to access patients' medical information.

Methods to Propel Tourism of Yeosu City Using Big Data (빅데이터를 활용한 여수관광 활성화 방안)

  • Lim, Yang-Ui;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.739-746
    • /
    • 2020
  • The fourth industrial revolution introduced at world economic forum in 2016 has had huge effects on tourism industries as well as the change of core technologies in ICT such as big data, IoT, etc, This paper proposes the methods to propel tourism of Yoesu city through big data analysis and questionnaires. Sensitive words and positive-negative trend are extracted by Social Metrics and the keywords for Yeosu tour trends are extracted and analyzed by Naver datalab, and the results are visualized by R language. And frequency, difference, factor, covariance and regression analysis in SPSS are executed for the questionnaires for 493 visitors who traveled in Yeosu city. Sentiment analysis for Yeosu tour and maritime cable car shows that positive effect is much more than negative one. The analyses for questionnaires in SPSS show that Yeosu area is statistically significant to tour satisfaction index and tour revitalization for Yeosu, and favorite sightseeing places and searching electronic devices for age groups are different. The sightseeing places such as a maritime park with soft contents that give joyfulness and healing to tourists are highly attracted in both the big data and questionnaires analysis.

RFID Tag Ownership Relocation Protocol Based on Trusted Third Party (신뢰받는 제3자 기반의 RFID 태그 소유권 이전 프로토콜)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.568-574
    • /
    • 2015
  • Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu's protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.