• Title/Summary/Keyword: 사물인터넷 기술

Search Result 1,385, Processing Time 0.035 seconds

A Study on Security Vulnerability Management in Electric Power Industry IoT (전력 산업 IoT에서의 보안 취약점 관리에 관한 연구)

  • Lee, Sang-Gi;Lee, Sei-Yoon;Kim, Jeong-Chul
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.499-507
    • /
    • 2016
  • The era of IoT, which figures exchanging data from the internet between things is coming. Recently, former electric power energy policy paradigm, namely Supply side paradigm, is changing, because electric power energy consumption is rapidly increasing. As new paradigm for this limit, convergence of existing electric power grid and ICT(Information and Communication Technology) will accelerate intellectualization of electric power device, its operation system. This change brought opened electric power grid. Consequently, attacks to the national electric power grid are increasing. On this paper, we will analyze security threats of existing IoT, discuss security weakness on electric power industry IoT and suggest needed security requirements, security technology.

A Study on Data Management of Internet of Things (사물인터넷 데이터 관리에 관한 연구)

  • Xu, Chen-lin;Lee, Hyun Chang;Shin, Seong Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.208-210
    • /
    • 2014
  • IOT(Internet of Things) through Radio Frequency Identification (RFID), Wireless Sensors, Global Positioning Systems, Laser Scanners and other information sensing device, according to the agreed protocol keep anything connected to the Internet for information exchange and communication. It's a network what in order to achieve intelligent identify, locate, track, monitor and manage. With the development of IOT technology, data growth will explode once again on the existing basis, which gives data management enormous challenges. This paper described characteristics of data in IOT and analysis existing data management technologies, then proposed a data management framework to conduct the research on the data management of IOT.

  • PDF

Smart Fusion Agriculture based on Internet of Thing (사물 인터넷 기반의 농업 융·복합 연구)

  • Chae, Cheol-Joo;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.49-54
    • /
    • 2016
  • The IoT has attracted attention as one of the technologies that are applied to various industries and create new services. The IoT can utilize existing network technologies to create services by providing Internet connection between objects. Objects Personalized services can be created by collecting various data using the IoT. In the field of agriculture, we are promoting sustainable agriculture and enhancing competitiveness through the use of the IoT, and the convergence of IoT in agriculture is pushing for smart agriculture. In Korea, the Ministry of Agriculture, Food and Rural Affairs is preparing measures to spread smart farms to improve agricultural competitiveness using IoT technology. Therefore, we propose the development model of smart agriculture in the future through the case study on the IoT based on agriculture.

A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation (사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용)

  • Han, Seul Ki;Kim, Myuhng Joo
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • As the demand for Internet of Things(IoT) increases, the need for the security of IoT devices is increasing steadily. It is difficult to apply the conventional security theory to IoT devices because IoT devices are subject to be constrained by some factors such as hardware, processor, and energy. Nowadays we have several security guidelines and related documents on IoT device. Most of them, however, do not consider the characteristics of specific IoT devices. Since they describes the security issues comprehensively, it is not easy to explain the specific security level reflecting each characteristics of IoT devices. In addition, most existing guidelines and related documents are described in view of developers and service proposers, and thus ordinary users are not able to assess whether a specific IoT device can protect their information securely or not. We propose an security evaluation model, based on the existing guidelines and related documents, for more specific IoT devices and prove that this approach is more convenient to ordinary users by creating checklists for the smart watch.

  • PDF

Privacy Protection Technologies on IoT Environments (사물인터넷(IoT) 환경에서 프라이버시 보호 기술에 관한 연구)

  • Lee, Hyunkyoung;Kim, Mihui
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.648-651
    • /
    • 2015
  • 모든 사물간의 통신이 이루어지는 사물인터넷(Internet of Things; IoT)의 발전은 빠른 속도로 발전하고 있고, 다양한 기술과 플랫폼이 발전하고 있다. 앞으로의 발전 과정에서 IoT 보안에 관한 기술의 발전은 특히 더욱 중요시 될 것으로 예상된다. 본 논문에서는 IoT 환경에서의 프라이버시 보안 위협들에 대해 기술하고, 이 기술들의 실제 사례를 통해 비교하며 대응방안에 대해 기술한다.

A Study on Internet of Things based on Semantic for Library (도서관의 시맨틱 기반 사물인터넷(IoT) 적용에 관한 연구)

  • Jung, Min-Kyung;Kwon, Sun-Young
    • Journal of Korean Library and Information Science Society
    • /
    • v.45 no.2
    • /
    • pp.235-260
    • /
    • 2014
  • This study aims to apply the concept of Internet of things to library and interpret a library as ecological space where human, thing and data are communicating and organically networking through internet. First, we defined various things existing in physical spaces of the real world and internet spaces as elements of Internet of Things. Then we proposed to apply a semantic web platform to integrate different meta-data formats and communication protocols from things. Finally, we provide the model of Internet of Things based on Semantic web to utilize a variety of information from things for library management and user service.

Design of an Intrusion Detection and Self-treatment System for IoT (사물인터넷을 위한 침입탐지 및 자가 치료 시스템의 설계)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.9-15
    • /
    • 2018
  • With the advent of the 5G communication era recently, advancement of the convergence technologies related to IoT has been progressed rapidly. IoT convergence technologies using various sensors are actively applied many fields in our lives, and it contributes to the popularization of these convergence technologies among many people successfully. The security problem of the IoT which connects many things on the network is critically vulnerable and is one of the most important challenge to be solved urgently. In this paper, we design an intrusion detection and self-treatment system for IoT, which can detect external attacks and anomalies in order to solve the security problems in IoT, perform self-treatment by operating the vaccine program according to the intrusion type whenever it detects certain intrusion. Furthermore, we consider the broadcasting of intrusion alarm message according to the frequency of similar circumstances in order to block intrusion contagious in IoT.

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

A study on the Techniques Trends and Prospects for Internet of Things (사물 인터넷의 기술 동향과 전망에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.65-73
    • /
    • 2014
  • Recently, the Internet of things has become issue as the new techniques the cloud computing and the grid computing etc. The Internet of Things is can grow even more that utilization of the range with the development of smart devices. and it has a lot of interest in several industries. In these circumstances, By analyzing the technologies and trends in the Internet of Things, I think you are ready to adapt to future IT field when needed. therefore, this paper are analyzed a various technologies and a case studies of the Internet of things, and it is expected to be used as the road map and material to build environment of the Internet of things in the future.