• Title/Summary/Keyword: 사물인터넷 네트워크

Search Result 595, Processing Time 0.026 seconds

사물인터넷 기반의 비즈니스 어프로치

  • Kim, Hakyong
    • Review of KIISC
    • /
    • v.25 no.2
    • /
    • pp.5-11
    • /
    • 2015
  • 최근 수 년 사이에 사물인터넷(Internet of Things)에 대한 학계 및 산업계의 관심이 높다. 그러나, 아직까지 사물인터넷 기반의 제품이나 서비스 혹은 관련 기술에 대한 깊이 있는 연구 결과를 찾는 것은 쉬운 일이 아니다. 사물인터넷이 새로운 기술을 의미하기 보다는 기존에 연구 개발된 기술들을 바탕으로 다양한 디바이스들을 유기적으로 연결함으로써 새로운 가치나 서비스를 만들어내는 개념이기 때문이다. 문제는 이처럼 새로운 가치나 서비스를 만드는 과정이 산업계 종사자들에게조차 친숙한 것이 아니며, 그러다 보니 그러한 과정에서 발생하는 기술적이고 학술적인 부분들에 대해서도 체계적으로 연구되지 못하고 있다는 것이다. 따라서, 본 논문에서는 사물인터넷 기반의 비즈니스 어프로치를 6 가지 측면에서 제안함으로써 사물인터넷 시장의 활성화와 그에 따른 관련 기술 및 학술적 연구의 단초를 제공하고자 한다. 6 가지 비즈니스 어프로치는 다음과 같다. (1) 애프터마켓형 제품을 출시하라. (2) 네트워크 효과를 이용하라. (3) 새로운 기능을 제공하기 보다는 구체적인 혜택을 제공하라. (4) 디바이스를 서비스와 연계하라. (5) 스몰데이터를 이용하라. 그리고 (6) 데이터를 합성하라. 마지막으로, 사물인터넷 개념을 바탕으로 서비스를 생성하는 과정에서 고려해야 할 사항들에 대해 소개하며 마무리하고자 한다.

Routing and Medium Access Control Interactions for Internet of Things (사물인터넷을 위한 라우팅과 매체접근제어의 상호작용)

  • Park, Pangun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2465-2472
    • /
    • 2015
  • Wireless Medium Access Control (MAC) and routing technologies are the basic building blocks making it possible the Internet of Things (IoT). These technologies have been the focus of substantial research in the last decade. Nevertheless, as new networking standards for IoT are being proposed and different solutions are patched together, evaluating the performance of the network becomes unclear. In this paper, a new overview of MAC and routing protocols for IoT and new interactions are given. The IEEE 802.15.4 MAC and Routing Protocol for Low-power Lossy Network (RPL) routing protocols are taken as reference to exemplify and illustrate the discussion. Experimental results show that contention-based access MACs may hurt the routing, unless these two are carefully designed together.

A Study on Smart Network Utilizing the Data Localization for the Internet of Things (사물 인터넷을 위한 데이터 지역화를 제공하는 스마트 네트워크에 관한 연구)

  • Kang, Mi-Young;Nam, Ji-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.336-342
    • /
    • 2017
  • Traffic can be localized by reducing the traffic load on the physical network by causing traffic to be generated at the end of the packet network. By localizing traffic, the IoT-based sensitive data-related security issues can be supported effectively. In addition, it can be applied effectively to the next-generation smart network environment without changing the existing network infrastructure. In this paper, a content priority scheme was applied to smart network-based IoT data. The IoT contents were localized to efficiently pinpoint the flow of traffic on the network to enable smart forwarding. In addition, research was conducted to determine the effective network traffic routes through content localization. Through this study, the network load was reduced. In addition, it is a network structure that can guarantee user quality. In addition, it proved that the IoT service can be accommodated effectively in a smart network-based environment.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

The Diffusion of Internet of Things: Forecasting Technologies and Company Strategies using Qualitative and Quantitative Approach (사물인터넷의 확산: 정성적·정량적 기법을 이용한 기술 및 기업 전략 예측)

  • Lee, Saerom;Jahng, Jungjoo
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.19-39
    • /
    • 2015
  • Internet of Things (IoT) is expected to provide efficiency and convenience in human life by integrating the Internet into the things that we use in daily lives. IoT can not only create new businesses but also can bring great changes in our lives thanks to the various ways of technical application: defining relationships among things or automatic use of technology by analyzing the usage pattern. This study uses the qualitative research of interviewing the experts to predict the changes that IoT technology is expected to bring in our lives. In addition, this paper analyzes news articles about internet of things in Korea using text-network analysis. This study also discusses the factors which need to be considered to put IoT into successful use in business contexts.

Industry Secret Information Leakage Prevention : Focus on the Utilization of IoT (기업의 산업기밀정보 유출예방에 관한 연구: 사물인터넷 활용을 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.101-110
    • /
    • 2017
  • The purpose of this study is to examine possibilities of industry secret information leakage through IoT devices and to prevent information leakage from the perspective of administrative and technique security. From the administrative security perspective, first, it is important to face the possibility of industry information data leakage through anyone who can access companies and should establish guidelines to limit the use of IoT devices when entering companies. Second, security management guideline should be prepared by companies or upon user's request and use of any electronic devices sharing wireless internet connection should be eliminated or restricted. From technique security perspective, channels that sharing IoT devices in computers should be controlled since industry secret information are stored in computers and servers. Furthermore, IoT devices that accessing wireless internet network or devices that already registered should be regularly checked in order to minimize any information leakage. Lastly, data and information stored in computers and servers should be encrypted.

The Use of Internet of Things and Innovation of the Private Security (사물인터넷의 활용과 민간시큐리티의 혁신)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.101-109
    • /
    • 2017
  • The Internet of things is a system that connects and communicates all sorts of things such as people, objects, and data. It's to create and share information by its own each other. It can be used to enhance the function of private security and has brought about innovative development of private security. The Internet of things is a system that allows devices connected to the Internet to communicate independently of people-objects, objects-objects connected to the Internet. That and can be used in many industries, especially in the private security sector, its value is high. The use of the Internet of things to private security sector can reinforce security zones with always-on surveillance systems, also be enhanced by its own preparedness and response to the situation. However, this study will discusse the application and development of private security in the Internet of things. The practical application of the virtual space is an immediate task and it is also an essential factor in securing security.

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.

Countermeasure to Underlying Security Threats in IoT communication (사물인터넷 통신기술에 내재된 보안위협과 대응 전략)

  • Mun, Hyung-Jin;Choi, Gwang-Houn;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.37-43
    • /
    • 2016
  • Due to the remarkable improvement of ICT, with the popularization of mobile devices and every sector of society connected by networks, an era, in which peer to peer, peer to thing, thing to thing can be connected to one another everywhere, has begun. As all the electronic devices are connected to Internet, they have become more intellectualized and automated, making convergence and process of information through the connection of the devices possible to provide a lot better services. However, those devices communicate mutually to send information and they are exposed to various security threats. Therefore, this study analyzes ZigBee, CoAP, MQTT, XMPP, which are communication-related technology of IoT, draws security threats they have, and suggests requirements that components of IoT should have. Plus, it examines real cases about security threats in IoT, and suggests a countermeasure so as to contribute to establishment of a basis for IoT to be used much more safely in the future.

A Study on The Connected Car's Sensor Technology and Vehicle Network (커넥티드 카의 센서기술과 차량 네트워크의 연구)

  • Kwon, Byung Wook;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.358-361
    • /
    • 2017
  • 사물인터넷은 각종 사물에 센서와 통신 기능을 가능한 매개체를 부착하여 실시간으로 데이터를 인터넷으로 주고받는 환경이나 기술을 의미한다. 인터넷으로 연결된 사물들이 데이터를 주고받아 스스로 분석하고 학습한 정보를 사용자에게 제공하거나 사용자가 이를 원격 조정할 수 있는 기술융합의 한 패러다임이다. 오늘날의 자동차 업계에서도 이를 적용하기위한 연구가 활발히 진행되고 있다. 이러한 네트워크 기술들이 융합 및 적용될 자동차를 커넥티드 카(Connected Car)라 하고, 커넥티드 카란 즉 인터넷과 모바일 기기, 그리고 나아가 운전자와 연결된 자동차를 의미 한다. 본 논문에서는 커넥티드 카의 개념과 주요 센서 기술 등을 설명하고 차후 발전 가능성이 높은 차량 네트워크 기술들에 대해 서술한다.