• Title/Summary/Keyword: 사물인터넷 서비스

Search Result 847, Processing Time 0.034 seconds

A Study on User Security in IoT Environment (IOT 환경에서의 사용자 보안에 관한 연구)

  • Yang, Hyunjung;Lee, Changmoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.1221-1223
    • /
    • 2017
  • 최근 사람과 사람, 사람과 사물의 연결에서 일상생활의 모든 것들을 상호 연결시키려는 사물인터넷 기술이 신 성장 동력의 핵심으로 주목받고 확산되어가고 있다. 이러한 IoT 기술의 활성화 및 신규 서비스 창출로 인해 우리의 삶의 질 향상 및 산업 발전을 이루고 있지만 인터넷에 연결된 장치의 수가 증가할수록 이에 수반하는 공격 대상 증가 및 위협 요소도 확장되어 가고 있어 사물인터넷 환경을 안전하게 구축하고 확산하기 위해서는 반드시 사물인터넷에 수반되는 보안적인 이슈를 해결해야 한다. 이러한 해결방안은 단순히 기술적 대응만이 아닌 사용자 스스로가 위협요소를 대처할 수 있도록 사용자 보안 대응방안이 필요하다. 이에 따라 본 연구에서는 IoT 환경에서 발생할 수 있는 위험요소를 도출하고, 이를 토대로 일반 사용자 환경에서 고려해야할 위험요소를 검토해보고 사용자 위협요소는 크게 기술적, 비기술적인 관점으로 구분하여 제시하였다.

Development of Autonomous Transport Tram Based on Safe Artificial Intelligence (안전한 인공지능기반의 무인자율 이송트램 개발)

  • Joo, Yunna;Kim, Dabin;Kim, Sebin;Kim, Heeyeop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.1059-1061
    • /
    • 2022
  • 본 논문은 최근 울산항만에 물류 차량과 사람이 충돌하는 위험이 수반되어 특별 안전대책에 따라 사각지대 없는 안전관리 체계의 일원으로 차별화된 울산항만과 선박 사이의 스마트 안전 정류장 구축과 이를 연계한 인공지능 기반의 무인 자율 이송 트램을 구현하는 프로젝트이다. 플랫폼 기반의 하드웨어로 각종 사물에 센서와 통신 기능을 내장하여 인터넷에 연결하는 사물인터넷(IoT)와 안드로이드 기반의 앱으로 사물인터넷에서 측정된 정보를 제공하거나 스마트 정류장과 연계하여 안전하게 이동할 수 있도록 서비스를 제공하며 이를 위해서 사물인터넷(IoT)을 분석한 데이터 정보는 인공지능 기반의 무인 자율 이송 트램의 사고를 방지하기 위해 꼭 필요하다.

A Study on the Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence (사물 인터넷과 빅데이터 융복합 활성화를 위한 규제 개선 방안에 관한 연구)

  • Kim, Ki-Bong;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.5
    • /
    • pp.29-35
    • /
    • 2017
  • Korea has been showing a high interest in convergence centered on information and communication technologies for the past 10 years. However, with successful convergence of broadcasting and telecommunication sectors, successful convergence cases such as IPTV have been excluded. In some fields, The performance that citizens can experience is limited. In addition, the combination of the Internet of things and the big data shows that infinite data in the natural and social environment surrounding service users can be created and utilized to create better services. However, the division between departments and departments, And the limitations of policies and systems that can promote convergence of information and communication technologies. Therefore, in order to create new industries through the fusion of the Internet of things and big data, it is necessary to investigate what kind of inhibitory enzymes are present, to investigate the problems, to solve the problems, to develop technologies for activating the Internet and big data, And suggests ways to utilize the policy to promote convergence of related technologies.

The Use of Internet of Things and Innovation of the Private Security (사물인터넷의 활용과 민간시큐리티의 혁신)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.101-109
    • /
    • 2017
  • The Internet of things is a system that connects and communicates all sorts of things such as people, objects, and data. It's to create and share information by its own each other. It can be used to enhance the function of private security and has brought about innovative development of private security. The Internet of things is a system that allows devices connected to the Internet to communicate independently of people-objects, objects-objects connected to the Internet. That and can be used in many industries, especially in the private security sector, its value is high. The use of the Internet of things to private security sector can reinforce security zones with always-on surveillance systems, also be enhanced by its own preparedness and response to the situation. However, this study will discusse the application and development of private security in the Internet of things. The practical application of the virtual space is an immediate task and it is also an essential factor in securing security.

Transmission Control Method of Beacon Signal Based on Bluetooth of Lower Electric Power (저 전력 블루투스 기반 비콘 신호 전송 제어 방법)

  • Oh, Am-suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1136-1141
    • /
    • 2016
  • IoT technology has been used as a core technology of convergence service that needs intelligent information processing, and the importance is largely emerging now. And internal network construction thru IoT interaction device can connect with IoT device effectively, provide diverse services by connection with open platform. Especially, beacon that is based on low electric power bluetooth device is receiving attention as one of core technology of IoT. Beacon technology is utilized widly in various fields of industry, and there are lot of demands in the specific environment and conditions beyond the basic function. On this thesis, the authors are proposing the beacon device that utilized acceleration sensor and hole sensor. this beacon device can control the target on specific situation thru sensing of moving target. For the more, we will expect to apply to the various type of factory environments like detachable installation, optimized management using sensor.

Development of an IoT System Based on the oneM2M Communication Protocol (oneM2M 통신 프로토콜 기반 사물인터넷 시스템 개발)

  • Park, Kee-Hyun;Lee, Jong-Hwi;Woo, Min-Woo;Park, Joon-Suu
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.41-49
    • /
    • 2016
  • In this paper, an IoT system which is increasingly popular in these days is developed. Among various international standards on the area, one M2M communication protocol is used in the system. The 0neM2M-based IoT system consists of ADN-AE modules and CSE modules. The ADN-AE module provides applications of various services. It also monitors a CSE module. The CES module is a platform that provides common services which should be provided to various AEs in an IoT system. The CSE module consists of a Network Manager module, a Message Handler module, and a Resource Manager module. The Network Manager module controls oneM2M communication and data flow in the system. The Message Handler module processes transmitted messages and the Resource Manager module manages the Resource Tree. The resource tree stores information of the objects to be managed in the system. Also, internal data flow and protocol mapping in the modules are explained.

A Study on the Reality of IoT Device and Service Information Gap in the Era of Digital Transformation (디지털 전환 시대에 IoT 기기와 서비스 정보 격차 실태 연구)

  • Lee, Sangho;Cho, Kwangmoon
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.79-89
    • /
    • 2021
  • This study attempted to identify the information gap about Internet of Things (IoT) devices and services in the era of digital transformation. To this end, we analyzed differences in perception of predicting future issues about IoT devices and services, and analyzed differences in the need for digital technology and help in life according to perceptions and experience of using IoT devices and services. Also, the level of education and demand for education were analyzed. A survey was conducted from February 15th to March 7th, 2021 for residents in Gwangju Metropolitan City and Jeollanam-do, and 232 respondents responded. Analysis was performed using SPSS 21.0, and all statistical values were presented as average values. The results of the study are as follows. First, the future issues of the intelligent information society according to the recognition of the intelligent information society, the help of life provided by artificial intelligence devices and services, and the need for intelligent information technology were presented. Second, the difference in Life help provided by artificial intelligence according to the recognition and use experience of artificial intelligence devices was presented. Third, the difference in life help provided by artificial intelligence according to the recognition and use experience of artificial intelligence service was presented. Fourth, the difference in necessity according to artificial intelligence technology recognition and use experience was presented. Fifth, the educational level and educational demand of the intelligent information society were investigated and presented. Through the results of this study, a suggestion for resolving the information gap in the era of digital transformation was suggested.

Research on Convergence of Internet-of-Things and Cloud Computing (사물인터넷과 클라우드 컴퓨팅의 융합에 대한 연구)

  • Choi, Kyung;Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.1-12
    • /
    • 2016
  • Internet of Things (IoTs) technologies have been computerized information generated from a variety of objects and humans, and have been applied to various fields by connecting via the Internet. In order to compensate for the marginal characteristics of IoT smart devices, such as low-power, limited processing and capacities, combining IoT and cloud computing technologies is now established itself as one of the paradigms. In this paper, we look at the definition, features and services of IoT and cloud computing technology, and we investigate and analyze the conversing needs of IoT and could computing, existing conversion paradigms, convergence cases, and platforms. In results, there are challenges to be solved, even though the cloud technologies complement a number of restrictions of IoT and offer various advantages such as scalability, interoperability, reliability, efficiency, availability, security, ease of access, ease of use, and reduced cost of deployment. We analyze the new research issues of convergence paradigm, and finally suggest a research challenges for convergence.

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.