• Title/Summary/Keyword: 사물인터넷 서비스

Search Result 846, Processing Time 0.033 seconds

Development of augmented reality based IoT control platform using marker (마커를 이용한 증강현실 기반 사물인터넷 제어 플랫폼 개발)

  • Shin, Kwang-Seong;Youm, Sungkwan;Park, YoungJoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1053-1059
    • /
    • 2021
  • In order to realize a smart home, a new type of service that converges the two technologies is required as a method to overcome the respective limitations of augmented reality and IoT technologies. Augmented reality recognizes objects and projects augmented content with the recognized objects on the screen. This technology mainly uses image processing methods such as markers as a method for recognizing objects. In this paper, an augmented reality-based IoT control platform using markers was developed. By defining a marker unique to the object, a unique identifier displayed on the camera was distinguished. A smart home system was implemented by calling a controller to control things. The proposed system receives state information of objects through symptom reality and transmits control commands. The proposed platform was verified by manipulating household lights.

Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things (스몰셀 기반 사물인터넷에서 패킷 지연시간 향상을 위한 디바이스 개인화 방법)

  • Lee, ByungBog;Han, Wang Seok;Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • Recently, with greatly improving the wireless communication technology, new services are created using smart sensors, i.e., machine-to-machine (M2M) and Internet of Things (IoT). In this paper, we propose a novel IoT device (IoTD) personalization method that adopt Small-cell Access Points (SAPs) to control IoTDs using user equipments (UEs), e.g., smart phones and tablet PC, from service users. First, we introduce a system architecture that consists of UE, IoTD, and SAP and propose the IoTD personalization method with two procedures, i.e., IoTD profile registration procedure and IoTD control procedure. Finally, through simulations, we evaluated the system performance of the proposed scheme and it is shown that the proposed scheme outperforms the conventional scheme in terms of the packet delay, packet loss probability, and normalized throughput.

Continuous Integration for Efficient IoT-Cloud Service Realization by Employing Application Performance Monitoring (효율적인 IoT-Cloud 서비스 실증을 위한 응용 성능 모니터링을 활용한 지속적인 통합)

  • Bae, Jeongju;Kim, Chorwon;Kim, JongWon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.85-96
    • /
    • 2017
  • IoT-Cloud service, integration of Internet of Things (IoT) and Cloud, is becoming a critical model for realizing creative and futuristic application services. Since IoT machines have little computing capacity, it is effective to attaching public Cloud resources for realizing IoT-Cloud service. Furthermore, utilizing containers and adopting a microservice architecture for developing IoT-Cloud service are useful for effective realization. The quality of microservice based IoT-Cloud service is affected by service function chaining which inter-connects each functions. For example, an issue with some of the functions or a bottleneck of inter-connection can degrade the service quality. To ensure functionality of the entire service, various test procedures considering various service environments are required to improve the service continuously. Hence in this paper, we introduce experimental realization of continuous integration based on DevOps and employ application performance monitoring for Node.js based IoT-Cloud service. Then we discuss its effectiveness.

IoT(Internet of Things) 정보보호 기술 개발 방향

  • Won, Yu-Jae
    • Information and Communications Magazine
    • /
    • v.32 no.1
    • /
    • pp.24-27
    • /
    • 2014
  • 기존의 사이버 환경의 보안 기술은 단순히 데이터, 네트워크, 시스템을 보호함으로써 인간의 자산을 보호하는 차원의 기술이었다면, IoT 환경에서 보안 기술은 궁극적으로 사물들로부터 사람을 보호하는 기술로 패러다임의 변화가 예상된다. 따라서 본고에서는 미래의 새로운 성장동력으로 부상하고 있는 사물인터넷(IoT) 서비스 활성화를 지원하는 동시에 인간의 자산과 생명을 보호하기 위하여 정부차원에서 수립한 정보보호 기술 개발 계획을 정리한다. IoT 정보보호 기술은 디바이스, 네트워크, 서비스/플랫폼의 3개 계층으로 나누어 9개 원천기술로 분류하였다

IoT 서비스를 위한 보안

  • Kim, Dong-Hui;Yun, Seok-Ung;Lee, Yong-Pil
    • Information and Communications Magazine
    • /
    • v.30 no.8
    • /
    • pp.53-59
    • /
    • 2013
  • 정보통신기술의 비약적인 발달은 오늘날 우리 주변의 사물들을 네트워크로 연결시켜주고 이들에 대한 정보를 언제, 어디서나 쉽게 접할 수 있는 사물인터넷(IoT) 시대의 도래를 촉진하고 있다. IoT 서비스는 스마트기기, 센서 등 다양한 단말 및 이기종 네트워크, 애플리케이션 등을 활용하기 때문에, 그만큼 발생할 수 있는 보안위협도 많을 것으로 예상된다. 본 고에서는 IoT의 주요 구성 및 기술요소들을 설명하고, 여기서 발생 가능한 보안위협들을 살펴본다. 아울러 IoT 환경에서 기본적으로 갖추어야 할 보안 요구사항들을 소개한다.

Kakao Talk, Internet fake news identification service using Bi-LSTM and topic modeling (Bi-LSTM과 토픽모델링을 활용한 카카오톡, 인터넷 가짜뉴스 판별 서비스)

  • Shim, Kuk-Bo;Lee, Seung-Ho;Jeong, Jun-Ho;Lee, Ki-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.1082-1084
    • /
    • 2021
  • 현재 영어 기반의 기술 팩트체크 서비스는 다양하지만 한국 기반 팩트체크 서비스는 비기술적(언론인 등 전문가의 교차 검증을 통한 팩트체크)이 주를 이루고 있으며, 기술 팩트체크 서비스가 많이 시행되지 않고 있다. 본 논문에서는 기술적인 요소와 비기술적인 요소의 서비스를 함께 사용할 때 허위 정보를 가장 정확하게 식별할 수 있기 때문에 한국어 기반의 자연어 처리 기술을 이용한 팩트체킹 서비스를 제안한다.

Secure MQTT Protocol based on Attribute-Based Encryption Scheme (속성 기반 암호화 기법을 활용한 보안 MQTT 프로토콜)

  • Kim, Nam Ho;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.195-199
    • /
    • 2018
  • Recently, with increasing scale of internet of Things (IoT), a large amount of data are generated and various services using such data are emerging. Therefore, a protocol suitable for IoT environment that can efficiently process / transmit big data is needed. MQTT is a lightweight messaging protocol for IoT environment. Although MQTT protocol can use TLS to provide security, it has a problem in that handshake and packet overhead will increase when TLS is used. Therefore, this paper proposed as Secure_MQTT protocol. It can provide stronger security by using lightweight encryption algorithm for MQTT protocol.

Development of Application for Blender Control and Alarm Service based on IoT (사물인터넷 기반 블렌더 제어 및 알람 서비스를 위한 애플리케이션 개발)

  • Kwon, Donguk;Lim, Wansu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.12
    • /
    • pp.76-81
    • /
    • 2016
  • The Internet of Things (IoT) interconnects every device by allowing them to communicate directly and share information with each other and has been recently applied to various industrial fields. The integration of home appliances with IoT has led to the creation of new markets by providing quick and better experience to consumers. Although IoT has been integrated into most modern day appliances, there have been few developments for kitchen appliances. This paper presents the development of integrating IoT with the blender, one of the most widely used appliance in the kitchen. A custom application was made to interact with the blender that provides three main functions: digital controller, maintenance, and defrosting alarm. The function of digital controller provides wireless control to the conventional blender. The maintenance function detects and alerts the user on blender reliability with the intent of enabling the anticipation of hardware failures. The defrost alarm alerts the user when the ingredient has reached the appropriate and desired temperature when cooking frozen food.

Analysis on the Security threat factors of the Internet of Things (사물 인터넷의 보안 위협 요인들에 대한 분석)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.47-53
    • /
    • 2015
  • Recently, the Internet of Things is an important technology with a Cloud computing services and a Big data in the IT fields. and The Internet of Things is widely used in various industries. This trend may be referred to as the emergence of significant based technologies for realizing a ubiquitous times. But the security problems of Internet of things are expected to increase with being realized in a variety of industries. and it will be have to provide a corresponding technology to the security threat for this. Therefore, this paper will be analyzed to the security threats of the Internet of Things by the cases. Thereby this is expected to be utilized as a basis for the countermeasure of Internet of Things in a future.