• Title/Summary/Keyword: 사물인터넷 융합

Search Result 518, Processing Time 0.025 seconds

Secure FOTA Update Mechanism for Lightweight IoT (경량 IoT 를 위한 안전한 무선 펌웨어 업데이트 메커니즘)

  • Seung-Eun Lee;Jin-Min Lee;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.288-289
    • /
    • 2024
  • 최근 전 산업 분야에서 사물인터넷 (Internet of Things, IoT) 기술이 활용되면서, 안전하고 편리한 펌웨어 업데이트 기술의 중요성이 커지고 있다. 그러나 종래의 FOTA (Firmware Over-The-Air) 기술은 단일 경로로 펌웨어를 업데이트하여 보안이 취약하고, 강력한 암호 기술을 활용할 수 없는 문제가 있다. 본 연구에서는 경량 IoT 를 위한 안전한 FOTA (Secure FOTA, S-FOTA) 메커니즘을 제안한다. 실험 결과에 따르면 제안하는 S-FOTA 는 암호화된 파일이 60 개이고 공격자 수가 100 명일 때 종래의 FOTA 대비 공격자의 공격 성공률을 89.84% 줄일 수 있었다.

Semi-supervised learning based malware detection technique (준지도 학습 기반의 멀웨어 탐지 기법)

  • Yu-Ran Jeon;Hye Yeon Shim;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.254-257
    • /
    • 2024
  • 5G 통신과 인공지능 기술이 발전하고, 사물인터넷 기기의 수가 증가함에 따라 종래의 정보보호체계를 우회하는 지능적인 사이버 공격이 증가하고 있다. 그러나, 종래의 기계학습 기반 멀웨어 탐지 방식은 이미 알려진 멀웨어만 탐지할 수 있으며, 새로운 멀웨어는 탐지가 어렵거나, 기존의 알려진 멀웨어로 잘못 분류되는 문제가 있다. 본 연구에서는 비지도학습을 사용하여 알려지지 않은 멀웨어를 탐지하고, 새롭게 탐지된 멀웨어를 새로운 라벨로 분류하여 재학습하는 준지도 학습 기반의 멀웨어 탐지 기법을 제안한다. 다양한 데이터 환경에서 알려지지 않은 멀웨어 데이터가 탐지 모델로 입력될 때 제안한 방식의 성능을 평가했다. 실험 결과에 따르면 제안한 준지도 학습 기반의 멀웨어 탐지 방법은 종래의 방식 대비 정확도를 약 16% 개선했다.

Dynamic Secure Link Adaptation Technique for Low-power IoT Communications (저전력 사물인터넷 통신을 위한 동적 보안 링크 적응 기법)

  • Chae-Yeon Park;Sun-Jin lee;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.167-168
    • /
    • 2024
  • 본 연구에서는 물리계층 보안을 위한 키 길이를 IoT 무선 채널 상태에 따라 조정하는 링크 적응 방법을 제안한다. 시뮬레이션 결과에 따르면 제안 방식은 종래 방식 대비 평균 78.52% 개선된 처리율과 약 2배 개선된 보안성을 보인다.

Comparison of encryption algorithm performance between low-spec IoT devices (저 사양 IoT 장치간의 암호화 알고리즘 성능 비교)

  • Park, Jung Kyu;Kim, Jaeho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2022
  • Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.

A study on BLE-based ZEP System Attack Techniques and Countermeasures Utilizing the Convergence of Big data Platform and Monitoring System (빅데이터 플랫폼과 모니터링 시스템의 융합을 이용한 BLE기반의 ZEP시스템 공격 기법에 대한 대응방안 연구)

  • Ahn, Ye-Chan;Shin, Young-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.331-336
    • /
    • 2015
  • Lately, the development and utilization of technology of the Internet of Things(IoT), and Fintech have been on the rise and amid the emerging convergence of system and service, mobile payment system and location based service technology have received much attention. Considering the fact that smartphone users are currently utilizing mobile payment frequently, many corporations are introducing various methods to the market for easy payment process of consumers by grafting various technologies, and by utilizing the technology based on BLE technology and location based technology, it is emerging as new method applied to payment service such as ZEP, for easy payment process. And by checking the existence of security threats and studying the attack techniques in these payment services, we strive to suggest a method of response based on big data platform.

Design of Convergence Platform for companion animal Personalized Services (반려동물 개인화서비스를 위한 융합 플랫폼 설계)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.29-34
    • /
    • 2016
  • Nowadays, real-time devices that provide health care for a companion animal is being developed by IoT technology and its demand such as smart puppy tag is increasing. However, it is difficult for IoT devices of companion animals to process complex nature due to miniaturized hardware and constructive nature. There is a clear limit to custom advanced features like health care implementation. This paper designs an integrated platform with statistical analysis which makes it possible to customized services such as feed production, pharmaceutical production, and health care for each companion animal. Middleware that collects sensor information, customer's spending pattern and information from Social Network Service is also designed by making use of IoT devices which companion animals wear. Furthermore, the paper designed data analyzer which analyzes and refines data from collected information that can be applied to personalized services.

A study on smart home service plan for ingle-households -Focusing on the 20s and 30s- (1인 가구를 위한 스마트 홈서비스 방안 연구 -20·30세대를 중심으로-)

  • Lee, Ui-Jin;Kim, Seung-In
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.129-135
    • /
    • 2018
  • This study analyzed the domestic and foreign cases of the existing smart home service and grasped the needs of the future smart home service in the future of the Internet of Things. As with all smart homes, the effectiveness of future use is important when comparing needs and random services according to user usability and destination patterns. In order to improve the reliability and to promote the development direction, we conducted a questionnaire survey of 110 people in 20 ~ 30 age group. The survey shows that the reliability of the smart home service is low. The low trust factors include: 1. lack of usability; 2. lack of device recognition; 3. lack of specialization services. Since the smart home service is still in the early stage, various smart home services and ecosystem should be constructed according to user's needs.

Implementation of Safety management broadcasting system for IoT based in IP PBX (IP PBX기반 안전관리 IoT 방송 시스템 구현)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.9-14
    • /
    • 2019
  • Currently, with the success of 5G commercialization, a server system that integrates various Internet public safety services should be developed. In this paper, we developed a public safety integrated server, which is an IoT platform connecting IoT device and IoT gateway based on IP PBX. This server is based on embedded OS and various IoT services are executed in one system and call processing / broadcasting server function that processes emergency call and emergency broadcasting in public places is built in. This system collects IoT sensor data and emergency bell information and automatically sends out emergency alarms, emergency evacuation broadcasts, etc. at an accident site in an emergency situation, and transmits the daily information to the upper IoT service server, Provide public safety management services.

A Study on Performance Analysis of a Messaging System in IoT Environments (IoT 환경에서의 메시징 시스템의 성능 분석에 관한 연구)

  • Young-Dong Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.112-118
    • /
    • 2023
  • Internet of Things(IoT) technology is developing to a stage where the Internet and objects are connected and objects themselves analyze and judge data to interconnect the real world and the virtual world in real time. This technology consists of sensors, actuators, devices, and networks, and it is being applied in various fields. As the number of IoT devices and applications increases, data traffic also increases. In this paper, a messaging system is designed and implemented in order to analyze the performance between an IoT device and MQTT broker. The experimental was performed to measure MQTT-based round-trip time and message transmission time between the IoT device and the broker. The result shows that there is no packet loss, and propagation delay affects round-trip time.

Design of Hardware(Hacker Board) for IoT Security Education Utilizing Dual MCUs (이중 MCU를 활용한 IoT 보안 교육용 하드웨어(해커보드) 설계)

  • Dong-Won Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.43-49
    • /
    • 2024
  • The convergence of education and technology has been emphasized, leading to the application of educational technology (EdTech) in the field of education. EdTech provides learner-centered, customized learning environments through various media and learning situations. In this paper, we designed hardware for EdTech-based educational tools for IoT security education in the field of cybersecurity education. The hardware is based on a dual microcontroller unit (MCU) within a single board, allowing for both attack and defense to be performed. To leverage various sensors in the Internet of Things (IoT), the hardware is modularly designed. From an educational perspective, utilizing EdTech in cybersecurity education enhances engagement by incorporating tangible physical teaching aids. The proposed research suggests that the design of IoT security education hardware can serve as a reference for simplifying the creation of a security education environment for embedded hardware, software, sensor networks, and other areas that are challenging to address in traditional education..