• Title/Summary/Keyword: 사물인터넷 융합

Search Result 517, Processing Time 0.027 seconds

데이터 기반의 글로벌 사물인터넷 융합을 위한 GS1 국제 표준

  • Kim, Dae-Yeong;Jeong, Seong-Gwan;Kim, Sang-Tae;Byeon, Jae-Uk;U, Seong-Pil;Gwon, Gi-Ung;Yun, Won-Deuk;Heo, Se-Hyeon;Im, Jang-Gwan;Jeon, Tae-Jun
    • Information and Communications Magazine
    • /
    • v.34 no.1
    • /
    • pp.41-50
    • /
    • 2016
  • 사물인터넷 비즈니스의 수요가 증가하면서, 다양한 사물들에 대한 식별 및 데이터 공유 체계와 서비스 디스커버리 표준을 제공하는 GS1 (Global Standard 1) 국제 표준이 글로벌 사물인터넷 표준으로써 자리잡고 있다. 유통/물류분야의 지배적 표준에서 시작한 GS1은 1999년 세계 최초로 사물인터넷(Internet of Things)이란 용어와 개념을 소개한 이후, 스마트팩토리, 헬스케어 서비스 표준에서부터 금융 서비스에 이르기까지, 다양한 산업 도메인 응용의 수평적 통합을 가능하게 하는 데이터 기반의 사물인터넷 표준으로서의 입지를 지속적으로 확장해 나가고 있다. 본 논문에서는 GS1 국제 표준에 대한 전반적인 개념 및 특징을 설명하고 현재 활발히 진행되고 있는 다양한 서비스 표준안들과 GS1 표준의 레퍼런스 구현인 Oliot(Open Language for Internet of Things) 오픈소스 프로젝트를 소개하고, 실제 글로벌 비즈니스에서의 적용 사례들을 살펴봄으로써 사물인터넷 비즈니스 플랫폼으로써의 GS1 표준의 전망을 제시한다.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

A Resource Planning Policy to Support Variable Real-time Tasks in IoT Systems (사물인터넷 시스템에서 가변적인 실시간 태스크를 지원하는 자원 플래닝 정책)

  • Hyokyung Bahn;Sunhwa Annie Nam
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.47-52
    • /
    • 2023
  • With the growing data size and the increased computing load in machine learning, energy-efficient resource planning in IoT systems is becoming increasingly important. In this paper, we suggest a new resource planning policy for real-time workloads that can be fluctuated over time in IoT systems. To handle such situations, we categorize real-time tasks into fixed tasks and variable tasks, and optimize the resource planning for various workload conditions. Based on this, we initiate the IoT system with the configuration for the fixed tasks, and when variable tasks are activated, we update the resource planning promptly for the situation. Simulation experiments show that the proposed policy saves the processor and memory energy significantly.

Development of Educational Model for ICT-based Convergence Expert (ICT 기반의 융합전문가 양성을 위한 교육모형 개발)

  • Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.75-80
    • /
    • 2015
  • To train convergence experts ICT infrastructure must be learned IoT use capabilities of things. In this paper, targeted to students that are majoring in computer science, and for the design of the curriculum and the educational model that handles education of operation in general for training IoT-related education for five months to experts of convergence training describe the contents. Course is the basic ability of the process, core competence course, is divided into real-life capability process and on-site training course, was constructed in a total of 10 stages of the process details. Curriculum, it was designed to learn sensing technology, network technology, security, and content production technology. This educational model is utilized for job creation human resource training project of 2015 Ministry of Employment and Labor, it demonstrated the utility to contribute in order to achieve a high completion and the employment rate. Applicable to future university education plans to expand the curriculum, including courses that complement the Java.

Analysis of Information Security Technology Development for ICT Convergence Services (ICT 융합서비스 제공을 위한 정보보호 기술개발 현황분석)

  • Kim, Dong-Chul
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.27-33
    • /
    • 2015
  • In this paper, the development level of information security technology for internet of things(Iot), big data and clo ud services is analyzed, and the detail policy is proposed to be leader in area of patents and ICT standard. The conc ept of ICT convergence is defined frist, market and current state of technology for three convergence services is the n analyzed, and finally main function and security target for each technology are presented. The evaluation criteria a nd IPR are analyzed to diagnose the level of patent and standard for the technology. From the results, even though the domestic competence is inferior compared to other advanced country, the efficient policy should be presented by using our capability for the big data and cloud. Furthermore, the technology development for the IoT and cloud is ne eded in advance considering the market-technology influence effects. In addition to, M2M security framework in IoT, data security in big data and reliable networking in cloud should be developed in advance.

A Study on Security Vulnerability Management in Electric Power Industry IoT (전력 산업 IoT에서의 보안 취약점 관리에 관한 연구)

  • Lee, Sang-Gi;Lee, Sei-Yoon;Kim, Jeong-Chul
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.499-507
    • /
    • 2016
  • The era of IoT, which figures exchanging data from the internet between things is coming. Recently, former electric power energy policy paradigm, namely Supply side paradigm, is changing, because electric power energy consumption is rapidly increasing. As new paradigm for this limit, convergence of existing electric power grid and ICT(Information and Communication Technology) will accelerate intellectualization of electric power device, its operation system. This change brought opened electric power grid. Consequently, attacks to the national electric power grid are increasing. On this paper, we will analyze security threats of existing IoT, discuss security weakness on electric power industry IoT and suggest needed security requirements, security technology.

Smart Top for Fighting Game based on Remote Control of Smart Device (스마트 기기의 원격제어를 기반으로 한 대전게임용 스마트 팽이)

  • An, Sungwoo;Lee, Kyoungyong;Yeom, Changguen
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.106-108
    • /
    • 2017
  • 최근 사물인터넷 기술은 4차 산업혁명을 이끌 차세대 성장기술로 많은 분야에서 기술도입과 융합을 시도하고 있다. 장난감 시장 역시 사물인터넷 기술 도입으로 많은 변화가 일어나고 있다. 특히, 단순한 조작 위주의 장난감을 스마트 기기, 센서 등과 연동하여 원격제어를 하고, 부가 정보를 축적하여 활용함으로써 사장되었던 많은 장난감들이 새로운 놀이도구로 재생산되고 있다. 본 논문에서는 대표적인 놀이기구였던 팽이를 새롭게 사물인터넷 기반 스마트 팽이로 제작하기 위한 방안을 제시한다. 스마트 팽이는 초소형 아두이노 보드를 장착하고 스마트폰과 통신이 가능하도록 하여 회전 및 충돌 정보를 스마트폰으로 전송하도록 한다. 또한, 스마트 팽이에 솔레노이드를 이용한 점핑 모듈을 추가하고 스마트폰에서 점프 명령을 내릴 수 있도록 함으로써 게임 참여자의 직접 제어가 가능한 스마트 팽이 대전 게임을 구현할 수 있도록 한다.

  • PDF

A Survey on the Security Vulnerability for Internet of Things (사물인터넷의 보안 실태에 관한 조사)

  • Seung-Won Ko;Jae-Kyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.629-630
    • /
    • 2023
  • 최근 아파트의 월패드 해킹 사건과 같이 사물인터넷의 보안이 매우 심각한 상황이다. 사물인터넷은 자동화된 데이터 수집, 분석, 의사결정으로 효율성과 생산성 향상하고, 실시간으로 모니터링이 가능하면서 저비용으로 개발이 가능하다. 그리고 현재 인공 지능, 빅 데이터 및 클라우드 컴퓨팅 등 다양한 기술과 융합이 가능해 더욱 발전할 전망을 가지고 있다. 그러나 활용 범위가 갈수록 방대해지지만 현재 기술력으론 완벽한 보안을 실현하기가 어려운 것이 현실이다. 그리고 해킹의 대부분 직접적인 피해 당사자인 소비자들은 스마트홈이 주는 편의에 대해서만 알 뿐 보안 위협요소에는 잘 알지 못한다. 스마트홈의 보급이 빨라지고 있지만 정부 및 제조사에서 아직 스마트홈 보안에 관련한 홍보 및 교육이 따라가지 못하기 때문이다. 이러한 점을 보완하기 위해 본 논문에선 스마트홈의 보안 실태와 보안 요구사항에 대해서 다양한 방안을 살펴보고자 한다.

  • PDF

Development of IoT Service Classification Method based on Service Operation Characteristic (세부 동작 기반 사물인터넷 서비스 분류 기법 개발)

  • Jo, Jeong hoon;Lee, HwaMin;Lee, Dae won
    • Journal of Internet Computing and Services
    • /
    • v.19 no.2
    • /
    • pp.17-26
    • /
    • 2018
  • Recently, through the emergence and convergence of Internet services, the unified Internet of thing(IoT) service platform have been researched. Currently, the IoT service is constructed as an independent system according to the purpose of the service provider, so information exchange and module reuse are impossible among similar services. In this paper, we propose a operation based service classification algorithm for various services in order to provide an environment of unfied Internet platform. In implementation, we classify and cluster more than 100 commercial IoT services. Based on this, we evaluated the performance of the proposed algorithm compared with the K-means algorithm. In order to prevent a single clustering due to the lack of sample groups, we re-cluster them using K-means algorithm. In future study, we will expand existing service sample groups and use the currently implemented classification system on Apache Spark for faster and more massive data processing.

Hash-based SSDP for IoT Device Security (IoT 기기 보안을 위한 해시 기반의 SSDP)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Due to the prolonged infectious disease of COVID-19 worldwide, there are various security threats due to network attacks on Internet of Things devices that are vulnerable to telecommuting. Initially, users of Internet of Things devices were exploited for vulnerabilities in Remote Desktop Protocol, spear phishing and APT attacks. Since then, the technology of network attacks has gradually evolved, exploiting the simple service discovery protocol of Internet of Things devices, and DRDoS attacks have continued to increase. Existing SSDPs are accessible to unauthorized devices on the network, resulting in problems with information disclosure and amplification attacks on SSDP servers. To compensate for the problem with the authentication procedure of existing SSDPs, we propose a hash-based SSDP that encrypts server-specific information with hash and adds authentication fields to both Notify and M-Search message packets to determine whether an authorized IoT device is present.