• Title/Summary/Keyword: 산업 IoT

Search Result 792, Processing Time 0.027 seconds

Analyses of Security and Privacy Challenges in Industrial Based on Internet of Things (사물 인터넷망에 기반한 산업 시설의 보안 요구 사항 해석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.598-599
    • /
    • 2016
  • Today, embedded, mobile, and cyber-physical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as "Industry 4.0" and Internet of Things (IoT), promise innovative business models and novel user experiences through strong connectivity and effective use of next generation of embedded devices. We survey an introduction to Industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems in this paper.

  • PDF

A Study on Uses Case of IoT Mobile Toilet (IoT가 접목된 이동형 임대 화장실의 활용량 측정 사례 연구)

  • Kim, Yu-Doo;Jung, Yong-jin;Kwon, Soon-bum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.729-730
    • /
    • 2017
  • There are many events such as festival or assembly. Toilets are needed in these events. Therefore, there are many companies that rental of mobile toilets. But these companies provide only rental of toilet. So in this research, we provide IT services using sensor into mobile toilets. And then has analysed that how to using sensor data from mobile toilets.

  • PDF

Industrial IoT Standardization Trend of the 5G Mobile Network (5G 모바일 네트워크의 Industrial IoT 표준기술 동향)

  • Kim, K.S.;Kang, Y.H.;Kim, C.K.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.13-24
    • /
    • 2021
  • Industrial networks has been developing various technologies from fieldbus technology to industrial Ethernet and time-sensitive networking. The industry expects that the 5G mobile network will solve the diverse and highly specific industrial site requirements. Accordingly, 3GPP has been developing standard functions to provide ultra-high reliability, ultra-high speed, ultra-connection, and ultra-low latency services, and 3GPP Rel-16 began developing ultra-low latency and ultra-high reliability communication functions for 5G mobile networks to support vertical industries. In this paper, we show the related standardization trends and requirements to apply industrial IoT service scenarios to 5G mobile networks, and in particular, we introduce 5G system features and extended 5G system architecture to provide time sensitive communication and time synchronization services.

A Study on the Improvement of Delivery System Using IoT (IoT 를 이용한 택배 시스템 개선에 관한 연구)

  • Kang, Min-Chae;Han, Hyo-Chang;Song, Ha-Yoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.528-531
    • /
    • 2020
  • 택배 산업의 발전에 따른 규모 증가와 언택트 시대의 도래는 택배 물류의 증가를 야기하였다. 본 연구에서는 택배 물류 관리의 용이성과 배송의 효율성을 향상시켜 경제성을 높이는 것을 목적으로 한다. 이를 위해 IoT Device 를 이용하여 배송 시스템의 불필요한 과정을 감소시켰다. 또한, IoT Device 를 택배 차량에 부착하여 Device 의 개수를 최적화하고, DB 내 데이터의 관계성을 증가시켰다.

Development of Coverage-based CoAP Fuzzer and Vulnerability Inspection (커버리지 기반 CoAP 퍼저 개발 및 취약점 점검)

  • Se-chang Lim;Hyung-joon Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.111-112
    • /
    • 2023
  • IoT 산업의 규모가 커짐에 따라서 IoT 디바이스 간의 통신 프로토콜에 대한 위협도 증가하고 있으며, 이에 따라 IoT 프로토콜에 대한 보안의 중요성이 대두되고 있다. 하지만 IoT 프로토콜 중 비교적 최근에 등장한 프로토콜인 CoAP 프로토콜에 대한 연구는 아직 충분하지 않으며, CoAP에 대한 기존의 연구는 커버리지를 고려하지 않은 퍼저를 사용하였다. 따라서 이번 연구에서는 커버리지를 고려한 CoAP대상 퍼저를 개발하고 CoAP의 잠재적인 취약성을 점검한다. CoAP의 c 구현체인 libcoap 라이브러리를 대상으로 퍼징한 결과, 총 2개의 힙 버퍼 오버 플로우 취약점을 발견하였다.

Secure FOTA Update Mechanism for Lightweight IoT (경량 IoT 를 위한 안전한 무선 펌웨어 업데이트 메커니즘)

  • Seung-Eun Lee;Jin-Min Lee;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.288-289
    • /
    • 2024
  • 최근 전 산업 분야에서 사물인터넷 (Internet of Things, IoT) 기술이 활용되면서, 안전하고 편리한 펌웨어 업데이트 기술의 중요성이 커지고 있다. 그러나 종래의 FOTA (Firmware Over-The-Air) 기술은 단일 경로로 펌웨어를 업데이트하여 보안이 취약하고, 강력한 암호 기술을 활용할 수 없는 문제가 있다. 본 연구에서는 경량 IoT 를 위한 안전한 FOTA (Secure FOTA, S-FOTA) 메커니즘을 제안한다. 실험 결과에 따르면 제안하는 S-FOTA 는 암호화된 파일이 60 개이고 공격자 수가 100 명일 때 종래의 FOTA 대비 공격자의 공격 성공률을 89.84% 줄일 수 있었다.

Testcase Selection Technique for Lightweight Fuzzing (경량 퍼징을 위한 테스트케이스 선택 기법)

  • Na-Eun Park;Yeon-Jin Kim;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.290-293
    • /
    • 2024
  • 최근 IoT (Internet of Things, IoT) 기기가 전 산업과 일상 생활에 활용되면서 취약점 탐지 기술이 중요해지고 있다. 그러나 리소스가 제약적인 IoT 기기에는 종래의 퍼징 기술을 적용하기 어렵다. 본 논문에서는 경량화 IoT 환경에서 퍼징 기술을 적용하기 위한 테스트케이스 선택 기법을 제안했다. 실험 결과에 따르면, 제안하는 방식은 무작위 입력을 생성하여 퍼징하는 종래 퍼저보다 평균 61.49% 빠르게 취약점을 탐지했다.

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.