• Title/Summary/Keyword: 산업 IoT

Search Result 780, Processing Time 0.551 seconds

A Double-blockchain Architecture for Secure Storage and Transaction on the Internet of Things Networks (IoT 네트워크에서 스토리지와 트랜잭션 보호를 위한 이중 블록체인 구조)

  • Park, jongsoon;Park, chankil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.43-52
    • /
    • 2021
  • IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography(ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing(CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Application Scenario of Integrated Development Environment for Autonomous IoT Applications based on Neuromorphic Architecture (뉴로모픽 아키텍처 기반 자율형 IoT 응용 통합개발환경 응용 시나리오)

  • Park, Jisu;Kim, Seoyeon;Kim, Hoinam;Jeong, Jaehyeok;Kim, Kyeongsoo;Jung, Jinman;Yun, Young-Sun
    • Smart Media Journal
    • /
    • v.11 no.2
    • /
    • pp.63-69
    • /
    • 2022
  • As the use of various IoT devices increases, the importance of IoT platforms is also rising. Recently, artificial intelligence technology is being combined with IoT devices, and research applying a neuromorphic architecture to IoT devices with low power is also increasing. In this paper, an application scenario is proposed based on NA-IDE (Neuromorphic Architecture-based autonomous IoT application integrated development environment) with IoT devices and FPGA devices in a GUI format. The proposed scenario connects a camera module to an IoT device, collects MNIST dataset images online, recognizes the collected images through a neuromorphic board, and displays the recognition results through a device module connected to other IoT devices. If the neuromorphic architecture is applied to many IoT devices and used for various application services, the autonomous IoT application integrated development environment based on the neuromorphic architecture is expected to emerge as a core technology leading the 4th industrial revolution.

Development of IIoT Edge Middleware System for Smart Services (스마트서비스를 위한 경량형 IIoT Edge 미들웨어 시스템 개발)

  • Lee, Han;Hwang, Joon Suk;Kang, Dae Hyun;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.115-125
    • /
    • 2021
  • Due to various ICT Technology innovations and Digital Transformation, the Internet of Things(IoT) environment is increasingly requiring intelligence, decentralization, and automated service, especially an advanced and stable smart service environment in the Industrial Internet of Things(IIoT) where communication network(5G), data analysis and artificial intelligence(AI), and digital twin technology are combined. In this study, we propose IIoT Edge middleware systems for flexible interface with heterogeneous devices such as facilities and sensors at various industrial sites and for quick and stable data collection and processing.

Hybrid Offloading Technique Based on Auction Theory and Reinforcement Learning in MEC Industrial IoT Environment (MEC 산업용 IoT 환경에서 경매 이론과 강화 학습 기반의 하이브리드 오프로딩 기법)

  • Bae Hyeon Ji;Kim Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.263-272
    • /
    • 2023
  • Industrial Internet of Things (IIoT) is an important factor in increasing production efficiency in industrial sectors, along with data collection, exchange and analysis through large-scale connectivity. However, as traffic increases explosively due to the recent spread of IIoT, an allocation method that can efficiently process traffic is required. In this thesis, I propose a two-stage task offloading decision method to increase successful task throughput in an IIoT environment. In addition, I consider a hybrid offloading system that can offload compute-intensive tasks to a mobile edge computing server via a cellular link or to a nearby IIoT device via a Device to Device (D2D) link. The first stage is to design an incentive mechanism to prevent devices participating in task offloading from acting selfishly and giving difficulties in improving task throughput. Among the mechanism design, McAfee's mechanism is used to control the selfish behavior of the devices that process the task and to increase the overall system throughput. After that, in stage 2, I propose a multi-armed bandit (MAB)-based task offloading decision method in a non-stationary environment by considering the irregular movement of the IIoT device. Experimental results show that the proposed method can obtain better performance in terms of overall system throughput, communication failure rate and regret compared to other existing methods.

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

Multiple Human Recognition for Networked Camera based Interactive Control in IoT Space

  • Jin, Taeseok
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.1
    • /
    • pp.39-45
    • /
    • 2019
  • We propose an active color model based method for tracking motions of multiple human using a networked multiple-camera system in IoT space as a human-robot coexistent system. An IoT space is a space where many intelligent devices, such as computers and sensors(color CCD cameras for example), are distributed. Human beings can be a part of IoT space as well. One of the main goals of IoT space is to assist humans and to do different services for them. In order to be capable of doing that, IoT space must be able to do different human related tasks. One of them is to identify and track multiple objects seamlessly. In the environment where many camera modules are distributed on network, it is important to identify object in order to track it, because different cameras may be needed as object moves throughout the space and IoT space should determine the appropriate one. This paper describes appearance based unknown object tracking with the distributed vision system in IoT space. First, we discuss how object color information is obtained and how the color appearance based model is constructed from this data. Then, we discuss the global color model based on the local color information. The process of learning within global model and the experimental results are also presented.

An Architecture of IoT Information Gateway in the IMS (IMS 기반의 IoT 정보 게이트웨이 구조)

  • Wang, Qichao;Lee, Jaeoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.29-36
    • /
    • 2019
  • With the rapid development of 5G technology, more and more network functions are interconnected and more popular. In order to effectively manage emerging network concepts, it allows any device object in the real world to be connected anywhere and at any time through the integration of device object recognition, interaction and raw data collection technologies. In addition, IP Multimedia Subsystem (IMS) is an architecture framework for transmitting IP-based information to the device object which can be represented as end user. Therefore, the Internet of Things and IP Multimedia Subsystem (IoT-IMS) communication platform can provide a convenient and fast way for user or device objects to deploy new application services effectively. In particular, in order to collect and manage the device information from IoT effectively in the IoT-IMS communication platform, an IoT Information Gateway (IIG) is proposed. Through the IoT Application Service (AS) scenario, the collected device information can be easily observed and managed in a unified way.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

IoT industrial site safety management system incorporating AI (AI를 접목한 IoT 기반 산업현장 안전관리 시스템)

  • Lee, Seul;Jo, So-Young;Yeo, Seung-Yeon;Lee, Hee-Soo;Kim, Sung-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.118-121
    • /
    • 2022
  • 국내 산업재해 사고 사망자의 상당수가 건설업에서 발생하고 있다. 건설 현장에는 굴삭기, 크레인과 같은 중장비가 많고 높은 곳에서 작업하는 경우가 흔해 위험 요소에 노출될 가능성이 높다. 물리적 사고 외에도 작업 중 발생하는 미세먼지에는 여러 유해 인자가 존재하여 건설근로자들에게 호흡기질환과 같은 직업병을 유발한다. 정부에서는 산업현장 안전 관리의 중요성이 증가함에 따라 각종 산업재해로부터 근로자를 보호하기 위한 법안을 마련하였다. 따라서 건설 현장의 경우 산업재해를 방지하기 위해서 위험요소를 사전에 인지하고 즉각 대응할 수 있는 기술이 필요하다. 본 연구에서는 인공지능(AI)과 사물인터넷(IoT)을 통한 자동화 기술을 활용하여 24시간 안전 관리 시스템을 제안한다. 제안하는 IoT 기반 통합안전 관리 시스템은 AI를 적용한 CCTV를 통해 산업 현장을 모니터링하고, 다수의 IoT 센서가 측정한 수치를 근로자 및 관리자가 실시간으로 확인할 수 있게 하여 산업 현장 내 안전사고를 예방한다. 구체적으로 어플리케이션을 통해 미세먼지 농도, 가스 농도, 온도, 습도, 안전모 착용 여부 등을 모니터링할 수 있다. 모니터링 중에 유해물질의 농도가 일정 수치를 넘기거나 안전모를 착용하지 않은 근로자가 발견될 경우 근로자 및 관리자에게 경고 알림을 발송한다. 유해물질 농도는 IoT 센서를 통해 측정하며 안전모 착용 여부는 카메라 센서에 딥러닝 모델을 적용하여 인식하였다. 본 연구에서 제시한 통합안전관리시스템을 통해 건설현장을 비롯한 산업현장의 산업재해 감소와 근로자 안전 증진에 기여할 수 있을 것으로 기대한다.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.