• Title/Summary/Keyword: 스마트 IoT

Search Result 1,190, Processing Time 0.03 seconds

Big Data-based Sensor Data Processing and Analysis for IoT Environment (IoT 환경을 위한 빅데이터 기반 센서 데이터 처리 및 분석)

  • Shin, Dong-Jin;Park, Ji-Hun;Kim, Ju-Ho;Kwak, Kwang-Jin;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.117-126
    • /
    • 2019
  • The data generated in the IoT environment is very diverse. Especially, the development of the fourth industrial revolution has made it possible to increase the number of fixed and unstructured data generated in manufacturing facilities such as Smart Factory. With Big Data related solutions, it is possible to collect, store, process, analyze and visualize various large volumes of data quickly and accurately. Therefore, in this paper, we will directly generate data using Raspberry Pi used in IoT environment, and analyze using various Big Data solutions. Collected by using an Sqoop solution collected and stored in the database to the HDFS, and the process is to process the data by using the solutions available Hive parallel processing is associated with Hadoop. Finally, the analysis and visualization of the processed data via the R programming will be used universally to end verification.

Reliable Mobility Management Using CoAP in Internet of Things Environments (사물 인터넷 환경에서 CoAP 기반의 신뢰성 있는 이동성 관리 방법)

  • Chun, Seung Man;Kim, Hyun Su;Ham, Chang Gyun;Chung, Yun Seok;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.13-18
    • /
    • 2016
  • In Internet of Things (IoT) environment, a variety of smart devices are connected to Internet through various network technologies such as 4G/5G, WiBro, Bluetooth, etc. in order to provide the remote monitoring service such as smart healthcare service, etc. Most standard mobility management protocols based on IETF Mobile IP may not be suitable for Internet of Things (IoT) environments due to constrained power, constrained CPU processing and memory capacity, and large signalling overhead which are inherently accompanied by various devices in IoT environments. In this article, we propose a new mobility management protocol CoMP (CoAP-based Mobility Managemenbt Protocol) for reliable mobility management in IoT environments. The architecture and algorithm to achieve both reliability and simplicity for IoT mobility management are proposed. Finally, performance has been evaluated by both mathematical analysis and simulation.

Implementing Blockchain Based Secure IoT Device Management System (블록체인 기반 안전한 사물인터넷 장치 관리 시스템 구현)

  • Kim, Mihui;Kim, Youngmin
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1343-1352
    • /
    • 2019
  • To manage the Internet of Things(IoT) Network, which consists of a large number of various devices, a secure and automatic method of strengthening the IoT network is being proposed. Blockchain has a 'smart contract' element of autonomous execution method, which is emerging as a way to not only exchange data quickly without mediators but also securely and automatically manage processes between IoT devices. In this paper, we implement a prototype of the entire IoT device management system based on the EOSIO with DPoS(Distributed Proof of Stake)-based blockchain structure, proposed as a prior study, including the user application DApp(Decentralized Application) and the actual IoT devices (Raspberry Pi-based device, and smart lamp) that interact with the blockchain platform. We analyze the benefits of the system and measure the time overhead to show the feasibility of the system.

A Study for Implementation of System for protecting Privacy data from IoT Things (IoT 장치의 개인정보 데이터 보호 시스템 구현에 관한 연구)

  • Kim, Seon Uk;Hong, Seong Eun;Bang, Jun Il;Kim, Hwa Jong
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.84-91
    • /
    • 2021
  • In the EU GDPR, when collecting personal information, the right of the information subject(user) to consent or refuse is given the highest priority. Therefore, the information subject must be able to withdraw consent and be forgotten and claim the right at any time. Especially, restricted IoT devices(Constrained Node) implement the function of consent of the data subject regarding the collection and processing of privacy data, and it is very difficult to post the utilization content of the collected information. In this paper, we designed and implemented a management system that allows data subjects to monitor data collected and processed from IoT devices, recognize information leakage problems, connect, and control devices. Taking into account the common information of the standard OCF(Open Connectivity Foundation) of IoT devices and AllJoyn, a device connection framework, 10 meta-data for information protection were defined, and this was named DPD (Data Protection Descriptor). we developed DPM (Data Protection Manager), a software that allows information subjects to manage information based on DPD.

Design and Implementation of Zigbee-CoAP-based Standby Power Saving System (Zigbee-CoAP 기반 대기전력 절감 시스템 설계 및 구현)

  • Jang, Young-Hwan;Lee, Sang-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.616-622
    • /
    • 2020
  • Recently, as the interest in power saving increases with the development of IoT technology, research on power saving of smart devices, which are being miniaturized, is being actively conducted. In particular, due to the diversification of IoT-based smart devices and the increase in personal penetration rate, the issue of standby power even when not in use is increasing. However, there is a drawback of physically unplugging the outlet or turning off the power in order to substantially reduce standby power. Since Zigbee is used instead of the existing IP, it is necessary to change to the IoT standard protocol based on the Internet network. Therefore, this paper designed and implemented the standby power saving system applying CoAP, the IoT standard protocol, to the existing Zigbee technology. Existing systems and evaluations confirmed that the average standby power of about 8.4Wh was reduced.

Integrity Guarantee System in IoT Virtual Environment Platform: Through Hyperedfger Indy and MQTT (IoT 가상환경 플랫폼에서의 무결성 보장 시스템:Hyperledger Indy와 MQTT를 통하여)

  • Yoosung Hong;Geun-Hyung Kim
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.76-85
    • /
    • 2024
  • In this paper, we propose a system that improves the data integrity of IoT(Internet of Things) devices in the virtual environment by combining Hyperledger Indy and MQTT(Message Queuing Telemetry Transport). The system complements the limitations of the centralized system by realizing a DPKI(Decentralized Public Key Infrastructure) structure that utilizes a distributed network in publish-subscribe(pub/sub) pattern communication. Digital signature technology was applied to ensure the data integrity of IoT devices and communication scenarios between the four core components of the client, IoT device, broker, and blockchain, as well as a topic structure using a decentralized identifier to ensure safety in the virtual environment. We present a systematic method for transparent data exchange. To prove the performance of the proposed system, this paper conducted experiments on four scenarios and evaluated communication performance in a virtual environment. The experimental results confirmed that the proposed system provides a reliable IoT data communication structure in a virtual environment.

Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things (스몰셀 기반 사물인터넷에서 패킷 지연시간 향상을 위한 디바이스 개인화 방법)

  • Lee, ByungBog;Han, Wang Seok;Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • Recently, with greatly improving the wireless communication technology, new services are created using smart sensors, i.e., machine-to-machine (M2M) and Internet of Things (IoT). In this paper, we propose a novel IoT device (IoTD) personalization method that adopt Small-cell Access Points (SAPs) to control IoTDs using user equipments (UEs), e.g., smart phones and tablet PC, from service users. First, we introduce a system architecture that consists of UE, IoTD, and SAP and propose the IoTD personalization method with two procedures, i.e., IoTD profile registration procedure and IoTD control procedure. Finally, through simulations, we evaluated the system performance of the proposed scheme and it is shown that the proposed scheme outperforms the conventional scheme in terms of the packet delay, packet loss probability, and normalized throughput.

A Study on Smart Network Utilizing the Data Localization for the Internet of Things (사물 인터넷을 위한 데이터 지역화를 제공하는 스마트 네트워크에 관한 연구)

  • Kang, Mi-Young;Nam, Ji-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.336-342
    • /
    • 2017
  • Traffic can be localized by reducing the traffic load on the physical network by causing traffic to be generated at the end of the packet network. By localizing traffic, the IoT-based sensitive data-related security issues can be supported effectively. In addition, it can be applied effectively to the next-generation smart network environment without changing the existing network infrastructure. In this paper, a content priority scheme was applied to smart network-based IoT data. The IoT contents were localized to efficiently pinpoint the flow of traffic on the network to enable smart forwarding. In addition, research was conducted to determine the effective network traffic routes through content localization. Through this study, the network load was reduced. In addition, it is a network structure that can guarantee user quality. In addition, it proved that the IoT service can be accommodated effectively in a smart network-based environment.

Analysis of Technology Trends in the Smart Cars and the IoV (스마트차량과 자동차 사물인터넷(IoV) 기술동향 분석)

  • Han, T.M.;Cho, S.I.;Chun, H.W.;Huh, J.D.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.5
    • /
    • pp.11-21
    • /
    • 2015
  • 최근 IT기술과 산업 간 융합이 활발한 가운데 자동차에도 각종 첨단 IT기술이 접목되면서 운전자의 안전과 편의성이 향상된 스마트카(smart car)가 속속 개발되고 있다. 가까운 미래에 스마트카의 도움으로 운전자가 전방주시 의무에서 자유롭게 될 수 있게 되면, 운행 중에 언제 어디서나 모바일 인터넷을 통한 정보접근이 가능하도록 지원하는 컴퓨팅 환경인 자동차 사물인터넷(Internet of Vehicles, Automotive IoT)이 중요하게 대두될 것으로 전망된다. 자동차 사물인터넷의 개념이 아직은 명확히 잡혀있지 않지만, 대체로 모바일 연결성(mobile connectivity)을 중심으로, 교통안전 혼잡해소뿐만 아니라 다양한 사용자 맞춤형 서비스 산업을 창출할 수 있는 컴퓨팅 환경을 의미한다. 즉, 운전자와 자동차, 자동차와 주변환경 및 교통인프라, 그리고 일상생활의 모든 요소가 자동차를 매개로 해서 유기적으로 연결되는 컴퓨팅 환경을 의미하며, 가까운 미래에 이런 컴퓨팅 환경을 지원하는 자동차가 상용화될 것으로 전망된다. 본고에서는 이러한 전망을 반영하여 자동차 사물인터넷 환경의 스마트카에 적용될 주요 기술과 서비스를 분석하고, 스마트카와 자율주행의 핵심기술인 인포테인먼트 플랫폼의 주요 동항 및 이슈를 살펴보고자 한다.

  • PDF

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.