• Title/Summary/Keyword: 스마트 IoT

Search Result 1,190, Processing Time 0.049 seconds

Preliminary Study of Biomedical Signal-based IoT Diffuser (생체신호 기반 IoT 디퓨저 개발을 위한 기초연구)

  • Yang, Yoon La;Shin, Hangsik
    • Proceedings of the KIEE Conference
    • /
    • 2015.07a
    • /
    • pp.1417-1418
    • /
    • 2015
  • 본 연구에서는 사용자 생체신호 및 주변 환경정보를 기반으로 스트레스 이완을 돕는 IoT 디퓨저 시스템 설계와 구성을 다룬다. 개발된 디퓨저는 스마트폰 어플리케이션과 연동되어 사용자의 맥박수를 전달 받고, 또한 내장된 온습도센서에서 측정된 사용자 주변 환경정보와도 연동되어 발향 및 조명 효과를 제공한다. 개발된 디퓨저 시스템은 사용자의 심박이 다소 빠르거나 사용자에게 스트레스를 줄 수 있는 온습도 환경이 감지되는 경우 스트레스 경감과 관련된 발향 및 조명색 제어를 통해 사용자의 스트레스 조절을 도울 수 있다.

  • PDF

Fire Prevention System (화재 예방 시스템)

  • Hur, Tai-Sung;Lee, Seung-Cheol;Hong, Ji-Hoo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.249-250
    • /
    • 2017
  • 본 논문은 Raspberry Pi를 이용하여 IoT 시대에 맞춘 화재 예방 시스템(Fire Prevention System)을 개발하였다. 오늘날 모바일 기기의 보급이 일상화 되어있어, 어디에서나 IoT 제품들을 제어할 수 있다. 이러한 IoT 기술을 접목하여, 화재가 발생하기 전, 가스 센서를 이용하여 가스누출을 미리 감지하여 스마트 폰에 메시지를 전달함과 동시에 가스밸브을 잠금으로서 화재를 미연에 방지하도록 하였다.

  • PDF

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

IoT-enabled Solutions for Tour Photography Services

  • Jeong, Isu;Baek, Seungwoo;An, Eunsol;Kim, Yujin;Choi, Jiwoo;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.127-135
    • /
    • 2020
  • In this paper, we propose an IoT-enabled solution for tour photography services with small-size investment and resources in the travel and tourism industries, being able to impact on economic, social, and cultural values. An IoT-enabled camera is developed based on an open hardware and software platform complying with oneM2M, which can make traditional embedded systems oneM2M-compliant devices due to a middleware solution called TAS (thing adaptation software). IoT cameras deployed around photo zones in a tour site could be remotely controlled via an IoT gateway with a Web-based application on a smartphone. Users would perform a pan and tilt camera control if they want and then take and download a perfect photo picture (even though they are away from the tour site). We expect that the proposed solution will promote the deployment IoT-enabled technologies in tour and travel industries which are important parts of the tertiary sector.

A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation (사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용)

  • Han, Seul Ki;Kim, Myuhng Joo
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • As the demand for Internet of Things(IoT) increases, the need for the security of IoT devices is increasing steadily. It is difficult to apply the conventional security theory to IoT devices because IoT devices are subject to be constrained by some factors such as hardware, processor, and energy. Nowadays we have several security guidelines and related documents on IoT device. Most of them, however, do not consider the characteristics of specific IoT devices. Since they describes the security issues comprehensively, it is not easy to explain the specific security level reflecting each characteristics of IoT devices. In addition, most existing guidelines and related documents are described in view of developers and service proposers, and thus ordinary users are not able to assess whether a specific IoT device can protect their information securely or not. We propose an security evaluation model, based on the existing guidelines and related documents, for more specific IoT devices and prove that this approach is more convenient to ordinary users by creating checklists for the smart watch.

  • PDF

A Study on Performance Analysis of a Messaging System in IoT Environments (IoT 환경에서의 메시징 시스템의 성능 분석에 관한 연구)

  • Young-Dong Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.112-118
    • /
    • 2023
  • Internet of Things(IoT) technology is developing to a stage where the Internet and objects are connected and objects themselves analyze and judge data to interconnect the real world and the virtual world in real time. This technology consists of sensors, actuators, devices, and networks, and it is being applied in various fields. As the number of IoT devices and applications increases, data traffic also increases. In this paper, a messaging system is designed and implemented in order to analyze the performance between an IoT device and MQTT broker. The experimental was performed to measure MQTT-based round-trip time and message transmission time between the IoT device and the broker. The result shows that there is no packet loss, and propagation delay affects round-trip time.

IoT model to improve parent-child interaction -Focus on smart watch for kids- (부모-자녀 상호작용을 증진하는 IoT 모델 -유아용 스마트워치를 중심으로-)

  • Yee, Young-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.209-218
    • /
    • 2017
  • To propose a contents model for children's smart watch, this study interview 15mothers who have a child using smart watches. Most mothers purchase smart watches for children to warrant their security and manage their schedules, and they use them for sending a call or text to their children, tracking or managing children's location and schedule. Mothers were satisfied with a smart watch's function of communication and safety management, but dissatisfied learning-oriented contents and worrried about bad influenced on children development. Through in-depth interviews, this study propose a persona model for children's smart watch for enhancing parent-child interaction and physical cognitive language socioemotional convergence play contents.

Study on Insider Pattern Monitoring System for Secure Smart Building Operations (안전한 스마트빌딩 운영을 위한 내부자 패턴 모니터링 시스템 연구)

  • Kim, Jeong-Ho;Chung, Hague;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.288-289
    • /
    • 2016
  • 최근 사물인터넷(Internet of Things)의 발달로 인해 사물과 사물간의 통신을 이용해 사용자가 어느 곳에서나 집 또는 사무실 등의 장소의 정보를 얻을 수 있게 되었다. 하지만 IoT기기들을 스마트빌딩에 활용하는데 있어서 내부에서 공격이 발생했을 경우에 효과적으로 방어할 수 있는 방어체계가 갖추어져 있지 않아 위험하다는 점이 존재한다. 따라서 본 논문에서는 IoT 네트워크를 구축한 스마트빌딩에서 내부 사용자 접근에 대한 누적 정보를 바탕으로 스마트빌딩 내부에서 발생할 수 있는 불법적인 내부자 공격에 대하여 스마트빌딩을 안전하게 운영할 수 있는 내부자 패턴 모니터링 시스템을 제안한다.

A Design and Implementation based on Educational Smart Farm System (스마트 팜 교육 시스템 설계 및 구현)

  • Chung, Joong-Soo;Jung, Kwang-Wook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.145-148
    • /
    • 2022
  • 본 논문은 스마트 팜 교육용 시스템을 IoT 기반으로 임베디드 환경에서 설계 및 구현하였다. 시스템 환경은 라즈베리파이 기반에서 노드-레드(Node-RED) 프로그램을 적용하였고 생육재배에 필요한 환경 센서와 구동장치를 연동하여 구축하였다. 센싱 정보는 유. 무선통신으로 서버로 전달되며, 데이터베이스를 근간으로 한 웹 설계는 PHP, MySQL을 사용하고, 스마트 폰 앱은 안드로이드 스튜디오를 사용하였다. 시스템 동작 과정은 센서값 인지 및 비주얼한 표시, 연동 구동장치 제어 프로그래밍, 서버 및 스마트 폰을 이용한 원격제어와 모니터링 과정을 수행할 수 있도록 설계하였다.

  • PDF

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.