• Title/Summary/Keyword: 스마트 IoT

Search Result 1,190, Processing Time 0.028 seconds

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.

Detection of Hand Gesture and its Recognition for Wearable Applications in IoMTW (IoMTW 에서의 웨어러블 응용을 위한 손 제스처 검출 및 인식)

  • Yang, Anna;Hong, Jeong Hun;Kang, Han;Chun, Sungmoon;Kim, Jae-Gon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2016.11a
    • /
    • pp.33-35
    • /
    • 2016
  • 손 제스처는 스마트 글라스 등 웨어러블 기기의 NUI(Natural User Interface)를 구현하기 위한 수단으로 각광받고 있다. 최근 MPEG 에서는 IoT(Internet of Things) 및 웨어러블 환경에서의 미디어 소비를 지원하기 위한 IoMTW(Internet of Media-Things and Wearables) 표준화를 진행하고 있다. 본 논문에서는 손 제스처를 웨어러블 기기의 NUI 로 사용하여 웨어러블 기기 제어 및 미디어 소비를 제어하기 위한 손 제스처 검출과 인식 기법를 제시한다. 제시된 기법은 스테레오 영상으로부터 깊이 정보와 색 정보를 이용하여 손 윤곽선을 검출하여 이를 베지어(Bezier) 곡선으로 표현하고, 표현된 손 윤곽선으로부터 손가락 수 등의 특징을 바탕으로 제스처를 인식한다.

  • PDF

A Study on the Livestock Feed Measuring Sensor and Supply Management System Implementation based on the IoT (IoT 기반의 축산사료 측정 장치 및 사료 공급 시스템 구현)

  • An, Wonyoung;Chang, YunHi
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.5
    • /
    • pp.442-454
    • /
    • 2017
  • As the demand for meat products has steadily increased in Korea, so the livestock industry has full grown. However, the opening of import meat products is taking a toll on the local industry. Cost reduction on livestock feed, which comprises the majority of costs involved in the industry is urgent to gain a competitive edge. As Internet of Things (IoT) technologies are being applied across a multiple of industries, so are the cases of applied Smart Farm technology for efficient production. The following research aims to utilize IoT technologies to measure, in real time, the rate of depletion of feed and remaining amount and to propose an effective automated reorder & delivery system. First, a method of utilization of ultrasonic and temperature/humidity sensors to obtain corresponding data of remaining feed in the Feedbin is proposed. In addition, a method of sending the obtained data via on-the-farm gateway to Supply Chain Management (SCM) servers is proposed. Finally, utilization of the stored data to construct an automated reorder & delivery service system is proposed. It is in the researcher's intention to contribute to and enable the local livestock industry with the application of various IoT services.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

An Enhanced System of Group Key Management Based on MIPUF in IoT (IoT 환경의 MIPUF 기반 그룹키 관리 시스템 개선)

  • Tak, Geum Ji;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1243-1257
    • /
    • 2019
  • With the emergence of the IoT environment, various smart devices provide consumers with the convenience and various services. However, as security threats such as invasion of privacy have been reported, the importance of security issues in the IoT environment has emerged, and in particular, the security problem of key management has been discussed, and the PUF has been discussed as a countermeasure. In relation to the key management problem, a protocol using MIPUF has been proposed for the security problem of the group key management system. The system can be applied to lightweight IoT environments and the safety of the PUF ensures the safety of the entire system. However, in some processes, it shows vulnerabilities in terms of safety and efficiency of operation. This paper improves the existing protocol by adding authentication for members, ensuring data independence, reducing unnecessary operations, and increasing the efficiency of database searches. Safety analysis is performed for a specific attack and efficiency analysis results are presented by comparing the computational quantities. Through this, this paper shows that the reliability of data can be improved and our proposed method is lighter than existing protocol.

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment (스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계)

  • Kim, Jeong-Ho;Heo, Jae-Wook;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.550-558
    • /
    • 2019
  • As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

Study on Digital content copyright protection and transaction activation method Using block chain Ethereum (블록체인을 활용한 디지털 콘텐츠 저작권 보호 및 거래활성화 방법 연구)

  • Baek, Yeong tae;Min, Youna
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.73-75
    • /
    • 2018
  • 디지털 콘텐츠의 영역을 확장하여 발달된 기술을 반영한 다양한 디지털 콘텐츠 기술이 발달하고 있다. 가상현실, 증강현실, 컴퓨터그래픽, 홀로그램, 오감 인터랙션, 지능형 스마트 미디어 유통기술이 그것인데 이 중 지능형 스마트 미디어 유통기술이란 IoT, 클라우드, 빅데이터 기반 개인 맞춤형 콘텐츠 유통기술, 영상정보를 검색하여 방송, 모바일 등 연관콘텐츠를 제공하는 유통기술(Visual Browsing) 등을 말한다. 이 논문에서는 디지털 콘텐츠 중 지능형 스마트 미디어 유통기술을 안전하게 개발하고 발전시키기 위하여 블록체인 방법을 활용한 스마트 미디어 유통기술에 대하여 연구하였다. 블록체인 기반 기술을 통하여 스마트 미디어 유통 시 해킹으로부터 데이터 원본 보호의 안전함을 제공하고 유통 시 필요한 저작권관리 및 유통 기록을 위 변조 없이 관리할 수 있다.

  • PDF

Smart refrigerator to inform the expiration date (유통기한을 알려주는 스마트 냉장고)

  • Ryu, Ji-wan;Bae, Dong-ki;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.442-444
    • /
    • 2015
  • While Internet of things(IoT) era arrives, the communication capable world between various smart devices is realized. In this study, to reduce the inconvenience of daily life, in research on a smart refrigerator, it is possible to confirm the presence or absence of abnormality of the contents by sending the expiration date of the contents in the refrigerator to the user's smart phone.

  • PDF

Self-development smart watch & app 'MO:TIVE' using AI and IOT technology (AI, IOT 기술을 활용한 자기계발 스마트 워치 & 어플 'MO:TIVE')

  • So-Yeon Kim;Ha-Yeon Mo;Yu-Young Lee;Ye-Sung Lee;Ga-Hyun Choi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1043-1044
    • /
    • 2023
  • 'MO:TIVE'는 AI 및 IoT를 활용하여 자기계발을 촉진하는 모바일 서비스로, 사용자 정보 학습과 정밀한 추천을 제공하며 생성형 AI를 활용한 개인화 조언을 제공한다. 이를 통해 사용자는 스마트 워치를 통해 자투리 시간을 효과적으로 활용하여 자기계발과 삶의 질을 향상을 기대할 수 있으며 지속적인 개선과 학습을 통해 더 나은 사용자 경험을 제공한다.

Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트 TV 보안 요구사항 도출)

  • Oh, In-Kyung;Seo, Jae-Wan;Lee, Min-Kyu;Lee, Tae-Hoon;Han, Yu-Na;Park, Ui-Seong;Ji, Han-Byeol;Lee, Jong-Ho;Cho, Kyu-Hyung;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.213-230
    • /
    • 2020
  • As smart TVs have recently emerged as the center of the IoT ecosystem, their importance is increasing. If a vulnerability occurs within a smart TV, there is a possibility that it will cause financial damage, not just in terms of privacy invasion and personal information leakage due to sniffing and theft. Therefore, in this paper, to enhance the completeness of smart TV vulnerability analysis, STRIDE threat classification are used to systematically identify threats. In addition, through the manufacture of the Attack Tree and the actual vulnerability analysis, the effectiveness of the checklist was verified and security requirements were derived for the safe smart TV use environment.