• Title/Summary/Keyword: Address of Things

Search Result 125, Processing Time 0.029 seconds

Federated Learning-Internet of Underwater Things (연합 학습기반 수중 사물 인터넷)

  • Shrutika Sinha;G., Pradeep Reddy;Soo-Hyun Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.140-142
    • /
    • 2023
  • Federated learning (FL) is a new paradigm in machine learning (ML) that enables multiple devices to collaboratively train a shared ML model without sharing their local data. FL is well-suited for applications where data is sensitive or difficult to transmit in large volumes, or where collaborative learning is required. The Internet of Underwater Things (IoUT) is a network of underwater devices that collect and exchange data. This data can be used for a variety of applications, such as monitoring water quality, detecting marine life, and tracking underwater vehicles. However, the harsh underwater environment makes it difficult to collect and transmit data in large volumes. FL can address these challenges by enabling devices to train a shared ML model without having to transmit their data to a central server. This can help to protect the privacy of the data and improve the efficiency of training. In this view, this paper provides a brief overview of Fed-IoUT, highlighting its various applications, challenges, and opportunities.

SPaRe: Efficient SQLite Recovery Using Database Schema Patterns

  • Lee, Suchul;Lee, Sungil;Lee, Jun-Rak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1557-1569
    • /
    • 2017
  • In recent times, the Internet of Things (IoT) has rapidly emerged as one of the most influential information and communication technologies (ICT). The various constituents of the IoT together offer novel technological opportunities by facilitating the so-called "hyper-connected world." The fundamental tasks that need to be performed to provide such a function involve the transceiving, storing, and analyzing of digital data. However, it is challenging to handle voluminous data with IoT devices because such devices generally lack sufficient computational capability. In this study, we examine the IoT from the perspective of security and digital forensics. SQLite is a light-weight database management system (DBMS) used in many IoT applications that stores private information. This information can be used in digital forensics as evidence. However, it is difficult to obtain critical evidence from IoT devices because the digital data stored in these devices is frequently deleted or updated. To address this issue, we propose Schema Pattern-based Recovery (SPaRe), an SQLite recovery scheme that leverages the pattern of a database schema. In particular, SPaRe exhaustively explores an SQLite database file and identifies all schematic patterns of a database record. We implemented SPaRe on an iPhone 6 running iOS 7 in order to test its performance. The results confirmed that SPaRe recovers an SQLite record at a high recovery rate.

A Study of Data Collection Method for Efficient Sharing in IoT Environment (사물인터넷(IoT) 환경에서 효율적 공유를 위한 데이터 수집 기법에 대한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.268-269
    • /
    • 2015
  • The current Internet environment, it is accessible by a computer, but also transferred to the IoT(Internet of Things). These data become large. If the data are provided to the application without any adjustment, it is difficult to exert the original performance. In this paper, we propose a method for filtering the data using the MapReduce of big data processing techniques to refine the collected data. We want to address the heterogeneity of the data generated by the sensor by adding a knowledge identification step in MapReduce. We use XMDR for this purpose.

  • PDF

Implementation of P2P Standard Group Formation in WiFi Direct for Direct Communication Services between Internet-of-Things Gateways (사물인터넷 게이트웨이 간의 직접통신 서비스를 제공하기 위한 와이파이 다이렉트 P2P Standard Group Formation 구현)

  • Park, Yungi;Han, Kwonhee;Seo, Jeongwook;Kim, Hyunsik;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.436-438
    • /
    • 2015
  • In this paper, a P2P Standard Group Formation (P2P-SGF) method in Wi-Fi Direct is presented to provide direct communication services between Internet-of-Things (IoT) gateways. Generally, network traffic congestion and speed reduction problems are caused when transmitting mass data as well as measured data from many sensors between IoT gateways via an Access Point (AP). For solving these problems, it is required to implement Wi-Fi Direct efficiently transmitting mass data between IoT gateways without passing through the AP. The implemented P2P-SGF method basically performs Discovery, GO (Group Owner) Negotiation, WPS (Wi-Fi Protected Setup) Provisioning, and Address Configuration. Especially, it supports the DLNA (Digital Living Network Alliance) service function for sharing mass data between IoT gateways. Some experimental results verify that it can successfully share large video files.

  • PDF

IoT-Based Health Big-Data Process Technologies: A Survey

  • Yoo, Hyun;Park, Roy C.;Chung, Kyungyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.974-992
    • /
    • 2021
  • Recently, the healthcare field has undergone rapid changes owing to the accumulation of health big data and the development of machine learning. Data mining research in the field of healthcare has different characteristics from those of other data analyses, such as the structural complexity of the medical data, requirement for medical expertise, and security of personal medical information. Various methods have been implemented to address these issues, including the machine learning model and cloud platform. However, the machine learning model presents the problem of opaque result interpretation, and the cloud platform requires more in-depth research on security and efficiency. To address these issues, this paper presents a recent technology for Internet-of-Things-based (IoT-based) health big data processing. We present a cloud-based IoT health platform and health big data processing technology that reduces the medical data management costs and enhances safety. We also present a data mining technology for health-risk prediction, which is the core of healthcare. Finally, we propose a study using explainable artificial intelligence that enhances the reliability and transparency of the decision-making system, which is called the black box model owing to its lack of transparency.

Challenges and solutions for Internet of Things Driven by IPv6

  • Emad-ul-Haq, Qazi;Aboalsamh, Hatim;Belghith, Abdelfettah;Hussain, Muhammad;Abdul, Wadood;Dahshan, Mostafa H.;Ghouzali, Sanaa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4739-4758
    • /
    • 2015
  • The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devices to the Internet as well as offering new services. Internet of Things, which provides interconnected uniquely identifiable devices in the existing Internet infrastructure, will be greatly affected by the lack of unique IP addresses. In order to connect to the existing Internet infrastructure, every new device needs a uniquely identified IP address for communication. It has been estimated that by the year 2020 more than 30 billion devices would be connected to the Internet. In order to meet the challenge of such vast requirement of unique IP addresses, the devices in IoT will have to adopt IPv6, which is the latest version of Internet Protocol. IPv6 uses 128-bit IP addresses and offers 2128 unique IP addresses. Therefore, it expands IPv4 and provides new features of end to end connections as well as new services. In this paper, the various challenges with respect to providing connectivity, security, mobility, etc., have been discussed and how IPv6 helps in meeting those challenges.

Implementation of Object Identifier, Mobile RFID and QR Code Exploiting End-of-Life Treatment Information of Internet of Things Devices (사물인터넷 디바이스의 폐기 처리 정보를 활용한 객체 식별자, 모바일 RFID 및 QR 코드 구현)

  • Seo, Jeongwook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.441-447
    • /
    • 2020
  • In a situation in which around 50 million metric tons of electrical and electronic products is generated globally per year, the total installed base of Internet of Things (IoT) devices is projected to amount to around 75 billion worldwide by 2025. However, there is very little research on identification schemes for end-of-life treatment (EoLT) of IoT devices. To address this issue, this paper proposes new identifiers including EoLT information such as recyclability rate (Rcyc) and recoverability rate (Rcov) of an IoT device, recycling rate (RCR) and recovery rate (RVR) of each part in the IoT device, etc. and implements them by using object identifier (OID), mobile radio frequency identification (RFID) and quick response (QR) code. The implemented OID and mobile RFID can be used with cooperation of a remote server via communication networks and the implemented QR code can be used simply with a smartphone app.

Software Engineering Principles for the Development of Power-Efficient Mobile IoT Devices (파워 효율이 높은 모바일 IoT 단말 개발을 위한 소프트웨어 공학 원칙)

  • Lee, Hyesun;Lee, Kang Bok;Bang, Hyo-Chan
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.12
    • /
    • pp.762-767
    • /
    • 2015
  • An Internet of Things (IoT) is a system where various "things" are connected to each other via a wired/wireless network, and where information is gathered, processed, and interchanged/shared. One of the important actors in IoT is a mobile IoT device (such as a smartphone or tablet). These devices tend to consume a large amount of power in order to provide various high performance application services; however, as the devices cannot be supplied with power all the time, efficient power management is necessary. Power management of mobile IoT devices involves complex relationships between various entities such as application processors (APs), HW modules inside/outside AP, operating systems, mobile IoT platforms, and applications. In order to develop power-efficient mobile IoT devices, a method is needed to systematically analyze these relationships and manage power based on a clear understanding of them. To address this problem, software engineering principles for the development of power-efficient mobile IoT devices are presented in this paper. The feasibility of the proposed principles have been validated in the domain of smartphone camera power management.

Constructing an Internet of things wetland monitoring device and a real-time wetland monitoring system

  • Chaewon Kang;Kyungik Gil
    • Membrane and Water Treatment
    • /
    • v.14 no.4
    • /
    • pp.155-162
    • /
    • 2023
  • Global climate change and urbanization have various demerits, such as water pollution, flood damage, and deterioration of water circulation. Thus, attention is drawn to Nature-based Solution (NbS) that solve environmental problems in ways that imitate nature. Among the NbS, urban wetlands are facilities that perform functions, such as removing pollutants from a city, improving water circulation, and providing ecological habitats, by strengthening original natural wetland pillars. Frequent monitoring and maintenance are essential for urban wetlands to maintain their performance; therefore, there is a need to apply the Internet of Things (IoT) technology to wetland monitoring. Therefore, in this study, we attempted to develop a real-time wetland monitoring device and interface. Temperature, water temperature, humidity, soil humidity, PM1, PM2.5, and PM10 were measured, and the measurements were taken at 10-minute intervals for three days in both indoor and wetland. Sensors suitable for conditions that needed to be measured and an Arduino MEGA 2560 were connected to enable sensing, and communication modules were connected to transmit data to real-time databases. The transmitted data were displayed on a developed web page. The data measured to verify the monitoring device were compared with data from the Korea meteorological administration and the Korea environment corporation, and the output and upward or downward trend were similar. Moreover, findings from a related patent search indicated that there are a minimal number of instances where information and communication technology (ICT) has been applied in wetland contexts. Hence, it is essential to consider further research, development, and implementation of ICT to address this gap. The results of this study could be the basis for time-series data analysis research using automation, machine learning, or deep learning in urban wetland maintenance.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.