• Title/Summary/Keyword: IOT

Search Result 332, Processing Time 0.023 seconds

Success Factors of O2O(Online-to-Offline) Commerce (O2O(Online-to-Offline) 상거래의 성공요인)

  • Kim, JaeKyung;Jang, YuRi;Jeong, HyeJin;Moon, Yun Ji
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.374-377
    • /
    • 2015
  • O2O(Online-to-offline) service is the new commerce system form that mixed information search and payment of products and services from online and receipt of goods from offline. O2O commerce combine advantage of existing electronic commerce and redeem the critical point of each commerce circulation method, but earnings model is still lacking compared to development speed of O2O technology. Therefore this study drew common factor applied to O2O service to search success factor of O2O commerce on the point of view as a customer Centered by existing B2C electronic commerce, Mobile commerce, and service quality model of offline commerce included O2O commerce method. Further we suggest O2O success factor model combined new O2O success factor additionally reflecting qualitative research result based on drew O2O success service Quality factor.

  • PDF

IoT-based D2D relation algorithms utilizing a Wi-Fi (Wi-Fi를 활용한 IoT기반 D2D 릴레이션 알고리즘)

  • Lim, Hyeok;Kim, Wung-Jun;Hwang, Jong-Sun;Jung, Dae-Jin;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.645-647
    • /
    • 2015
  • IoT (Internet of Things) technology has immense potential in our modern society. Generally when used in a consumer electronics environment, the IoT can continue to work more efficiently than the conventional method of home appliances. In order to use the IOT device's effectively in the environment, we need to determine the relationship between all device's based on their state and priority and compare it to find the suitable device based on the state and priority. In this paper I have done research on Wi-Fi devices in a network environment and I have observed relationships between them. Also I have proposed an algorithm to determine the device status and priority. This determines high-priority devices and they are identified on the basis of the state of the device associated with a particular operation and proceeds further.

  • PDF

A Study on the Comparison of Reliability Between MQTT and CoAP (Confirmative Message) (MQTT와 CoAP(Confirmative message) 신뢰성 비교)

  • Ryu, Kuem-gang;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.485-487
    • /
    • 2017
  • With the growth of the IoT, security is a growing concern. Things the risk of IoT security has been constantly raised, and there have been many cases of hacking. As a result, there is a growing concern and scale about security, but there is a lack of interest and research on the message protocols between Iot devices. With the development of the IoT, the importance of low-power, lightweight and accurate message delivery will become more important and more advanced message protocols will be needed. In this paper, it is aimed to construct the system for communication between client and server of MQTT and CoAP with Confirmative option, which are most used among IoT message protocols and compare the message reliability of each communication protocol to check efficiency.

  • PDF

Smart Outlet System for Single-person Household based on IoT (Internet of Things) (사물 인터넷 기반의 1인 가구를 위한 스마트 콘센트 시스템)

  • Kim, Hye-Suk;Park, Byeong-Ju;Cho, Young-Ju
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.895-904
    • /
    • 2017
  • In this paper, we propose an IoT based smart outlet system for one-person household with electric safety, electric energy consumption management and transmission of messages to the reserved contacts by connecting the emergency network. The proposed smart outlet system is implemented by parsing packet data and protocol between server, module, application and WiFi AP receiver. The WiFi AP built for communication can be used not only for the outlet but also for the gas barrier, the door lock and the like. In addition, the proposed method can provide the remote monitoring function by receiving the amount of power of the receptacle received through the AC current sensor (SCT-013) in real time. The smart outlet system is expected to be capable of automatically shutting off the power in case of emergency through automatic power use analysis in addition to the standby power cutoff function.

Power Charge Scheduling and Charge-Ready Battery Allocation Algorithms for Real-Time Drones Services (실시간 드론 서비스를 위한 전원 충전 스케쥴링과 충전 배터리 할당 알고리즘)

  • Tajrian, Mehedi;Kim, Jai-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.277-286
    • /
    • 2019
  • The Unmanned Aerial Vehicle (UAV) is one of the most precious inventions of Internet of things (IOT). UAV faces the necessity to charge battery or replace battery from the charging stations during or between services. We propose scheduling algorithms for drone power charging (SADPC). The basic idea of algorithm is considering both a deadline (for increasing deadline miss ratio) and a charging time (for decreasing waiting time) to decide priority on charging station among drones. Our simulation results show that our power charging algorithm for drones are efficient in terms of the deadline miss ratio as well as the waiting time in general in compare to other conventional algorithms (EDF or SJF). Also, we can choose proper algorithms for battery charge scheduling and charge ready battery allocation according to system parameters and user requirements based on our simulation.

A Generic Interface for Internet of Things (IoT) Platforms (IoT 플랫폼을 위한 범용 인터페이스)

  • Kim, Mi;Lee, Nam-Yong;Par, Jin-Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.1
    • /
    • pp.19-24
    • /
    • 2018
  • This paper presents an IoT platform of common interfaces that are flexible IoT applications and Connect the smart devices. The IoT platform includes automatic collaboration discovery the smart Device. It is different things case with connection each device through IoT Platforms are each device and application service. Due to these heterogeneities, it is quite advantages to develop applications working with derived IoT services. This circumstance needs the generic interface and results in a range of IoT architectures by not only the environments settings and discovery resource but also varied uniqe to implementation services working with IoT applications. Therefore, this suggestion of solve the problems and make it possible independent platforms always alive to connection with each devices based on the generic interface. The generic interface is heterogeneity-driven solve the problems and effectively contributions a platform that could be operated in diverse IoT Platforms.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Design and Implementation of CoAP Authorization Framework Based on OAuth 2.0 (OAuth 2.0 기반 CoAP 인증 프레임워크 설계 및 구현)

  • Kim, Kyoung-Han;Lim, Hyun-Kyo;Heo, Joo-Seong;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.329-342
    • /
    • 2017
  • Recently, interest and investment in the Internet of Things (IoT) have increased significantly, and security issues are constantly being raised. As a solution, the IETF ACE Working Group is establishing the ACE framework standard, which is a new security framework for various constrained IoT environments based on the existing OAuth 2.0. However, additional work is required to apply the ACE framework, which proposes a new lightweight security system, to the existing Internet environment, and this additional cost is a factor that hinders the application of OAuth 2.0 to the IOT environment. Therefore, we propose an IoT authentication framework based on OAuth 2.0's existing development motivation, and implement a proposal framework based on CoAPthon and analyze its performance.

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

Development of Technique for Real-time measurement of Water Elevation based on Open-source Hardware and Webservice (오픈소스 하드웨어와 웹서비스 기반 실시간 수위 관측기술 개발)

  • You, Ho Jun;Kim, Dong Su
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.64-64
    • /
    • 2018
  • 하천에서 수위는 가장 기본적인 수리 수문학적 자료로서, 홍수나 가뭄 등의 피해를 막기 위한 치수와 물을 잘 통하게 하거나 물을 이용하기 위한 이수에 주로 사용된다. 예를 들면, 댐, 보, 저수지 등의 하천시설물 설계 및 관리를 위해 수위를 이용하며, 유량 산정을 위해서 수위-유량 관계 곡선식을 구축하여 수위를 이용한다. 따라서 하천에서 수위는 현재 국내에서 수자원분야에서 사용되는 자료 중에서 가장 중요하며, 동시에 광범위하게 사용되고 있으므로 수위를 관측하는 것이 수자원의 기초라 할 수 있다. 수위 관측의 필요성과 확장 필요성에 대한 인식에도 불구하고, 국내의 수위 관측소는 한강, 낙동강, 금강 등 대하천 위주로 설치되어 있어, 중소규모 하천에서 발생하는 다양한 수문사상에 대한 분석 및 예측이 어려운 실정이다. 특히, 홍수의 경우 같은 강우 사상에도 대하천보다는 중소규모의 하천이 더 극단적으로 유출이 발생하기 때문에, 즉각적인 수위의 계측이 필요한 실정이다. 하지만 한정된 예산 및 인프라의 부족은 중소규모 하천에 대한 수위 관측 시스템의 적용이 대하천에 비해 그 우선수위가 밀리는 원인이 되고 있으며, 지속적으로 중소규모 하천에 대한 수위 관측시스템 적용에 대한 수요가 증가를 야기 시키고 있다. 최근, 과거에 제품을 만들기 위한 전자회로, 자재명세서, 기판도면 등의 정보를 공개하지 않는 폐쇄적인 환경을 벗어나 제품을 만들기 위한 하드웨어 정보를 공개하고, 공개된 정보를 통해 기술을 개발하기 위한 움직임이 활발하다. 이러한 개념을 오픈소스 하드웨어라는 개념으로서, 하드웨어의 제작 없이 간단한 코딩을 통해 하드웨어를 컨트롤 하는 기술이다. 즉, 오픈소스 하드웨어는 초소형화된 PC를 활용하여 센서를 작동하는 것이라 할 수 있다. 이를 통해 기존의 기술을 저렴한 가격으로 제품으로 생산할 수 있다. 또한 사물인터넷(IOT)를 활용하여 온라인 상에서 이러한 오픈소스 하드웨어를 컨트롤 할 수 있으며, 웹서비스와 결합할 경우 센서를 통해 수집된 결과를 인터넷 상에서 확인 할 수 있는 기술들이 지속적으로 개발하고 있다. 이러한 기술이 접목되면 과거에 비해 적은 비용으로 고효율의 자료 수집을 수행 할 수 있다. 본 연구에서는 지속적으로 증가하고 있는 중소규모 하천에 대한 수위 관측시스템 적용에 대한 수요를 해결하기 위해서 기존의 시스템이 가지고 있는 경제적, 기술적 한계를 극복하기 위하여 오픈소스 하드웨어 플랫폼인 아두이노와 사물인터넷 기반 기술을 활용하기 위한 웹서비스를 이용하여 실시간 수위 관측기술을 개발하고, 적용성을 검토하고자 한다.

  • PDF