• Title/Summary/Keyword: IOT 시스템

Search Result 129, Processing Time 0.028 seconds

A Study on Multi-Variant Execution Environment (Multi-Variant Execution Environment 연구 동향)

  • Cho, Myunghyun;Chang, Jiwon;Nam, Kevin;Hwang, Dongil;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.275-278
    • /
    • 2020
  • C 와 C++은 비교적 자유로운 코딩 환경으로 많은 프로그래머들에게 사랑받는 프로그래밍 언어이다. 또한, 빠른 속도와 호환성 덕분에 현재 많은 IOT, 임베디드 시스템에 적용되고 있다. C 와 C++은 자유로운 환경을 가지고 있는 반면에 프로그래머의 부주의한 코딩 방식에 의해 여러 취약점을 발생시켜 공격 범위를 증가시킬 수 있다. 다음은 외부 침입자에게 공격에 필요한 좋은 소스를 제공할 수 있으므로 이러한 공격을 막기 위한 범용적인 기술이 필요하다. 본 연구에서는 다음 취약점에 대한 공격을 막을 수 있는 기술 중 하나인 Multi-Variant Execution Environment(MVEE) 기술을 소개하고 다음 기술의 핵심인 다양한 Variant 생성 방식과 기존 연구 분석을 통해 한계점을 고찰하고자 한다.

Design and Implementation of Sensor-based Secondary Vehicle Accident Prevention System (센서 기반의 차량 2차사고 방지 시스템 설계 및 구현)

  • Lim, Kyung-Gyun;Kim, Gea-Hee;Jeong, Seon-Mi;Mun, Hyung-Jin;Kim, Chang-Geun
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.313-321
    • /
    • 2017
  • Traffic accidents in the country have steadily increased. Although IOT technologies have been applied so as to prevent the primary accident, practical solutions to prevent the secondary accident have not been suggested. A general guideline is simply recommended. In this paper, utilizing existing communication technology, we implement a proposed model and its simulation to prevent the secondary accident. When it is possible for a driver to secure visibility, the secondary accident can be prevented; In areas like tunnel, mountain terrain, and curve road with heavy traffic, where the driver has difficulty in securing the visibility, the secondary accident rates after the primary accident have been increasing. Therefore, we implement an accident prevention system that determines the primary accident utilizing sensor technology and prevents the secondary accident communicating through V2V or V2I. After the simulation, we found that the proposed model and the existing model made no difference with regard to the secondary accident rates when the visibility of the driver is secured; With the application of the proposed model, however, the accident rates decreased for 3-7 percent even though the visibility and communication were not secured.

Design and Implementation of ifttt-based Smart Home Remote Controller for Intelligent Smart Home Service (지능적인 스마트홈 서비스를 위한 IFTTT기반의 스마트홈 리모컨 설계 및 구현)

  • Kim, Dong-min;Lim, Ji-yong;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.72-75
    • /
    • 2018
  • Internet of Things (IOT) technology is rapidly becoming a reality in many parts of our lives through various products and services. Currently, the perception of Internet services for things is becoming common, and the B2C (Business to Consumer) market is explosively increasing as consumers are increasingly willing to purchase Internet devices. In particular, the economic effects of the Internet based smart home sector are known to be very large, and global manufacturers are launching various consumer oriented products based on smart home services.However, current smart home service products are closed systems because they provide independent devices for each manufacturer and provide only specific devices and services linked to them. There is a need for an environment that can provide intelligent smart home service through linkage between objects or services, and a controller that can provide smart control is needed. Therefore, this paper proposes a smart home remote control that can control the Internet devices and services of objects. The proposed smart home remote control provides an environment in which users can directly rescue services through the IFTTT automated service platform, which is an independent platform for each manufacturer.

  • PDF

Comparison of Efficiency Analysis of Device Energy Used in Object Communication (사물통신에 사용되는 디바이스 에너지의 효율화 분석 고찰)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1106-1112
    • /
    • 2017
  • As the Internet of Things (IOT) is evolving into an industry-wide service and expanded to the concept of Internet of Everything (IoE), services using IoT devices are easily accessible in everyday life. IoT requires more devices to collect information and is expected to increase the number of devices by 50 billion by 2020, and is about the number of devices currently available. Gradually, the number of mobile devices, smart devices, and Internet devices is increasing, and energy resources are required to operate such a large number of Internet devices, and the energy consumed by each device is small. In this paper, we consider the number of devices to be increased and generate a signal irrespective of transmission information so that power other than the energy required for signal transmission is consumed. When transmission information is generated and near to a receiver to receive information, The method to be used as an analysis is designed through experiments.

A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique (정적 분석 기반 기계학습 기법을 활용한 악성코드 식별 시스템 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.775-784
    • /
    • 2019
  • Malware infringement attacks are continuously increasing in various environments such as mobile, IOT, windows and mac due to the emergence of new and variant malware, and signature-based countermeasures have limitations in detection of malware. In addition, analytical performance is deteriorating due to obfuscation, packing, and anti-VM technique. In this paper, we propose a system that can detect malware based on machine learning by using similarity hashing-based pattern detection technique and static analysis after file classification according to packing. This enables more efficient detection because it utilizes both pattern-based detection, which is well-known malware detection, and machine learning-based detection technology, which is advantageous for detecting new and variant malware. The results of this study were obtained by detecting accuracy of 95.79% or more for benign sample files and malware sample files provided by the AI-based malware detection track of the Information Security R&D Data Challenge 2018 competition. In the future, it is expected that it will be possible to build a system that improves detection performance by applying a feature vector and a detection method to the characteristics of a packed file.

A Study on Zero Energy House Model of Housing Complex (주택 단지 제로 에너지 하우스 모델에 관한 연구)

  • Huh, Myung Hoi;Shin, shung jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.121-126
    • /
    • 2020
  • In many parts of the world, climate warming has caused tremendous environmental disasters to repeat every year. Overuse of fossil fuels, the main source of energy, has affected the global environment, destroying the global ecosystem and depleting resources. To overcome this, efforts to reduce carbon emissions through the development of renewable energy are being actively studied at home and abroad. Already, new technologies are being reported abroad to reduce carbon emissions. Zero Energy House is a model that reduces low carbon emissions and energy use due to the use of high-density materials for high-heated materials, and can live in real life by receiving the minimum required energy through renewable energy. Although the government is trying to apply this in Korea, it is difficult to become common because of the lack of economic feasibility. The purpose of this study is to study models that can zero carbon emissions, which are eco-friendly elements, secure construction economy of zero energy house by using ventilation system, heat exchanger and energy storage system for public use, and attach automation system to window opening/closing to maintain indoor temperature.

Power Charge Scheduling and Charge-Ready Battery Allocation Algorithms for Real-Time Drones Services (실시간 드론 서비스를 위한 전원 충전 스케쥴링과 충전 배터리 할당 알고리즘)

  • Tajrian, Mehedi;Kim, Jai-Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.277-286
    • /
    • 2019
  • The Unmanned Aerial Vehicle (UAV) is one of the most precious inventions of Internet of things (IOT). UAV faces the necessity to charge battery or replace battery from the charging stations during or between services. We propose scheduling algorithms for drone power charging (SADPC). The basic idea of algorithm is considering both a deadline (for increasing deadline miss ratio) and a charging time (for decreasing waiting time) to decide priority on charging station among drones. Our simulation results show that our power charging algorithm for drones are efficient in terms of the deadline miss ratio as well as the waiting time in general in compare to other conventional algorithms (EDF or SJF). Also, we can choose proper algorithms for battery charge scheduling and charge ready battery allocation according to system parameters and user requirements based on our simulation.

Intelligent Home appliances Power Control using Android and Arduino (안드로이드와 아두이노를 이용한 지능형 가전제품 전력 컨트롤)

  • Park, Sung-hyun;Kim, A-Yong;Kim, Wung-Jun;Bae, Keun-Ho;Yoo, Sang-keun;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.854-856
    • /
    • 2014
  • Has been released of make it possible to control the using for smart devices of a wide variety home appliances and electronics in smart appliances in accordance with the one person multi devices. In addition, is increasing rapidly for the number of the product on cleaning robot and refrigerator, air conditioning, TV, etc. these devices are using the implement up DLNA system. And at home and abroad for development and has provided with Iot and Alljoyn such systems. But currently using home appliances or electronic devices of there are a lot of the operating system non installed than the installed products. In addition, smart appliances do not use for user than buying existing electronic products a lot more. In addition, more occur for smart appliances of that do not use for the user on smart appliances rather than buying existing electronics. In this paper, Suggested and implemented for system of control such as smart devices to existed home appliance on not have an operating system, Using mobile device for want users to quantify the data to transfer from arduino board.

  • PDF

The Arduino based Window farm Monitoring System (아두이노를 활용한 창문형 수경재배 모니터링 시스템)

  • Park, Young-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.563-569
    • /
    • 2018
  • This paper is on the implementation of a system for automatically monitoring window farm hydroponics based on Arduino (utilizing Arduino's open source code) emerging as the icon of the Fourth Industrial Revolution. A window farm, which means window-type hydroponics, is offered as an alternative to fulfill the desires of people who want to grow plants aside from the busy daily life in the city. The system proposed in this paper was developed to automatically monitor a window farm hydroponics cultivation environment using the Arduino UNO board, a four-charmel motor shield, temperature and humidity sensors, illumination sensors, and a real-time clock module. Modules for hydroponics have been developed in various forms, but power consumption is high because most of them use general power and motors. Since it is not a system that is monitored automatically, there is a disadvantage in that an administrator always has to manage its operational state. The system is equipped with a water supply that is most suitable for a plant growth environment by utilizing temperature, humidity, and light sensors, which function as Internet of Things sensors. In addition, the real-time clock module can be used to provide a more appropriate water supply. The system was implemented with sketch code in a Linux environment using Raspberry Pi 3 and Arduino UNO.

Design of Operation Management Check Items of Efficient Information System for Improvement of Business Continuity based on ISO 22301 (ISO22301 기반 비지니스 연속성 증대를 위한 효율적인 정보시스템 운영감리 점검항목 설계)

  • Joo, Nak Wan;Kim, Dong Soo;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.9 no.2
    • /
    • pp.31-40
    • /
    • 2019
  • In this paper, we have studied the improvement of operational control for the enhancement of business continuity of information system becoming more important with the development of information technology such as big data, Iot, and artificial intelligence. The operational management and audit guidance of the current information system, which is coming in the fourth industrial age, where various services, data and industries are converged, is based on the existing general information system pattern and needs to be improved. The provision of services at fixed times is linked to the survival of enterprises and countries and serves as a key element. Therefore, it is necessary to study the application of optimized check items of the operation audits to minimize the service interruption damage of the information system and to provide the stable service in terms of business continuity management. To accomplish this, the check items presented in the operational control of the information system were derived by combining the PDCA step contents and 8 resource requirements provided in ISO 22301. From the point of view of increasing the business continuity according to the derivation criteria of the inspection items, the operational inspection check items were derived by exemplifying the improved check items and review items of the information system operation audit and the products to be checked during the operational audit. The check items were divided into management audit improvement check items for service continuity management, and operational audit improvement check items for performance and availability management. The average score of the IT professionals' survey on the suitability of the proposed checklist was 4.63, which was concluded to be appropriate.