• Title/Summary/Keyword: Industrial Internet of Things

Search Result 436, Processing Time 0.022 seconds

Analyses of Security Issues and Vulnerability for Smart Home Network based on Internet of Things (사물인터넷 기반의 스마트 홈 네트워크에서의 취약점 및 보안 이슈 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.707-714
    • /
    • 2023
  • The Internet of Things, which is the key factor of the 4th industrial revolution, are apt to apply to many systems. The existing security mechanism cannot be realized with limited resources such as low capacity of devices and sensors. In order to apply IoT system, a new structure and ultra-lightweight encryption is required. In this paper, we analyzed security issues that can operate in Internet-based smart home networks, and to solve the critical issues against these attacks, technologies for device protection between heterogeneous devices. Security requirements are required to protect from attacks. Therefore, we analyzed the demands and requirements for its application by analyzing the security architecture and features in smart home network.

A Study on Smart Factory Construction Method for Efficient Production Management in Sewing Industry

  • Kim, Jung-Cheol;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.61-68
    • /
    • 2020
  • In the era of the fourth industrial revolution, many production plants are gradually evolving into smart factories that apply information and communication technology to manufacturing, distribution, production, and quality management. The conversion from conventional factories to smart factories has resulted in the automation of production sites using the internet and the internet of things (IoT) technology. Thus, labor-intensive production can easily collect necessary information. However, implementing a smart factory required a significant amount of time, effort, and money. In particular, labor-intensive production industries are not automated, and productivity is determined by human skill. A representative industry of such industries is sewing the industry. In the sewing industry, wherein productivity is determined by the operator's skills. This study suggests that production performance, inventory management and product delivery of the sewing industries can be managed efficiently with existing production method by using smart buttons incorporating IoT functions, without using automated machinery.

Drone Force Deployment Optimization Algorithm For Efficient Military Drone Operations (효율적 군용 드론 작전 운영을 위한 Drone Force Deployment Optimization 알고리즘)

  • Song, Ju-Young;Jang, Hyeon-Deok;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.211-219
    • /
    • 2020
  • One of the major advancements of the Fourth Industrial Revolution is the use of Internet of Drones (IoD), which combines the Internet of Things (IoT) and drone technology. IoD technology is especially important for efficiently and economically operating C4ISR operations in actual battlefields supporting various combat situations. The purpose of this study is to solve the problems of limited battery capacity of drones and lack of budgeting criteria for military drone transcription, introduction, and operation. If the mission area is defined and corresponding multi-drone hovering check points and mission completion time limits are set, then an energy and time co-optimized scheduling and operation control scheme is needed. Because such a scheme does not exist, in this paper, a Drone Force Deployment Optimization (DFDO) scheme is proposed to help schedule multi-drone operation scheduling and networked based remote multi-drone control.

Automotive ECU Biometric Authentication Using Blockchain (블록체인을 이용한 자동차 ECU 생체인증 기법)

  • Hong, Ji-Hoon;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.39-43
    • /
    • 2020
  • The Internet of Things plays a role as an important element technology of the 4th Industrial Revolution. This study is currently developing intelligent cars with IT technology, and is at a time when the development of intelligent cars is active and network data communication is possible. However, security solutions are needed as security is still at a weak stage, which can be threatened by intrusions into the network from outside. In this paper, in order to improve security of intelligent cars without causing security problems, we will apply blockchain technology, propose biometric authentication techniques using users' biometric information, and continue to study them in the future.

Analysis of Technology Convergence of 'Internet of Things' Patents in the Electronic Commerce by the CPC Code Technology (전자상거래(G06Q) 분야에서 '사물인터넷' 기술의 CPC 코드 기반 기술 융복합 분석)

  • Shim, Jaeruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.678-683
    • /
    • 2018
  • This study deals with the analysis of a technology convergence of the IoT(Internet of Things) which is the key technology of the fourth industrial revolution. For this purpose, 77 patents with the Main Category CPC code G06Q50/10(Electronic Commerce Service) among the IoT patents filed after 2014 were analyzed. As a result of the Main-Sub Category analysis of CPC codes, the IoT has a strong relationship between "Electronic Commerce Service (G06Q50/10)" and G06Q(49 cases), H04L(40 cases), G08B(24 cases), G05B(21 cases), H04W(21 cases), H04N(16 cases), and so on. By using the methodology in this study, we can contribute the establishment of technology strategy and new value creation from the prediction of the possibility of the combination of technologies and to develop new patents among various new technologies.

A Scheme for Information Protection using Blockchain in IoT Environment (사물인터넷 환경에서 블록체인을 이용한 정보보호 기법)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.33-39
    • /
    • 2019
  • Entering the 4th industrial revolution, many technologies are developing and various threats are emerging. In order to cope with such threats, research is being conducted in many fields. Even in the development of various fields, the threats caused by the development of medical technology and intelligent vehicles are the threats to life due to misinformation about medical care and the threats to life by preventing the safe operation of people through intelligent vehicles. In this paper, as the patient's information is important, the private blockchain is used to increase the safety, efficiency, and scalability of the patient's medical records. We propose an information protection technique using blockchain technology to hack the car system and threaten the driver's life, solve privacy problems by identifying personal information and differences, and prevent forgery in the Internet of Things.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

Attitudes and Performance of Workers Preparing for the Fourth Industrial Revolution

  • Hahm, SangWoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.4038-4056
    • /
    • 2018
  • Recently, the most frequently studied topics related to the fourth industrial revolution (FIR) are Big data, AI, Cloud Computing and Internet of Things- these four components are collectively known as the main components of the FIR (henceforth MCs). The MCs have a wide range of effects on workers' performance. As such it is imperative that these components are properly understood. This understanding will lead to a proper recognition of the attitudes that workers need to adopt to the MCs. Specifically, the attitudes of workers to several variables need to be examined, including importance, intention to use, belief in improvement, efficacy to use, and negative cognition. Each of these variables plays a role in determining how worker's performance in the FIR era will change. The performance-related variables such as self-efficacy, expectations, and acceptance of change are also crucial. These variables are related to creation of new opportunities, and can greatly influence performance in the FIR era. This study explains how specific attitudes to MCs improve performance-related factors for FIR. The adoption of these attitudes will ultimately lead to more successful adaption to the FIR era.

A study on BEMS-linked Indoor Air Quality Monitoring Server using Industrial IoT

  • Park, Taejoon;Cha, Jaesang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.65-69
    • /
    • 2018
  • In this paper, we propose an interworking architecture for building indoor air quality monitoring server (BEMS) using IIoT (Industrial Internet of Things). The proposed monitoring server adopts IIoT-based standard protocol so that interaction with BEMS installed in existing buildings can be performed easily. It can effectively communicate with indoor air quality measurement sensor installed in the building based on IIoT, Indoor air quality monitoring is possible. We implemented a proposed monitoring server, and confirmed the availability and monitoring of data from sensors in the building.

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.