• Title/Summary/Keyword: Industrial Internet of Things

Search Result 436, Processing Time 0.031 seconds

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

A Study of Smart IT convergence Framework applying a Lego-typed Sensor Module (레고형 센서 모듈을 활용한 스마트 IT 융합 프레임워크에 관한 연구)

  • Park, Jung-min;Kim, Hye-Young
    • Journal of Korea Game Society
    • /
    • v.16 no.3
    • /
    • pp.87-96
    • /
    • 2016
  • As use of Internet increase, IoT(Internet Of Things), a interaction between connected devices, is widely used throughout industrial area. In this paper, we discussed what to consider when planning framework for contents using user's mobile devices and various sensors in IoT environment and suggest related techniques. Also, using the techniques suggested in this paper, we showed the prototype of the framework. Finally, we showed the possibility of games in the IoT environment by creating game in the IoT environment.

Analyses of Technology Trend and marketability in Internet of Things (사물인터넷 통신의 시장성 및 기술 동향 분석)

  • Jang, Chang-Whan;Jo, Sung-Ho;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.882-883
    • /
    • 2016
  • The idea of Internet of Things (IoT) and the challenges is developed and growing rapidly. The general layered architecture of IoT along with its constituent elements is analyzed and described. Further, the paper provides for a secure construction of the IoT architecture, by tackling security issues at each layer of the architecture. We survey an introduction to industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards security framework for Industrial IoT systems.

  • PDF

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.

Sustainable Industrial Value Creation in SMEs: A Comparison between Industry 4.0 and Made in China 2025

  • Muller, Julian M.;Voigt, Kai-Ingo
    • International Journal of Precision Engineering and Manufacturing-Green Technology
    • /
    • v.5 no.5
    • /
    • pp.659-670
    • /
    • 2018
  • The Industrial Internet of Things (IIoT) confronts industrial manufactures with economic, ecological, as well as social benefits and challenges, referring to the Triple Bottom Line of sustainability. So far, research has mainly investigated its dimensions in isolation or economic aspects have not been compared with ecological and social perspectives. Further, research misses studies that are devoted to the special characteristics and requirements of Small and Medium-sized Enterprises (SMEs). This study aims to contribute to close this research gap, providing a research context that encompasses all three dimensions of sustainability. The results are based on data obtained from 329 SMEs, 222 in Germany and 107 in China, therefore allowing for a comparison of the concepts "Industrie 4.0" and "Made in China 2025" in the context of SMEs. In general, German SMEs expect a lower impact through "Industrie 4.0", perceiving the concept as more beneficial for larger enterprises. We further find that Chinese SMEs foremost see social benefits. Challenges whilst introducing "Industrie 4.0"by German SMEs as well as several frame conditions are perceived more relevant than for "Made in China 2025", as seen by Chinese SMEs. The paper closes with implications for research and practice based on these findings.

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

  • Chang, Kai-Di;Chen, Jiann-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.5-23
    • /
    • 2012
  • Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.

The effect of experiential marketing factors of fashion service applying 4th industrial revolution technology on customer acceptance and use : focusing on 3D printing, internet of things, and innovation (4차 산업 기술 패션 서비스 체험마케팅 요인이 소비자 수용과 이용에 미치는 영향 : 3D프린팅, 사물인터넷, 혁신성을 중심으로)

  • Jeong, So-Jeong;Rhee, Young-Ju
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.21 no.3
    • /
    • pp.93-108
    • /
    • 2019
  • This study analyzed the influence of experiential marketing factors of 3D printing and Internet services on technology acceptance factors and usage intention. Furthermore, we analyzed how the user's innovativeness shows the effect on the intention to use. Data acquired from a total of 518 college students was used for the final analysis, which was perfromed by SPSS 21.0 and AMOS 23.0 programs. The results of this study are as follows. We analyzed the influence of the experiential marketing factors of fashion service utilizing the 3D printing and the Internet of Things on the acceptance of technology and intention to use these technologies. As for 3D printing, first, sensory and behavioral factors are positively related to the acceptance of technology. Second, emotional and cognitive factors have negative effects on all technology acceptance. Third, relational factors did not show a significant influence on several conditions of technology acceptance. Fourth, the effects of technology acceptance on the willingness to use have a positive effect on several conditions factors, except the effort expectation. As for the result concerning the Internet of Things first, behavioral factors have a positive effect on all technology acceptance. Second, emotional factors have a negative effect on all technology acceptance. Third, cognitive factors did not have a significant effect on various conditions and showed negative effects on several factors. Fourth, sensory and relational factors did not affect the acceptance of technology. Fifth, the effects of technology acceptance on the intention to use are affected by several conditions, except for effort expectation. As a result of analyzing the moderating effects of user's innovativeness on the willingness to use, 3D printing did not show any significant effect on innovation. However, the Internet of Things has a significant influence on the user acceptance of technology acceptance.

A Survey Analysis of Internet of Things Security Issues and Combined Service

  • Kim, HyunHo;Lee, HoonJae;Lee, YoungSil
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.73-79
    • /
    • 2020
  • Since the start of the 4th industrial revolution, technologies have been developed in the Internet of Things (IoT), artificial intelligence (AI), virtual reality (VR), and 5G. Compared to other technologies IoT is currently being commercialized more than other technologies where the numbers of connected things are increases every year. The IoT has a huge advantage to provide convenience and lots of information to users, but security cannot keep up with the speed of development. IoT services continue to provide services for related devices, but at present, more and more types of new services are being combined with other technologies by utilizing the services of devices. This paper reviews and analyzes research on security issues and services related to the Internet of Things to explore how security trends and service delivery will develop in the future.

Machine Learning Based APT Detection Techniques for Industrial Internet of Things (산업용 사물인터넷을 위한 머신러닝 기반 APT 탐지 기법)

  • Joo, Soyoung;Kim, So-Yeon;Kim, So-Hui;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.449-451
    • /
    • 2021
  • Cyber-attacks targeting endpoints have developed sophisticatedly into targeted and intelligent attacks, Advanced Persistent Threat (APT) targeting the Industrial Internet of Things (IIoT) has increased accordingly. Machine learning-based Endpoint Detection and Response (EDR) solutions combine and complement rule-based conventional security tools to effectively defend against APT attacks are gaining attention. However, universal EDR solutions have a high false positive rate, and needs high-level analysts to monitor and analyze a tremendous amount of alerts. Therefore, the process of optimizing machine learning-based EDR solutions that consider the characteristics and vulnerabilities of IIoT environment is essential. In this study, we analyze the flow and impact of IIoT targeted APT cases and compare the method of machine learning-based APT detection EDR solutions.

  • PDF