• Title/Summary/Keyword: Industrial Internet of Things

Search Result 439, Processing Time 0.03 seconds

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

An Analysis of IoT Service using Sentiment Analysis on Online Reviews: Focusing on the Characteristics of Service Providers (감성분석을 활용한 사물인터넷(IoT) 서비스 리뷰 분석: 사업자 특성에 따른 차이를 중심으로)

  • Ryu, Min Ho;Cho, Hosoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.5
    • /
    • pp.91-102
    • /
    • 2020
  • The Internet of Things (IoT) is characterized as the market where various companies compete for the same consumers. Thus, there are differences in functions and performance provided by the main business area and other characteristics of the service providers. This paper investigates whether satisfaction with the service provided depends on the characteristics of the operator by using sentiment analysis of comments. To achieve this goal, word importance analysis and sensitivity analysis are conducted on 34,310 reviews of 41 applications registered in the Google Play. The review analysis was conducted at various levels, including TD-IDF (Term frequency-inverse document frequency) value of keywords, service sectors, the origin of providers, and domestic/foreign providers. The results show that users' overall assessment of IoT services was found to be low, and smart homes received relatively high reviews compared to other services, and manufacturing-based and overseas providers received relatively higher evaluations than others.

Visualization of the Intellectual Structure on the Internet of Things Focuses on the Industry 4.0 (제 4차 산업혁명 중심의 사물인터넷 지적 구조 시각화)

  • Hyaejung, Lim;Chang-Kyo, Suh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.6
    • /
    • pp.127-140
    • /
    • 2022
  • With the recent development of the ICT (information and communication technology), the revolution of the industry has moved on from the third industry to the fourth. There is no doubt that the companies would not survive in the future without adopting these technologies. The purpose of this research is to analyze the intellectual structure of the internet of things(IoT) literature for the Industry 4.0 to suggest a better insight for the field. The data for this research is extracted from the Web of Science database. Total of 1,631 documents and 72,754 references are used for the research with the analysis program CiteSpace. Author co-citation analysis is used to analyze the intellectual structure and performed clustering, timeline and burst detection analysis. We identified 12 sub-areas of IoT for the Industry 4.0 which are 'Supply Chain', 'Digital Twin', 'Smart Manufacturing System' and etc. Through the timeline analysis we can find out which clusters will increase or decrease its reputation. As concluding remarks, limitations and further research suggestions are discussed.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

Application of artificial intelligence for solving the engineering problems

  • Xiaofei Liu;Xiaoli Wang
    • Structural Engineering and Mechanics
    • /
    • v.85 no.1
    • /
    • pp.15-27
    • /
    • 2023
  • Using artificial intelligence and internet of things methods in engineering and industrial problems has become a widespread method in recent years. The low computational costs and high accuracy without the need to engage human resources in comparison to engineering demands are the main advantages of artificial intelligence. In the present paper, a deep neural network (DNN) with a specific method of optimization is utilize to predict fundamental natural frequency of a cylindrical structure. To provide data for training the DNN, a detailed numerical analysis is presented with the aid of functionally modified couple stress theory (FMCS) and first-order shear deformation theory (FSDT). The governing equations obtained using Hamilton's principle, are further solved engaging generalized differential quadrature method. The results of the numerical solution are utilized to train and test the DNN model. The results are validated at the first step and a comprehensive parametric results are presented thereafter. The results show the high accuracy of the DNN results and effects of different geometrical, modeling and material parameters in the natural frequencies of the structure.

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.

Global Manager - A Service Broker In An Integrated Cloud Computing, Edge Computing & IoT Environment

  • Selvaraj, Kailash;Mukherjee, Saswati
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1913-1934
    • /
    • 2022
  • The emergence of technologies like Big data analytics, Industrial Internet of Things, Internet of Things, and applicability of these technologies in various domains leads to increased demand in the underlying execution environment. The demand may be for compute, storage, and network resources. These demands cannot be effectively catered by the conventional cloud environment, which requires an integrated environment. The task of finding an appropriate service provider is tedious for a service consumer as the number of service providers drastically increases and the services provided are heterogeneous in the specification. A service broker is essential to find the service provider for varying service consumer requests. Also, the service broker should be smart enough to make the service providers best fit for consumer requests, ensuring that both service consumer and provider are mutually beneficial. A service broker in an integrated environment named Global Manager is proposed in the paper, which can find an appropriate service provider for every varying service consumer request. The proposed Global Manager is capable of identification of parameters for service negotiation with the service providers thereby making the providers the best fit to the maximum possible extent for every consumer request. The paper describes the architecture of the proposed Global Manager, workflow through the proposed algorithms followed by the pilot implementation with sample datasets retrieved from literature and synthetic data. The experimental results are presented with a few of the future work to be carried out to make the Manager more sustainable and serviceable.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

An Extended Product Data Management System Supporting Personal Manufacturing Based on Connected Consumer 3D Printing Services (3D 프린팅 서비스 기반 개인제조를 지원하는 확장 제품자료관리 시스템)

  • Do, Namchul
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.3
    • /
    • pp.215-223
    • /
    • 2016
  • The low price around 1000 USD makes consumer 3D printers as a new additive manufacturing platform for the personal manufacturing where consumers can make and sell their own products. To allow the consumers to design and manufacture their products, not only economic 3D printers but also supporting information systems for their design and manufacturing are essential. This study suggests an extended product data management (PDM) system that can support both the design and manufacturing of personal products with consumer 3D printing services. This extended PDM system helps consumer designers use advanced PDM technologies for their design and connected 3D printing services with Internet of Things (IoT) technology for realization of their products. As a result, the proposed system supports the consumer designers a seamless integrated product development and manufacturing environment supported by PDM and consumer 3D printing services.

A study on the evolution of post-smartphone technologies in the 5G technology environment

  • Kwak, Jeong Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1757-1772
    • /
    • 2020
  • As the smartphone market becomes saturated, an innovative device equipped with new features is expected to appear soon in mobile communications. In particular, various possibilities were raised regarding the alternative technologies that can develop post-smartphones, which are differentiated from the current smartphones, as Korea commercialized the 5G infrastructure for the first time in the world. Under these circumstances, the Korean government announced the "5G+ Strategy for Realizing Innovative Growth" in April 2019, vowing to build an innovative industrial ecosystem quickly while creating various convergence services based on the 5G infrastructure. As described above, the policy importance of the alternative technologies that will develop post-smartphones is increasing, but the theoretical study on the technology evolution of post-smartphones has not been systematically conducted until now. This study reviewed the alternative technologies that can develop post-smartphones through documentary research, and data mining analysis was performed on the research result using actual data. The policy priority was also set quantitatively for the alternative technologies of post-smartphones in order to determine the alternative post-smartphone technology that the government should focus on given the constraint of limited resources. As a results, autonomous vehicle(43.68%) was found to be most important, followed by artificial intelligence(17.4%) and Internet of Things(13.1%), among alternative technologies that could develop into the post-smartphone.