• Title/Summary/Keyword: Internet Of Things

Search Result 2,747, Processing Time 0.036 seconds

The IEEE 802.15.4e based Distributed Scheduling Mechanism for the Energy Efficiency of Industrial Wireless Sensor Networks (IEEE 802.15.4e DSME 기반 산업용 무선 센서 네트워크에서의 전력소모 절감을 위한 분산 스케줄링 기법 연구)

  • Lee, Yun-Sung;Chung, Sang-Hwa
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.213-222
    • /
    • 2017
  • The Internet of Things (IoT) technology is rapidly developing in recent years, and is applicable to various fields. A smart factory is one wherein all the components are organically connected to each other via a WSN, using an intelligent operating system and the IoT. A smart factory technology is used for flexible process automation and custom manufacturing, and hence needs adaptive network management for frequent network fluctuations. Moreover, ensuring the timeliness of the data collected through sensor nodes is crucial. In order to ensure network timeliness, the power consumption for information exchange increases. In this paper, we propose an IEEE 802.15.4e DSME-based distributed scheduling algorithm for mobility support, and we evaluate various performance metrics. The proposed algorithm adaptively assigns communication slots by analyzing the network traffic of each node, and improves the network reliability and timeliness. The experimental results indicate that the throughput of the DSME MAC protocol is better than the IEEE 802.15.4e TSCH and the legacy slotted CSMA/CA in large networks with more than 30 nodes. Also, the proposed algorithm improves the throughput by 15%, higher than other MACs including the original DSME. Experimentally, we confirm that the algorithm reduces power consumption by improving the availability of communication slots. The proposed algorithm improves the power consumption by 40%, higher than other MACs.

Research on the Curriculum for Integration of ICT+Design (ICT+디자인 융합 교육과정 개발연구)

  • Jeong, Sang-Hoon
    • Science of Emotion and Sensibility
    • /
    • v.20 no.1
    • /
    • pp.105-114
    • /
    • 2017
  • Nowadays, novel and innovative technology including 3D printers, internet of things (IoT), and wearable devices are rapidly emerging. As we must constantly keep up with the most recent trends, words like convergence, multidisciplinarity, and design revolution indeed define society today. Due to the expansion of such diverse technological, industrial, and academic convergence trends, the role of design is becoming evermore essential in development of products as well as creative services. Even the government is pushing towards a 'creative economy' by encouraging ICT convergence to create novel industries as well as advanced jobs. In order to adapt flexibly to such changes in global trends, a solid academic curriculum centered around 'ICT+Design' must be developed. In the current research, we analyzed various literature and benchmarked the major universities both domestic and foreign. Also we utilized a survey-based approach against subjects who are experts or design specialists working in environments related to industry and research. In our proposed integrated ICT+Design educational curriculum, students familiarize themselves with design perspectives and methodology to creatively carry out the course. Moreover, experts from design and ICT came together in an act of 'Radical Collaboration' in which they shared their unique 'Design Thinking' in order to promote understanding and cooperation. Furthermore, industry experts have also taken part as mentors in order to create a workplace-oriented course with various integrated projects. Most importantly, the course was designed so that in addition to research, students can really get hands-on with their ideas in the creativity-integrated workplace.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.

The Arduino based Window farm Monitoring System (아두이노를 활용한 창문형 수경재배 모니터링 시스템)

  • Park, Young-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.563-569
    • /
    • 2018
  • This paper is on the implementation of a system for automatically monitoring window farm hydroponics based on Arduino (utilizing Arduino's open source code) emerging as the icon of the Fourth Industrial Revolution. A window farm, which means window-type hydroponics, is offered as an alternative to fulfill the desires of people who want to grow plants aside from the busy daily life in the city. The system proposed in this paper was developed to automatically monitor a window farm hydroponics cultivation environment using the Arduino UNO board, a four-charmel motor shield, temperature and humidity sensors, illumination sensors, and a real-time clock module. Modules for hydroponics have been developed in various forms, but power consumption is high because most of them use general power and motors. Since it is not a system that is monitored automatically, there is a disadvantage in that an administrator always has to manage its operational state. The system is equipped with a water supply that is most suitable for a plant growth environment by utilizing temperature, humidity, and light sensors, which function as Internet of Things sensors. In addition, the real-time clock module can be used to provide a more appropriate water supply. The system was implemented with sketch code in a Linux environment using Raspberry Pi 3 and Arduino UNO.

Development of a Mountainous Area Monitoring System based on IoT Technology (IoT 기술 기반의 산악지 모니터링 시스템 개발)

  • Kim, Kyoon-Tai
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.437-446
    • /
    • 2017
  • 70 percent of Korea's territory is covered with mountains, whose difficult conditions can cause damage to facilities. Recently, the demand for facilities related to outdoor activities including monorails has been on the rise, and such facilities are much more likely to become damaged. For this reason, a monitoring system applying IoT to mountainous areas was developed and its applicability is evaluated in this study. The current status of the existing mountainous facilities and monitoring systems were reviewed, and the current wired monitoring technology was analyzed. A scenario for IoT-based monitoring was developed, and then sensor nodes were developed, which include an RF-communication module and interface, power-supply and solar-cell. A testbed was set up at K University. The same data was collected by the wireless system as had been collected by the wired one. The study findings are as follows. Firstly, by using the wireless system, it is estimated that the construction duration can be reduced by about 25 percent, while the construction costs can be reduced by about 3~52 percent. Secondly, the safety of the construction workers can be improved by making the working conditions less dangerous, such as by eliminating the need to transport cables.

A Study on the Technology Development of User-based Home Automation Service (사용자 위치기반 홈오토메이션 서비스 기술 개발에 관한 연구)

  • Lee, Jung-Gi;Lee, Yeong-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.327-332
    • /
    • 2017
  • As Internet of Things (IoT) technology advances, there is a growing demand for location-based services (LBSs) to identify users' mobility and identity. The initial LBS system was mainly used to measure position information by measuring the phase of a signal transmitted from a global positioning system (GPS) satellite or by measuring distance to a satellite by tracking the code of a carrier signal. However, the use of GPS satellites is ineffective, because it is difficult to receive satellite signals indoors. Therefore, research on wireless communications systems like ultra-wide band (UWB), radio frequency identification (RFID), and ZigBee are being actively pursued for location recognition technology that can be utilized in an indoor environment. In this paper, we propose an LBS system that includes the 2.45GHz band for chirp spread spectrum (CSS), and the 3.1-10.6GHz band and the 250-750MHz bands for UWB using the IEEE 802.15.4a standard for low power-based location recognition. As a result, we confirmed that the 2.45GHz Industrial, Scientific and Medical (ISM) band RF transceiver and the ranging function can be realized in the hardware and has 0dBm output power.

Framing Effect of Energy Consumption Information on Consumers' Attitude (에너지 소비정보의 프레이밍이 소비자 태도에 미치는 효과)

  • Kim, Bora
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.129-138
    • /
    • 2017
  • Faced with the era of the IoT (Internet of Things) and smart homes, this study aims to explore the type of information loaded on smart devices that can lead to consumer's efficient energy use. 105 Americans participated in the survey with eight different versions according to two energy consumption levels (Above or Below condition) by four information frames (Finance, security, environment, or health). It was found that frames can make significant differences in consumers' attitudes; (1) Those in the Below condition worried about environments more than those in the Above condition; (2) Finance-framed information in the Above condition was the least effective to increase consumers' energy saving motivation; (3) In the Below condition, those receiving finance and security framed information revealed more environmental concerns than those receiving other types of informations. This study can contribute to the field by providing with basic research findings that smart device developers can refer to in the future. Also, follow-up studies need to be conducted to examine effective messages for Korean energy consumers.

Effect of Psychological Variables on Decision-making Time in the Online Centipede Game (온라인 지네 게임으로 알아본 심리적 변인이 의사결정 시간에 미치는 영향)

  • Kim, Bora;Kwon, Young-Mi
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.169-185
    • /
    • 2017
  • Given that nowadays things get very fast due to the pervasive use of the Internet and mobile devices, decision-making time can be an important variable in the online economic decisions. Although in experimental and behavioral economics, measures like scores or earnings are usually preferred, this study argues that the time variable can be dealt with as a new decision outcome. Thus, by selecting some psychological factors presumably impactful in the online context (i.e., incidental emotions, psychological distances, and individual's impulsivity), this study tested their effect on decision time in the online centipede game. As a result, the mean decision time in the game was longer (1) in the happiness condition than in the anger condition and (2) in the friend condition than in the stranger condition. The people with attention difficulties spent a short time in the decision and the people who dislike complex problems spent a short time in explaining their decision. This study can contribute to the field as it used the decision time as the dependent variable and it tested the effect of psychological factors in the context of online decision-making. Future studies can be conducted in other online decision situations or by considering other psychological variables.