• Title/Summary/Keyword: Internet of Thing (IoT)

Search Result 115, Processing Time 0.027 seconds

HoneyThing: A New Honeypot Design for CPE Devices

  • Erdem, Omer;Pektas, Abdurrahman;Kara, Mehmet
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4512-4526
    • /
    • 2018
  • The Internet of Things (IoT) has become an emerging industry that is broadly used in many fields from industrial and agricultural manufacturing to home automation and hospitality industry. Because of the sheer number of connected devices transmitting valuable data, the IoT infrastructures have become a main target for cyber-criminals. One of the key challenges in protecting IoT devices is the lack of security measures by design. Although there are many hardware and software based security solutions (firewalls, honeypots, IPDS, anti-virus etc.) for information systems, most of these solutions cannot be applied to IoT devices because of the fact that IoT devices have limited computing resources (CPU, RAM,). In this paper, we propose a honeypot system called HoneyThing for modem/router devices (i.e. a kind of IoT device). HoneyThing emulates TR-069 protocol which is prevalent protocol used to remotely manage customer-premises equipment (CPE) devices, e.g. modems, routers. Honeything also serves an embedded web server simulating a few actual, critical vulnerabilities associated with the implementation of TR-069 protocol. To show effectiveness of the HoneyThing in capturing real world attacks, we have deployed it in the Internet. The obtained results are highly promising and facilitate to reveal network attacks targeting to CPE devices.

Ontology Based-Security Issues for Internet of Thing (IoT): Ontology Development

  • Amir Mohamed Talib
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.168-176
    • /
    • 2023
  • The use of sensors and actuators as a form of controlling cyber-physical systems in resource networks has been integrated and referred to as the Internet of Things (IoT). However, the connectivity of many stand-alone IoT systems through the Internet introduces numerous security challenges as sensitive information is prone to be exposed to malicious users. In this paper, IoT based-security issues ontology is proposed to collect, examine, analyze, prepare, acquire and preserve evidence of IoT security issues challenges. Ontology development has consists three main steps, 1) domain, purpose and scope setting, 2) important terms acquisition, classes and class hierarchy conceptualization and 3) instances creation. Ontology congruent to this paper is method that will help to better understanding and defining terms of IoT based-security issue ontology. Our proposed IoT based-security issue ontology resulting from the protégé has a total of 44 classes and 43 subclasses.

A Study on the Rice growing water-management System based on IoT (IoT 기반 벼농사 생장 물 관리 시스템 연구)

  • Nam, Kang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.10
    • /
    • pp.989-994
    • /
    • 2016
  • This study was conducted the management of a water level through the water sensor, the waterline and the drain applied to the rice paddy. The gateway transfers the information to oneM2M(: Machine to Machine) platform of IoT(: Internet of Thing) standards to the height of the water level sensor information through the LoRa connection. Depending on the water level requested by the IoT platform, the gateway is to On or Off waterline or drain motor switch and send the information of the water level sensor. IoT platform performs the intelligent application function according to the condition of the water level.

Authentication Method for Safe Internet of Things Environments (안전한 사물 인터넷 환경을 위한 인증 방식)

  • Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.1
    • /
    • pp.51-58
    • /
    • 2015
  • Internet of Thing is a collection of various technical components, and the interworking among heterogeneous devices, networks, applications is expected to be accelerated through the openness of IoT platform. For this reason, many technical and administrative security threats will occur in IoT environments. In this paper, authentication methods of recent researches are analyzed for safe IoT services, and new mutual authentication protocol is proposed to provide more secure communication. The proposed protocol prevents an impersonation as malicious gateway or illegal device providing mutual authentication between gateway and IoT device. The performance analysis and evaluation of proposed authentication protocol are performed.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

An IoT Tag and Social Message-based Device Control System (IoT 태그 및 소셜 메시지 기반 사물 제어 시스템)

  • Baek, Seung Min;Jin, Yeon Ju;Ha, Kwon Woo;Han, Sang Wook;Jeong, Jin-Woo
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.550-556
    • /
    • 2017
  • Due to the rapid growth and development of Internet of Things (IoT), various devices are now accessible and controllable anytime from anywhere. However, the current IoT system requires a series of complex steps (e.g., launch an application, choose a space and thing, control the thing, etc.) to control the IoT devices; therefore, IoT suffers from a lack of efficient and intuitive methods of interacting with users. To address this problem, we propose a novel IoT control framework based on IoT tags and social messages. The proposed system provides an intuitive and efficient way to control the device based on the device ownership: 1) users can easily control the device by IoT tagging, or 2) users can send an IoT social message to the device owner to request control of the tagged device. Through the development of the prototype system, we show that the proposed system provides an efficient and intuitive way to control devices in the IoT environment.

Interpretive Structural Modeling in the Adoption of IoT Services

  • Kim, Yonghee;Park, Youngju;Song, Gwangsuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1184-1198
    • /
    • 2019
  • This study aims to use ISM to identify the enablers affecting the acceptance of IoT services. For this purpose, this study conducted an ISM analysis and a MICMAC analysis, extracted the enablers from Internet of Things - An Action Plan for Europe published by the EU for the research, and conducted interviews and surveys. The study found that it would be preferentially necessary to prepare the base for successful IoT services through international cooperation and the security of objective data. In addition, it turned out that it would be necessary to make efforts to spread and develop IoT services by conducting R&D and implementing projects through public-private partnerships and the organization of a consultative group. Lastly, since information security and standardization are the desired objects of the IoT industry, it was found that both the government and the industrial world should focus on them. This study has significance in that it can provide practical implications for the effective acceptance of IoT services.

Design and Implementation of Object Detector based on IoMT Standard (IoMT 표준 기반 Object Detection 서비스 제공을 위한 미디어 분석 서비스 운용 기술)

  • Kum, Seung Woo;Moon, Jaewon;Kim, Youngkee
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2019.06a
    • /
    • pp.296-297
    • /
    • 2019
  • 최근의 IoT 기술의 발전은 다양한 형상, 네트워크 특징 및 서비스 아키텍쳐를 가지는 IoT 기기, 서비스 및 단말을 활용한 서비스의 발전을 가져오고 있다. 특히 OneM2M, OCF 등의 표준기구등은 다양한 IoT 기기 및 서비스 아키텍쳐에 대한 정의를 최근 수년간 진행해 오고 있으며, 이러한 IoT 서비스는 단순히 기기의 원격 상태 확인 및 제어 뿐만 아니라, 클라우드 및 AI 기술과의 연계를 통하여 그 서비스 영역을 지속적으로 확장 중에 있다. 이 중 Internet of Media Things 표준은 다양한 미디어 기반 서비스를 Thing으로 표현하여 다양한 Thing과의 연계 방안을 제시하고 있다. 본 논문에서는 기존에 다양한 기법을 통하여 연구 및 구현되고 있는 영상 기반 서비스를 Internet of Media Things 표준 기반으로 구현하기 위한 방법을 제시한다. 기존 영상 분석 기술은 대부분 정확도의 향상에 그 목적을 가지고 있어 서비스 형태로 제공하고 타 기기와의 연계성을 제공하기 위한 추가적인 기술간 연계가 필요하다. 본 논문에서는 Yolo v3 기반의 Face Detection 기술에 대하여, 해당 기술을 Internet of Media Things 표준으로 표출하기 위한 요구사항을 파악하고 실제 구현하기 위한 방안에 대하여 검토한다.

  • PDF

IoT 플랫폼 개발 동향 및 발전방향

  • Kim, Jae-Ho;Yun, Jae-Seok;Choe, Seong-Chan;Ryu, Min-U
    • Information and Communications Magazine
    • /
    • v.30 no.8
    • /
    • pp.29-39
    • /
    • 2013
  • IoT기술은 Internet of Thing의 약자로서 국내에서는 사물인터넷 기술로 불리우고 있다. IoT 기술은 실 세계에 존재하는 사물 (Physical Things) 및 사이버 환경에 존재하는 사물(Virtual Things) 들이 인터넷을 통하여 서로 연결되고 이러한 물리공간과 가상공간의 사물들의 연동을 통하여 다양한 서비스를 제공할 수 있는 미래 인터넷 인프라 기술이다. 본고에서는 현재 개발완료 또는 개발 중인 국내외 IoT 기술에 대하여 소개하고 각 기술의 특징에 대하여 알아본다. 또한 IoT 기술의 발전을 위하여 IoT 생태계의 중요성을 제시하고 이를 통한 IoT 플랫폼의 발전 방향에 대하여 논의 한다.

A Development of Semantic Connected Service between Vehicles and Things for IoV (차량 인터넷 기술을 위한 시맨틱 차량-사물 연결 서비스 구현)

  • Ryu, Minwoo;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • The recent efforts in academia and industry represent a paradigm shift that will extend the IoT from the home environment so that it is interoperable with the Internet of Vehicles (IoV). IoV is a special kind of IoT. It allows to connect between vehicle and things located in infrastructure. Furthermore, IoV enable to create new intelligent services through collaboration with existing various services such as smart city and connected home. In this paper, we develop a service in order to realize IoV. To this end, we design a novel vehicle service platform which could automatical controlling the IoT device according to drivers' voice. To show practical usability of our proposed platform, we develop a prototype service could be call car-to-thing (C2T). We expect that our proposed platform could eventually contribute to realizing IoV.