• Title/Summary/Keyword: Internet of Things (IOT)

Search Result 116, Processing Time 0.027 seconds

Multifunctional Interface Board for the implementation of IoT (사물 인터넷을 위한 다기능 인터페이스 보드 구현)

  • kim, Ka-Eul;Oh, Kang-Jin;Jo, Su-Min;Kwoen, Oh-Jun;Kim, Sun-Hyeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.530-532
    • /
    • 2015
  • Nowadays, it is animately studied on IoT(Internet of Things) on the strength of development of the short-range communications technology and smart device. In this paper, it made a interface board which is capable of short-range communications networks based on embedded linux and Android OS (operating system). and we also made a IoT sensor module and device driver module. This devices are easily separated and changed and also simply embodied in IoT, and It was implemented using the Android app that allows you to control the sensors.

  • PDF

A Study on IoT based Forensic Policy for Early Warning System of Plant & Animal as A Subsystem of National Disaster Response and Management (국가재난형 동·식물 조기경보시스템을 위한 IOT기반의 포렌식 정책 연구)

  • Chung, Ho-jin;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.295-298
    • /
    • 2014
  • In recently, a climatic change(such as subtropical climate and frequent unusual high temperature) and the open-trade policies of agricultural & livestock products are increasing the outbreak risk of highly pathogenic avian influenza(HPAI) and foot and mouth disease(FMD), and accordingly the socio-economic damage and impacts are also increasing due to the cases such as damage from the last 5 times of FMD outbreak(3,800 billion won), from 10 years public control cost of Pine Wilt Disease (PWD)(238.3 billion won), and from the increased invasive pests of exotic plant like isoptera. Therefore, the establishment of new operation strategy of IoT(Internet of Things) based satellite early warning system(SEWS) for plants and animals as a subsystem of national disaster response and management system is being required, where the forensic technology & measures should be applied as a government policy to estimate the post compensation and to carry out the legal responsibility.

  • PDF

Effects of Information Overload to Information Privacy Protective Response in Internet of Things(Iot) (사물인터넷 시대의 개인정보과잉이 정보프라이버시 보호반응에 미치는 영향)

  • So, Won-Geun;Kim, Ha-Kyun
    • Management & Information Systems Review
    • /
    • v.36 no.1
    • /
    • pp.81-94
    • /
    • 2017
  • In the age of information overload such as Internet of Things(IoT), big data, and cloud computing, Data and informations are collected to processed regardless of the individual's will. The purpose of this paper presents a model related to personal information overlord, information privacy risk, information privacy concern (collection, control, awareness) and personal information privacy protective response. The results of this study is summarized as follows. First, personal information overload significantly affects information privacy risk. Second, personal information overload significantly affects information privacy concern(collection, control, awareness) Third, information privacy risk significantly affects collection and awareness among information privacy concern, but control does not significantly affects. This results shows that users are cognitively aware the information risk through collection and awareness of information. Users can not control information by self, control of information does not affects. Last, information privacy concern(collection and awareness significantly affect information privacy protective response, but information privacy concern (control) does not affect. Personal information users are concerned about information infringement due to excessive personal information, ability to protect private information became strong.

  • PDF

Design and Implementation of CoAP Authorization Framework Based on OAuth 2.0 (OAuth 2.0 기반 CoAP 인증 프레임워크 설계 및 구현)

  • Kim, Kyoung-Han;Lim, Hyun-Kyo;Heo, Joo-Seong;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.329-342
    • /
    • 2017
  • Recently, interest and investment in the Internet of Things (IoT) have increased significantly, and security issues are constantly being raised. As a solution, the IETF ACE Working Group is establishing the ACE framework standard, which is a new security framework for various constrained IoT environments based on the existing OAuth 2.0. However, additional work is required to apply the ACE framework, which proposes a new lightweight security system, to the existing Internet environment, and this additional cost is a factor that hinders the application of OAuth 2.0 to the IOT environment. Therefore, we propose an IoT authentication framework based on OAuth 2.0's existing development motivation, and implement a proposal framework based on CoAPthon and analyze its performance.

System of gas sensor for conbinating wire and wireless using Internet of Things (IOT기술을 이용한 유무선 통합 가스검출 시스템 구현)

  • Bang, Yong-Ki;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.4
    • /
    • pp.297-304
    • /
    • 2015
  • This study concerns the integrated gas sensor system of wire and wireless communication by using IoT(Internet of Things) technology. First, communication part is that it delivers the detection information, which transferred by wire or wireless communication and required control procedure based on a wireless module that receives the gas leakage information from wired or wireless detector, to administrator or user's terminal. Second, receiver part is that it shows the location and information, which received from the wired detector formed by a detecting sensor's node as linking with the communication part, and transfers these to the communication part. Third, wireless detector formed as a communication module of a detecting sensor node is that it detects gas leakage and transfers the information through wireless as a packet.Fourth, wired detector communicated with the receiver part and formed as a communication module of a detecting sensor node is that it detects gas leakage, transfers and shows the information as a packet. Fifth, administrator's terminal is that it receives gas leakage information by the communication part, transfers the signal by remote-control, and shut off a gas valve as responding the information. Sixth, database is that it is connected with the communication part; it sets and stores the default values for detecting smoke, CO., and temperature; it transfers this information to the communication part or sends a gas detecting signal to user's terminal. Seventh, user's terminal is that it receives each location's default value which stored and set at the database; it manages emergency situation as shutting off a gas valve through remote control by corresponding each location's gas leakage information, which transferred from the detector to the communication part by wireless.It is possible to process a high quality data regarding flammable or toxic gas by transferring the data, which measured by a sensor module of detector, to the communication part through wire and wireless. And, it allows a user to find the location by a smart phone where gas leaks. Eventually, it minimizes human life or property loss by having stability on gas leakage as well as corresponding each location's information quickly.

A Way of Unusual Gait Cognition for Life Safety (생활안전 보장을 위한 보행자의 비정상 걸음 인지 방안)

  • Kim, Su-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.2
    • /
    • pp.215-222
    • /
    • 2016
  • Research on gait recognition and its use is actively underway. This study suggests a method to recognize abnormal gaits of pedestrians. The purposes of the existing research to recognize normal steps are to measure physical activities and to validate people by their walks, but the purpose to recognize abnormal steps in this study is to insure the safe life of pedestrians. There are situations in which pedestrians are unaware of themselves vulnerable and can not ask for help. The purpose of this research is that even if pedestrians are unaware of themselves and there are no spontaneous requests for helps, it is intended for them to escape from dangers and difficulties by adopting the recent IOT technology. Hence, this study analyzes normal pace of pedestrians using the triaxial acceleration sensors, and takes ranges of their normal walking. And then, the steps of pedestrians are measured using the triaxial acceleration sensors, contrasted with their normal walking ranges, and determine whether their steps are normal or not. When it is out of the state for normal paces, a method to determine as abnormal paces is suggested.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

A Case Study of Bandi&Luni's Bookstore Using an Online to Offline(O2O) Service Design (O2O(Online to Offline) 서비스 디자인을 활용한 반디앤루니스 서점에 대한 사례연구)

  • Lee, Sangshik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.1
    • /
    • pp.117-126
    • /
    • 2017
  • This Study Focuses on the Customer Experience Story of Bandi&Luni's Centum City branch which Offers the Different Service Concept on the Competitive Book Selling Market. Bandi&Luni's Stands as one of the Largest Bookstore Chains that has 14 Offline Bookstores and an Online Bookstore Shop. The Purpose of this Study takes Lessons from the Unique Practices and Efforts of Bandi&Lunis's Online-to-Offline(O2O) Service and Service Design. In Order to Achieve this Propose, we Investigated the History, Service Concept, Value, and Performance of Bandi&Luni's from a Variety of sources and Reviewed the Previous Literatures of O2O Service and Service Design. In order to Offer Better Customer Experience the Service should be Designed from Customer's View and be Delivered through the Lifecycle of Customers. In a era of Big Data, IOT(internet of things), AI(artificial intelligence), The Service Design Innovation using Information and Communication Technology will be needed in order to Break down the Boundaries Between Online and Offline.

An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor (위치 추적 센서 기반의 IOT 헬스케어 서비스 관리 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.261-267
    • /
    • 2016
  • As IoT technology has gained the attention all around the world, the development for various services of healthcare, smart city, agriculture, and defense based on IoT is in progress. However, it is likely that healthcare services based on IoT have a problem of being leaked of patients' biological information by a third party and that risks patients' lives. In this paper, an IoT health care service managing model based on location sensor is proposed, which secures the biological information of a patient and simplifies the procedure to process the treatment and administration steps by using the data resources sensed. Even when an emergency occurs, this proposed model can respond quickly using the location information of the patient, which enables the staff in the hospital to locate the patient in real time. In addition, there is an advantage to minimize the time and the process of care, because the location of the equipment for necessary treatment is possible to be instantaneously located with attached sensors.

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment (IoT환경에서 무아레 현상을 이용한 사용자 얼굴 인증 기법)

  • Cho, Ik-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.171-176
    • /
    • 2019
  • In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply $moir{\acute{e}}$ technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow $moir{\acute{e}}$ as a $moir{\acute{e}}$ phenomenon method, and the projection $moir{\acute{e}}$. When comparing the existing IoT products and IoT products applied with $moir{\acute{e}}$ technology, IoT products applied with $moir{\acute{e}}$ technology are safer in terms of security.