• Title/Summary/Keyword: Internet of Things (IoT)

Search Result 1,878, Processing Time 0.03 seconds

Data Transmission Method using Broadcasting in Bluetooth Low Energy Environment (저전력 블루투스 환경에서 브로드캐스팅을 이용한 데이터전송 방법)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Soh, Woo-Young
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.963-969
    • /
    • 2018
  • Wi-Fi and Bluetooth technologies are perhaps the most prominent examples of wireless communication technologies used in the Internet of Things (IoT) environment. Compared to widely used Wi-Fi, Bluetooth technology has some flaws including 1:1 connection (one-way) between Master and Slave, slow transmission, and limited connection range; Bluetooth is mainly used for connecting audio devices. Since the release of Bluetooth Low Energy (BLE), some of the flaws of Bluetooth technology have been improved but it still failed to become a competitive alternative of Wi-Fi. This paper presents a method of data transmission through broadcasting in BLE and demonstrates its performance, one-to-many data transfer result. The Connection-Free Data Transmission proposed in this paper will hopefully be utilized in special circumstances requiring 1:N data transmission or disaster security network.

RFID Tag Ownership Relocation Protocol Based on Trusted Third Party (신뢰받는 제3자 기반의 RFID 태그 소유권 이전 프로토콜)

  • Kim, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.568-574
    • /
    • 2015
  • Recently RFID not only is widely utilized in various fields such as inventory management, merchandize logistics, etc., but also, has evolved as an important component of the Internet of Things (IoT). According to increasing the utilization field of RIFD, studies for security and privacy for RFID system have been made diverse. Among them, the ownership transfer protocols for RFID tags have also been proposed in connection with the purchase of products embedded with RFID tag. Recently, Kapoor and Piramuthu proposed a RFID ownership transfer protocol to solve the problems of security weakness of the previous RFID ownership transfer protocols. In this paper, we show that Kapoor-Piramuthu's protocol also has security problems and provide a new protocol to resolve them. Security analysis of newly proposed protocol shows the security concerns are resolved.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Intelligent Home appliances Power Control using Android and Arduino (안드로이드와 아두이노를 이용한 지능형 가전제품 전력 컨트롤)

  • Park, Sung-hyun;Kim, A-Yong;Kim, Wung-Jun;Bae, Keun-Ho;Yoo, Sang-keun;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.854-856
    • /
    • 2014
  • Has been released of make it possible to control the using for smart devices of a wide variety home appliances and electronics in smart appliances in accordance with the one person multi devices. In addition, is increasing rapidly for the number of the product on cleaning robot and refrigerator, air conditioning, TV, etc. these devices are using the implement up DLNA system. And at home and abroad for development and has provided with Iot and Alljoyn such systems. But currently using home appliances or electronic devices of there are a lot of the operating system non installed than the installed products. In addition, smart appliances do not use for user than buying existing electronic products a lot more. In addition, more occur for smart appliances of that do not use for the user on smart appliances rather than buying existing electronics. In this paper, Suggested and implemented for system of control such as smart devices to existed home appliance on not have an operating system, Using mobile device for want users to quantify the data to transfer from arduino board.

  • PDF

Design and Implementation of Multi-Cloud Service Common Platform (멀티 클라우드 서비스 공통 플랫폼 설계 및 구현)

  • Kim, Sooyoung;Kim, Byoungseob;Son, Seokho;Seo, Jihoon;Kim, Yunkon;Kang, Dongjae
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.75-94
    • /
    • 2021
  • The 4th industrial revolution needs a fusion of artificial intelligence, robotics, the Internet of Things (IoT), edge computing, and other technologies. For the fusion of technologies, cloud computing technology can provide flexible and high-performance computing resources so that cloud computing can be the foundation technology of new emerging services. The emerging services become a global-scale, and require much higher performance, availability, and reliability. Public cloud providers already provide global-scale services. However, their services, costs, performance, and policies are different. Enterprises/ developers to come out with a new inter-operable service are experiencing vendor lock-in problems. Therefore, multi-cloud technology that federatively resolves the limitations of single cloud providers is required. We propose a software platform, denoted as Cloud-Barista. Cloud-Barista is a multi-cloud service common platform for federating multiple clouds. It makes multiple cloud services as a single service. We explain the functional architecture of the proposed platform that consists of several frameworks, and then discuss the main design and implementation issues of each framework. To verify the feasibility of our proposal, we show a demonstration which is to create 18 virtual machines on several cloud providers, combine them as a single resource, and manage it.

PLC-Based Smart grid Home Network System Design and Implementation using OPNET Simulation

  • Huh, Jun-Ho;Seo, Kyungryong
    • Journal of Multimedia Information System
    • /
    • v.1 no.2
    • /
    • pp.111-118
    • /
    • 2014
  • The Smart grid refers to the technology that enables efficient usage of electric power by collecting information concerning the power usage and power lines grafting information and communications technology to onto power grids. There are Zigbee, PLC or IEEE 802.11 WLAN MAC as a core technology of the Smart grid, but in this paper, the discussion is focused on the PLC. The PLC is the technology that carries out data communications using power lines and put into practical use in the field of lights or home appliances control recently but PLC-applied communications between electronic devices are rarely seen. For the reason that the PLC uses high-voltage power lines and has a disadvantage of experiencing higher data loss rate caused by the noises produced by going through transformers, the technology is yet to be used in many areas. Nevertheless, the PLC has been studied widely recently in respect that it's the low-cost communication solution for the Smart Metering [1]. Moreover, this technology is emerging as a novel data communication method and discussed as an important technology lately due to the developments of the Smart grid systems and Internet of things (IoT). Thus, in this paper, the results obtained from designing and performing implementation scenario for the PLC-based Smart grid home network system were compared and analyzed with that of IEEE 802.11 WLAN MAC (the foundation technology at Jeju Smart grid Test bed)-based Smart grid home network. Thus, in this paper, OPNET 14.5 PL8, OSI 7 layer, PLC router nodes and PLC nodes had been used for the designing and implementation simulations of both systems. Additionally, QoS was not considered in order to guarantee that all the traffics would not have the same processing priority.

  • PDF

Non-memorizing authentication system using the preference words (좋아하는 단어를 이용한 암기하지 않는 패스워드 시스템)

  • Rim, Kwang-Cheol;Lim, Dong-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.565-570
    • /
    • 2016
  • User requirements for access and authentication increase daily because of the diversification of the Internet of Things (IoT) and social structures. The increase in authentication needs requires the generation of new passwords. Users want to utilize the same passwords for memorization convenience. However, system administrators request each user to use different passwords, as well as passwords that include special symbols. Differnet passwords and including special symbols passwords seem to exceed the tolerance range within your memorization skills. It fetches a very negative consequences in terms of password management. This paper proposes a preference symbol password system that does not require memorization by users. First, a survey is conducted to prove statistical safety, and based on this, an evolution-type password system that uses preference symbols is designed. Preference symbol passwords show superiority with respect to installation cost and convenience, compared with conventional non-memorizing password systems such as biometrics, keystrokes, and mouse patterns.

Development of Vending Machine for Electricity Based on Z-Wave Mesh Network (Z-Wave 메쉬 네트워크 기반의 전기 자판기 개발)

  • Kang, Ki-beom;Ahn, Hyun-kwon;Kim, Han-soo;Lee, Seung-hyun;Jwa, Jeong-woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1256-1262
    • /
    • 2016
  • As the population of camping is increased in campsites and auto camp sites, the electrical equipment can safely supply electricity to users in a variety of electricity bill policy is required in the campsite. In this paper, we develop the vending machine for electricity that can control the outdoor electrical outlet from the management server using the Z-Wave WPAN and android mobile application. The developed vending machine for electricity consists of the management server, the controller, the outdoor outlet box, and the mobile application. The management server provides reservation and electricity bill payment to users. The management server controls the electrical outlet box through the controller to safely supply electricity to users. The controller that is a relay device between the management server and the switch controls switches based on Z-Wave mesh network. Outdoor electrical outlet box has 2 meter switches. We receive the relevant authorization to provide commercial electricity services using the outdoor electrical outlet box in the campsite.

Topic Modeling on Research Trends of Industry 4.0 Using Text Mining (텍스트 마이닝을 이용한 4차 산업 연구 동향 토픽 모델링)

  • Cho, Kyoung Won;Woo, Young Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.764-770
    • /
    • 2019
  • In this research, text mining techniques were used to analyze the papers related to the "4th Industry". In order to analyze the papers, total of 685 papers were collected by searching with the keyword "4th industry" in Korea Journal Index(KCI) from 2016 to 2019. We used Python-based web scraping program to collect papers and use topic modeling techniques based on LDA algorithm implemented in R language for data analysis. As a result of perplexity analysis on the collected papers, nine topics were determined optimally and nine representative topics of the collected papers were extracted using the Gibbs sampling method. As a result, it was confirmed that artificial intelligence, big data, Internet of things(IoT), digital, network and so on have emerged as the major technologies, and it was confirmed that research has been conducted on the changes due to the major technologies in various fields related to the 4th industry such as industry, government, education field, and job.

A study on the digital transformation strategy of a fashion brand - Focused on the Burberry case - (패션 브랜드의 디지털 트랜스포메이션 전략에 관한 연구 - 버버리 사례를 중심으로 -)

  • Kim, Soyoung;Ma, Jin Joo
    • The Research Journal of the Costume Culture
    • /
    • v.27 no.5
    • /
    • pp.449-460
    • /
    • 2019
  • Today, the fashion business environment of the 4.0 generation is changing based on fashion technology combined with advanced digital technologies such as AI (Artificial Intelligence), big data and IoT (Internet of Things). "Digital Transformation" means a fundamental change and innovation in a digital paradigm including corporate strategy, organization, communication, and business model, based on the utilization of digital technology. Thus, this study examines digital transformation strategies through the fashion brand Burberry. The study contents are as follows. First, it examines the theoretical concept of digital transformation and its utilization status. Second, it analyzes the characteristics of Burberry's digital transformation based on its strategies. For the research methodology, a literature review was performed on books and papers, aligning with case studies through websites, social media, and news articles. The result showed that first, Burberry has reset their main target to Millennials who actively use mobile and social media, and continues to communicate with them by utilizing digital strategy in the entire management. Second, Burberry is quickly delivering consistent brand identity to consumers by internally creating and providing social media-friendly content. Third, they have started real-time product sales and services by using IT to enhance access to brands and to lead consumers towards more active participation. In this study, Burberry's case shows that digital transformation can contribute to increased brand value and sales, keeping up with the changes in the digital paradigm. Therefore, the study suggests that digital transformation will serve as an important business strategy for fashion brands in the future.