• 제목/요약/키워드: Internet of Things (IoT) Model

검색결과 282건 처리시간 0.026초

IoT Adoption by the Young Consumer: An Extended ASE Perspective

  • Arif Mahmud;Mohd Najwadi Yusoff;Mohd Heikal Husin
    • Asia pacific journal of information systems
    • /
    • 제32권4호
    • /
    • pp.857-889
    • /
    • 2022
  • Home theft and burglary are prevalent in Dhaka city. Internet of things (IoT), in contrast, is commonly recognized as among the most advanced home security systems. However, the factors that attract young people to use IoT for household security have yet to be examined. Consequently, the purpose of this article is to validate the attitude-social influence-self-efficacy (ASE) model with personal innovativeness and perceived trust. We collected data from Dhaka citizens aged 15 to 24 using a purposive sample technique and 370 valid responses were chosen for the study. According to the analysis, all of our proposed hypotheses were found significant with a 73.6% variance. Furthermore, the effects of attitude and social influence were shown to be the highest and lowest, respectively, and trust and innovativeness were both nearly strong main predictors of ASE. Significantly, since this is one of the few studies in the technology adoption domain using this model, a solid foundation for IoT adoption for security purposes is established.

Privacy-Preservation Using Group Signature for Incentive Mechanisms in Mobile Crowd Sensing

  • Kim, Mihui;Park, Younghee;Dighe, Pankaj Balasaheb
    • Journal of Information Processing Systems
    • /
    • 제15권5호
    • /
    • pp.1036-1054
    • /
    • 2019
  • Recently, concomitant with a surge in numbers of Internet of Things (IoT) devices with various sensors, mobile crowdsensing (MCS) has provided a new business model for IoT. For example, a person can share road traffic pictures taken with their smartphone via a cloud computing system and the MCS data can provide benefits to other consumers. In this service model, to encourage people to actively engage in sensing activities and to voluntarily share their sensing data, providing appropriate incentives is very important. However, the sensing data from personal devices can be sensitive to privacy, and thus the privacy issue can suppress data sharing. Therefore, the development of an appropriate privacy protection system is essential for successful MCS. In this study, we address this problem due to the conflicting objectives of privacy preservation and incentive payment. We propose a privacy-preserving mechanism that protects identity and location privacy of sensing users through an on-demand incentive payment and group signatures methods. Subsequently, we apply the proposed mechanism to one example of MCS-an intelligent parking system-and demonstrate the feasibility and efficiency of our mechanism through emulation.

Multiple Human Recognition for Networked Camera based Interactive Control in IoT Space

  • Jin, Taeseok
    • 한국산업융합학회 논문집
    • /
    • 제22권1호
    • /
    • pp.39-45
    • /
    • 2019
  • We propose an active color model based method for tracking motions of multiple human using a networked multiple-camera system in IoT space as a human-robot coexistent system. An IoT space is a space where many intelligent devices, such as computers and sensors(color CCD cameras for example), are distributed. Human beings can be a part of IoT space as well. One of the main goals of IoT space is to assist humans and to do different services for them. In order to be capable of doing that, IoT space must be able to do different human related tasks. One of them is to identify and track multiple objects seamlessly. In the environment where many camera modules are distributed on network, it is important to identify object in order to track it, because different cameras may be needed as object moves throughout the space and IoT space should determine the appropriate one. This paper describes appearance based unknown object tracking with the distributed vision system in IoT space. First, we discuss how object color information is obtained and how the color appearance based model is constructed from this data. Then, we discuss the global color model based on the local color information. The process of learning within global model and the experimental results are also presented.

Stability-based On-demand Multi-path Distance Vector Protocol for Edge Internet of Things

  • Dongzhi Cao;Peng Liang;Tongjuan Wu;Shiqiang Zhang;Zhenhu Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권10호
    • /
    • pp.2658-2681
    • /
    • 2023
  • In edge computing scenarios, IoT end devices play a crucial role in relaying and forwarding data to significantly improve IoT network performance. However, traditional routing mechanisms are not applicable to this scenario due to differences in network size and environment. Therefore, it becomes crucial to establish an effective and reliable data transmission path to ensure secure communication between devices. In this paper, we propose a trusted path selection strategy that comprehensively considers multiple attributes, such as link stability and edge cooperation, and selects a stable and secure data transmission path based on the link life cycle, energy level, trust level, and authentication status. In addition, we propose the Stability-based On-demand Multipath Distance Vector (STAOMDV) protocol based on the Ad hoc AOMDV protocol. The STAOMDV protocol implements the collection and updating of link stability attributes during the route discovery and maintenance process. By integrating the STAOMDV protocol with the proposed path selection strategy, a dependable and efficient routing mechanism is established for IoT networks in edge computing scenarios. Simulation results validate that the proposed STAOMDV model achieves a balance in network energy consumption and extends the overall network lifespan.

Case Study on Nest's "Internet of Energy (IoE)" Business Model: Based on Strategic Choices for Connected Product

  • Song, Minzheong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권1호
    • /
    • pp.89-96
    • /
    • 2019
  • The purpose of this study is to investigate Nest Labs (Nest)'s business strategy. The activities based on strategic choices for monetizing connected product are investigated. Nest's capacity and functionality is to offer a seamless integration of devices, platforms, and services and the "Works with Nest" offers an ecosystem fulfilling the needs of different partners. For monetizing customer data, Nest provides a seamless customer experience supported by product incentives. Nest introduces open APIs to connect its connected products to the wider Internet of things (IoT) and open to "If This, Then That." The Nest app controls them from one single place. Nest partners with 32 energy providers as of 2017 and they provide energy from renewable and non-renewable energy sources. Nest also creates a sales channels in direct and indirect route and expands is business model to other industries such as home-rental service, 'AirBnB' to help consumers become more energy-efficient at home.

Network Forensics and Intrusion Detection in MQTT-Based Smart Homes

  • Lama AlNabulsi;Sireen AlGhamdi;Ghala AlMuhawis;Ghada AlSaif;Fouz AlKhaldi;Maryam AlDossary;Hussian AlAttas;Abdullah AlMuhaideb
    • International Journal of Computer Science & Network Security
    • /
    • 제23권4호
    • /
    • pp.95-102
    • /
    • 2023
  • The emergence of Internet of Things (IoT) into our daily lives has grown rapidly. It's been integrated to our homes, cars, and cities, increasing the intelligence of devices involved in communications. Enormous amount of data is exchanged over smart devices through the internet, which raises security concerns in regards of privacy evasion. This paper is focused on the forensics and intrusion detection on one of the most common protocols in IoT environments, especially smart home environments, which is the Message Queuing Telemetry Transport (MQTT) protocol. The paper covers general IoT infrastructure, MQTT protocol and attacks conducted on it, and multiple network forensics frameworks in smart homes. Furthermore, a machine learning model is developed and tested to detect several types of attacks in an IoT network. A forensics tool (MQTTracker) is proposed to contribute to the investigation of MQTT protocol in order to provide a safer technological future in the warmth of people's homes. The MQTT-IOT-IDS2020 dataset is used to train the machine learning model. In addition, different attack detection algorithms are compared to ensure the suitable algorithm is chosen to perform accurate classification of attacks within MQTT traffic.

IoT-Based Health Big-Data Process Technologies: A Survey

  • Yoo, Hyun;Park, Roy C.;Chung, Kyungyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.974-992
    • /
    • 2021
  • Recently, the healthcare field has undergone rapid changes owing to the accumulation of health big data and the development of machine learning. Data mining research in the field of healthcare has different characteristics from those of other data analyses, such as the structural complexity of the medical data, requirement for medical expertise, and security of personal medical information. Various methods have been implemented to address these issues, including the machine learning model and cloud platform. However, the machine learning model presents the problem of opaque result interpretation, and the cloud platform requires more in-depth research on security and efficiency. To address these issues, this paper presents a recent technology for Internet-of-Things-based (IoT-based) health big data processing. We present a cloud-based IoT health platform and health big data processing technology that reduces the medical data management costs and enhances safety. We also present a data mining technology for health-risk prediction, which is the core of healthcare. Finally, we propose a study using explainable artificial intelligence that enhances the reliability and transparency of the decision-making system, which is called the black box model owing to its lack of transparency.

IoT Healthcare Communication System for IEEE 11073 PHD and IHE PCD-01 Integration Using CoAP

  • Li, Wei;Jung, Cheolwoo;Park, Jongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권4호
    • /
    • pp.1396-1414
    • /
    • 2018
  • With the proliferation of the Internet of Things (IoT) healthcare devices, significant interoperability issue arises where devices use proprietary data transfer protocols. The IHE PCD-01 standard has been suggested for the exchange of healthcare data in ISO/IEEE 11073 PHD data model. However, the PCD-01 is not efficient to be used in the IoT environment. This is because the use of SOAP for PCD-01 may be too complex to be implemented in the resource-constrained IoT healthcare devices. In this paper, we have designed a communication system to implement ISO/IEEE 11073 and IHE PCD-01 integration using the IETF CoAP. More specifically, we have designed the architecture and procedures, using CoAP, to seamlessly transmit the bio-signal from the tiny resource-constrained IoT healthcare devices to the server in a standardized way. We have also built the agent, gateway, and PCD-01 interface at the server, all of which are using the CoAP as a communication protocol. In order to evaluate the performance of the proposed system, we have used the PCD data to be transmitted over CoAP, MQTT, and HTTP. The evaluation of the system performance shows that the use of CoAP results in faster transaction and lesser cost than other protocols, with less battery power consumption.

Mitigation of Phishing URL Attack in IoT using H-ANN with H-FFGWO Algorithm

  • Gopal S. B;Poongodi C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권7호
    • /
    • pp.1916-1934
    • /
    • 2023
  • The phishing attack is a malicious emerging threat on the internet where the hackers try to access the user credentials such as login information or Internet banking details through pirated websites. Using that information, they get into the original website and try to modify or steal the information. The problem with traditional defense systems like firewalls is that they can only stop certain types of attacks because they rely on a fixed set of principles to do so. As a result, the model needs a client-side defense mechanism that can learn potential attack vectors to detect and prevent not only the known but also unknown types of assault. Feature selection plays a key role in machine learning by selecting only the required features by eliminating the irrelevant ones from the real-time dataset. The proposed model uses Hyperparameter Optimized Artificial Neural Networks (H-ANN) combined with a Hybrid Firefly and Grey Wolf Optimization algorithm (H-FFGWO) to detect and block phishing websites in Internet of Things(IoT) Applications. In this paper, the H-FFGWO is used for the feature selection from phishing datasets ISCX-URL, Open Phish, UCI machine-learning repository, Mendeley website dataset and Phish tank. The results showed that the proposed model had an accuracy of 98.07%, a recall of 98.04%, a precision of 98.43%, and an F1-Score of 98.24%.

경기도 사물인터넷 생태계 분석을 통한 정책방향 수립에 관한 연구 (The Study on Internet of Things(IoT) Ecosystem Analysis and Its Policy Direction in Gyeonggi Province)

  • 김명진;이지훈
    • 한국경제지리학회지
    • /
    • 제19권1호
    • /
    • pp.18-32
    • /
    • 2016
  • 초연결 사회(Hyper-connected society)가 도래함에 따라 각 국가, 중앙정부와 일부지자체도 관련 정책을 추진 중에 있다. 경기도는 대한민국의 대표적인 지방자치단체로서 사물인터넷 관련산업의 역량이 뛰어나 능동적으로 대응방안을 마련해야한다. 본 논문은 경기도의 사물인터넷 생태계를 산학연 중심으로 분석하고 전문가 심층인터뷰를 통하여 정책수요를 파악해 올바른 정책방향을 수립하는 데 있다. 경기도에는 사물인터넷 관련 중소기업이 디바이스분야 특히, 전자집적회로, 유무선 통신장비 제조업 등에 집중되어 있고, 대학은 경기도R&D와 중앙정부R&D로 사물인터넷 관련 연구를 수행하고 있다. 뿐만 아니라 도내에 위치한 중앙정부 산하 연구기관에서 사물인터넷 관련 연구를 수행하고 있으며, 각각의 혁신주체들은 협업을 통해 연구를 수행하고 있다. 사물인터넷 관련 산학연 간 유기적인 협력체계가 좀 더 활발하게 작동하도록 경기도 지방자치단체는 사물인터넷 관련 산업육성을 위한 정책기반을 확보하고, 사물인터넷이 더욱 활성화 될 수 있는 환경을 조성하며, 사물인터넷 서비스 실현을 위한 실증지구를 지정하여 사물인터넷 적용 기회를 마련하도록 한다.

  • PDF