• Title/Summary/Keyword: Internet of Things Devices

Search Result 800, Processing Time 0.026 seconds

Internet of Things: An Overview and its Applications in Aviation (항공 분야에서의 사물인터넷 기술 현황)

  • Hyun, WooSeok
    • Korean journal of aerospace and environmental medicine
    • /
    • v.30 no.3
    • /
    • pp.100-107
    • /
    • 2020
  • Internet of Things (IoT) is a technology that communicates data between devices, which are things, using an embedded sensor connected through network backbone such as the internet. Here, data communication technology, sensor technology, and actuator (interface) technology are fused into IoT and it turns devices into smart things. As a result, vast sized data are being generated and that data is being processed into useful actions that can control the things that are devices to make our lives much fruitful. Nowadays, the IoT, early defined as Machine-to-Machine (M2M) connection, becomes a key technology powered by growing innovation of wireless communication trends in the internet connectivity through mobile networking. This paper gives an overview of Internet of Things and brief information about major technologies and its applications in various fields focusing aviation.

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

Beginning of a New Standard: Internet of Media Things

  • Kim, Sang-Kyun;Sahu, Nevadita;Preda, Marius
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5182-5199
    • /
    • 2017
  • Recently, Internet of Things (IoT) drives a large variety of research, development, and new type of markets. All type of devices and sensors will be part of the Internet of Things and will be able to communicate not only plain data, but also audio-visual, olfactory, and haptic media data. In addition, as the devices and sensors getting smarter, it is highly probable that they can process acquired media and metadata to extract higher level of information (e.g., semantics). To support such enhanced functionalities, ISO/IEC SC29 WG11 (MPEG) starts a new standard project, ISO/IEC 23093, called Internet of Media Things (IoMT) to provide standard data formats and APIs for media things. This paper presents the standardization activities of IoMT focusing on explaining terms, standard scopes, and major media things with their use cases. One of the use cases, an IoT system for a blind pedestrian navigation assistance, is evaluated to prove its effectiveness.

VLC4WoT : Visible Light Communication for Web of Things

  • Durgun, Mahmut;Gokrem, Levent
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1502-1519
    • /
    • 2020
  • Recently, new devices have been developed for the Internet of Things concept. The devices commonly use RF (Radio Frequency) based wireless communication. With the increase in the number of devices, the space allocated for the radio frequency band in wireless communication fills rapidly. Visible Light Communication (VLC) is an alternative, secure and economical communication technology that uses light instead of radio frequencies. While Web of Things (WoT) is the adaptation of the experience and knowledge acquired from the web into the internet of things ecosystems. By combining these two technologies, the development of the Visible Light Communication for Web of Things (VLC4WoT) system, which can use VLC and WoT technologies, has been our motivation. In our study, microcontroller control circuit was created for VLC4WoT system. Control of the circuits over the internet was performed. VLC based receiver and transmitter units have been developed for wireless communication. Web based interface was created for control. The test apparatus consisting of four objects with four outputs and a transfer unit was carried out. In this test, communication was achieved successfully. It was presented in the study that VLC can be used in the web of things architecture. In the future, it is envisaged to use this system as a safe and economical system in indoor environments.

IP camera security: "Security Eyes"

  • Alshamrani, Sultan S
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.75-80
    • /
    • 2022
  • With the rapid growth of Internet of Things (IoT) applications and devices, there are still defects in safety and privacy. Current researches indicate that there are weak security mechanisms to protect these devices. Humans use the Internet of Things to control and connect their devices with the Internet. Using the Internet of things has been increased over time. Therefore, capture of sensitive user data has increased intentionally or not [1]. The IP Camera is a type of (IOT) devices. Therefore, in this paper we aim to create a "Security Eyes" application that protects IP Cameras from security attacks according to certain security mechanisms (increasing the strength of encryption and filling the usual security holes in IP cameras … etc) and alerts the user when the live broadcast is interrupted or an error occurs.

Survey of Trust Management System in Internet of Things

  • Meghana P.Lokhande;Dipti Durgesh Patil;Sonali Tidke
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.53-58
    • /
    • 2024
  • The Internet of Things (IoT) enables the connection of millions of disparate devices to the World Wide Web. To perform the task, a lot of smart gadgets must work together. The gadgets recognize other devices as part of their network service. Keeping participating devices safe is a crucial component of the internet of things. When gadgets communicate with one another, they require a promise of confidence. Trust provides certainty that the gadgets or objects will function as expected. Trust management is more difficult than security management. This review includes a thorough examination of trust management in a variety of situations.

A Study on Internet of Things in IT Convergence Period (융복합 시대의 사물인터넷에 관한 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.267-272
    • /
    • 2014
  • Many people have used a internet at various purposes. Internet have been used the optimal space to share informations by information producer or consumer. But, recently, through the development of networks and devices, The Internet is expanding beyond PCs and mobile devices into enterprise assets such as field equipment, and consumer items such as cars and televisions. The Internet of Things will enable forms of collaboration and communication between people and things, and between things themselves, hitherto unknown and unimagined. This paper presents various meanings of IoT, and describe the electronic and car domain of internet of things.

Context-Aware Modeling with User Demand in an Internet of Things Environment (사물 인터넷 환경에서 사용자 요구를 포함한 상황 인지 모델)

  • Ryu, Shinhye;Kim, Sangwook
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.11
    • /
    • pp.641-649
    • /
    • 2017
  • As Internet of Things devices become pervasive, services improve to better assess the context and to alert other users to deal with emergencies. Such services use Internet of Things devices to detect the context around the user and promptly notify public institutions, hospitals or other parental users in emergencies. Most of these systems analyze an event when the value of the device is unchanged for a period of time or if it detects an abnormal value. However, just monitoring sensor values makes it difficult to accurately understand the context surrounding a user. Also if the device is inactive, it can not identify the context or provide services again. However, understanding the user requirements, services provided through other devices, information sent to other users lets, appropriate actions be taken. This paper, proposes a device search method and system based on a context-aware model that includes user demands. The proposed system analyzes the user's context and demands by using data collected from the internet of things devices. If user devices are inactive, they can recognize other devices by searching for other devices and providing services to users again. Through the proposed method, the user-centric services are provided. This method also analyzes and responds to requirements in various emergencies.

Novus-io: An Internet of Things Platform for Academic Projects

  • Lozoya, Camilo;Aguilar-Gonzalez, Alberto;Favela-Contreras, Antonio;Zamora, Arturo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5634-5653
    • /
    • 2018
  • Internet of things (IoT) is based on a global dynamic information network with cloud services where a great number of devices (things) exchange data to provide added-value services and products. There are several commercial and open source IoT platforms available in the market to connect devices to internet; however, they have cost and operational constraints that make them not suitable for academic projects. In this work, an IoT platform, known as Novus-io, is introduced in order to support academic projects for undergraduate students. With this platform and proper training, undergraduate students from different majors (not only from information technology and electronics) are capable to upgrade their school projects with IoT functionalities. The objective of this approach is to provide to any undergraduate student skills and knowledge on IoT, so they will be prepared, in their imminent step toward professionalism, to understand the relevance of digital services in today's world.

A Method of Test Coverage Measurement Based on BitTorrent for Internet of Things Environment (사물 인터넷 환경을 위한 BitTorrent 알고리즘 기반의 테스트 커버리지 측정기법)

  • Ryu, Hodong;Lee, Woo Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.365-370
    • /
    • 2014
  • Although Internet of Things already became a new paradigm on service on network, we should pay more effort for studying about its testing method, since humans, things and environments in IoT are connected to each other without any restrictions. Earlier researches based on emulators showed that such virtual devices on emulators had unavoidable gap between them and real things. Furthermore, growth of connection complexity between the devices and loosing of restrictions make the gap wider. Accordingly, in this paper, we suppose a method of test coverage measurement based on BitTorrent for IoT environment. It has cooperation features among homogeneous devices with avoiding the overlapping on each part of whole test process.