• Title/Summary/Keyword: Internet of Things Service(IoT Service)

Search Result 482, Processing Time 0.025 seconds

A Study of Research Trend about Internet of Things (사물인터넷(IoT)에 관한 국내 연구 동향 분석)

  • Joo, Chungmin;Na, Hyungjin
    • Informatization Policy
    • /
    • v.22 no.3
    • /
    • pp.3-15
    • /
    • 2015
  • This study aims to examine the recent trend of domestic researches on the Internet of Things(IoT) which has drawn a lot of attention in the field of ICT. This meta-analysis analyzes 101 studies published in academic journals from 2010, focusing on research topics, methods and the fields of study. The results show that the research topics of most used studies were related to the technological and industrial issues, and especially in the technical field, the major topic was suggesting new IoT technology. The most research method was testing research followed by the literature review. Even though engineers are holding the mainstream of the IoT technology, some experts in the field of social science release their articles nowadays. These results indicate that the IoT has a great ripple effect both technologically and socioculturally, and researches need to be vitalized in the fields of industry, service, policy and institution as well as technological fields. In addition, the research for the future should extend methodological diversity and take more convergence approaches in a variety of fields.

A study on the Influence of Usage Intention of IoT Healthcare service for Elderly (노인의 IoT 기반 스마트 건강관리서비스 이용의도에 미치는 영향)

  • Hong, Sung Jung;Lee, Sung-Hyun;Kim, Kyung Mi
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.341-349
    • /
    • 2020
  • The purpose of this study was conducted to explain the intention of use of IoT (internet of things) healthcare service for elderly using TAM (Technology Acceptance Model). The exogenous variables were professional support, personalization, interaction, and convenience, The endogenous variables were usefulness and intention. Data were collected from 220 elderly residents aged 65 over in welfare center and were analyzed using structural equation modeling using AMOS 25.0. The result of this study showed that professional support and personalization did not significantly difference perceived usefulness, and there were significant differences interaction, and convenience. Futhermore, perceived usefulness influence intention of use of IoT healthcare service for elderly. IoT health care service for elderly is affected by perceived usefulness. This study systematically verified the elderly's intention of using IoT-based smart healthcare services. The result of this study would be able to be used as basic data for preparing strategies to enhance their intention to use the services.

A Survey on Smart Internet of Things - Trend Issues, Cognitive Computing Frameworks (지능형 IoT에 대한 조사 - Cognitive Computing Frameworks, 트렌드 이슈)

  • Landry, Moungala Alban;Kabulo, Nday Sinai;Yum, Sun-Ho;Namgung, Jung-Il;Shin, Soo-Young;Park, Soo-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.604-607
    • /
    • 2018
  • From the last past decade, the Internet of Thing (IoT) area has attracted a lot of attention from researchers. It is said to be a promising technology with great impact in people life, since it redefines the relationship objects have with Human and between themselves. It allows objects to gather data from the real world and communicate with others through the internet. This enabled many opportunities for service providers, companies, factories, environmental monitoring, healthcare, smart cities, and soon. Therefore, today, IoT is densely used in various domains of life, and knows an exponential growth. However, although many advancements have been achieved, several challenges keep causing issues and still need to be overcome. This paper gives an overview on the current trend issues in IoT on which researchers are focusing. It's also explores different proposed frameworks to allow the application of cognitive computing as an integrated process of an Internet of things (IoT) systems, to bring a great advanced in the way machine may communicate with human and their surroundings. This is known as cognitive IoT (CIoT), which allows machines to produce a human-like behavior, then providing enhanced level of capabilities to IoT.

A Survey of Application Layer Protocols of Internet of Things

  • bibi, Nawab;Iqbal, Faiza;Akhtar, Salwa Muhammad;Anwar, Rabia;bibi, Shamshad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.301-311
    • /
    • 2021
  • The technological advancements of the last two decades directed the era of the Internet of Things (IoT). IoT enables billions of devices to connect through the internet and share their information and resources on a global level. These devices can be anything, from smartphones to embedded sensors. The main purpose of IoT is to make devices capable of achieving the desired goal with minimal to no human intervention. Although it hascome as a social and economic blessing, it still brought forward many security risks. This paper focuses on providing a survey of the most commonly used application layer protocols in the IoT domain, namely, Constrained Application Protocol (CoAP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), and Extensible Messaging and Presence Protocol (XMPP). MQTT, AMQP, and XMPP use TCP for device-to-device communication, while CoAP utilizes UDP to achieve this purpose. MQTT and AMQP are based on a publish/subscribe model, CoAP uses the request/reply model for its structuring. In addition to this, the quality of service provision of MQTT, AMQP, and CoAP is not very high, especially when the deliverance of messages is concerned. The selection of protocols for each application is very a tedious task.This survey discusses the architectures, advantages, disadvantages, and applications of each of these protocols. The main contribution of this work is to describe each of the aforementioned application protocols in detail as well as providing their thorough comparative analysis. This survey will be helpful to the developers in selecting the protocol ideal for their system and/or application.

Towards Open Interfaces of Smart IoT Cloud Services

  • Kim, Kyoung-Sook;Ogawa, Hirotaka
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.235-238
    • /
    • 2016
  • With the vision of Internet of Things (IoT), physical world itself is becoming a connected information system on the Internet and cyber world is computing as a physical act to sense and respond to real-world events collaboratively. The systems that tightly interlink the cyber and physical worlds are often referred to as Smart Systems or Cyber-Physical Systems. Smart IoT Clouds aim to provide a cyber-physical infrastructure for utility (pay-as-you-go) computing to easily and rapidly build, modify and provision auto-scale smart systems that continuously monitor and collect data about real-world events and automatically control their environment. Developing specifications for service interoperability is critical to enable to achieve this vision. In this paper, we bring an issue to extend Open Cloud Computing Interface for uniform, interoperable interfaces for Smart IoT Cloud Services to access services and build a smart system through orchestrating the cloud services.

  • PDF

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

Sparse DTMNs routihg protocol for the M2M environment (Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.11-18
    • /
    • 2014
  • Recently, ICT technology has been evolving towards an M2M (Machine to Machine) environment that allows communication between machine and machine from the communication between person and person, and now the IoT (Internet of Things) technology that connects all things without human intervention is receiving great attention. In such a network environment, the communication network between object and object as well as between person and person, and person and object is available which leads to the sharing of information between all objects, which is the essential technical element for us to move forward to the information service society of the era of future ubiquitous computing. On this paper, the protocol related to DTMNs in a Sparse M2M environment was applied and the improved routing protocol was applied by using the azimuth and density of the moving node in order to support a more efficient network environment to deliver the message between nodes in an M2M environment. This paper intends to verify the continuity of the study related to efficient routing protocols to provide an efficient network environment in the IoT and IoE (Internet of Everything) environment which is as of recently in the spotlight.

How the Strength of Parent Brand Associations Influences the User Acceptance of Extended brand: Internet of Things Perspective (사용자의 확장브랜드 수용과 모브랜드의 영향력: 사물인터넷을 중심으로)

  • Lim, Hyun A;Kwon, Hyuk-Jun;Choi, Jaewon
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.2
    • /
    • pp.49-65
    • /
    • 2018
  • The purpose of the research is to identify the effects of brand evidence, brand personality and negative factors on extended brand trust and customer purchase intention in IoT (Internet of Things) service. Negative factors include scarcity marketing and privacy concern. To achieve this objective, we analyzed the 269 respondents who had used Xiaomi products at least more than once. The results of this study are as follows: First, it was found that core service, self-image congruence of brand evidence and brand personality has a positive influence on extended brand trust. But, perceived price of brand evidence is not related to extended brand trust. Secondly, Scarcity marketing influenced extended brand trust. But, Privacy concern is not related to extended brand trust. Consumers did not realize privacy because of technological innovation of IoT. Thus, the research has a different significance from antecedent research.

Secure Smart Safety System Using Streetlight Infrastructure (가로등 인프라를 활용한 안전한 스마트 방범 시스템)

  • Cha, Jeong-Hwa;Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.851-856
    • /
    • 2015
  • As crime has actually increased in recent years, various mobile applications related to safety and emergency measure have received much attention. Therefore, IoT (Internet of Things) technologies, which connect various physical objects with Internet communication, have been also paid attention and then diverse safety services based on IoT technologies have been on the increase. However, existing mobile safety applications are simply based on location based service (LBS). Also, as they are independently operated without the help of another safety systems, they cannot efficiently cope with various safety situations. So, this paper proposes the efficient smart safety service architecture with both the risky situation detection using user location as well as various sensing information and the risk congruence measure using the streetlight infrastructure. Additionally, UDID (unique device identifier) is utilized for the secure communication with the control center.