• Title/Summary/Keyword: Internet of Things Service(IoT Service)

Search Result 482, Processing Time 0.035 seconds

A Routing Scheme Considering Bottleneck and Route Link Quality in RPL-based IoT Wireless Networks (RPL 기반 IoT 무선 네트워크에서 노드 병목 및 전송 경로 품질을 고려한 라우팅 기법)

  • Jung, Ik-Joo;Chung, Sang-Hwa;Lee, Sung-Jun
    • Journal of KIISE
    • /
    • v.42 no.10
    • /
    • pp.1268-1279
    • /
    • 2015
  • In order to manage a large number of devices connected to the Internet of Things (IoT), the Internet Engineering Task Force (IETF) proposed the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). The route of the RPL network is generated through the use of an Objective Function (OF) that is suitable for the service that is required for the IoT network. Since the route of the RPL network is conventionally simply chosen only by considering the link quality between the nodes, it is sensible to seek an OF that can also provide better Quality of Service (QoS). In previous studies, the end-to-end delay might possibly be sub-optimal because they only deal with problems related to the reduction of energy consumption and not to the link quality on the path to the sink node. In this study, we propose a scheme that reduces the end-to-end delay but also gives full consideration to both the quality on the entire route to the destination and to the expected lifetime of nodes with bottlenecks from heaped traffic. Weighting factors for the proposed scheme are chosen by experiments and the proposed scheme can reduce the end-to-end delay and the energy consumption of previous studies by 20.8% and 10.5%, respectively.

Medical Information Security and Standard Technology On IoT Environment (IoT 환경의 의료 정보보호와 표준 기술)

  • Woo, Sung-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2683-2688
    • /
    • 2015
  • Internet of Things(IoT) using a variety of technologies in combination provides a convenient, elevated range of services to users. IoT has been noted in combining the fields of medical service in particular. However, with the advent and growing of IoT, the more medical services are evolving, security problems caused by leakage of personal health information will become more serious. U-Health and medical devices, which deal mainly the personal health information, is required to a high level of privacy and security of health information. Therefore, the introduction of the IoT in the healthcare industry requires the medical information security as a prerequisite. This study analyzes security status and trend of IoT, personal medical information leakage cases, the health information protection measures in accordance with the life cycle of medical information, and the standardized protection technologies.

Remote medical Smart healthcare system for IoT-based multi-biometric information measurement (IoT기반 다중 생체정보 측정을 위한 원격 의료 스마트 헬스케어 시스템)

  • Sim, Joung-Yong;Seo, Hyun-Gon
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.10
    • /
    • pp.53-61
    • /
    • 2020
  • Recently, as the uncontact service is activated in earnest due to the Corona 19 virus, the necessity of system development to provide non-face-to-face contact remote medical service has increased. In this study, we propose a smart healthcare system, Rm_She(Remote Medical Smart Healthcare System). Rm_She can collect and manage various vital signs information by connecting various healthcare products that detect bio-signals based on IoT to one application. The health check app (HC_app) is used to connect vital sign measurement devices to a wireless LAN and receive vital sign values from the HC_app. Then, the vital signs are output to the user on the smartphone, and the corresponding information is transmitted to the healthcare management server. The healthcare server receives the measured values and stores them in a database, and the stored measured values are provided as a web service so that medical staff can remotely monitor them in real time.

Link Budget Analysis of Communication System for Reliable WBAN (신뢰성있는 WBAN을 위한 통신 시스템의 링크 버짓 분석)

  • Roh, Jae-sung
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.6
    • /
    • pp.584-588
    • /
    • 2019
  • Wireless body area network (WBAN) is a networking technology that enables early detection of abnormal health conditions, real-time medical monitoring, and telemedicine support systems. The internet of things (IoT) for healthcare, which has become an issue recently, is one of the most promising areas for improving the quality of human life. It must meet the high QoS requirements of the medical communication system like any other communication system. Therefore, the bit error rate (BER) threshold was chosen to accommodate the QoS requirements of the WBAN communication system. In this paper, we calculated BER performance of WBAN channel using IR-UWB PPM modulation and analyzed link budget and system margin of WBAN according to various system parameters.

A Study on AES-based Mutual Authentication Protocol for IoT Devices (사물인터넷 디바이스를 위한 AES 기반 상호인증 프로토콜)

  • Oh, Se-Jin;Lee, Seung-Woo
    • Journal of Industrial Convergence
    • /
    • v.18 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • The Internet of things (IoT) is the extension of Internet connectivity into various devices and everyday objects. Embedded with electronics, Internet connectivity and other forms of hardware. The IoT poses significant risk to the entire digital ecosystem. This is because so many of these devices are designed without a built-in security system to keep them from being hijacked by hackers. This paper proposed a mutual authentication protocol for IoT Devices using symmetric-key algorithm. The proposed protocol use symmetric key cryptographic algorithm to securely encrypt data on radio channel. In addition, the secret key used for encryption is random number of devices that improves security by using variable secret keys. The proposed protocol blocked attacker and enabled legal deives to communicate because only authenticated devices transmit data by a mutual authentication protocol. Finally, our scheme is safe for attacks such as eavesdropping attack, location tracking, replay attack, spoofing attack and denial of service attack and we confirmed the safety by attack scenario.

A Study on the Feasibility of IoT and AI-based elderly care system application

  • KANG, Minsoo;KIM, Baek Seob;SEO, Jin Won;KIM, Kyu Ho
    • Korean Journal of Artificial Intelligence
    • /
    • v.9 no.2
    • /
    • pp.15-21
    • /
    • 2021
  • This paper conducted a feasibility study by applying an Internet of Things and Artificial intelligence-based management system for the elderly living alone in an aging society. The number of single-person families over the age of 50 is expected to increase, and problems such as health, safety, and loneliness may occur due to aging. Therefore, by establishing an IoT-based care system for the elderly living alone, a stable service was developed through securing a rapid response system for the elderly living alone and automatically reporting 119. The participants of the demonstration test were subjects under the jurisdiction of the "Seongnam Senior Complex," and the data collection rate between the IoT sensor and the emergency safety gateway was high. During the demonstration period, as a result of evaluating the satisfaction of the IoT-based care system for the elderly living alone, 90 points were achieved. We are currently in the COVID-19 situation. Therefore, the number of elderly living alone is continuously increasing, and the number of people who cannot benefit from care services will continue to occur. Also, even if the COVID-19 situation is over, the epidemic will happen again. So the care system is essential. The elderly care system developed in this way will provide safety management services based on artificial intelligence-based activity pattern analysis, improving the quality of in-house safety services.

Fall Detection System based Internet of Things (사물인터넷 기반의 낙상 감지 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2546-2553
    • /
    • 2015
  • Falling can happen to anyone, anywhere at anytime and especially it is one of the risk factor that can lead causes of death of persons aged 65 and over. Recently, the study of fall detection mechanisms as a smart healthcare service based on the IoT(Internet of Things) are being actively investigated. In this paper, we implement a fall detection system using arduino as a smart sensor communicates with a smart device. When transmitting the information of the acceleration on a sensor smart sensor with a BLE(Bluetooth Low Energy), the smart device processing and analyzing this information. and determines a fall situation. A fall detection system based on the Internet of Things which using smart sensor and smart device, has the advantage of being able to overcome the mobility and portability constraints.

Security and Privacy Issues of Fog Computing (포그 컴퓨팅 환경에서의 보안 및 프라이버시 이슈에 대한 연구)

  • Nam, Hyun-Jae;Choi, Ho-Yeol;Shin, Hyung-June;Kwon, Hyun-Soo;Jeong, Jong-Min;Hahn, Chang-Hee;Hur, Jun-Beom
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.257-267
    • /
    • 2017
  • With the development of IoT (Internet of Things) technology, the application area has been diversified and the number of users using this service also has increased greatly. Real time big data generated by many IoT devices is no longer suitable for processing in a cloud computing environment. To solve this issue, fog computing is suggested which minimizes response time and makes real time processing suitable. However, security requirement for new paradigm called fog computing is not established until now. In this paper, we define models for fog computing, and the security requirements for the defined model.

QoS-aware Data Delivery Infrastructure for IoT Computing Environments (사물인터넷 컴퓨팅 환경에서 QoS를 고려한 데이터 전송 구조)

  • Rhee, Yunseok
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.407-413
    • /
    • 2018
  • In this paper, we present a scalable data delivery infrastructure for such IoT computing environment where we need a common platform where data providers share their diverse sensing data and applications can easily access and receive such data from providers. For efficient data delivery, this paper proposes a new delivery path management technique that take advantage of diverse consumer QoS when building bandwidth-efficient delivery paths. We perform primitive experiments on the path construction and reconstruction which may be major overhead of the scalable infrastructure. The results show that the proposed infrastructure achieves a high level of scalability, and demonstrates that the management overhead is not significant.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.