• Title/Summary/Keyword: Internet of Things Service(IoT Service)

Search Result 482, Processing Time 0.028 seconds

Efficient indoor positioning systems for indoor location-based service provider (실내 위치 기반 서비스 제공을 위한 효율적인 실내 위치 측위 시스템)

  • Yoon, Chang-Pyo;Hwang, Chi-Gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1368-1373
    • /
    • 2015
  • Recently, There is increasing interest in the IoT(Internet of Thing) as intelligent information service that enables communication between people and things based on internet. In particular the demand for indoor location-based services with the development of smart devices is rapidly increasing. Using the RSSI signal that is provide to the BLE(Bluetooth Low Energy) for Indoor location information measurement calculates distance information between beacon and mobile terminal. However, simply using the RSSI signal to the distance measurement has a difficult to get the indoor location information due to the influence of the signal interference and the weather. In this paper, by performing an operation for obtaining a reliable distance information from the signal information of iBeacon we propose a system for providing reliable indoor location.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

IP-Based Heterogeneous Network Interface Gateway for IoT Big Data Collection (IoT 빅데이터 수집을 위한 IP기반 이기종 네트워크 인터페이스 연동 게이트웨이)

  • Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.173-178
    • /
    • 2019
  • Recently, the types and amount of data generated, collected, and measured in IoT such as smart home, security, and factory are increasing. The technologies for IoT service include sensor devices to measure desired data, embedded software to control the devices such as signal processing, wireless network protocol to transmit and receive the measured data, and big data and AI-based analysis. In this paper, we focused on developing a gateway for interfacing heterogeneous sensor network protocols that are used in various IoT devices and propose a heterogeneous network interface IoT gateway. We utilized a OpenWrt-based wireless routers and used 6LoWAN stack for IP-based communication via BLE and IEEE 802.15.4 adapters. We developed a software to convert Z-Wave and LoRa packets into IP packet using our Python-based middleware. We expect the IoT gateway to be used as an effective device for collecting IoT big data.

Service Architecture Models For Fog Computing: A Remedy for Latency Issues in Data Access from Clouds

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2310-2345
    • /
    • 2017
  • With the emergence of the Internet of Things (IoT) the world is projecting towards a scenario where every object in the world (including humans) acts as a sender and receiver of data and if we were to see that concept mature we would soon be talking of billions more users of the cloud networks. The cloud technology is a very apt alternative to permanent storage when it comes to bulk storage and reporting. It has however shown weaknesses concerning real-time data accessibility and processing. The bandwidth availability of the cloud networks is limited and combined with the highly centralized storage structure and geographical vastness of the network in terms of distance from the end user the cloud just does not seem like a friendly environment for real-time IOT data. This paper aims at highlighting the importance of Flavio Bonomi's idea of Fog Computing which has been glamorized and marketed by Cisco but has not yet been given a proper service architecture that would explain how it would be used in terms of various service models i-e IaaS, PaaS and SaaS, of the Cloud. The main contribution of the paper would be models for IaaS, PaaS and SaaS for Fog environments. The paper would conclude by highlighting the importance of the presented models and giving a consolidated overview of how they would work. It would also calculate the respective latencies for fog and cloud to prove that our models would work. We have used CloudSim and iFogSim to show the effectiveness of the paradigm shift from traditional cloud architecture to our Fog architecture.

A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation (사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용)

  • Han, Seul Ki;Kim, Myuhng Joo
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • As the demand for Internet of Things(IoT) increases, the need for the security of IoT devices is increasing steadily. It is difficult to apply the conventional security theory to IoT devices because IoT devices are subject to be constrained by some factors such as hardware, processor, and energy. Nowadays we have several security guidelines and related documents on IoT device. Most of them, however, do not consider the characteristics of specific IoT devices. Since they describes the security issues comprehensively, it is not easy to explain the specific security level reflecting each characteristics of IoT devices. In addition, most existing guidelines and related documents are described in view of developers and service proposers, and thus ordinary users are not able to assess whether a specific IoT device can protect their information securely or not. We propose an security evaluation model, based on the existing guidelines and related documents, for more specific IoT devices and prove that this approach is more convenient to ordinary users by creating checklists for the smart watch.

  • PDF

A Review Study of Interface Technology based Internet of Things (사물인터넷 기반 인터페이스 기술에 관한 문헌적 고찰)

  • Jin, Chan-Yong;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.115-117
    • /
    • 2016
  • Recently, many IoT(internet of things) products are emerging on the market and information technology companies are competing on the areas of internet of things standardization and platforms. This paper introduces many researches, standardizations, platforms on internet of things. Because of that, as the interest in this area out focused, many kinds of technology and new service are being exploited in this field. Therefore, we conducted a review research based on the internet of things. Also, this study was targeted a total of 34 research papers that are setting up the related internet of things among the research papers published in domestic academic journals since 2010. In this review, the studies related internet of things showed that the most is studied between 2014 and 2015. This study suggests practical and theoretical implications based on the results.

  • PDF

A Health Management Service with Beacon-Based Identification for Preventive Elderly Care

  • Li, Jian-Wei;Chang, Yi-Chun;Xu, Min-Xiong;Huang, De-Yao
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.648-662
    • /
    • 2020
  • Bluetooth low energy (BLE) beacon is an actively push-to-broadcast electronic signal and can be used for object identification. This paper uses such beacon-based identification and Internet of Things (IoT) technologies for the elder health management service system to simplify the user interfaces and steps for preventive elder care. In the proposed system, an elder's family member, caregiver, or medical worker can conveniently and quickly record daily health management information. Besides, through the statistics and analysis of the data on the back end of the system, it is helpful for the elderly to refer to the data of daily care management and future management trends. Similarly, it is also an essential reference data for system maintenance and the new preventive health care services development.

The Internet of Things(IoT) applications and value creation in the retail industry: focusing on consumer decision-making stages (리테일 산업에서의 구매단계별 사물인터넷 활용과 가치 창출)

  • Park, In-hyoung;Jeong, So Won
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.187-198
    • /
    • 2021
  • This study aims to understand the current status of the use of IoT-based products and services from the perspective of consumers and analyze the role and consumption value of each service-generated from the products and services. Their features and generated consumption value have been identified The decision-making process was divided into based on three stages (pre-purchase, purchase, and post-purchase) stages, and IoT services were classified in stages. In the pre-purchase stage, the IoT service provides information and alternatives, and is used for interaction and automatic payment systems in the purchasing stage. In the post-purchase stage, repetitive purchases are encouraged and after-sale services are provided. Throughout the decision-making process, smart retai application and servicel provides epistemic and functional value. In addition, it provides conditional and social value in the pre-purchase stage, and conditional value in the post-purchase stage. This study aims to provideprovides marketers and retailers an insight advice for the enhanced satisfaction of consumersimproving the satisfaction of consumers and the development of smart retail by examining the consumer-centered consumption value.

Efficient Implementation of the MQTT Protocol for Embedded Systems

  • Deschambault, Olivier;Gherbi, Abdelouahed;Legare, Christian
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.26-39
    • /
    • 2017
  • The need for embedded devices to be able to exchange information with each other and with data centers is essential for the advent of the Internet of Things (IoT). Several existing communication protocols are designed for small devices including the message-queue telemetry transport (MQTT) protocol or the constrained application protocol (CoAP). However, most of the existing implementations are convenient for computers or smart phones but do not consider the strict constraints and limitations with regard resource usage, portability and configuration. In this paper, we report on an industrial research and development project which focuses on the design, implementation, testing and deployment of a MQTT module. The goal of this project is to develop this module for platforms having minimal RAM, flash code memory and processing power. This software module should be fully compliant with the MQTT protocol specification, portable, and inter-operable with other software stacks. In this paper, we present our approach based on abstraction layers to the design of the MQTT module and we discuss the compliance of the implementation with the requirements set including the MISRA static analysis requirements.

Tourism Information Reservation System considering the Security and Efficiency (보안 및 효율성을 고려한 관광 예약 정보 시스템)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.67-72
    • /
    • 2015
  • As new Information technology such as IoT develops rapidly, a lot of changes are occurred in our lives. The Internet of Things is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. This change is also applied to tourism industry. These days many people make a tour reservation using the internet. But it is required to consider the efficiency and security of tour reservation system. In this paper, we suggest a tour reservation system. First, we describe the computer reservation system, hotel reservation system and reservation system. Second, we perform the modeling of general reservation system and suggested reservation system. Third, performance evaluation is carried out with respect to efficiency and security. The results show that the suggested reservation system has a better performance than a general reservation system. At last we described the results and future works.