• Title/Summary/Keyword: Internet-of-Things (IoT)

Search Result 1,858, Processing Time 0.029 seconds

Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things (스몰셀 기반 사물인터넷에서 패킷 지연시간 향상을 위한 디바이스 개인화 방법)

  • Lee, ByungBog;Han, Wang Seok;Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • Recently, with greatly improving the wireless communication technology, new services are created using smart sensors, i.e., machine-to-machine (M2M) and Internet of Things (IoT). In this paper, we propose a novel IoT device (IoTD) personalization method that adopt Small-cell Access Points (SAPs) to control IoTDs using user equipments (UEs), e.g., smart phones and tablet PC, from service users. First, we introduce a system architecture that consists of UE, IoTD, and SAP and propose the IoTD personalization method with two procedures, i.e., IoTD profile registration procedure and IoTD control procedure. Finally, through simulations, we evaluated the system performance of the proposed scheme and it is shown that the proposed scheme outperforms the conventional scheme in terms of the packet delay, packet loss probability, and normalized throughput.

An Authentication Management using Biometric Information and ECC in IoT-Edge Computing Environments (IoT-EC 환경에서 일회용 생체정보와 ECC를 이용한 인증 관리)

  • Seungjin Han
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.142-148
    • /
    • 2024
  • It is difficult to apply authentication methods of existing wired or wireless networks to Internet of Things (IoT) devices due to their poor environment, low capacity, and low-performance processor. In particular, there are many problems in applying methods such as blockchain to the IoT environment. In this paper, edge computing is used to serve as a server that authenticates disposable templates among biometric information in an IoT environment. In this environment, we propose a lightweight and strong authentication procedure using the IoT-edge computing (IoT-EC) system based on elliptic curve cryptographic (ECC) and evaluate its safety.

Cloud Computing Based Analysis Incorporated with the Internet of Things (IoT) in Nuclear Safety Assessment for Fukushima Dai-ichi Disaster (후쿠시마 다이-이치 재해에 대한 원자력 안전 평가에서 사물 인터넷 (IoT)과 통합된 클라우드 컴퓨팅 기반 분석)

  • Woo, Tae-Ho;Jang, Kyung-Bae
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.73-81
    • /
    • 2020
  • The internet of things (IoT) using cloud computing is applied to nuclear industry in which the nuclear power plant (NPP) accident is analyzed for the safety assessment. The Fukushima NPP accident is modeled for the accident simulations where the earthquake induced plant failure accident is used for analyzing the cloud computing technology. The fast and reasonable treatment in the natural disaster was needed in the case of the Fukushima. The real time safety assessment (RTSA) and the Monte-Carlo real time assessment (MCRTA) are constructed. This cloud computing could give the practicable method to prepare for the future similar accident.

Survey of Trust Management System in Internet of Things

  • Meghana P.Lokhande;Dipti Durgesh Patil;Sonali Tidke
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.53-58
    • /
    • 2024
  • The Internet of Things (IoT) enables the connection of millions of disparate devices to the World Wide Web. To perform the task, a lot of smart gadgets must work together. The gadgets recognize other devices as part of their network service. Keeping participating devices safe is a crucial component of the internet of things. When gadgets communicate with one another, they require a promise of confidence. Trust provides certainty that the gadgets or objects will function as expected. Trust management is more difficult than security management. This review includes a thorough examination of trust management in a variety of situations.

An Implement TLS VPN for Internet of Things (IoT기기를 위한 TLS VPN 구현)

  • Park, J.P
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.191-192
    • /
    • 2015
  • 본 논문에서는 최근 급성장하는 사물인터넷(Internet of Things, IoT) 시장의 안전한 원격 네트워크 통신을 위한 가상사설망(Virtual Private Network, VPN) 구축을 TLS(Transport Layer Security, TLS 1.0 또는 SSL 3.0) 프로토콜을 사용하여 암호화 기술, 터널링 기술을 적용한 인증 기반의 안전한 통신망을 제공하는 목적에서 기술개발의 고도화를 추구한다.

  • PDF

A Hedonic Model Effects for Consumer-oriented Retargeting Advertising Based on Internet of Things

  • Kim, Bo-Ram;Yoon, Yong-Ik;Chung, Man-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.75-80
    • /
    • 2017
  • In this study, we developed a Hedonic Model for Retargeting Advertising Based on Consumer-centerd IoT space for offering useful, interest, and interactive information to consumer. And most existing relative researches about Internet of Things but, this paper focusing on the Type of information, humor, and interactive and analyze the attitude and clicks intention to Retargeting Advertising Based on Consumer-centerd Internet of Things. According to the results, humor Advertising is positively related to attitude and click intention toward Internet of Things Advertising. But information Ad and interactive Ad affect positive to click intention. This is mean that click intention is more immediate reaction of consumers in the IoT space. Therefore Future research will be designed in a more interactive elements that can lead to positive reaction of consumers on the Internet of Things be more effective if you advertise advertising.

A new method to detect attacks on the Internet of Things (IoT) using adaptive learning based on cellular learning automata

  • Dogani, Javad;Farahmand, Mahdieh;Daryanavard, Hassan
    • ETRI Journal
    • /
    • v.44 no.1
    • /
    • pp.155-167
    • /
    • 2022
  • The Internet of Things (IoT) is a new paradigm that connects physical and virtual objects from various domains such as home automation, industrial processes, human health, and monitoring. IoT sensors receive information from their environment and forward it to their neighboring nodes. However, the large amounts of exchanged data are vulnerable to attacks that reduce the network performance. Most of the previous security methods for IoT have neglected the energy consumption of IoT, thereby affecting the performance and reducing the network lifetime. This paper presents a new multistep routing protocol based on cellular learning automata. The network lifetime is improved by a performance-based adaptive reward and fine parameters. Nodes can vote on the reliability of their neighbors, achieving network reliability and a reasonable level of security. Overall, the proposed method balances the security and reliability with the energy consumption of the network.

A Process-driven IoT-object Collaboration Model (프로세스 기반 사물인터넷 객체 협업 모델)

  • Ahn, Hyun;Lee, Yongjoon;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.9-16
    • /
    • 2014
  • In recent years, the importance of IoT (Internet of Things) is emphasized by information communication technologies and the performance of various smart devices are rapidly developed and applied in the real world. In this paper, we propose a process-driven IoT-object collaboration model to specify and execute a IoT service based on processes. That is, the purpose of this paper is to suggest a formal method in order to describe a IoT service into a group of tasks having execution order and collaboration between IoT-objects in charge of the enactment of a task. Conclusively, through the proposed model, we expect that IoT services will be automatically executed, analyzed, monitored and reused in the process-driven IoT computing environment.

Design of the Communication System for IoT (IoT 통신 시스템 설계)

  • Jang, Seon-Ju;Kim, Kyu-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.231-232
    • /
    • 2013
  • 현대사회는 기술의 발전으로 우리가 의식하지 않아도 모든 사물과 사람이 통신을 하는 시대로 바뀌고 있다. 이런 기술을 Internet of things 줄여서 IoT라고 부른다. IoT기술의 핵심은 인간의 개입 없이 모든 사물들이 상호 협력적으로 센싱, 정보 처리 등을 수행한다는 점이다. 본 논문은 IoT기술의 지속적인 발전과 함께 기술의 실현을 위해서 필요한 시스템을 제안한다.

  • PDF

Reliable Mobility Management Using CoAP in Internet of Things Environments (사물 인터넷 환경에서 CoAP 기반의 신뢰성 있는 이동성 관리 방법)

  • Chun, Seung Man;Kim, Hyun Su;Ham, Chang Gyun;Chung, Yun Seok;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.13-18
    • /
    • 2016
  • In Internet of Things (IoT) environment, a variety of smart devices are connected to Internet through various network technologies such as 4G/5G, WiBro, Bluetooth, etc. in order to provide the remote monitoring service such as smart healthcare service, etc. Most standard mobility management protocols based on IETF Mobile IP may not be suitable for Internet of Things (IoT) environments due to constrained power, constrained CPU processing and memory capacity, and large signalling overhead which are inherently accompanied by various devices in IoT environments. In this article, we propose a new mobility management protocol CoMP (CoAP-based Mobility Managemenbt Protocol) for reliable mobility management in IoT environments. The architecture and algorithm to achieve both reliability and simplicity for IoT mobility management are proposed. Finally, performance has been evaluated by both mathematical analysis and simulation.