• Title/Summary/Keyword: Internet-of-things device

Search Result 466, Processing Time 0.022 seconds

Development of User-customized Device Intelligent Character using IoT-based Lifelog data in Hyper-Connected Society (초연결사회에서 IoT 기반의 라이프로그 데이터를 활용한 사용자 맞춤형 디바이스 지능형 캐릭터 개발)

  • Seong, Ki Hun;Kim, Jung Woo;Sul, Sang Hun;Kang, Sung Pil;Choi, Jae Boong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.21-31
    • /
    • 2018
  • In Hyper-Connected Society, IoT-based Lifelog data is used throughout the Internet and is an important component of customized services that reflect user requirements. Also, Users are using social network services to easily express their interests and feelings, and various life log data are being accumulated. In this paper, Intelligent characters using IoT based lifelog data have been developed and qualitative/quantitative data are collected and analyzed in order to systematically grasp emotions of users. For this, qualitative data through the social network service used by the user and quantitative data through the wearable device are collected. The collected data is verified for reliability by comparison with the persona through esnography. In the future, more intelligent characters will be developed to collect more user life log data to ensure data reliability and reduce errors in the analysis process to provide personalized services.

An Architecture of IoT Information Gateway in the IMS (IMS 기반의 IoT 정보 게이트웨이 구조)

  • Wang, Qichao;Lee, Jaeoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.29-36
    • /
    • 2019
  • With the rapid development of 5G technology, more and more network functions are interconnected and more popular. In order to effectively manage emerging network concepts, it allows any device object in the real world to be connected anywhere and at any time through the integration of device object recognition, interaction and raw data collection technologies. In addition, IP Multimedia Subsystem (IMS) is an architecture framework for transmitting IP-based information to the device object which can be represented as end user. Therefore, the Internet of Things and IP Multimedia Subsystem (IoT-IMS) communication platform can provide a convenient and fast way for user or device objects to deploy new application services effectively. In particular, in order to collect and manage the device information from IoT effectively in the IoT-IMS communication platform, an IoT Information Gateway (IIG) is proposed. Through the IoT Application Service (AS) scenario, the collected device information can be easily observed and managed in a unified way.

Homomorphic Encryption as End-to-End Solution for Smart Devices

  • Shanthala, PT;Annapurna, D;Nittala, Sravanthi;Bhat, Arpitha S;Aishwarya, Aishwarya
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.57-62
    • /
    • 2022
  • The recent past has seen a tremendous amount of advancement in the field of Internet of Things (IoT), allowing the influx of a variety of devices into the market. IoT devices are present in almost every aspect of our daily lives. While this increase in usage has many advantages, it also comes with many problems, including and not limited to, the problem of security. There is a need for better measures to be put in place to ensure that the users' data is protected. In particular, fitness trackers used by a vast number of people, transmit important data regarding the health and location of the user. This data is transmitted from the fitness device to the phone and from the phone onto a cloud server. The transmission from device to phone is done over Bluetooth and the latest version of Bluetooth Light Energy (BLE) is fairly advanced in terms of security, it is susceptible to attacks such as Man-in-the-Middle attack and Denial of Service attack. Additionally, the data must be stored in an encrypted form on the cloud server; however, this proves to be a problem when the data must be decrypted to use for running computations. In order to ensure protection of data, measures such as end-to-end encryption may be used. Homomorphic encryption is a class of encryption schemes that allow computations on encrypted data. This paper explores the application of homomorphic encryption for fitness trackers.

Machine Learning-based Detection of DoS and DRDoS Attacks in IoT Networks

  • Yeo, Seung-Yeon;Jo, So-Young;Kim, Jiyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.101-108
    • /
    • 2022
  • We propose an intrusion detection model that detects denial-of-service(DoS) and distributed reflection denial-of-service(DRDoS) attacks, based on the empirical data of each internet of things(IoT) device by training system and network metrics that can be commonly collected from various IoT devices. First, we collect 37 system and network metrics from each IoT device considering IoT attack scenarios; further, we train them using six types of machine learning models to identify the most effective machine learning models as well as important metrics in detecting and distinguishing IoT attacks. Our experimental results show that the Random Forest model has the best performance with accuracy of over 96%, followed by the K-Nearest Neighbor model and Decision Tree model. Of the 37 metrics, we identified five types of CPU, memory, and network metrics that best imply the characteristics of the attacks in all the experimental scenarios. Furthermore, we found out that packets with higher transmission speeds than larger size packets represent the characteristics of DoS and DRDoS attacks more clearly in IoT networks.

A Study of Temporary Positioning Scheme with IoT devices for Disastrous Situations in Indoor Spaces Without Permanent Network Infrastructure (상설 네트워크 인프라가 없는 실내 공간에서 재난시 IoT 기기를 활용한 부착형 실내 위치 추적 기술 연구)

  • Lee, Jeongpyo;Yun, Younguk;Kim, Sangsoo;Kim, Youngok
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.315-324
    • /
    • 2018
  • Purpose: This paper propose a temporary indoor positioning scheme with devices of internet of things (IoT) for disastrous situations in places without the infrastructure of networks. Method: The proposed scheme is based on the weighted centroid localization scheme that can estimate the position of a target with simple computation. Results: It also is implemented with the IoT devices at the underground parking lot, where the network is not installed, of general office building. According to the experiment results, the positioning error was around 10m without a priori calibration process at $82.5m{\times}56.4m$ underground space. Conclusion: The proposed scheme can be deployed many places without the infrastructure of networks, such as parking lots, warehouses, factory, etc.

A Memory Mapping Technique to Reduce Data Retrieval Cost in the Storage Consisting of Multi Memories (다중 메모리로 구성된 저장장치에서 데이터 탐색 비용을 줄이기 위한 메모리 매핑 기법)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.19-24
    • /
    • 2023
  • Recently, with the recent rapid development of memory technology, various types of memory are developed and are used to improve processing speed in data management systems. In particular, NAND flash memory is used as a main media for storing data in memory-based storage devices because it has a nonvolatile characteristic that it can maintain data even at the power off state. However, since the recently studied memory-based storage device consists of various types of memory such as MRAM and PRAM as well as NAND flash memory, research on memory management technology is needed to improve data processing performance and efficiency of media in a storage system composed of different types of memories. In this paper, we propose a memory mapping scheme thought technique for efficiently managing data in the storage device composed of various memories for data management. The proposed idea is a method of managing different memories using a single mapping table. This method can unify the address scheme of data and reduce the search cost of data stored in different memories for data tiering.

The IoT System Simulation Based XML (XML기반의 IoT 시뮬레이션 시스템)

  • Jang, Ki-Man;Hwang, Jong-Sun;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.663-668
    • /
    • 2016
  • Without the interference of man in traditional single-device control system P2M way to control the device by a person to the development of the Internet of Things it was changing the way the M2M communication between devices possible. The attention of the user on the IoT to this development, but this increase was caused problems the system is insufficient to help the understanding of the IoT technologies to meet them. Therefore, to understand the operation of the IoT technology system that can easily expressed is required. In this paper, we design and implement a simulation system that can monitor the process of relationships between devices, such as when a user event occurs, the sensor, SNS and the XML-based collaboration to meet users' needs. Further, the respective functions for the maintenance and updating of the simulation system is proposed to make API.

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

Basic Study on the IoT Micro Boiler (IoT 마이크로 보일러에 대한 기초 연구)

  • Jang, Sung-Cheol
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.23-29
    • /
    • 2022
  • The product to be developed in this study is a heat recovery device which generates steam or hot water at high temperature and high pressure by heating water using exhaust gas from diesel engine, gas engine, gas turbine, etc. as an exhaust gas boiler off heat boiler(EGB) type for ship and power generation. The steam vapor or the created warm water is used as the power source required for the steerage heating and hot water facility or the HFO heating of the ship, and the turbine drive. The principle of waste heat boilers serves to heat water as high temperature exhaust gas with heat pass through the tube of the boiler. The heated water is a structure that is sent to a cabin or turbine device in the form of steam. In this study, the objective of this study is to maximize the efficiency by increasing the heat transfer surface by replacing the tube which is the heat transfer part of EGB with the plate tube.

An Efficient SLC Transition Method for Improving Defect Rate and Longer Lifetime on Flash Memory (플래시 메모리 상에서 불량률 개선 및 수명 연장을 위한 효율적인 단일 비트 셀 전환 기법)

  • Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.81-86
    • /
    • 2023
  • SSD (solid state disk), which is flash memory-based storage device, has the advantages of high density and fast data processing. Therefore, it is being utilized as a storage device for high-capacity data storage systems that manage rapidly increasing big data. However, flash memory, a storage media, has a physical limitation that when the write/erase operation is repeated more than a certain number of times, the cells are worn out and can no longer be used. In this paper, we propose a method for converting defective multi-bit cells into single-bit cells to reduce the defect rate of flash memory and extend its lifetime. The proposed idea distinguishes the defects and treatment methods of multi-bit cells and single-bit cells, which have different physical characteristics but are treated as the same defect, and converts the expected defective multi-bit cells into single-bit cells to improve the defect rate and extend the overall lifetime. Finally, we demonstrate the effectiveness of our proposed idea by measuring the increased lifetime of SSD through simulations.