• Title/Summary/Keyword: Internet-of-things device

Search Result 465, Processing Time 0.029 seconds

Performance Analysis of Implementation on IoT based Smart Wearable Mine Detection Device

  • Kim, Chi-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.51-57
    • /
    • 2019
  • In this paper, we analyzed the performance of IoT based smart wearable mine detection device. There are various mine detection methods currently used by the military. Still, in the general field, mine detection is performed by visual detection, probe detection, detector detection, and other detection methods. The detection method by the detector is using a GPR sensor on the detector, which is possible to detect metals, but it is difficult to identify non-metals. It is hard to distinguish whether the area where the detection was performed or not. Also, there is a problem that a lot of human resources and time are wasted, and if the user does not move the sensor at a constant speed or moves too fast, it is difficult to detect landmines accurately. Therefore, we studied the smart wearable mine detection device composed of human body antenna, main microprocessor, smart glasses, body-mounted LCD monitor, wireless data transmission, belt type power supply, black box camera, which is to improve the problem of the error of mine detection using unidirectional ultrasonic sensing signal. Based on the results of this study, we will conduct an experiment to confirm the possibility of detecting underground mines based on the Internet of Things (IoT). This paper consists of an introduction, experimental environment composition, simulation analysis, and conclusion. Introduction introduces the research contents such as mines, mine detectors, and research progress. It consists of large anti-personnel mine, M16A1 fragmented anti-mine, M15 and M19 antitank mines, plastic bottles similar to mines and aluminum cans. Simulation analysis is conducted by using MATLAB to analyze the mine detection device implementation performance, generating and transmitting IoT signals, and analyzing each received signal to verify the detection performance of landmines. Then we will measure the performance through the simulation of IoT-based mine detection algorithm so that we will prove the possibility of IoT-based detection landmine.

Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

  • Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.328-342
    • /
    • 2022
  • The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.

A Study on the Application Method of GOF Design Pattern for Optimizing Android Devices (안드로이드 디바이스 최적화를 위한 GOF 디자인 패턴적용 방법에 대한 연구)

  • Jung, Woo-Cheol;Jeon, Mun-Seok;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.89-97
    • /
    • 2017
  • Recent Internet of Things(IoT), and in addition to wearable PC, such as software development methodologies based on a variety of object-oriented design and design patterns of GoF(Gang of Four) with OOP(Object-Oriented Programming) intended for portable devices. However, incorrect application design specification is that the higher the importance of the optimization of the program on the device because it can cause problems such as decreased operating speed, increase the memory occupancy and battery usage. In this paper, we propose an optimized design pattern based on the method of application, such as Android (Android) OS Strategy Pattern, State Pattern, Observer pattern. Test results show that the proposed scheme selection patterns can be selected to optimize the design pattern in the device that specification.

A Study to Apply A Fog Computing Platform (포그 컴퓨팅 플랫폼 적용성 연구)

  • Lee, Kyeong-Min;Lee, Hoo-Myeong;Jo, Min-Sung;Choi, Hoon
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.6
    • /
    • pp.60-71
    • /
    • 2019
  • As IoT systems such as smart farms and smart cities become popular, a large amount of data collected from many sensor nodes is sent to a server in the Internet, which causes network traffic explosion, delay in delivery, and increase of server's workload. To solve these problems, the concept of fog computing has been proposed to store data between IoT systems and servers. In this study, we implemented a software platform of the fog node and applied it to the prototype smart farm system in order to check whether the problems listed above can be solved when using the fog node. When the fog node is used, the time taken to control an IoT device is lower than the response time of the existing IoT device-server case. We confirmed that it can also solve the problem of the Internet traffic explosion and the workload increase in the server. We also showed that the intelligent control of IoT system is feasible by having the data visualization in the server and real time remote control, emergency notification in the fog node as well as data storage which is the basic capability of the fog node.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

Analysis on Coexistence between Unlicensed Wireless Device based on 802.11ah and LTE User Equipment (802.11ah 기반 비면허 무선기기와 LTE 단말기 간 공존 분석)

  • Lee, Il-Kyoo;Park, Yeon-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2015-2021
    • /
    • 2017
  • Recently, a lot of attention is fallen to IoT(Internet of Things) for hyper-connected society and the number of unlicensed wireless device has been increasing. Thus, this paper analyzed the impact of unlicensed wireless device on the basis of 802.11ah on licensed LTE user equipment in 900 MHz frequency band for efficient frequency use. As the interference analysis method, Minimum Coupling Loss (MCL) method and Monte Carlo (MC) method were used. In case of one interferer, minimum separation distance between interferer and victim was calculated as about 22 m through the MCL method under the assumption of the worst case. The maximum number of interferer to meet the interference probability of 5% below within a cell radius of the victim was computed as about 3000 by using MC method based on statistical technique. The analysis method and results in this paper are expected to be used for the coexistence between unlicensed wireless device and licensed wireless device.

Hardware Interlocking Security System with Secure Key Update Mechanisms In IoT Environments (IoT 환경에서의 안전한 키 업데이트를 위한 하드웨어 연동 보안 시스템)

  • Saidov, Jamshid;Kim, Bong-Keun;Lee, Jong-Hyup;Lee, Gwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.4
    • /
    • pp.671-678
    • /
    • 2017
  • Recent advances in Internet of Things (IoT) encourage us to use IoT devices in daily living areas. However, as IoT devices are being ubiquitously used, concerns onsecurity and privacy of IoT devices are getting grown. Key management is an important and fundamental task to provide security services. For better security, we should restrict reusing a same key in sequential authentication sessions, but it is difficult to manually update and memorize keys. In this paper, we propose a hardware security module(HSM) for automated key management in IoT devices. Our HSM is attached to an IoT device and communicates with the device. It provides an automated, secure key update process without any user intervention. The secure keys provided by our HSM can be used in the user and device authentications for any internet services.

Sensing Data Management System Using LoRa Based on Mobius Platform (모비우스 플랫폼 기반 LoRa 통신을 이용한 센싱 데이터 관리 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.9-16
    • /
    • 2019
  • In order to realize IoT(Internet of Things) service, it is necessary to manage sensing data and build a service with respect to its scalability. However, existing internet services use unique protocols and non-standardized functions for each service provider, and it is difficult to provide data management and service because they use short-range communication technology such as Bluetooth. In addition, plurality of APs and gateways must be taken into consideration in establishing a wide area network. In this paper, we propose a sensing data management system using LoRa(Long Range) communication based on Mobius platform. The end device that drives Tas is configured to collect sensing data, configure an application gateway that drives &Cube, and transmit sensing data to the server. In addition, a server that manages the Mobius is configured to handle the sensing data transmitted from the application gateway to provide a monitoring service. We establish a wide area network through LoRa communication between the end device and the gateway and provide data management and service corresponding to the internet through the Mobius platform.

Convergent Case Study of Research and Education: Internet of Things Based Wireless Device Forming Research (R&E 융합적 사례: IoT 기반 무선 디바이스 성형연구)

  • Lee, Jeong-Ick
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.1-7
    • /
    • 2015
  • This study is a case study of the research study and education with high school students of natural sciences. Recent development of the Internet of Things (IoT) based on the subject of various studies exist. This study is one of the most portable communication devices of these infancy, yet students were easy to define the molding process of contacting a pager that can go along way in making research topics. We called a pager. Today, it is given a large and complex smart mobile communication devices that can be used for big data. Prior pagers are taught the meaning of the first mobile communication means in our lives were given device. The internal structure is relatively simple and is thought to function relatively simple, just suitable as a teaching practices of high school students with an interest in science and engineering universities. This study can see all of the mechanical, electronic information contents of the radio pager in a relatively simple analysis of the injection molding ONE CAVITY analysis. Furthermore, the students also rated good educational practices that give meaning to remind the convergence training on mass production and process automation.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.