• Title/Summary/Keyword: Internet-of-things device

Search Result 471, Processing Time 0.026 seconds

Performance Evaluation of Advanced Container Security Device(ACSD) system based on IoT(Internet of Things) (IoT 기반 컨테이너 보안 장치 및 시스템 성능 평가)

  • Moon, Young-Sik;Choi, Sung-Pill;Lee, Eun-Kyu;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2183-2190
    • /
    • 2013
  • Container Security Device (ConTracer) which is suggested in this study is to monitor temperature, humidity, and impact inside of the container while the container is transported. ConTracer could also give information to users when a door of the container is opened over 2 inch within 1 second. Additionally, GPS/GLONASS based global position and status information about container are transmitted to a remote server using IoT (Internet of Things) based communication. In this research, we are looking into the development trend of global container security devices; and applying ConTracer to real freight transport from domestic to overseas using Global Roaming Service which is offered for domestic Mobile Communication Companies as well. As a result, we estimate the performance of ConTracer and verify it.

Application on Autonomous Things Monitoring System for IoT Platform of Smart City (스마트시티 IoT플랫폼 구축을 위한 자율사물 모니터링 시스템 적용성 평가)

  • Yoo, Chan Ho;Baek, Seung Cheol
    • Land and Housing Review
    • /
    • v.11 no.1
    • /
    • pp.103-108
    • /
    • 2020
  • Autonomous things system is a technology that judges and acts based on using surrounding information by itself, and it is evaluated as a future technology that can replace the current IoT technology. The current IoT technology is widely used from facility monitoring to machine control but it is shown weakness as a evaluation and prediction technique despite of smart city important technology. In this study, in order to confirm the application of the autonomous things technology, a monitoring system was installed on a real reservoir dam facility and long-term monitoring was performed that the measuring device itself judges and control as a facility monitoring technology. The autonomous things technology was confirmed during 19 months and it is possible to continuous measurement in the same way as current automated instrumentation. In addition, it was confirmed that the ICT device itself could to control autonomously measurement cycle according to the rainfall by itself.

A Study on the Seismic Resistance Design of Sway Brace Device using Internet of Things (IoT를 활용한 흔들림 방지 버팀대의 내진설계에 관한 연구)

  • Thak, Sung-In;Yu, Bong-Geun;Son, Bong-Sei
    • Fire Science and Engineering
    • /
    • v.31 no.1
    • /
    • pp.58-62
    • /
    • 2017
  • There is a growing need for seismic resistance design. But it is controversial that standards of sway brace device in non-structural elements for buildings like pump waterway is vary widely. Therefore, in this study to get a valid range of sway brace device in seismic resistance design, using load test of sway brace device. As a result, load of safe range from 0 to 18.5 kN and under 29.4 kN, no structural fault of sway brace device. And using internet of things get a data of seismic resistance design from sensor node like accelerometer, GPS, tilt sensor and temperature sensor through steps of sampling and prediction. These results will be acceptable for monitoring system for seismic resistance in non-structural elements.

Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things (사물인터넷의 경량화 장치를 위한 안전한 Pre-shared Key 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.1-6
    • /
    • 2015
  • The IoT(Internet of things) technology enable objects around user to be connected with each other for sharing information. To support security is the mandatory requirement in IoT because it is related to the disclosure of private information but also directly related to the human safety. However, it is difficult to apply traditional security mechanism into lightweight devices. This is owing to the fact that many IoT devices are generally resource constrained and powered by battery. PSK(Pre-Shared Key) based approach, which share secret key in advance between communication entities thereafter operate security functions, is suitable for light-weight device. That is because PSK is costly efficient than a session key establishment approach based on public key algorithm. However, how to safely set a PSK of the lightweight device in advance is a difficult issue because input/output interfaces such as keyboard or display are constrained in general lightweight devices. To solve the problem, we propose and develop a secure PSK configuration scheme for resource constrained devices in IoT.

Authentication Method for Safe Internet of Things Environments (안전한 사물 인터넷 환경을 위한 인증 방식)

  • Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.1
    • /
    • pp.51-58
    • /
    • 2015
  • Internet of Thing is a collection of various technical components, and the interworking among heterogeneous devices, networks, applications is expected to be accelerated through the openness of IoT platform. For this reason, many technical and administrative security threats will occur in IoT environments. In this paper, authentication methods of recent researches are analyzed for safe IoT services, and new mutual authentication protocol is proposed to provide more secure communication. The proposed protocol prevents an impersonation as malicious gateway or illegal device providing mutual authentication between gateway and IoT device. The performance analysis and evaluation of proposed authentication protocol are performed.

IoT based Smart device Data collection in everyday life (IoT 플랫폼 기반 일상생활 스마트 기기 건강 데이터 수집)

  • Ji, Geonwoo;Lee, Seongchan;Msigwa, Constantino;Bernard, Denis;Yun, Jaeseok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.325-327
    • /
    • 2022
  • 최근 스마트 기기 시장이 커지며 이와 함께 스마트 기기를 이용한 연구가 활발하다. 현재 많이 사용되는 스마트 기기인 스마트워치와 스마트폰에는 다양한 센서들이 내장되어있다. 이 센서들을 통해 생성된 데이터를 이용하면 사용자의 행동 분류, 건강관리 등 사용자에게 도움이 되는 서비스를 제공할 수 있다. 본 논문에서는 어플리케이션 개발을 통해 상용 스마트기기인 갤럭시 워치 4와 갤럭시 S10에 내장되어있는 센서의 원시데이터를 수집하고 수집한 데이터를 oneM2M 표준 플랫폼에 저장하였다. oneM2M 표준 플랫폼에 저장된 데이터는 API를 통해 손쉽게 사용할 수 있으며 여러 대의 스마트 기기 데이터를 수집하고 빅데이터를 구축한다면 많은 연구자들이 보다 편리하게 데이터를 이용하여 다양한 의미 있는 연구들을 진행할 수 있을 것이다.

  • PDF

Enhancing Internet of Things Security with Random Forest-Based Anomaly Detection

  • Ahmed Al Shihimi;Muhammad R Ahmed;Thirein Myo;Badar Al Baroomi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.67-76
    • /
    • 2024
  • The Internet of Things (IoT) has revolutionized communication and device operation, but it has also brought significant security challenges. IoT networks are structured into four levels: devices, networks, applications, and services, each with specific security considerations. Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs) are the three types of IoT networks, each with unique security requirements. Communication protocols such as Wi-Fi and Bluetooth, commonly used in IoT networks, are susceptible to vulnerabilities and require additional security measures. Apart from physical security, authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security pose significant challenges. Ensuring the security of IoT devices and the data they exchange is crucial. This paper utilizes the Random Forest Algorithm from machine learning to detect anomalous data in IoT devices. The dataset consists of environmental data (temperature and humidity) collected from IoT sensors in Oman. The Random Forest Algorithm is implemented and trained using Python, and the accuracy and results of the model are discussed, demonstrating the effectiveness of Random Forest for detecting IoT device data anomalies.

A Self-Reconfigurable System of Contents among Smart Devices

  • Ren, Hao;Kim, Paul;Kim, Sangwook
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.223-232
    • /
    • 2015
  • In this system, mobile devices are not independent, they can communicate with each other, one device's change can affect the whole system or other devices. To achieve the above mentioned A Self-Reconfigurable System of Contents, through discover the device and connect process, to establish the connection between the mobile devices. After user assigns two dimension display type, the user can select content to input the system, contents are portioning and broadcast to devices. The system can self-reconfigure contents rapidly and exactly. This technique supports contents self-reconfiguration for devices remove, addition and position exchange. In this paper, when the user uses the hand contacts device, the device sends a signal to assist the system to detection device's position. The system does not need to get accurate devices moving direction, just according to all changed devices position to judge where the devices destination is. This research develops an application according to this technique, and the real machine tests the application using Android platform. Some communication protocols and mathematical modeling methods are proposed. These methods can also be used in other Internet of Things (IoT) fields, such as Drones Navigation, Smart Home, and Informational City management.

Business Model Framework for IoT: Case Studies and Strategic Implications for IoT Businesses

  • Kim, Dongwook;Kim, Sungbum;Lee, Junghwan
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.1
    • /
    • pp.1-28
    • /
    • 2022
  • To realize the vision of internet of things (IoT), where it is expected to bring significant impact to the global economy in the future, consideration of business models in the IoT context is necessary. This research attempts to build an enhanced artifact business model framework based on the definitions of IoT and literature on business models for analysis of IoT businesses. The framework is used to analyze four different types of players: the owner of things, vendors of devices, providers of connectivity and providers of IoT application services. The findings suggest that the owners of things tend to partner with ICT players to complement their weakness, and it tends to be connectivity providers. The device vendors leverage their strength of devices and device platforms to attract and enable 3rd party sensor/devices to interconnect, while the service providers are aiming to penetrate into customer premise. These lead to the following recommendations for non-IT players to consider in expanding into IoT business: 1) take into account differences in product development process between IT and non-IT businesses in expanding into IoT market; 2) collaborate with ICT players that acknowledge and understand the differences.

Distributed CoAP Handover Using Distributed Mobility Agents in Internet-of-Things Networks

  • Choi, Sang-Il;Koh, Seok-Joo
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2017
  • The constrained application protocol (CoAP) can be used for remotely controlling various sensor devices in Internet of Things (IoT) networks. In CoAP, to support the handover of a mobile sensor device, service discovery and message transmission needs to be repeated, although doing so would increase the handover delay significantly. To address this limitation of CoAP, a centralized CoAP scheme has been proposed. However, it tends to result in performance degradation for an inter-domain handover case. In this letter, we propose a distributed CoAP handover scheme to support the inter-domain handover. In the proposed scheme, a distributed mobility agent (DMA) is used for managing the location of mobile sensors in a domain and performing handover control operations with its neighboring DMAs in a distributed manner. A performance comparison reveals that the proposed scheme offers a performance improvement of up to 29.5% in terms of the handover delay.