• Title/Summary/Keyword: IoE(Internet of Everything)

Search Result 14, Processing Time 0.028 seconds

IoE 환경에 적합한 보안 경고 디스플레이를 활용한 개인정보 보호 기법

  • Ryoo, Jungwoo
    • Review of KIISC
    • /
    • v.27 no.1
    • /
    • pp.25-30
    • /
    • 2017
  • 최근, Internet of Everything (IoE)는 Internet of Things (IoT)의 영역을 급속히 확장하며 그 범위를 넓혀가고 있다. IoT가 여러 가지 다양한 센서들을 인터넷에 연결하는 기술이라면 IoE는 우리주변의 모든 기기들 (예를 들면 가전제품이나 보안 시스템)을 IoE와 아울러서 통합된 망을 구축함으로써 여러 가지 상승효과를 모색하는 정보산업의 새로운 흐름이라 할 수 있겠다. 하지만, IoE의 많은 장점에도 불구하고, 새롭게 개발되고 있는 기술이라는 특성상, 아직도 보완해야 될 점이 많은 것이 사실이다. 특히, IoE 환경의 경우, 가정이나 사무공간에서 연결되고 있는 기기나 장비들이 개인용품이 많다는 특성상 정보 보안에 문제가 생길 때 개인정보 유출의 우려가 클 수밖에 없는 것이 사실이다. 하지만, 많은 IoE 서비스 이용자들이 이런 보안상의 문제점들에 대해서 인지하지 못하고 있는 것이 현실이다. 따라서 본 논문에서는 보안경고 디스플레이 기술을 활용하여 일반인들에게 개인정보 유출에 대한 경각심을 일으키고 구체적인 대응방안을 모색해 볼 수 있도록 유도하는 디자인 기법들의 가능성들을 모색해 보고자 한다.

Comparison of Efficiency Analysis of Device Energy Used in Object Communication (사물통신에 사용되는 디바이스 에너지의 효율화 분석 고찰)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1106-1112
    • /
    • 2017
  • As the Internet of Things (IOT) is evolving into an industry-wide service and expanded to the concept of Internet of Everything (IoE), services using IoT devices are easily accessible in everyday life. IoT requires more devices to collect information and is expected to increase the number of devices by 50 billion by 2020, and is about the number of devices currently available. Gradually, the number of mobile devices, smart devices, and Internet devices is increasing, and energy resources are required to operate such a large number of Internet devices, and the energy consumed by each device is small. In this paper, we consider the number of devices to be increased and generate a signal irrespective of transmission information so that power other than the energy required for signal transmission is consumed. When transmission information is generated and near to a receiver to receive information, The method to be used as an analysis is designed through experiments.

Design and Implementation of Nools-based Rule Engine for Smart IoE Platform (지능형 IoE 플랫폼을 위한 Nools 기반 룰 엔진의 설계 및 구현)

  • Lee, Sung-Hun;Hwang, Chae-Eun;Jeong, Jin-Woo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.379-387
    • /
    • 2018
  • In order to make the IoT ecosystem more usable and friendly to general users, the interaction between the users and platforms/devices and its UX must be improved. In this study, a web-based rule engine system to help users intuitively interact with the various devices and services in IoE (Internet of Everything) platform is proposed. The proposed system consists of web interfaces and UI components for creating and managing rule-based scenarios using sensors, actuators, and external services in an intuitive way. Also, a rule management module for automatically translating the rules from the web interface into Nools rule engine compatible ones is proposed. Finally, we show the usability and feasibility of the proposed system by demonstration of rule-based use cases of IoT devices and external services.

Research on Career Development Program Management for Global Empowerment - Based on Cases of IoE Management - (글로벌 역량강화를 위한 커리어 개발프로그램 운영 연구 - IoE 운영사례를 중심으로 -)

  • Kwon, Jungin;Ryoo, Intae
    • Journal of Engineering Education Research
    • /
    • v.18 no.6
    • /
    • pp.18-23
    • /
    • 2015
  • Nowadays, IT that leads information era is closely connected to our lives. The importance of training human resources for global empowerment on IT is being emphasized all over the world. With the growth of international society, the cultivation of global human resources now includes the cultivation of future human resources and the educations related with the career development program. However, the programs that colleges are operating for the cultivation of global human resources have been limited only to supporting the participation in international training program, operating camp and conferences, etc. On the contrary, to give many learners chances of experiencing courses for global empowerment and employment capability, We are operating the Internet of Everything online education program with Cisco Networking Academy Korea. Based on the management cases of Internet of Everything online education program, this thesis is suggesting a career program on global empowerment that many learners can experience, different from the limitation of the existing program.

A Study on the Security Framework for IoT Services based on Cloud and Fog Computing (클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1928-1939
    • /
    • 2017
  • Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.

Study of Policies of Major Countries on Internet of Things and Market Forecast (사물인터넷(IoT)의 주요국 정책과 시장전망에 관한 연구)

  • Ko, Yun Seung
    • International Commerce and Information Review
    • /
    • v.16 no.5
    • /
    • pp.27-47
    • /
    • 2014
  • Gartner mentioned IoT (Internet of Things) as one of the ten growth engines in the world in 2014. In addition, IoT has been frequently invited as a theme by participants at CES held in the early this year. Gartner predicts that the number of devices connected will reach to 26 billion and a total of economic value added will grow to 1.9 trillion dollars until 2020. The definition of IoT has been arranged in a different way by each institution. Therefore, this study arranged the concept of IoT which has been variously defined and used together with M2M and IoE. Further, forecasts presented by research institutions which stated domestic and foreign market outlook were collected and arranged. As IoT is on the uptrend and is selected as one of the ten growth engines in the world, it was found out how policies on IoT in the US, China, Japan and Korea were established and promoted as well as how recent strategies on IoT of major large companies have been carried out. Lastly, the following countermeasures of our government and companies were discussed.

  • PDF

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

A Study and Countermeasure of the Infected TTF(True type Font) Files (감염된 TTF(True Type Font)파일에 대한 연구 및 대응방법)

  • Park, Yeon-Jin;Oh, Ju-Hye;Lee, Keun-Ho
    • Annual Conference of KIPS
    • /
    • 2016.04a
    • /
    • pp.283-285
    • /
    • 2016
  • 최근 정보통신 기술의 발전과 함께 M2M(Machine-to-Machine) 산업분야의 시스템이 다기능 고성능화되고 있으며 IoT(Internet of Things), IoE(Internet of Everything)기술 등과 함께 많은 발전해가고 있다[1]. 가장 오래 된 정보통신 기술의 근간인 웹 애플리케이션은 점점 발전하고 고도화 되어가고 있으며 이러한 웹 애플리케이션을 해킹하는 기술도 다양한 관점에서 발전하고 있다. 웹 애플리케이션을 구성하는데 필수적인 파일인 TTF(True Type Font)파일에 대한 보안적 관심이 필요하다. TTF파일을 외부에서 받아옴으로서 웹 애플리케이션에 적용시키는 방식을 사용할 때, 다른 서버에서 URL을 통해 받아오는 TTF파일에 대해 보안적 검사가 제대로 실행되지 않는다. 본 논문에서는 TTF파일의 감염과 그 파일에 대한 대응 방법을 제안하고자 한다.

Sparse DTMNs routihg protocol for the M2M environment (Sparse M2M 환경을 위한 DTMNs 라우팅 프로토콜)

  • Wang, Jong Soo;Seo, Doo Ok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.11-18
    • /
    • 2014
  • Recently, ICT technology has been evolving towards an M2M (Machine to Machine) environment that allows communication between machine and machine from the communication between person and person, and now the IoT (Internet of Things) technology that connects all things without human intervention is receiving great attention. In such a network environment, the communication network between object and object as well as between person and person, and person and object is available which leads to the sharing of information between all objects, which is the essential technical element for us to move forward to the information service society of the era of future ubiquitous computing. On this paper, the protocol related to DTMNs in a Sparse M2M environment was applied and the improved routing protocol was applied by using the azimuth and density of the moving node in order to support a more efficient network environment to deliver the message between nodes in an M2M environment. This paper intends to verify the continuity of the study related to efficient routing protocols to provide an efficient network environment in the IoT and IoE (Internet of Everything) environment which is as of recently in the spotlight.