• Title/Summary/Keyword: IoT기기

Search Result 588, Processing Time 0.021 seconds

A Case Study on the Big Data Analysis Curriculum for the Efficient Use of Data (데이터의 효율적 활용을 위한 빅데이터 분석 교육과정 사례 연구)

  • Song, Young-A
    • Journal of Practical Engineering Education
    • /
    • v.12 no.1
    • /
    • pp.23-29
    • /
    • 2020
  • Data generated by the development of ICT, the diversification of ICT devices and services and the expansion of social media are categorized as big data characterized by the amount, variety and speed of the data. The spread of the use of big data is expected to have the effects of identifying the status quo by analyzing data in all industries, predicting the future, and creating opportunities to apply it. However, while it is imperative for these things to be done, the nation still lacks professional training institutions or curricula. In this case study, we will investigate and compare the state of education for the training of big data personnel in Korea, find out what level and level of education is being trained to nurture balanced professionals, and prepare an opportunity to think about how it can help students create value at a time when the need for education is growing in the wake of awareness of big data.

Improvement of Smart Surveillance Service using Service Priority (서비스 우선순위를 이용한 스마트 관제 서비스의 개선)

  • Seong, Dong-Su
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.1003-1010
    • /
    • 2018
  • When an applicant requests the emergency situation call or safe return service using a smart device, the smart surveillance service can select the CCTV(closed circuit television) cameras around the applicant using applicant's location information, then automatically takes a photograph to track the applicant. Since the surrounding CCTV camera shoots the applicant continuously using location information and the applicant can be observed by the monitor agent in real time, this service can be very helpful in an applicant's emergency situation or safe return. The existing smart surveillance service does not consider the priority of the emergency situation call and safe return service. Therefore, there is the disadvantage that the applicant who requests an emergency situation call service can not be photographed when safe return service has already preoccupied CCTV cameras which are capable of taking a picture of the applicant. The proposed smart surveillance service improves this disadvantage by using service priority.

Data Transmission Method using Broadcasting in Bluetooth Low Energy Environment (저전력 블루투스 환경에서 브로드캐스팅을 이용한 데이터전송 방법)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Soh, Woo-Young
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.963-969
    • /
    • 2018
  • Wi-Fi and Bluetooth technologies are perhaps the most prominent examples of wireless communication technologies used in the Internet of Things (IoT) environment. Compared to widely used Wi-Fi, Bluetooth technology has some flaws including 1:1 connection (one-way) between Master and Slave, slow transmission, and limited connection range; Bluetooth is mainly used for connecting audio devices. Since the release of Bluetooth Low Energy (BLE), some of the flaws of Bluetooth technology have been improved but it still failed to become a competitive alternative of Wi-Fi. This paper presents a method of data transmission through broadcasting in BLE and demonstrates its performance, one-to-many data transfer result. The Connection-Free Data Transmission proposed in this paper will hopefully be utilized in special circumstances requiring 1:N data transmission or disaster security network.

Methods to Propel Tourism of Yeosu City Using Big Data (빅데이터를 활용한 여수관광 활성화 방안)

  • Lim, Yang-Ui;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.4
    • /
    • pp.739-746
    • /
    • 2020
  • The fourth industrial revolution introduced at world economic forum in 2016 has had huge effects on tourism industries as well as the change of core technologies in ICT such as big data, IoT, etc, This paper proposes the methods to propel tourism of Yoesu city through big data analysis and questionnaires. Sensitive words and positive-negative trend are extracted by Social Metrics and the keywords for Yeosu tour trends are extracted and analyzed by Naver datalab, and the results are visualized by R language. And frequency, difference, factor, covariance and regression analysis in SPSS are executed for the questionnaires for 493 visitors who traveled in Yeosu city. Sentiment analysis for Yeosu tour and maritime cable car shows that positive effect is much more than negative one. The analyses for questionnaires in SPSS show that Yeosu area is statistically significant to tour satisfaction index and tour revitalization for Yeosu, and favorite sightseeing places and searching electronic devices for age groups are different. The sightseeing places such as a maritime park with soft contents that give joyfulness and healing to tourists are highly attracted in both the big data and questionnaires analysis.

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

Lightweight Hardware Design of Elliptic Curve Diffie-Hellman Key Generator for IoT Devices (사물인터넷 기기를 위한 경량 Elliptic Curve Diffie-Hellman 키 생성기 하드웨어 설계)

  • Kanda, Guard;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.581-583
    • /
    • 2017
  • Elliptic curve cyptography is relatively a current cryptography based on point arithmetic on elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP). This discrete logarithm problems enables perfect forward secrecy which helps to easily generate key and almost impossible to revert the generation which is a great feature for privacy and protection. In this paper, we provide a lightweight Elliptic Curve Diffie-Hellman (ECDH) Key exchange generator that creates a 163 bit long shared key that can be used in an Elliptic Curve Integrated Encryption Scheme (ECIES) as well as for key agreement. The algorithm uses a fast multiplication algorithm that is small in size and also implements the extended euclidean algorithm. This proposed architecture was designed using verilog HDL, synthesized with the vivado ISE 2016.3 and was implemented on the virtex-7 FPGA board.

  • PDF

MITM Attack on Bluetooth Pairing in Passkey Entry Mode and Its Countermeasure (블루투스 Passkey Entry 인증 모드에 대한 MITM 공격과 대응방법)

  • Lee, Jearyong;Choi, Wonsuk;Lee, DongHoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.481-490
    • /
    • 2016
  • Bluetooth utilizes a symmetric key that is exchanged at the first pairing to establish a secure channel. There are four authentication modes which enables device authentication, Just work, Passkey Entry, Out of Band, and Numeric Comparison. Up to now, Just work has been considered as the authentication mode that is vulnerable to Man-In-The-Middle (MITM) Attack. In addition, it is possible to intentionally change any authentication mode to Just work mode, in order to succeed in MITM Attack under Just work mode. However, this kind of attacks have just worked under the assumption that users should not notice that authentication mode was changed. In this paper, We analyze the specification of Secure Simple Pairing, LE Legacy Pairing and LE Secure Connection Pairing. When using Passkey Entry mode on each approach, it seems the MITM attack is possible. Also it offers Passkey Entry MITM attack that does not require assumptions about the user's fault, because it isn't change verification process of the authentication mode unlike traditional attacks. We implement the proposed MITM attacks. Also we presents a scenario in which an attack can be exploited and a countermeasure.

NFC-based Attendance Checking System for Institutions of Higher Education (NFC 기반의 고등교육기관 출결지원 시스템에 대한 실증적 연구)

  • Cho, Yun Seok;Kim, KyungMi
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.283-289
    • /
    • 2015
  • We propose a low cost attendance checking system using NFC (Near Field Communication) and show a case study of an actual operation of the system in a higher education institute. The system offers a direct attendance check service when a student touches NFC tag on a classroom desk with his/her own smartphone. Our service was first developed and operated in 2012, and then additional functions like massive real time processing were reinforced. In the fall semester, 58 courses use the service and 96% of the class attendance was checked with mobile devices. The only hardware requirement of the system was NFC tag on the classroom desk, which reduced hardware cost dramatically. However, it also minimized attendance checking time into 1 minute regardless of enrolled student number.

A Study on ICT Technology Leading Change of Unmanned Store (무인판매점 변화를 리드하는 ICT 기술에 대한 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.4
    • /
    • pp.109-114
    • /
    • 2018
  • In general, the simple items we need to live in are purchased through retail stores such as supermarkets near our home. In the store, not only the items but also the management personnel and the payment instruments for the store management are located in one space called the store. Such a general store environment is gradually changing into an 'unmanned market' as a result of the development and fusion of information and communication technology (ICT). An unmanned market is an environment in which no one runs a market as the word has. An example of a typical change is Amazon's Unofficial Amazon Store. In addition, the usage and prospects of unmanned market in China are growing very meaningfully. In this study, the present situation of the unmanned market is examined in the US and China markets, and the development prospects are described. It also describes the key milestones necessary for the unmanned market.