• Title/Summary/Keyword: IoT

Search Result 4,361, Processing Time 0.06 seconds

IoT 상호운용성 및 서비스 개발

  • Go, Yeong-Jun;Kim, Yong-Jin
    • Information and Communications Magazine
    • /
    • v.32 no.5
    • /
    • pp.31-35
    • /
    • 2015
  • IoT 서비스 사업자, IoT 기기 공급업체 또는 산업분야별로 구축한 IoT 서비스가 파편화돼 가는 상황에서 IoT 플랫폼간 상호운용성(Interoperability) 관련 기술 개발의 필요성이 증대되고 있다. 본 논문에서는 IoT 서비스 플랫폼간의 상호운용성 및 IoT 디바이스간의 상호운용성을 개선하기 위한 플랫폼간 연동(Interworking) 기술 및 개방형 표준 플랫폼 기술 적용 방안을 제시하였으며 사용 편의를 위한 상황인식(Context-Awareness) 기술 구현안을 제시하였다. 본 논문에서는 모다정보통신이 개발한 oneM2M 국제표준 기반의 지능형 IoT 플랫폼인 OMNIPASS와 다양한 IoT 플랫폼 간의 상호연동성을 지원하는 IoT Gateway장치로서 Smart Brain을 소개하고 이를 통해 IoT 서비스의 발굴과 다양한 산업 응용 분야의 확산을 도모하고자 한다.

Comparison and Analysis of Functional Features of IoT Operating Systems (IOT 운영체제들의 기능적 특징들의 비교 및 분석)

  • Lee, Yo-Seob;Moon, Phil-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.337-344
    • /
    • 2017
  • The ICT industry is changing. From the PC to mobile devices, and from the mobile devices to wearable and IoT devices, it is changing. It requires the OS for the IoT, coming out various IoT OS have been developed in accordance with this need. In this paper, we discuss the kind of OS that supports IoT device, analyze the technology trends.

Information Analysis as Keyword of integrated IoT and Advanced Leisure Sport (IoT와 융합된 선진형 여가 스포츠 산업의 키워드 중심의 정보 분석)

  • Kim, Myeong-Mi;Kim, Ki-Man;Shon, Young-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.5
    • /
    • pp.609-616
    • /
    • 2014
  • Recently information industry has developed from IT into ICT. Among ICT area, M2M is evolving into IoT. As progress is being made in the IoT industry, people continue to try converging the IoT and other industries. One good example of such convergence is with sports industry. In this paper, we perform information analysis centered at keyword as a basic research for development of advanced leisure sports industry integrated with the IoT.

A Study on the Penetratrion Testing Next-generation IoT environment(ARMv7 Thumb Architecture) (차세대 IoT환경(ARMv7 Thumb Architecture) 침투테스트에 관한 연구)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.585-588
    • /
    • 2016
  • Due to the nature IoT Device (or Sensor) of the IoT System it may be susceptible (or attached) to our daily lives, so easy to direct physical access to IoT Device, which caused physical security is very weak. In this study, we implemented "Zero-Day Attack" on the ARMv7 Thumb Architecture as a direct target local system.

  • PDF

Risk of Attack through an Open Wireless Network of IoT Devices (IoT 장치의 개방형 무선 네트워크를 통한 공격 위험)

  • Lee, Geonwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.10-14
    • /
    • 2019
  • The number of security incidents is increasing as the Internet of Things(IoT) is distributed widely. The security incidents of IoT can cause financial damages. Moreover, It can become direct threats to humans. In order to prevent these problems, the security installation for IoT devices is important. This paper describes the definition of IoT devices, security incident case, architecture, and the security threats that can occur when a device is connected to network without security installation.

  • PDF

Analysis of Security Vulnerabilities for IoT Devices

  • Kim, Hee-Hyun;Yoo, Jinho
    • Journal of Information Processing Systems
    • /
    • v.18 no.4
    • /
    • pp.489-499
    • /
    • 2022
  • Recently, the number of Internet of Things (IoT) devices has been increasing exponentially. These IoT devices are directly connected to the internet to exchange information. IoT devices are becoming smaller and lighter. However, security measures are not taken in a timely manner compared to the security vulnerabilities of IoT devices. This is often the case when the security patches cannot be applied to the device because the security patches are not adequately applied or there is no patch function. Thus, security vulnerabilities continue to exist, and security incidents continue to increase. In this study, we classified and analyzed the most common security vulnerabilities for IoT devices and identify the essential vulnerabilities of IoT devices that should be considered for security when producing IoT devices. This paper will contribute to reducing the occurrence of security vulnerabilities in companies that produce IoT devices. Additionally, companies can identify vulnerabilities that frequently occur in IoT devices and take preemptive measures.

A Study on Collection Method of IoT Information for The Adaptation of Web Services (웹 서비스 적용을 위한 IoT 정보 수집 방법에 관한 연구)

  • Sim, Sung-Ho;Han, Jung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.71-76
    • /
    • 2017
  • It is necessary to develop a service that meets various environmental requirements so that the Internet of things can be applied to the fourth industry in overall. This paper presents a method for extracting IoT devices information to change the current provider centric service provision environment in order to construct a user centered service provision environment for Web services. Also, it provides users to utilize the appropriate web services through taking advantage of IoT devices information. The existing service provision environment is focused on the method of selecting the service using the provider service information, thus, it is considered necessary for a user-oriented service search method to be in need. In this study, the service list is provided to the user by combining provider information and information extracted from IoT Devices. IoT information collection generates information by separating context information such as information between IoT devices and users and event information between devices through identifiers. In this paper, we propose a development of a user centric service environment by presenting users with a necessary service list through the proposed IoT information.

Software Engineering Principles for the Development of Power-Efficient Mobile IoT Devices (파워 효율이 높은 모바일 IoT 단말 개발을 위한 소프트웨어 공학 원칙)

  • Lee, Hyesun;Lee, Kang Bok;Bang, Hyo-Chan
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.12
    • /
    • pp.762-767
    • /
    • 2015
  • An Internet of Things (IoT) is a system where various "things" are connected to each other via a wired/wireless network, and where information is gathered, processed, and interchanged/shared. One of the important actors in IoT is a mobile IoT device (such as a smartphone or tablet). These devices tend to consume a large amount of power in order to provide various high performance application services; however, as the devices cannot be supplied with power all the time, efficient power management is necessary. Power management of mobile IoT devices involves complex relationships between various entities such as application processors (APs), HW modules inside/outside AP, operating systems, mobile IoT platforms, and applications. In order to develop power-efficient mobile IoT devices, a method is needed to systematically analyze these relationships and manage power based on a clear understanding of them. To address this problem, software engineering principles for the development of power-efficient mobile IoT devices are presented in this paper. The feasibility of the proposed principles have been validated in the domain of smartphone camera power management.

Development of IoT Home Gateway Environment based on ACOME using Open Source Hardware (오픈소스 하드웨어를 활용한 ACOME 기반의 IoT 홈 게이트웨이 환경 개발)

  • Kim, Seong-Min;Choi, Hoan-Suk;Rhee, Woo-Seop
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.296-304
    • /
    • 2016
  • Recently in domestic market, the telecommunication and appliance companies actively provide IoT home service through their dedicated smart device and communication network. But because their service should use only their own devices and be payed by monthly, it does not satisfy user's needs. So, users want device and service environment that can be easily configured according to user needs. Therefore, in this paper, we propose IoT home service environment architecture and ACOME(Auto-Configuration of MQTT and REST) mechanism. The proposed architecture consists of IoT platform and IoT home gateway. And the ACOME provides the automatic registration using DPWS function and interface construction using MQTT. This implements as a library for open-source hardware such as Arduino that is easy to get on the market. So the user easy to make own IoT device. Finally, we provide performance evaluation about service and device discovery between ACOME and DPWS.

Smart IoT Home Data Analysis and Device Control Algorithm Using Deep Learning (딥 러닝 기반 스마트 IoT 홈 데이터 분석 및 기기 제어 알고리즘)

  • Lee, Sang-Hyeong;Lee, Hae-Yeoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.4
    • /
    • pp.103-110
    • /
    • 2018
  • Services that enhance user convenience by using various IoT devices are increasing with the development of Internet of Things(IoT) technology. Also, since the price of IoT sensors has become cheaper, companies providing services by collecting and utilizing data from various sensors are increasing. The smart IoT home system is a representative use case that improves the user convenience by using IoT devices. To improve user convenience of Smart IoT home system, this paper proposes a method for the control of related devices based on data analysis. Internal environment measurement data collected from IoT sensors, device control data collected from device control actuators, and user judgment data are learned to predict the current home state and control devices. Especially, differently from previous approaches, it uses deep neural network to analyze the data to determine the inner state of the home and provide information for maintaining the optimal inner environment. In the experiment, we compared the results of the long-term measured data with the inferred data and analyzed the discrimination performance of the proposed method.