• Title/Summary/Keyword: IoT (Internet of Things)

Search Result 1,912, Processing Time 0.035 seconds

Technology Trend Analysis of the 4th Industrial Revolution Using AHP (AHP 기법을 이용한 4차 산업혁명 기술 트렌드 분석)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.330-331
    • /
    • 2021
  • Newly, the fourth industrial revolution is a way of describing the blurring of boundaries between the physical, digital, and biological worlds. It's a fusion of advances in AI (artificial intelligence), robotics, the IoT (internet of things), 3d printing, genetic engineering, quantum computing, and other technologies. At the world economic forum in Davos, switzerland, in january 2016, chairman professor (klaus schwab) proposed the fourth industrial revolution for the first time. In order to apply the AHP (analytic hierarchy process) analysis method, the first stage factors were designed as Digital Technology, Physics Technology and Biological Technology. In addition, the second stage factors were organized into 8 detailed services presented in the conceptual model. Thus, we present the theoretical and practical implications of these results.

  • PDF

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

Implementation of a Remote Group Lighting Control System using ICT (ICT를 활용한 원격 그룹조명 제어시스템 구현)

  • Na, Cheol-hun;Boo, Su-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.606-608
    • /
    • 2021
  • Humans and various devices are interconnected using the Internet of Things and are used in various ways. In this study, a synchronization control system with remote locations was constructed using ICT, and a signal system for pedestrians was implemented using the system. PLC circuits were used to implement controllers, through which wireless control signal transmission and reception, LED lamp emission control, and power control were performed. It was confirmed that signal synchronization from the main controller to the remote sub-controller was possible by establishing a controller and pedestrian traffic light system, and lamp signal synchronization of the pedestrian traffic light system installed on both sides of the road was implemented. As a result, it was confirmed that 1:1 remote control or 1:N remote group control was possible, and this result can be used in various fields.

  • PDF

Improvement of Smart Surveillance Service using Service Priority (서비스 우선순위를 이용한 스마트 관제 서비스의 개선)

  • Seong, Dong-Su
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.1003-1010
    • /
    • 2018
  • When an applicant requests the emergency situation call or safe return service using a smart device, the smart surveillance service can select the CCTV(closed circuit television) cameras around the applicant using applicant's location information, then automatically takes a photograph to track the applicant. Since the surrounding CCTV camera shoots the applicant continuously using location information and the applicant can be observed by the monitor agent in real time, this service can be very helpful in an applicant's emergency situation or safe return. The existing smart surveillance service does not consider the priority of the emergency situation call and safe return service. Therefore, there is the disadvantage that the applicant who requests an emergency situation call service can not be photographed when safe return service has already preoccupied CCTV cameras which are capable of taking a picture of the applicant. The proposed smart surveillance service improves this disadvantage by using service priority.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

AI-based smart water environment management service platform development (AI기반 스마트 수질환경관리 서비스 플랫폼 개발)

  • Kim, NamHo
    • Smart Media Journal
    • /
    • v.11 no.9
    • /
    • pp.56-63
    • /
    • 2022
  • Recently, the frequency and range of algae occurrence in major rivers and lakes are increasing due to the increase in water temperature due to climate change, the inflow of excessive nutrients, and changes in the river environment. Abnormal algae include green algae and red algae. Green algae is a phenomenon in which blue-green algae such as chlorophyll (Chl-a) in the water grow excessively and the color of the water changes to dark green. In this study, a 3D virtual world of digital twin was built to monitor and control water quality information measured in ecological rivers and lakes in the living environment in real time from a remote location, and a sensor measuring device for water quality information based on the Internet of Things (IOT) sensor. We propose to build a smart water environment service platform that can provide algae warning and water quality forecasting by predicting the causes and spread patterns of water pollution such as algae based on AI machine learning-based collected data analysis.

A High Speed Optimized Implementation of Lightweight Cryptography TinyJAMBU on Internet of Things Processor 8-Bit AVR (사물 인터넷 프로세서 8-bit AVR 상에서의 경량암호 TinyJAMBU 고속 최적 구현)

  • Hyeok-Dong Kwon;Si-Woo Eum;Min-Joo Sim;Yu-Jin Yang;Hwa-Jeong Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.183-191
    • /
    • 2023
  • Cryptographic algorithms require extensive computational resources and rely on complex mathematical principles for security. However, IoT devices have limited resources, leading to insufficient computing power. As a result, lightweight cryptography has emerged, which uses fewer computational resources. NIST organized a competition to standardize lightweight cryptography and TinyJAMBU, one of the algorithms in the competition, is a permutation-based algorithm that repeats many permutation operations. In this paper, we implement TinyJAMBU on an 8-bit AVR processor with a proposedtechnique that includes a reverse shift method and precomputing some operations in a fixed key and nonce environment. Our techniques showed a maximum performance improvement of 7.03 times in permutation operations and 5.87 times in the TinyJAMBU algorithm, improving up to 9.19 times in a fixed key and nonce environment.

Smart Port Policy Trend of Europe and Singapore and Its Political Implications (스마트항만의 해외사례 분석과 정책 시사점: 유럽과 싱가포르를 중심으로)

  • Lee, Tae-Hwee
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.1
    • /
    • pp.77-90
    • /
    • 2020
  • Recent studies have offered ambiguous definitions of smart ports. These include smart ports being the only way that fully integrated ports can survive (Deloitte 2017) or ports that have a design based on Internet-of-Things technology to minimize waste of urban space and resources (Port Technology 2016). In addition, many port authorities are creating smart port strategies and have held research seminars focused on smart ports. This study sheds light on the following questions: Why do we need smart ports? Why should all ports be smart ports? Why are overseas advanced ports promoting smartization as soon as possible? What does the future look like for smart ports? Therefore, in this study, we explored the concept of smart ports based on previous research and examined the trends in smart port policies in the Netherlands, Germany, the UK, Italy, and Singapore. Finally, this study proposes useful policies for smart ports and also discusses policy directions that could make our ports truly smart ports.

Smart Factory Safety Management System using Bluetooth (블루투스 통신을 이용한 스마트공장 안전관리 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.47-53
    • /
    • 2019
  • Safety accidents at industrial sites can occur anytime, anywhere. Recently, research on the industrial safety management system based on the IoT has been actively conducted. However, most of the studies are studies of actions after safety accidents or simply monitoring. In this paper, the safety equipment was introduced before safety accidents occurred, and the subjects could be managed not only by workers but also by visitors. Also, it implements a system to prevent the accident by detecting the user's motion and situation periodically before a safety accident occurs. The implemented system is a system that attaches the device for safety management to the hard hat and can identify the safety situation by using the Bluetooth beacon device attached to the user's smartphone and the industrial site.

Task Migration in Cooperative Vehicular Edge Computing (협력적인 차량 엣지 컴퓨팅에서의 태스크 마이그레이션)

  • Moon, Sungwon;Lim, Yujin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.12
    • /
    • pp.311-318
    • /
    • 2021
  • With the rapid development of the Internet of Things(IoT) technology recently, multi-access edge computing(MEC) is emerged as a next-generation technology for real-time and high-performance services. High mobility of users between MECs with limited service areas is considered one of the issues in the MEC environment. In this paper, we consider a vehicle edge computing(VEC) environment which has a high mobility, and propose a task migration algorithm to decide whether or not to migrate and where to migrate using DQN, as a reinforcement learning method. The objective of the proposed algorithm is to improve the system throughput while satisfying QoS(Quality of Service) requirements by minimizing the difference between queueing delays in vehicle edge computing servers(VECSs). The results show that compared to other algorithms, the proposed algorithm achieves approximately 14-49% better QoS satisfaction and approximately 14-38% lower service blocking rate.