• Title/Summary/Keyword: IoT 결함

Search Result 629, Processing Time 0.024 seconds

A study on prioritizing the application areas for business development of IoT(Internet of Things) (사물 인터넷의 사업화 영역에 대한 우선순위 선정에 관한 연구)

  • Moon, Tae Hee;Kim, Taehoon;Ahn, Hyunchul
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.183-195
    • /
    • 2014
  • This study aims at identifying and prioritizing the application areas for business development of IoT(Internet of Things). In specific, we collected the opinions of the experts on IoT in Korea through the survey based on pairwise comparison, and then we analyzed them using AHP(analytic hierarchy process). As a result, we found that 'Public Safety & Security', 'Automotive & Transportation', and 'Utility & Energy' are the most promising area in realizing IoT-related businesses. Also, we found that the experts had different views according to the positions of their industry in IoT value chain. The analysis showed that the device industry prioritizes 'Public Safety & Security', whereas the network industry does 'Automotive & Transportation'. The experts from the service industry were found to regard 'Utility and Energy' as the most promising commercialization area of IoT.

Hash-chain-based IoT authentication scheme suitable for small and medium enterprises (중소기업 환경에 적합한 해쉬 체인 기반의 IoT 인증 기법)

  • Jeong, Yoon-Su;Yon, Yong-Ho;Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.105-111
    • /
    • 2017
  • With the emergence of the fourth industrial revolution, more and more attempts have been made to apply IoT technology to the manufacturing process and launch the product. In this paper, we propose IoT authentication scheme based on hash chain which can easily apply IoT device to small and medium enterprises in Korea. In the proposed method, the companies that installed IoT devices suitable for the manufacturing environment are selected to maintain the linkage between IoT devices so that product information and release information can be efficiently collected and managed during the entire manufacturing process. In addition, the proposed scheme is characterized in that it does not require an additional encryption / decryption algorithm because the authentication information of the IoT device is constructed based on a hash chain. As a result of the performance evaluation, the efficiency of the manufacturing process was improved by 18.5% and the processing of the manufacturing process with the IoT device was shortened by 20.1% on the average according to the application of the IoT device. In addition, the labor cost reduction costs in the manufacturing process decreased by an average of 30.7%.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

Detection of Delay Attack in IoT Automation System (IoT 자동화 시스템의 지연 공격 탐지)

  • Youngduk Kim;Wonsuk Choi;Dong hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.787-799
    • /
    • 2023
  • As IoT devices are widely used at home, IoT automation system that is integrate IoT devices for users' demand are gaining populrity. There is automation rule in IoT automation system that is collecting event and command action. But attacker delay the packet and make time that real state is inconsistent with state recongnized by the system. During the time, the system does not work correctly by predefined automation rule. There is proposed some detection method for delay attack, they have limitations for application to IoT systems that are sensitive to traffic volume and battery consumption. This paper proposes a practical packet delay attack detection technique that can be applied to IoT systems. The proposal scheme in this paper can recognize that, for example, when a sensor transmits an message, an broadcast packet notifying the transmission of a message is sent to the Server recognized that event has occurred. For evaluation purposes, an IoT system implemented using Raspberry Pi was configured, and it was demonstrated that the system can detect packet delay attacks within an average of 2.2 sec. The experimental results showed a power consumption Overhead of an average of 2.5 mA per second and a traffic Overhead of 15%. We demonstrate that our method can detect delay attack efficiently compared to preciously proposed method.

Design and Evaluation of a Fault-tolerant Publish/Subscribe System for IoT Applications (IoT 응용을 위한 결함 포용 발행/구독 시스템의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1101-1113
    • /
    • 2021
  • The rapid growth of sense-and-respond applications and the emerging cloud computing model present a new challenge: providing publish/subscribe middleware as a scalable and elastic cloud service. The publish/subscribe interaction model is a promising solution for scalable data dissemination over wide-area networks. In addition, there have been some work on the publish/subscribe messaging paradigm that guarantees reliability and availability in the face of node and link failures. These publish/subscribe systems are commonly used in information-centric networks and edge-fog-cloud infrastructures for IoT. The IoT has an edge-fog cloud infrastructure to efficiently process massive amounts of sensing data collected from the surrounding environment. In this paper. we propose a quorum-based hierarchical fault-tolerant publish/subscribe systems (QHFPS) to enable reliable delivery of messages in the presence of link and node failures. The QHFPS efficiently distributes IoT messages to the publish/subscribe brokers in fog overlay layers on the basis of proposing extended stepped grid (xS-grid) quorum for providing tolerance when faced with node failures and network partitions. We evaluate the performance of QHFPS in three aspects: number of transmitted Pub/Sub messages, average subscription delay, and subscritpion delivery rate with an analytical model.

Research on a Solution for Efficient ECG Data Transmission in IoT Environment (사물 인터넷 환경에서의 효율적인 ECG 데이터 전송 방안에 관한 연구)

  • Cho, Gyoun Yon;Lee, Seo Joon;Lee, Tae Ro
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.371-376
    • /
    • 2014
  • Consistently collecting a variety of vital signs is crucial in u-Healthcare. In order to do so, IoT is being considered as a top solution nowadays as an efficient network environment between the sensor and the server. This paper proposes a transmission method and compression algorithm which are appropriate for IoT environment. Results were compared to widely used compression methods, and were compared to other prior researches. The results showed that the compression ratio of our proposed algorithm was 11.7.

A Study on the Establishment of Massive IoT based on Low Power Wide Area Network Technology (저전력 광역 네트워크 기술 기반 Massive IoT 구축 연구)

  • Lee, Gyeongheon;Hong, Jiyeon;Youn, Joosang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.103-104
    • /
    • 2019
  • 최근 스마트시티 구축 사업에서 사물인터넷 기반 서비스 개발이 활발히 진행 중이다. 그 서비스들을 제공하기 위해 사용되어야 할 디바이스 수가 수백만 개까지 증가할 것으로 예상하고 있으며 수백만 개의 디바이스들을 수용하기 위해서는 Massive IoT 네트워크의 환경 구축을 필요로 하고 있다. 따라서 본 논문에서는 Massive IoT 네트워크 환경을 구축하기 위해 저전력 광역 네트워크(LPWAN) 기술 중 LoRa(Long Range) 네트워크가 적용이 가능한지를 LoRaSim을 이용하여 시뮬레이션한다. 시뮬레이션한 결과 중 충돌 횟수를 통해 충동률을 구하고 그래프를 이용하여 신뢰성을 나타내며, Massive IoT 네트워크에 적합성에 대해 분석한다.

  • PDF

An IoT-based Traffic Safety Pedestrian System for the Elderly by Factor Analysis (요인분석을 통한 IoT 기반 고령자용 교통안전 보행자 시스템)

  • Lee, Kyung-Min;Lin, Chi-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • In this paper, we propose an IoT-based traffic safety pedestrian system for the elderly by factor analysis. The proposed system performs a factor analysis of the elderly safety variables and uses the analysis results to provide an optimal path for the elderly. In order to verify the performance of this system, we experimented with performance measurements on elderly pedestrian paths. As a result, we confirm that it provides a better safety path than mobile navigation.

An Adaptive Traffic Interference Control System for Wireless Home IoT services (무선 홈 IoT 서비스를 위한 적응형 트래픽 간섭제어 시스템)

  • Lee, Chong-Deuk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.259-266
    • /
    • 2017
  • The massive traffic interferences in the wireless home IoT provides the reason for packet losses, and it degrades the QoS (Quality of Service) and throughput on the home network. This paper propose a new adaptive traffic interference control system, ATICS, for enhancing QoS and throughput for IoT services as detecting a traffic process and non-traffic process in the wireless home network. The proposed system control the traffic interferences as distinguishing the short-term traffic process and long-term traffic process by traffic characteristics in wireless home networks. The simulation results shows that the proposed scheme have more efficient traffic control performance than the other schemes.

A Trust Evaluation Model on QoS based Services Composition for IoT Environments (IoT 환경에서 QoS 기반 서비스 조합을 위한 신뢰 평가모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.85-93
    • /
    • 2019
  • In an open, heterogeneous environment based on machine-to-machine (M2M) interactions, service selection is a critical issue and the concept of social trust can be applied to service selection so that IoT devices can make the best choice for interaction. In this paper, we propose a method for evaluating the trust level of the service and for estimating the QoS of the composite service using a profile created based on social trust relationship in IoT environment. As the service selection is made through quantitative evaluation, it is expected that the result of a more reliable service combination can be obtained.