• Title/Summary/Keyword: IoT 관련 기업

Search Result 60, Processing Time 0.026 seconds

TTA와 함께하는 ICT표준자문서비스 - 화승엑스윌, 4차 산업혁명으로 내딛는 첫걸음

  • TTA 표준화본부 표준진흥단
    • TTA Journal
    • /
    • s.177
    • /
    • pp.116-119
    • /
    • 2018
  • 2007년 화승그룹, R&A에서 분사한 (주)화승엑스윌은 컨베이어 벨트, 산업용 유압 호스, 특수물, 시트 등의 산업용 고무제품과 철도 장비 등을 제조 도매한다. 특히 해양 방현재의 설계 및 제작 기술도 보유하고 있다. 국내에서는 포스코, 한국수력원자력, 한국전력공사, 해양수산부 등을 해외에서는 SUMITOMO, TEXCEL, TRELLEBORG 등을 주요 거래처로 하는 중견기업이다. (주)화승엑스윌은 세계적 대세를 따라 기존의 컨베이어용 벨트를 IoT 융합형 스마트 컨베이어로 업그레이드하고자 했고, 개발 기술의 표준화도 염두에 두었다. 그러나 제조업 기반 기업으로서 표준 IoT 관련 전문성은 외부에서 구할 수밖에 없었다. 주변의 추천으로 TTA 자문서비스를 신청한 (주)화승엑스윌은 현재 IoT 표준 제품의 개발 네트워크를 구축하고 정부 과제 참여를 검토 중이다.

  • PDF

Development of KEPCO e-IoT Standard Type oneM2M Gateway for Efficient Management of Energy Facilities (에너지 설비의 효율적 관리를 위한 한전 e-IoT 표준형 oneM2M Gateway 개발)

  • Sim, Hyun;Kim, Yo-Han
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1213-1222
    • /
    • 2021
  • This study is a digitalization study based on ICT technology as part of the development of innovative technologies in the new energy industry as a 2050 carbon-neutral policy. It is the development of an oneM2M-based IoT server platform that can be integrated and managed in conjunction with the external interface of each energy facility. It analyzes KEPCO's e-IoT standard specifications through the Power Research Institute's 'SPIN' and develops representative standards, LWM2M and oneM gateway platforms. OneM2M secures and analyzes the recently announced standard for Release 2 instead of the existing Release 1. In addition, the e-IoT standard oneM2M platform is developed based on R2. In addition, it selects the specifications for e-IoT gateway devices that can sufficiently implement KEPCO's e-IoT standards. In addition, a technology and system for developing a high-performance gateway device that considers future scalability were proposed.

A Study on Energy Saving and Safety Improvement through IoT Sensor Monitoring in Smart Factory (스마트공장의 IoT 센서 모니터링을 통한 에너지절감 및 안전성 향상 연구)

  • Woohyoung Choi;Incheol Kang;Changsoo Kim
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.117-127
    • /
    • 2024
  • Purpose: The purpose is to conduct basic research to save energy and improve the safety of manufacturing plant infrastructure by comprehensively monitoring energy management, temperature, humidity, dust and gas, air quality, and machine operation status in small and medium-sized manufacturing plants. Method: To this end, energy-related data and environmental information were collected in real time through digital power meters and IoT sensors, and research was conducted to disseminate and respond to situations for energy saving through monitoring and analysis based on the collected information. Result: We presented an application plan that takes into account energy management, cost reduction, and safety improvement, which are key indicators of ESG management activities. Conclusion: This study utilized various sensor devices and related devices in a smart factory as a practical case study in a company. Based on the information collected through research, a basic system for energy saving and safety improvement was presented.

A study on prioritizing the application areas for business development of IoT(Internet of Things) (사물 인터넷의 사업화 영역에 대한 우선순위 선정에 관한 연구)

  • Moon, Tae Hee;Kim, Taehoon;Ahn, Hyunchul
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.183-195
    • /
    • 2014
  • This study aims at identifying and prioritizing the application areas for business development of IoT(Internet of Things). In specific, we collected the opinions of the experts on IoT in Korea through the survey based on pairwise comparison, and then we analyzed them using AHP(analytic hierarchy process). As a result, we found that 'Public Safety & Security', 'Automotive & Transportation', and 'Utility & Energy' are the most promising area in realizing IoT-related businesses. Also, we found that the experts had different views according to the positions of their industry in IoT value chain. The analysis showed that the device industry prioritizes 'Public Safety & Security', whereas the network industry does 'Automotive & Transportation'. The experts from the service industry were found to regard 'Utility and Energy' as the most promising commercialization area of IoT.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

Analyses of Security Consideration and Vulnerability based on Internet of Things (사물인터넷 기반의 시스템을 위한 보안 취약성 및 고려사항 분석)

  • Jang, Chang-hwan;Jo, Sung-ho;Lee, Jin-hyup;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.491-494
    • /
    • 2017
  • Recently, IoT has been supported by ICT technology with a variety of ICT powers. In May 2014, Information and Communication Strategy Committee announced the 'Basic plan for Internet of Things'. Also on Febuary 24 this SAME year, KISA(Korea Internet&Security Agency) provides many projects related to IoT, such as announcement of 'K-Global Project' for start-up and venture support related to IoT and ICT companies. In contrast to the various services of Internet of Things, when a connection is made between object-to-object or person-to-object wired and wireless networks, security threats have occurred in the process of communication. We analyzed these kinds of security threats related to Internet of things, and gave a consideration for requirement.

  • PDF

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

A System Architecture for Facility Fault Diagnosis and Repair Action in Smart Factory (스마트 팩토리에서 설비 장애 진단 및 조치 시스템 구조)

  • Cho, Jaehyung;Lee, Jaeoh
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.18-25
    • /
    • 2020
  • Recently, a research on a smart factory was developed from a concept of factory automation(FA) to the formation of collecting and analyzing data. This trend is accelerated as the development of communication technology(5G) and IoT devices are developed in various ways according to the field situation. In addition, digital transformation has been actively conducted in the strengthening corporate competitiveness, and various optimization studies are being conducted through process re-adjustment by combining data received from various IoT equipment and automated facilities. Therefore, in this paper, we propose a system architecture and its related components in diagnosing and repairing facility failure using a prediction system which is one of the related researches.

Countermeasure to Underlying Security Threats in IoT communication (사물인터넷 통신기술에 내재된 보안위협과 대응 전략)

  • Mun, Hyung-Jin;Choi, Gwang-Houn;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.37-43
    • /
    • 2016
  • Due to the remarkable improvement of ICT, with the popularization of mobile devices and every sector of society connected by networks, an era, in which peer to peer, peer to thing, thing to thing can be connected to one another everywhere, has begun. As all the electronic devices are connected to Internet, they have become more intellectualized and automated, making convergence and process of information through the connection of the devices possible to provide a lot better services. However, those devices communicate mutually to send information and they are exposed to various security threats. Therefore, this study analyzes ZigBee, CoAP, MQTT, XMPP, which are communication-related technology of IoT, draws security threats they have, and suggests requirements that components of IoT should have. Plus, it examines real cases about security threats in IoT, and suggests a countermeasure so as to contribute to establishment of a basis for IoT to be used much more safely in the future.

Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System (클라우드 병원 IoT 시스템을 활용한 효율적인 환자 정보 송·수신 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.1-7
    • /
    • 2019
  • The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular, as ICT convergence digital healthcare technology is applied to hospital medical systems, infrastructure technologies such as big data, Internet of Things, and artificial intelligence are being used in conjunction with the cloud. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection model from hospital IoT system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established hospital IoT systems. The proposed model allows clinicians to analyze patients' disease information so that they can collect and treat diseases associated with their eating habits through IoT devices. The analyzed disease information minimizes hospital work to facilitate the handling of prescriptions and care according to the patient's degree of illness.