• Title/Summary/Keyword: IoT 기능

Search Result 555, Processing Time 0.023 seconds

Smart Jewelry System for Health Management based on IoT (사물인터넷 기반 건강관리 스마트 주얼리 시스템)

  • Kang, Yun-Jeong;Yin, Li;Choi, DongOun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1494-1502
    • /
    • 2016
  • With the increasing availability of medical sensors and Internet of Things(IoT) devices for personal use, considering the interaction with users, it is planned to add intelligent function design to the fashionable jewelry, and develop composite multi-function intelligent jewelry through sensors identification. By means of IoT technology, while possessing communication function of intelligent jewelry, the function of intelligent jewelry can be expanded to the linkage network. In order to rapidly manage the mass data produced by intelligent jewelry sensors based on IoT, an intelligent jewelry system for health management is designed and an ontology model of intelligent jewelry system based on IoT is worked out. After the state of the services through the smart phone application is shown. The application provides a personalized service to the user and to determine the risk to show the guide lines according to the disease.

IoT Device Management Standard Protocol Trends in Mobile Communications (이동통신 기반 IoT 장치관리 표준 프로토콜 동향)

  • Oh, S.H.;Ko, S.K.;Son, S.C.;Lee, B.T.;Kim, Y.S.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.1
    • /
    • pp.94-101
    • /
    • 2015
  • 이동통신 기반 IoT(Internet of Things) 관련 표준들은 3GPP와 ETSI를 중심으로 제정되어 왔으나 2012년부터 표준의 중복을 회피하고 단일화된 표준을 통해서 IoT 시장을 성장시키고자 oneM2M이라는 국제적 협의체가 구성되었으며, 최근 Release 1 표준을 발표하는 등 IoT 표준을 사실상 주도하고 있다. Mason과 Machina 리서치에 따르면 2020년에는 동시 연결된 M2M(Machine to Machine)/IoT 장치들의 수가 21억개에 달할 것이고, 이것들이 동시에 200억개의 통신 연결을 생성할 것이다. 이런 수많은 장치들을 관리하기 위한 표준으로 OMA(Open Mobile Alliance)에서는 LWM2M(Lightweight M2M)를 제정하였다. 또한 이런 장치들은 센서들과 같이 연산능력과 배터리에 제약이 많아서 이것을 극복할 수 있는 메시지 프로토콜로 IETF에서는 CoAP 표준을 제정하였다. oneM2M에서도 CoAP과 LWM2M 표준을 채택하였고, 이를 기반으로 한 단말과 응용서비스 관리 기능이 확대될 것으로 기대된다. 본고에서는 이동통신 기반 IoT 표준 동향과 LWM2M 기반 단말 관리 규격에 대해 살펴본다.

  • PDF

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.

IoT Multi-Phase Authentication System Using Token Based Blockchain (블록체인 기반의 토큰을 이용한 IoT 다단계 인증 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.139-150
    • /
    • 2019
  • IoT(Internet of Things) security is becoming increasingly important because IoT potentially has a variety of security threats, including limited hardware specifications and physical attacks. This paper is a study on the certification technology suitable for the lightened IoT environment, and we propose a system in which many gateways share authentication information and issue authentication tokens for mutual authentication using blockchain. The IoT node can be issued an authentication token from one gateway to continuously perform authentication with a gateway in the block-chain network using an existing issued token without performing re-authentication from another gateway participating in the block-chain network. Since we do not perform re-authentication for other devices in a blockchain network with only one authentication, we proposed multi phase authentication consisting of device authentication and message authentication in order to enhance the authentication function. By sharing the authentication information on the blockchain network, it is possible to guarantee the integrity and reliability of the authentication token.

IoT Collaboration System Based on Edge Computing for Smart Livestock System (스마트 축사를 위한 에지 컴퓨팅 기반 IoT 협업 시스템)

  • Ahn, Chi-Hyun;Lee, Hyungtak;Chung, Kwangsue
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.258-264
    • /
    • 2022
  • The smart farm for livestock, in which information and communication technology (ICT) is combined with livestock farm, is mostly based on the cloud computing paradigm. A cloud-based smart livestock farm has disadvantages such as increased response time, burden on cloud resource caused by the increased number of IoT sensors, traffic burden on the network, and lack of failure resilience mechanisms through collaboration with adjacent IoT devices. In this paper, with these problems in mind, we propose an IoT collaboration system based on edge computing. By using the relatively limited computing resources of the edge device to share the cloud's web server function, we aim to reduce the cloud's resources needed and improve response time to user requests. In addition, through the heartbeat-based failure recovery mechanism, IoT device failures were detected and appropriate measures were taken.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

Design and Evaluation of a High-performance Key-value Storage for Industrial IoT Environments (산업용 IoT 환경을 위한 고성능 키-값 저장소의 설계 및 평가)

  • Han, Hyuck
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.7
    • /
    • pp.127-133
    • /
    • 2021
  • In industrial IoT environments, sensors generate data for their detection targets and deliver the data to IoT gateways. Therefore, managing large amounts of real-time sensor data is an essential feature for IoT gateways, and key-value storage engines are widely used to manage these sensor data. However, key-value storage engines used in IoT gateways do not take into account the characteristics of sensor data generated in industrial IoT environments, and this limits the performance of key-value storage engines. In this paper, we optimize the key-value storage engine by utilizing the features of sensor data in industrial IoT environments. The proposed optimization technique is to analyze the key, which is the input of a key-value storage engine, for further indexing. This reduces excessive write amplification and improves performance. We implement our optimization scheme in LevelDB and use the workload of the TPCx-IoT benchmark to evaluate our proposed scheme. From experimental results we show that our proposed technique achieves up to 21 times better than the existing scheme, and this shows that the proposed technique can perform high-speed data ingestion in industrial IoT environments.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

3GPP M2M/IoT 표준 기술 동향

  • Ryu, Jin-Suk;Kim, Hyeon-Suk;Kim, Rae-Yeong;Kim, Gi-Yeong
    • Information and Communications Magazine
    • /
    • v.32 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • 본고에서는 최근 활발한 활동을 보이고 있는 3GPP내 M2M/IoT 서비스를 위한 표준 기술 동향을 알아보고자 한다. 기술 초기 단계에 혼잡제어에 집중 되었던 M2M/IoT서비스를 위한 3GPP내 표준 기술은, 현재 Rel-13에 접어 들면서 Non-3GPP 기술 대비 경쟁력을 높이기 위해 새로운 기능 추가 등 시스템 전반에 걸쳐 많은 진화를 보이고 있다. 이에 3GPP 시스템 및 Radio Access 관점에서 최근 진행되고 있는 M2M/IoT 서비스 관련 기술 및 그 이후에 예상되는 표준 기술 변화를 살펴 M2M/IoT 서비스를 위한 이동통신 기술의 현 주소를 파악하고 향후 가능한 진화 방향성을 함께 알아 보고자 한다.

IoT Service Design Framework Using BLE Sensor Node (저전력 센서 노드를 사용한 IoT 서비스 설계 프레임워크)

  • Kim, jung-sook
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2015.05a
    • /
    • pp.37-38
    • /
    • 2015
  • 최근 안드로이드 4.0 이상 버전에서 저전력 블루투스(Bluetooth Low Energy) 기능이 지원되면서, 다양한 응용사례가 나타나고 있다. 이러한 BLE 프로토콜을 활용하는 Sensor-Tag IoT 센서노드를 활용하면 스마트홈, 웨어러블, 스마트카, 생활밀착 서비스, 스마트에너지, 산업 및 환경분야에서 다양한 스마트폰 앱을 개발할 수 있다. 또한, BLE-스택(Stack)TM 소프트웨어를 사용하면, 라이센서 걱정없이 펌웨어 소스코드의 개발 및 업데이트가 가능하다. 따라서, 다양한 센서가 장착된 IoT Sensor 노드를 통하여, 습도/온도/가속도/지자기/자이로 등의 데이터를 수집하여 활용할 수 있다. 이에 본 논문에서는 "저전력 센서 노드를 사용한 IoT 서비스 설계 프레임워크"를 제안한다.

  • PDF