• Title/Summary/Keyword: IoT 시스템

Search Result 1,684, Processing Time 0.028 seconds

A Design for Security Functional Requirements of IoT Middleware System (IoT(Internet of Things) 시스템 미들웨어 보안기능요구사항 설계)

  • Jung, Hyun Mi;Jeong, Kimoon;Cho, Han Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.63-69
    • /
    • 2017
  • The middleware in the IoT system is software that acts as a messenger to connect and exchange data between humans and objects, objects and objects. IoT middleware exists in various forms in all areas, including hardware, protocol, and communication of different kinds, which are different in form and purpose. However, IoT middleware exists in various forms across different areas, including hardware, protocol, and communication of different types and purposes. Therefore, even if the system is designed differently for each role, it is necessary to strengthen the security in common. In this paper, we analyze the structure of IoT middleware using Service Oriented Architecture(SOA) approach and design system security requirements based on it. It was defined: Target Of Evaluation(TOE) existing system development method and the object is evaluated by Common Criteria(CC) for verification based otherwise. The proposed middleware system will be correlated with the security problem definition and the security purpose, which will be the basis for implementing the security enhanced IoT system.

Implementation of a DB-based Virtual Filesystem for IoT Service Platform using Linux FUSE (DB 및 리눅스 FUSE 기반 IoT 서비스 플랫폼을 위한 가상 파일시스템 구현)

  • Lee, Hyung-Bong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.103-104
    • /
    • 2015
  • IoT의 주요 구성요소는 기존의 데스크 탑 외에 디바이스 즉, 단말 기기들이 주류를 이룬다. 이러한 IoT 디바이스들은 데이터의 유형이나 접근 방법이 다양하고, 실시간적 데이터 생산과 제어를 위한 양방향 데이터 접근 지원을 필요로 한다. 이러한 IoT 디바이스를 연결하여 클라우드 형 서비스로 개발하기 위해서는 디바이스 속성 관리가 용이한 도메인 관리 방법과 디바이스에 대한 일관된 접근 인터페이스를 제공하는 플랫폼이 필요하다. 이 논문에서는 리눅스 파일시스템 후면 즉, 사용자 영역에 리눅스 파일 시스템 스타일의 DB 기반 가상 파일시스템을 구축하여 IoT 디바이스를 연결하고 관리하는 프레임워크를 제시한다. 구현 가상 파일시스템은 계층적 디렉터리 체계를 DB에 유지하면서 단말 노드에는 지리적으로 산재한 IoT 디바이스들에 대한 속성 정보를 관리한다. 디렉터리 및 IoT 디바이스의 추가 삭제 검색 등 도메인 관리는 mkdir. mknod, ls, find 등 리눅스 고유 명령어로 이루어지고, 모든 IoT 디바이스에 대한 접근은 open(), read(), write(), close() 등 POSIX 인터페이스를 통해 가능하다.

Smart IoT Home Data Analysis and Device Control Algorithm Using Deep Learning (딥 러닝 기반 스마트 IoT 홈 데이터 분석 및 기기 제어 알고리즘)

  • Lee, Sang-Hyeong;Lee, Hae-Yeoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.4
    • /
    • pp.103-110
    • /
    • 2018
  • Services that enhance user convenience by using various IoT devices are increasing with the development of Internet of Things(IoT) technology. Also, since the price of IoT sensors has become cheaper, companies providing services by collecting and utilizing data from various sensors are increasing. The smart IoT home system is a representative use case that improves the user convenience by using IoT devices. To improve user convenience of Smart IoT home system, this paper proposes a method for the control of related devices based on data analysis. Internal environment measurement data collected from IoT sensors, device control data collected from device control actuators, and user judgment data are learned to predict the current home state and control devices. Especially, differently from previous approaches, it uses deep neural network to analyze the data to determine the inner state of the home and provide information for maintaining the optimal inner environment. In the experiment, we compared the results of the long-term measured data with the inferred data and analyzed the discrimination performance of the proposed method.

Device Authentication System in IoT environment (IoT 환경의 단말 인증 시스템)

  • Dong-Yeon, Kang;Ji-Soo, Jeon;Sung-Hwa, Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.97-102
    • /
    • 2023
  • IoT is being used in a lot of industry domain such as smart home, smart ocean, smart energy, and smart farm, as well as legacy information services. For a server, an IoT device using the same protocol is a trusted object. Therefore, a malicious attacker can use an unauthorized IoT device to access IoT-based information services and access unauthorized important information, and then modify or extract it to the outside. In this study, to improve these problems, we propose an IoT device authentication system used in IoT-based information service. The IoT device authentication system proposed in this study applies identifier-based authentication such as MAC address. If the IoT device authentication function proposed in this study is used, only the authenticated IoT device can access the server. Since this study applies a method of terminating the session of an unauthorized IoT device, additional research on the access deny method, which is a more secure authentication method, is needed.

A Study on the Penetratrion Testing Next-generation IoT environment(ARMv7 Thumb Architecture) (차세대 IoT환경(ARMv7 Thumb Architecture) 침투테스트에 관한 연구)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.585-588
    • /
    • 2016
  • Due to the nature IoT Device (or Sensor) of the IoT System it may be susceptible (or attached) to our daily lives, so easy to direct physical access to IoT Device, which caused physical security is very weak. In this study, we implemented "Zero-Day Attack" on the ARMv7 Thumb Architecture as a direct target local system.

  • PDF

CAN interface supporting IoT application system Setup using open-source hardware and IoT platform (오픈소스 하드웨어와 IoT 플랫폼을 이용한 CAN Interface를 지원하는 차량용 IoT 응용시스템 구현)

  • Kim, Yong Hwan;Park, Su-Ho;Jeong, Jae-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.779-780
    • /
    • 2015
  • As IoT becomes a main technology of the age, many IoT products have developed and are being developed now. By using open-source hardware "Arduino"and open-source IoT platform "Temboo" to analize CAN signal from vehicle and make vehicle IoT environment to analize and use it through the mobile phone, figured out the way to develop the IoT environment with low cost. Also suggest the way to solve problems and improove.

  • PDF

Research Trends and Considerations for Blockchain-based IoT Cloud Systems (블록체인 기반 IoT 클라우드 시스템에 대한 연구동향 및 고찰)

  • Kim, Tae Woo;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.349-352
    • /
    • 2020
  • 클라우드는 가상화 기술을 사용한 리소스의 유연성과 뛰아난 접근성을 장점으로 빅데이터, 딥러닝 등 여러 분야에서 클라우드를 사용하고 있다. 최근 클라우드와 결합된 IoT 시스템을 통해 시스템 관리, 데이터 처리 및 저장, 데이터를 이용한 빅데이터 활용 등 여러 방법으로 사용 할 수 있어 많은 관심을 받고 있다. 그러나 IoT 클라우드의 많은 활용에 따라 대규모 시스템화, 여러 사용자의 개인정보 저장 등의 이유로 많은 공격자의 표적이 되고있다. 여러 공격자의 공격을 방아하기 위해 IoT 클라우드 시스템은 블록체인, 보안 IoT 디바이스, 변형된 클라우드 모델등 여러 연구가 진행되고 있다. 본 논문에서는 최근 연구되고 있는 블록체인, 클라우드, IoT 시스템의 동향에 대해 조사하고, 기존에 연구되었던 기술을 바탕으로 효과적인 블록체인 기반의 IoT 클라우드 시스템을 제안한다. 제안하는 IoT 클라우드 시스템은 블록체인 기술을 사용하여 보안정책을 관리할 수 있어 신뢰성이 높으며, 클라우드 시스템이 작동하지 않을 경우 페일오버 기능을 수행할 수 있어 가용성이 뛰어나다.

Design of Context Aware IoT Data Management System based on Ontology (온톨로지 기반 상황인지 IoT 데이터 관리 시스템 설계)

  • Choi, Kang-im;Choi, Young-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.331-332
    • /
    • 2016
  • In the IoT environment, The mass IoT data can be collected in a variety of IoT devices. Due to mass IoT data, the services for data processing and providing are needed that fit user requirements. So we propose the design of IoT data management system based on ontology using context information.

  • PDF

An IoT Tag and Social Message-based Device Control System (IoT 태그 및 소셜 메시지 기반 사물 제어 시스템)

  • Baek, Seung Min;Jin, Yeon Ju;Ha, Kwon Woo;Han, Sang Wook;Jeong, Jin-Woo
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.550-556
    • /
    • 2017
  • Due to the rapid growth and development of Internet of Things (IoT), various devices are now accessible and controllable anytime from anywhere. However, the current IoT system requires a series of complex steps (e.g., launch an application, choose a space and thing, control the thing, etc.) to control the IoT devices; therefore, IoT suffers from a lack of efficient and intuitive methods of interacting with users. To address this problem, we propose a novel IoT control framework based on IoT tags and social messages. The proposed system provides an intuitive and efficient way to control the device based on the device ownership: 1) users can easily control the device by IoT tagging, or 2) users can send an IoT social message to the device owner to request control of the tagged device. Through the development of the prototype system, we show that the proposed system provides an efficient and intuitive way to control devices in the IoT environment.

Implementation of crypto key-based IoT network security system (암호키 기반 IoT 네트워크 보안 시스템 구현)

  • Jeon, Ji-Soo;Kang, Dong-Yeon;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.349-350
    • /
    • 2022
  • As research on IT convergence continues, the scope of IoT (Internet of Things) services continues to expand. The IoT service uses a device suitable for the purpose. These IoT devices require an authentication function. In addition, in IoT services that handle important information such as personal information, security of transmission data is required. In this study, we implement a crypto key-based IoT network security system that can authenticate devices for IoT services and securely transmit data between devices. Through this study, IoT service can authenticate the device itself and maintain the confidentiality of transmitted data. However, since it is an IoT service, additional research on the application efficiency of the encryption algorithm is required.

  • PDF