• Title/Summary/Keyword: IoT 장비

Search Result 187, Processing Time 0.024 seconds

Evaluation of Compaction Quality Control applied the Dynamic Cone Penetrometer Test based on IoT (다짐품질관리를 위한 IoT 기반 DCPT 적용 평가)

  • Jisun, Kim;Jinyoung, Kim;Namgyu, Kim;Sungha, Baek;Jinwoo, Cho
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.4
    • /
    • pp.1-12
    • /
    • 2022
  • Generally, the plate load test and the field density test are conducted for compaction quality control in earthwork, and then additional analysis. Recently developed that the DCPT (Dynamic Cone Penetration Test) equipment for smart compaction quality control its the system are able to get location and real-time information about worker history management. The IoT-based the DCPT system improved the time-cost in the field compared traditional test, and the functions recording and storage of the DPI (Dynamic Cone Penetration Index) were automated. This paper describes using these DCPT equipment on in-situ and compared to the standards of the DCPT, and the compaction trend had be confirmed with DPI as the field test data. As a result, the DPI of the final compaction decreased by 1.4 times compared to the initial compaction, confirming the increase in the compaction strength of the subgrade compaction layer 10 to 14 cm deep from the surface. A trend of increasing compaction strength was observed. This showed a tendency to increase the compaction strength of the target DPI proposed by MnDOT and the results of the existing plate load test, but there was a difference in the increase rate. Therefore, additional studies are needed on domestic compaction materials and laboratory conditions for target DPI and correlation studies with the plate load tests. If this is reflected, it is suggested that DCPT will be widely used as smart construction equipment in earthworks.

The IoT Implementation Technology for e-Health Device Connection (e-Health장비 연결을 위한 IoT구현기술)

  • Yoo, Jinho
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.394-399
    • /
    • 2015
  • This paper is a study related to connecting to medical device in IoT environment for e-Health Implementation. The implementation environment of this paper consists of sensing device node, gateway and its server. The information from medical devices on sensor node is transferred to gateway. The gateway transfers the information from their devices into the server and the server saves their transferred information. The medical information from medical devices is ready to use in making medical decision which is saved in database. In this paper, we connected the gateway to the commercial sensor node for implementing gateway functions. We studied and implemented how their network entities communicate each other.

Smart Centralized Remote Security Service Provisioning Framework for Open ICT Environment (개방형 ICT 환경을 위한 집중식 원격 보안 서비스 프로비저닝 프레임워크 구성 방안)

  • Park, Namje
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.2
    • /
    • pp.81-88
    • /
    • 2016
  • Machine-to-Machine (M2M) communication provides each component (machine) with access to Internet, evolving into the IoT technology. IoT is a trend where numbers of devices provide the communication service, using the Internet protocol. As spreading the concept of IoT(Internet of Things), various objects become home information sources. According to the wide spread of various devices, it is difficult to access data on the devices with unified manners. Under this environment, security is a critical element to create various types of application and service. In this paper propose the inter-device authentication and Centralized Remote Security Provisioning framework in Open M2M environment. The results of previous studies in this task is carried out by protecting it with the latest information on M2M / IoT and designed to provide the ultimate goal of future M2M / IoT optimized platform that can be integrated M2M / IoT service security and security model presents the information.

Suggestion of Home Network using IoT (IoT를 활용한 홈네트워크 제언)

  • Kim, YoungChul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2017.06a
    • /
    • pp.151-152
    • /
    • 2017
  • 최근에 제4차 산업혁명을 거론하면서 사물인터넷(IoT)을 하나의 중요한 요소로 보고 있으며, 사물인터넷의 한 방향으로 홈네트워크인 홈IoT가 주목을 받고 있다. 최근의 경제적, 사회적인 변화로 1인 가구, 독거노인, 맞벌이 가구의 증가로 인한 주거환경 변화가 사물인터넷 디바이스의 새로운 수요 증가를 시키고 있는 상황이다. 따라서 홈IoT와 관련하여 다양한 이슈화가 있지만 크게 두 부분으로 제언을 하고자 한다. 하나는 사물인터넷(IoT)가 가지고 있는 근본적인 문제인 전원으로 에너지 자립형 IoT와 관련하여 에너지 하베스팅을 기반으로 연구되고 있으나, 홈IoT 설비의 관점에서 단순하게 접근하고자 한다. 두번째로 정보보안 관련으로 최근에 랜섬웨어와 같은 네트워크 침입을 통한 해킹 및 접근이 지속적으로 이루어지고 있음으로 네트워크 보안관점을 보고하고자 한다. 결과적으로 홈IoT는 무선전력방식이나 전원접근방식을 저전력 방식으로 새롭게 표준화나 전원 서비스를 함으로서 좀 더 용이하게 IoT를 설치할 수 있도록 하여야 하며, 네트워크 보안은 개인의 경각심과 더불어서 IoT 장비 개발사의 지속적인 보안 업데이트가 가능하도록 인증절차가 필요할 것으로 판단이 된다.

  • PDF

Feasibility Test with IoT-based DCPT system for Digital Compaction Information of Smart Construction (스마트건설 디지털 다짐정보 구축을 위한 IoT 기반 DCPT 시스템 현장실증)

  • Kim, Donghan;Bae, Kyoung Ho;Cho, Jinwoo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.40 no.5
    • /
    • pp.421-428
    • /
    • 2022
  • The earthwork is a core process of all constructions, and compaction measurement of earthwork play an important role in improving productivity. The analog tests such as Plate Bearing Test and Sand-cone occupy current compaction measurement techniques. Due to advanced 4th Industrial Revolution, research on analog tests combined smart construction technology are actively conducted. DCPT (Dynamic Cone penetration Test), simpler and faster than conventional tests, has recently on rise. However, it is also an analog that measures data manually and has several disadvantages such as history management and data verification. The IoT-based DCPT system developed in this study combines digital wire sensors, mobile phones, and Bluetooth with conventional DCPT. Compare to conventional test methods, IoT-based DCPT has advantages such as performance time, single-person measurement, low cost, mobile-based management, and real-time data verification. In addition, a test bed was built to verify IoT-based DCPT. The test bed was built under similar conditions to the actual earthworks site through roller equipment. DCPT data obtained from 322 stations. As a result, IoT-based DCPT showed good performance, and the test bed was also showed stable results as the compaction was carried out.

Internet of Things based on Visible Light Communications: Testbed Experimentations (가시광 통신 기반 사물인터넷 환경 구축 및 실험)

  • Kim, So-Yong;Kim, Cheol-Min;Kim, Byung-Oh;Koh, Seok-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.939-942
    • /
    • 2018
  • 최근 LED 조명을 활용한 가시광 통신(VLC: Visible Light Communications)기술이 주목을 받고 있다. 가시광 통신 기술은 Bluetooth, ZigBee 등과 함께 새로운 인터넷 접속 기술로 활용될 수 있으나 전송 용량의 한계 때문에 실제 적용이 힘든 상황이다. 본 논문에서는 이 문제를 해결하기 위해 키-값 데이터베이스 패러다임을 적용한 가시광 통신 기반의 사물인터넷(IoT: Internet of Things) 모델을 제시한다. 제안하는 IoT 환경은 플렛폼 서버, 게이트웨이, VLC 송신기 및 VLC 수신기로 구성된다. IoT 통신을 위한 각 장비의 기능 및 프로토콜 스텍을 설계하고 실험 환경에서 각 장치의 초기화 절차 및 데이터 전송 과정을 검증하였다. 실험결과, 각 장비의 초기 구동 시간을 포함하여 1분 이내에 VLC 기반의 IoT 환경 구축이 가능함을 확인하였다.

Design Method of Things Malware Detection System(TMDS) (소규모 네트워크의 IoT 보안을 위한 저비용 악성코드 탐지 시스템 설계 방안 연구)

  • Sangyoon Shin;Dahee Lee;Sangjin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.459-469
    • /
    • 2023
  • The number of IoT devices is explosively increasing due to the development of embedded equipment and computer networks. As a result, cyber threats to IoT are increasing, and currently, malicious codes are being distributed and infected to IoT devices and exploited for DDoS. Currently, IoT devices that are the target of such an attack have various installation environments and have limited resources. In addition, IoT devices have a characteristic that once set up, the owner does not care about management. Because of this, IoT devices are becoming a blind spot for management that is easily infected with malicious codes. Because of these difficulties, the threat of malicious codes always exists in IoT devices, and when they are infected, responses are not properly made. In this paper, we will design an malware detection system for IoT in consideration of the characteristics of the IoT environment and present detection rules suitable for use in the system. Using this system, it will be possible to construct an IoT malware detection system inexpensively and efficiently without changing the structure of IoT devices that are already installed and exposed to cyber threats.

Development of Valve Monitoring System (밸브 모니터링 시스템 개발)

  • Kim, Gwan-hyung;Oh, Am-suk;Kim, Sung-dae;Kong, Suk-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.518-519
    • /
    • 2017
  • 사물인터넷(IoT) 기술의 발달로 인하여 간단한 개인 장비에서부터 다양한 산업장비에까지 IoT 기술을 접목해 나가고 있으며, 유체 및 기타 동작을 단속할 수 있는 밸브에까지 다양하게 접목해 나가고 있다. 현재 국내의 소규모 회사에서 DCM(Deep Cement Mixing Method) 공법에 사용되는 장비의 동작 특성인 시멘트 흐름을 단속할 수 있는 고온/고압에 견딜 수 있는 밸브를 제작하고 판매하고 있다. 그러한 특수한 밸브 시스템에 사물인터넷(IoT) 기술을 접목하여 작동되는 밸브를 원격으로 관리할 수는 원격지 관리시스템 및 간단한 밸브 상태계측 모듈을 연구개발하여 적용 가능성을 검토하고자 한다.

  • PDF

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.