• Title/Summary/Keyword: IoT 정보

Search Result 2,779, Processing Time 0.024 seconds

An IoT Information Security Model for Securing Bigdata Information for IoT Users (IoT 사용자의 빅데이터 정보를 안전하게 보호하기 위한 IoT 정보 보안 모델)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.8-14
    • /
    • 2019
  • Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.

Device Authentication System in IoT environment (IoT 환경의 단말 인증 시스템)

  • Dong-Yeon, Kang;Ji-Soo, Jeon;Sung-Hwa, Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.97-102
    • /
    • 2023
  • IoT is being used in a lot of industry domain such as smart home, smart ocean, smart energy, and smart farm, as well as legacy information services. For a server, an IoT device using the same protocol is a trusted object. Therefore, a malicious attacker can use an unauthorized IoT device to access IoT-based information services and access unauthorized important information, and then modify or extract it to the outside. In this study, to improve these problems, we propose an IoT device authentication system used in IoT-based information service. The IoT device authentication system proposed in this study applies identifier-based authentication such as MAC address. If the IoT device authentication function proposed in this study is used, only the authenticated IoT device can access the server. Since this study applies a method of terminating the session of an unauthorized IoT device, additional research on the access deny method, which is a more secure authentication method, is needed.

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

A Privacy Approach Model for Multi-Access to IoT Users based on Society 5.0 (소사이어티 5.0 기반 IoT 사용자에 대한 다중 접근방식의 프라이버시 접근 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.4
    • /
    • pp.18-24
    • /
    • 2020
  • Recently, research on Society 5.0 has been actively carried out in Japan. The Society 5.0 is used in various areas using IoT sensors. This paper proposes a privacy approach model of multiple approaches to IoT users based on Society 5.0. The proposed model used multiple methods of synchronizing important information of IoT devices with one another in the virtual environment. The proposed model improved the efficiency of IoT information by accumulating the weight of IoT information on a probability-based basis. Further, it improves the accuracy of IoT information by segmenting it so that attribute information is linked to IoT information. As a result of the performance evaluation, the efficiency of IoT devices has improved by an average of 5.6 percent, depending on the number of IoT devices and the number of IoT hub devices. Accuracy has improved by an average of 15.9% depending on information collection and processing.

Blockchain-based multi-IoT verification model for overlay cloud environments (오버레이 클라우드 환경을 위한 블록체인 기반의 다중 IoT 검증 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.151-157
    • /
    • 2021
  • Recently, IoT technology has been applied to various cloud environments, requiring accurate verification of various information generated by IoT devices. However, due to the convergence of IoT technologies and 5G technologies, accurate analysis is required as IoT information processing is rapidly processed. This paper proposes a blockchain-based multi-IoT verification model for overlay cloud environments. The proposed model multi-processes IoT information by further classifying IoT information two layers (layer and layer) into bits' blockchain to minimize the bottleneck of overlay networks while ensuring the integrity of information sent and received from embedded IoT devices within local IoT groups. Furthermore, the proposed model allows the layer to contain the weight information, allowing IoT information to be easily processed by the server. In particular, transmission and reception information between IoT devices facilitates server access by distributing IoT information from bits into blockchain to minimize bottlenecks in overlay networks and then weighting IoT information.

A Study on Reinforcing Non-Identifying Personal Sensitive Information Management on IoT Environment (IoT 환경의 비식별 개인 민감정보관리 강화에 대한 연구)

  • Yang, Yoon-Min;Park, Soon-Tai;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.34-41
    • /
    • 2020
  • An era of stabilizing IoT markets and rapid expansion is coming. In an IoT environment, communication environments where objects take the lead in communication can occur depending on the situation, and communication with unspecified IoT environments has increased the need for thorough management of personal sensitive information. Although there are benefits that can be gained by changing environment due to IoT, there are problems where personal sensitive information is transmitted in the name of big data without even knowing it. For the safe management of personal sensitive information transmitted through sensors in IoT environment, the government plans to propose measures to enhance information protection in IoT environment as the use of non-identifiable personal information in IoT environment is expected to be activated in earnest through the amendment of the Data 3 Act and the initial collection method.

스마트 홈 IoT 포렌식 기술 동향

  • Kim, Minju;Shon, Taeshik
    • Review of KIISC
    • /
    • v.31 no.6
    • /
    • pp.31-35
    • /
    • 2021
  • 다양한 스마트 홈 IoT가 개발됨에 따라 가정 내에서 IoT를 활용한 서비스가 확장되고 있다. 스마트 홈 IoT와 IoT가 등록된 스마트 폰은 서비스 제공을 위해 클라우드 서버와 통신을 수행한다. 클라우드 서버와 통신 과정에서 스마트 홈 IoT와 스마트 폰, 클라우드 서버에는 사용자에 대한 다양한 정보가 저장될 가능성이 있다. 사용자에 대한 다양한 정보가 클라우드 서버로 전송되는 것은 개인정보 문제를 야기할 수 있지만, 포렌식 관점에서는 범죄를 해결하는 데 증거로 사용될 수 있다. 따라서 본 논문에서는 클라우드 서버와 통신을 수행하는 클라우드 기반의 스마트 홈 IoT를 대상으로 데이터를 수집하는 기법을 알아보고 데이터 수집 기법이 적용된 기존의 스마트 홈 IoT 연구를 스마트 홈 IoT 기기 별로 나누어 분석한다.

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

A Study on Collection Method of IoT Information for The Adaptation of Web Services (웹 서비스 적용을 위한 IoT 정보 수집 방법에 관한 연구)

  • Sim, Sung-Ho;Han, Jung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.71-76
    • /
    • 2017
  • It is necessary to develop a service that meets various environmental requirements so that the Internet of things can be applied to the fourth industry in overall. This paper presents a method for extracting IoT devices information to change the current provider centric service provision environment in order to construct a user centered service provision environment for Web services. Also, it provides users to utilize the appropriate web services through taking advantage of IoT devices information. The existing service provision environment is focused on the method of selecting the service using the provider service information, thus, it is considered necessary for a user-oriented service search method to be in need. In this study, the service list is provided to the user by combining provider information and information extracted from IoT Devices. IoT information collection generates information by separating context information such as information between IoT devices and users and event information between devices through identifiers. In this paper, we propose a development of a user centric service environment by presenting users with a necessary service list through the proposed IoT information.

Different Heterogeneous IoT Data Management Techniques for IoT Cloud Environments (IoT 클라우드 환경을 위한 서로 다른 이기종의 IoT 데이터 관리 기법)

  • Cho, Sung-Nam;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.15-21
    • /
    • 2020
  • Although IoT systems are used in a variety of heterogeneous environments as cloud environments develop, all IoT devices are not provided with reliable protocols and services. This paper proposes an IoT data management technique that can extend the IoT cloud environment to an n-layer multi-level structure so that information collected from different heterogeneous IoT devices can be efficiently sorted and processed. The proposed technique aims to classify and process IoT information by transmitting routing information and weight information through wireless data link data collected from heterogeneous IoT devices. The proposed technique not only delivers information classified from IoT devices to the corresponding routing path but also improves the efficiency of IoT data processing by assigning priority according to weight information. The IoT devices used in the proposed technique use each other's reliable protocols, and queries for other IoT devices locally through a local cloud composed of hierarchical structures have features that ensure scalability because they maintain a certain cost.y channels of IoT information in order to make the most of the multiple antenna technology.