• Title/Summary/Keyword: IoT Cloud

Search Result 400, Processing Time 0.023 seconds

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

Real-time Streaming and Remote Control for the Smart Door-Lock System based on Internet of Things (스마트 도어록 시스템을 위한 IoT 기반의 실시간 스트리밍 및 원격 제어)

  • Lee, Sung-Won;Yu, Je-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.6
    • /
    • pp.565-570
    • /
    • 2015
  • In this paper, we implemented the smart door lock system that control remotely devices using the concept of internet of things. Internet of things is intelligent system that can help devices to communicate with people and devices. And recently internet of things is getting attention because of advance of hardware technology and big data. The smart doorlock system based on internet of things used raspberry pi, sensor and doorlock. Using the smart phone, doorlock can be controlled from the raspberry pi server. And the user can identify some people that is in front of doorlock. also user can check around of doorlock in realtime using the raspberry pi camera.

A Study on Internet Technology Perspective Applicable in Industrial Environments (산업환경에서 적용 가능한 사물인터넷 기술 전망에 한 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.17 no.2
    • /
    • pp.21-27
    • /
    • 2019
  • The Internet of things is the infrastructure that can communicate with each other by exchanging information by installing antennas that can communicate with all things in the world. The reason why the Internet of Things is the core of the Fourth Industrial Revolution is that data is collected through the Internet to be. Technology of things Internet and Trend of Things Internet IoT (Internet of Things) is a concept that enables internet connection and communication between devices equipped with various sensors. It is the core IT trend of lot, technology such as big data, mobile, cloud And to provide information for the development of the industrial environment through research on the importance of the Internet of things, the core of the Fourth Industrial Revolution and the processing and analysis techniques of Big Data. By providing various security measures and future technologies, This study was conducted to contribute to management.

Extending the Home Network using UPnP+ (UPnP+를 이용한 홈 네트워크 확장)

  • Kim, Hyun-Sik;Park, Yong-Suk;Koo, Sung Wan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.540-542
    • /
    • 2014
  • The Universal Plug and Play (UPnP) specification permits networked devices to discover each other and to provide diverse services in the home network environment. Recently, new paradigms such as mobile connected computing, cloud-based service delivery, smart device content sharing, and Internet of Things (IoT) have emerged, but the home network based UPnP shows functional limitations in supporting such paradigms. To support them, the UPnP Forum has recently extended the capabilities of the existing UPnP, calling it UPnP+. In this paper, the UPnP Device Architecture V2.0 (UDA 2.0), which forms the basis of UPnP+, is presented. We present how UDA 2.0 enables the expansion of the home network to wide-area networks and non-IP device domains.

  • PDF

UAV and LiDAR SLAM Combination Effectiveness Review for Indoor and Outdoor Reverse Engineering of Multi-Story Building (복층 건물 실내외 역설계를 위한 UAV 및 LiDAR SLAM 조합 효용성 검토)

  • Kang, Joon-Oh;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.69-79
    • /
    • 2020
  • TRecently, smart cities that solve various problems in cities based on IoT technology are in the spotlight. In particular, cases of BIM application for smooth management of construction and maintenance are increasing, and spatial information is converted into 3D data through convergence technology and used for safety diagnosis. The purpose of this study is to create and combine point clouds of a multi-story building by using a ground laser scanner and a handheld LiDAR SLAM among UAV and LiDAR equipment, supplementing the Occluded area and disadvantages of each technology, examine the effectiveness of indoor and outdoor reverse design by observing shape reproduction and accuracy. As a result of the review, it was confirmed that the coordinate accuracy of the data was improved by creating and combining the indoor and outdoor point clouds of the multi-story building using three technologies. In particular, by supplementing the shortcomings of each technology, the completeness of the shape reproduction of the building was improved, the Occluded area and boundary were clearly distinguished, and the effectiveness of reverse engineering was verified.

Design and Implementation of High-Speed Software Cryptographic Modules Using GPU (GPU를 활용한 고속 소프트웨어 암호모듈 설계 및 구현)

  • Song, JinGyo;An, SangWoo;Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1279-1289
    • /
    • 2020
  • To securely protect users' sensitive information and national secrets, the importance of cryptographic modules has been emphasized. Currently, many companies and national organizations are actively using cryptographic modules. In Korea, To ensure the security of these cryptographic modules, the cryptographic module has been verified through the Korea Certificate Module Validation Program(KCMVP). Most of the domestic cryptographic modules are CPU-based software (S/W). However, CPU-based cryptographic modules are difficult to use in servers that need to process large amounts of data. In this paper, we propose an S/W cryptographic module that provides a high-speed operation using GPU. We describe the configuration and operation of the S/W cryptographic module using GPU and present the changes in the cryptographic module security requirements by using GPU. In addition, we present the performance improvement compared to the existing CPU S/W cryptographic module. The results of this paper can be used for cryptographic modules that provide cryptography in servers that manage IoT (Internet of Things) or provide cloud computing.

Vaccine Cold Chain Monitoring System Using IoT Vaccine Fridge for Developing Countries (IoT 백신 냉장고를 사용한 개발도상국 백신 콜드체인 모니터링 시스템)

  • Lyu, Jang-Hyeon;Park, Samuel;Yu, Jong-Ha;Wang, Xin-Lin;Im, Hyuck-Soon;Rhee, Hyop-Seung;Ahn, Sung-Hoon
    • Journal of Appropriate Technology
    • /
    • v.7 no.1
    • /
    • pp.26-32
    • /
    • 2021
  • In the process of vaccine delivery and vaccination, temperature is mostly controlled by an insulated containers containing ice. Moreover, amount of wasted vaccine is significant because the temperature of the vaccine is not properly controlled. A core challenge of vaccination is temperature data monitoring, since it is critical for managing and operating strategical vaccination by health organizations. In this research, a real-time monitoring vaccine carrier system was developed. Temperature, location, and power consumption data of the vaccine carrier were monitored and working performances of the vaccine carrier were tested in both Korea and Tanzania (Arusha and Kilimanjaro regions). For both places, Short Message Service (SMS) communication method was used to send information of the carrier's status. As a result, the monitoring system was able to transmit and receive real-time data of the vaccine carrier status while the vaccine carrier was tested. The vaccine status data can be accessed from any location through the cloud server and web-based user interface.

A Study on Integrity Protection of Edge Computing Application Based on Container Technology (컨테이너 기술을 활용한 엣지 컴퓨팅 환경 어플리케이션 무결성 보호에 대한 연구)

  • Lee, Changhoon;Shin, Youngjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1205-1214
    • /
    • 2021
  • Edge Computing is used as a solution to the cost problem and transmission delay problem caused by network bandwidth consumption that occurs when IoT/CPS devices are integrated into the cloud by performing artificial intelligence (AI) in an environment close to the data source. Since edge computing runs on devices that provide high-performance computation and network connectivity located in the real world, it is necessary to consider application integrity so that it is not exploited by cyber terrorism that can cause human and material damage. In this paper, we propose a technique to protect the integrity of edge computing applications implemented in a script language that is vulnerable to tampering, such as Python, which is used for implementing artificial intelligence, as container images and then digitally signed. The proposed method is based on the integrity protection technology (Docker Contents Trust) provided by the open source container technology. The Docker Client was modified and used to utilize the whitelist for container signature information so that only containers allowed on edge computing devices can be operated.

Digital transformation in terms of user experience design - Focusing on Starbucks case (사용자 경험 디자인 측면에서의 디지털 트랜스포메이션 - 스타벅스 사례를 중심으로)

  • Choi, Ye-Na;Heo, So-Yeon;Kim, Min-Gyeong;Jung, Young-Wook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.715-725
    • /
    • 2022
  • With the development of digital technology related to mobile, cloud, IoT, even traditional businesses have began to develop strategies for digital transformation. This is regarded as a very important part for business sustainability. However, many of these attempts are being conducted from the management point of view, and there has been little research on user experience design for digital transformation. In this study, Starbucks, which started a offline store business and expanded its experience with online services, was selected as a representative case and user research was conducted on it. Through an usability evaluation and post-task interviews of the Starbucks mobile application users, we discovered important issues of user experience to consider when transforming and expanding services online from offline. Based on the findings, the considersations for designing online user experience were discussed and proposed. These are expected to contribute to the process of researching and implementing digital transformation.

A Study on the Development Issues of Digital Health Care Medical Information (디지털 헬스케어 의료정보의 발전과제에 관한 연구)

  • Moon, Yong
    • Industry Promotion Research
    • /
    • v.7 no.3
    • /
    • pp.17-26
    • /
    • 2022
  • As the well-being mindset to keep our minds and bodies free and healthy more than anything else in the society we live in is spreading, the meaning of health care has become a key part of the 4th industrial revolution such as big data, IoT, AI, and block chain. The advancement of the advanced medical information service industry is being promoted by utilizing convergence technology. In digital healthcare, the development of intelligent information technology such as artificial intelligence, big data, and cloud is being promoted as a digital transformation of the traditional medical and healthcare industry. In addition, due to rapid development in the convergence of science and technology environment, various issues such as health, medical care, welfare, etc., have been gradually expanded due to social change. Therefore, in this study, first, the general meaning and current status of digital health care medical information is examined, and then, developmental tasks to activate digital health care medical information are analyzed and reviewed. The purpose of this article is to improve usability to fully pursue our human freedom.