• Title/Summary/Keyword: IoT Context

Search Result 124, Processing Time 0.024 seconds

An Analysis of Research Trends in IoT Security (IoT 보안에 대한 국내외 연구 동향 분석)

  • Yu, Woo Young
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.61-67
    • /
    • 2018
  • IoT technology is currently being applied at various industrial sites and is developing as a core technology in the fourth industrial revolution. Along with IoT developments, awareness and importance of IoT security is increasing, and research on IoT security is underway to counter these threats. However, research trends in the context of IoT security awareness are insufficient. This paper is a research that analyzes the progress of R&D and IoT security in both domestic and international IoT and thus leads to improvements. The research covered the 229 papers and articles of domestic and foreign journals covering security fields as a main theme. Among them, detailed analyses of 96 papers related to IoT security were performed. Research has shown that many studies are being conducted on trends in IoT security, key management and privacy. A detailed study on the characteristics of services to apply IoT technologies and access control and authentication between IoT devices is needed, and a study that addressed the issues of privacy in IoT environments in Korea.

  • PDF

A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments

  • Wu, Xu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2396-2413
    • /
    • 2018
  • Trust management is one of the most challenging issues for the highly heterogeneous Internet of Things (IoT). In the context of the IoT, it is difficult to evaluate the node's trustworthiness in the same trust model when a node provides different services. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of IoT environments. With these issues in mind, this paper propose a robust and adaptive trust management system for the IoT that is able to measure the trustworthiness of nodes based on feedbacks collected from participants in a specific context and ensure the availability of trust management services. The main contributions of our system are: 1) Proposing a partly decentralized trust management framework, which improves the resiliency of the trust mechanism; 2) Proposing an adaptive trust evaluation scheme and a three-dimensional context representation makes trust evaluation more accurate and specific; 3) Enhancing the adaptive trust evaluation scheme by incorporating a bad behavior factor in trust estimation, which efficiently distinguishes misleading feedbacks from On-Off attacks. Simulation results show the good performance of the proposed system and especially show effectiveness against On-Off attacks compared to other trust mechanisms.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.

Open Research Problem for effective IoT Authentication

  • Mihir Mehta;Kajal Patel
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.174-178
    • /
    • 2024
  • IoT is collection of different "things" which are associated with open web. As all the things are connected to the Internet, it offers convenience to end users for accessing the resources from "Any Where, Any Time" throughout the globe. At the same time, open nature of IoT provides a fertile ground to an intruder for launching different security related threats. If we can no apply proper security safeguards to the IoT System, then it will be not useful to society. Authentication, Encryption, Trust Management and Secure Routing are different domains to offer security in IoT system. Among them, Authentication is very much important security service as it validates device identity before granting access to system services/ resources. Existing IoT Authentication algorithms are fail to verify device identity in unambiguous way. They are vulnerable to different security threats such as Key Stolen threat, MITM threat and Location Spoofing threat. So, it is a demand of time to design an efficient and secure Multi-factor IoT algorithm which can offer better security and validate device identity in unambiguous way.

Design and implementation of context-aware inference system based on Internet of Things (IoT 기반 상황 인식 추론 시스템 설계 및 구현)

  • Lee, Jung-June;Kim, Kyung-Tae;Song, Jun-Seok;Youn, Hee-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.129-132
    • /
    • 2016
  • IT분야의 하드웨어 발달에 따라 저전력, 저가 및 센싱 및 통신이 가능한 IoT 디바이스들 출시 되고, 이를 이용한 새로운 솔루션 제품들이 출시되면서 IoT 시장 규모가 급격히 확대 되고 있다. 본 논문에서는 이러한 IoT 기기들의 연동을 통한 시너지 효과를 극대화 할 수 있는 상황 인식 추론 시스템의 설계 및 구현에 대해 서술한다. 해당 시스템은 상황 인식을 위한 상황 정보를 기존의 상황 인식 시스템과는 달리 클라이언트 기기에서 규격화 하여 서버로 전송한다. 이러한 이기종 데이터의 규격화는 RDF 문서의 정보 표기 방법인 Triple을 이용해 이루어진다. 이후, 서버로 전송된 상황 정보는 추론 엔진을 통해 현재 상황에 대한 추론 결과를 도출하고, 사용자에 의해 입력된 룰을 기반으로 상황에 적합한 서비스를 제공한다. 해당 시스템의 정상 동작 확인 여부를 위해, 본 논문에서는 방범 시나리오를 설정하여 테스트를 진행하였다.

  • PDF

Business Model Framework for IoT: Case Studies and Strategic Implications for IoT Businesses

  • Kim, Dongwook;Kim, Sungbum;Lee, Junghwan
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.1
    • /
    • pp.1-28
    • /
    • 2022
  • To realize the vision of internet of things (IoT), where it is expected to bring significant impact to the global economy in the future, consideration of business models in the IoT context is necessary. This research attempts to build an enhanced artifact business model framework based on the definitions of IoT and literature on business models for analysis of IoT businesses. The framework is used to analyze four different types of players: the owner of things, vendors of devices, providers of connectivity and providers of IoT application services. The findings suggest that the owners of things tend to partner with ICT players to complement their weakness, and it tends to be connectivity providers. The device vendors leverage their strength of devices and device platforms to attract and enable 3rd party sensor/devices to interconnect, while the service providers are aiming to penetrate into customer premise. These lead to the following recommendations for non-IT players to consider in expanding into IoT business: 1) take into account differences in product development process between IT and non-IT businesses in expanding into IoT market; 2) collaborate with ICT players that acknowledge and understand the differences.

A Study on Collection Method of IoT Information for The Adaptation of Web Services (웹 서비스 적용을 위한 IoT 정보 수집 방법에 관한 연구)

  • Sim, Sung-Ho;Han, Jung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.71-76
    • /
    • 2017
  • It is necessary to develop a service that meets various environmental requirements so that the Internet of things can be applied to the fourth industry in overall. This paper presents a method for extracting IoT devices information to change the current provider centric service provision environment in order to construct a user centered service provision environment for Web services. Also, it provides users to utilize the appropriate web services through taking advantage of IoT devices information. The existing service provision environment is focused on the method of selecting the service using the provider service information, thus, it is considered necessary for a user-oriented service search method to be in need. In this study, the service list is provided to the user by combining provider information and information extracted from IoT Devices. IoT information collection generates information by separating context information such as information between IoT devices and users and event information between devices through identifiers. In this paper, we propose a development of a user centric service environment by presenting users with a necessary service list through the proposed IoT information.

Recommendation System using Baysian Network in IoT Environment (IoT 환경에서의 베이지안 네트워크를 이용한 추천시스템)

  • Jeong, Soo-Yeon;Kim, Young-Kuk
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.125-127
    • /
    • 2016
  • 본 논문에서는 IoT(Internet of Things) Device와 스마트폰을 이용하여 사용자의 상황을 인지하고 상황에 적합한 상품을 추천하는 추천시스템을 제안한다. 기존 추천시스템과 다르게 제안하는 IoT 환경에서의 추천시스템은 IoT Device와 스마트폰에서 얻을 수 있는 날씨, 위치, 사용자 정보 등을 파악하여 추천하는 것으로 다양하고 많은 데이터를 제공하므로 정확도를 높일 수 있다. 베이지안 네트워크(BN, Bayesian Network)는 불확실성을 효율적으로 관리하고 정확도와 실시간성을 높일 수 있는 방법으로, 상품의 특징에 따라 종류를 분류하여 추론하고 선호도가 높은 상품의 종류를 추천하는 시스템을 제안한다.

  • PDF

Ontology-based IoT Context Information Modeling and Semantic-based IoT Mashup Services Implementation (온톨로지 기반의 IoT 상황 정보 모델링 및 시맨틱 기반 IoT 매쉬업 서비스 구현)

  • Seok, Hyun-Seung;Lee, Yong-Ju
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.671-678
    • /
    • 2019
  • The semantic information provided through the semantic-based IoT system will produce new high value-added products that are completely different from what we have known and experienced. From this point of view, the key issue of current IoT technology and applications is the development of an intelligent IoT platform architecture. The proposed system collects the IoT data of the sensors from the cloud computer, converts them into RDF, and annotates them with semantics. The converted semantic data is shared and utilized through the ontology repository. We use KT's IoTMakers as a cloud computing environment, and the ontology repository uses Jena's Fuseki server to express SPARQL query results on the web using Daum Map API and Highcharts API. This gives people the opportunity to access the semantic IoT mash-up service easily and has various application possibilities.

A Study on Context-aware Beacon Services Connecting Smart TV (Smart TV 상황 인지형 Beacon서비스 연구)

  • Nam, Kang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.5
    • /
    • pp.499-504
    • /
    • 2016
  • The Service had a purpose to be heard through the Smart Phone APP and Smart TV Broadcasting Contents to Foreigner's Language in The Asia Culture Center. This Paper explained how to realize foreigner with Beacon's Signal and IoT gateway provided the voice service with selected his language using AllJoyn Protocol Interface function. IoT Service Platform received the Registration of foreigner's identifier, there sent messages to all devices, which were all IoT gateways, IoT gateway could connect to foreigner's Smart Phone App and heard the Broadcasting contents. If a foreigner went out of Beacon's management distance, the voice App service were released.