• Title/Summary/Keyword: IoT Data

Search Result 1,761, Processing Time 0.025 seconds

The Analysis of Association between Learning Styles and a Model of IoT-based Education : Chi-Square Test for Association

  • Sayassatov, Dulan;Cho, Namjae
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.3
    • /
    • pp.19-36
    • /
    • 2020
  • The Internet of things (IoT) is a system of interrelated computed devices, digital machines and any physical objects which are provided with unique identifiers and the potential to transmit data to people or machine (M2M) without requiring human interaction. IoT devices can be used to monitor and control the electrical and electronic systems used in different fields like smart home, smart city, smart healthcare and etc. In this study we introduce four imaginary IoT devices as a learning support assistants according to students' dominant learning styles measured by Honey and Mumford Learning Styles: Activists, Reflectors, Theorists and Pragmatists. This research emphasizes the association between students' strong learning styles and a preference to appropriate IoT devices with specific characteristics. Moreover, different levels of IoT devices' architecture are clearly explained in this study where all the artificial devices are designed based on this structure. Data analysis of experiment were measured by the use of chi square test for association and research results showed the statistical significance of the estimated model and the impacts of each category over the model where we finally got accurate estimates for our research variables. This study revealed the importance of considering the students' dominant learning styles before inventing a new IoT device.

Toward Energy-Efficient Task Offloading Schemes in Fog Computing: A Survey

  • Alasmari, Moteb K.;Alwakeel, Sami S.;Alohali, Yousef
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.163-172
    • /
    • 2022
  • The interconnection of an enormous number of devices into the Internet at a massive scale is a consequence of the Internet of Things (IoT). As a result, tasks offloading from these IoT devices to remote cloud data centers become expensive and inefficient as their number and amount of its emitted data increase exponentially. It is also a challenge to optimize IoT device energy consumption while meeting its application time deadline and data delivery constraints. Consequently, Fog Computing was proposed to support efficient IoT tasks processing as it has a feature of lower service delay, being adjacent to IoT nodes. However, cloud task offloading is still performed frequently as Fog computing has less resources compared to remote cloud. Thus, optimized schemes are required to correctly characterize and distribute IoT devices tasks offloading in a hybrid IoT, Fog, and cloud paradigm. In this paper, we present a detailed survey and classification of of recently published research articles that address the energy efficiency of task offloading schemes in IoT-Fog-Cloud paradigm. Moreover, we also developed a taxonomy for the classification of these schemes and provided a comparative study of different schemes: by identifying achieved advantage and disadvantage of each scheme, as well its related drawbacks and limitations. Moreover, we also state open research issues in the development of energy efficient, scalable, optimized task offloading schemes for Fog computing.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

An Efficient IoT Platform for Fog Computing (포그 컴퓨팅을 위한 효율적인 IoT 플랫폼)

  • Lee, Han Sol;Choi, Jeong Woo;Byeon, Gi Beom;Hong, Ji Man
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2019
  • With IoT device technology developments, such devices now can perceive the surrounding environment and operate upon the condition, but a method for efficiently processing an enormous amount of IoT device data is required. The existing cloud computing has a transmission delay problem due to load and distance. Fog Computing, an environment to control IoT devices, therefore, emerged to solve this problem. In Fog Computing, IoT devices are located close to each other to solve the shortcomings of the cloud system. While many earlier studies on Fog Computing for IoT mainly focus on its structure and framework, we would like to propose an integrated Fog Computing platform that monitors, analyzes, and controls IoT devices.

Development of Interactive Content Services through an Intelligent IoT Mirror System (지능형 IoT 미러 시스템을 활용한 인터랙티브 콘텐츠 서비스 구현)

  • Jung, Wonseok;Seo, Jeongwook
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.472-477
    • /
    • 2018
  • In this paper, we develop interactive content services for preventing depression of users through an intelligent Internet of Things(IoT) mirror system. For interactive content services, an IoT mirror device measures attention and meditation data from an EEG headset device and also measures facial expression data such as "sad", "angery", "disgust", "neutral", " happy", and "surprise" classified by a multi-layer perceptron algorithm through an webcam. Then, it sends the measured data to an oneM2M-compliant IoT server. Based on the collected data in the IoT server, a machine learning model is built to classify three levels of depression (RED, YELLOW, and GREEN) given by a proposed merge labeling method. It was verified that the k-nearest neighbor (k-NN) model could achieve about 93% of accuracy by experimental results. In addition, according to the classified level, a social network service agent sent a corresponding alert message to the family, friends and social workers. Thus, we were able to provide an interactive content service between users and caregivers.

Integrity Guarantee System in IoT Virtual Environment Platform: Through Hyperedfger Indy and MQTT (IoT 가상환경 플랫폼에서의 무결성 보장 시스템:Hyperledger Indy와 MQTT를 통하여)

  • Yoosung Hong;Geun-Hyung Kim
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.76-85
    • /
    • 2024
  • In this paper, we propose a system that improves the data integrity of IoT(Internet of Things) devices in the virtual environment by combining Hyperledger Indy and MQTT(Message Queuing Telemetry Transport). The system complements the limitations of the centralized system by realizing a DPKI(Decentralized Public Key Infrastructure) structure that utilizes a distributed network in publish-subscribe(pub/sub) pattern communication. Digital signature technology was applied to ensure the data integrity of IoT devices and communication scenarios between the four core components of the client, IoT device, broker, and blockchain, as well as a topic structure using a decentralized identifier to ensure safety in the virtual environment. We present a systematic method for transparent data exchange. To prove the performance of the proposed system, this paper conducted experiments on four scenarios and evaluated communication performance in a virtual environment. The experimental results confirmed that the proposed system provides a reliable IoT data communication structure in a virtual environment.

Design and Implementation of CoAP based Cloud-IoT Architecture (CoAP 기반 클라우드 환경 IoT 구조 설계 및 구현)

  • Park, Young-Ki;Yang, Hyun-Sik;Kim, Young-Han
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.3
    • /
    • pp.119-127
    • /
    • 2015
  • In the IoT(Internet of Things) environment, methods that user can access sensor node directly to collect sensing data or manage sensor in a gateway have a limitations. To solve this problem, cloud based sensor network architectures are proposed. In this paper, we proposed CoAP based IoT architecture that a lightweight gateway is used for data gathering instead of using a heavy traditional one and users can request sensing data through IoT applications running in the cloud environment and analyze signaling message cost. By doing so, our system can reduce message cost compared to the traditional gateway based system.

CoAP-based Reliable Message Transmission Scheme in IoT Environments

  • Youn, Joosang;Choi, Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.79-84
    • /
    • 2016
  • In this paper, we propose reliable message transmission scheme based on CoAP, considering the constrained feature of IoT device, such as low power, the limited memory size and low computing capacity. Recently, the various kinds of application protocol has been studied to support IoT environments. In particular, CoAP protocol was developed as application protocol for IoT at the IETF core WG. However, because CoAP protocol is deigned to be used in constrained node, this protocol uses UDP at transport layer. Thus, data loss may occur frequently in network congestion environments. The proposed scheme, in this paper, is to overcome the problem of frequent data loss with low overhead. Also it includes the function which is to minimize the data loss in sleep mode of IoT device.

IoT service and Research for Field of medicine application (IoT 서비스와 의료분야 적용에 관한 연구)

  • Na, Chan-kook;Park, Yune-soo;Kim, Wooseond;Lee, Bok-gi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.453-456
    • /
    • 2016
  • Recently, IoT technologies attract much attenction in medical area. Previous medical IoT had focused mainly on chronological diseases or fitness for particular users. Contrarily, medical use of the IoT technologies is now extended for medical institutes and hospitals to care intensively in-house patients, which requires typically more strict and reliable data delivery and security, authentication and authorization. This study defines scenario of the medical IoT for the intensive care and proposes an architecture of the medical IoT services. We implement a testbed using commerical sensors and Arduino board together with a Web-based platform. Experiment results on the testbed show that our approach can be feasible for the medical system in terms of latency and accuracy in medical data delivery.

  • PDF

Analysis of Public Sector Sharing Rate based on the IoT Device Classification Methodology (사물인터넷(IoT) 기기 분류 체계 기반 공공분야 점유율 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2022
  • The Internet of Things (IoT) provides data convergence and sharing functions, and IoT technology is the most fundamental core technology in creating new services by convergence of various cutting-edge technologies. However, there are different classification systems for the Internet of Things, and when it is limited to the domestic public sector, it is difficult to properly grasp the current status of which devices are installed and operated with what share, and systematic data or research The results are very difficult to find. Therefore, in this study, the relevance of the classification system for IoT devices was analyzed according to reality based on sales, shipments, and growth rate, and based on this, the actual share of IoT devices among domestic public institutions was analyzed in detail. The derived detailed analysis results are expected to be efficiently utilized in the process of selecting IoT devices for research and analysis to advance information protection technology such as responding to malicious code attacks on IoT devices, analyzing incidents, and strengthening security vulnerabilities.