• Title/Summary/Keyword: IoT Device

Search Result 801, Processing Time 0.025 seconds

A Virtual Object Hosting Technology for IoT Device Controlling on Wireless AP's (무선 인터넷 공유기에서 사물 인터넷 장치 제어를 위한 가상 오브젝트 호스팅 기술 연구)

  • Yang, Jinhong;Park, Hyojin;Kim, Yongrok;Choi, Jun Kyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.164-172
    • /
    • 2014
  • Recently, as the number of IoT (Internet of Things) devices for personal or home intelligence increases, the need for unified control and cooperative utilization is required. This paper presents a novel idea, proposes methods for virtualizing Internet of Things (IoT) devices and hosting them on the home AP instead of relying on a cloud service or purchasing a new device to do so. For this, the process and profile of the IoT gadgets need to be virtualized into JavaScript-based objects. Then, to execute and control the instances of the virtualized IoT objects on the wireless AP, a novel instance management method and their interfaces are designed. The implementation and performance section demonstrates the proposed system's stability and operability by showing the stress test results while the wireless AP is running for its wireless routing.

A Study on gateway authentication protocol in IoT (IoT에서 게이트웨이에 대한 인증 프로토콜에 관한 연구)

  • Lee, Jae-Young
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.91-96
    • /
    • 2017
  • IoT which is an abbreviation of Internet of Things refers to the communication network service among various objects such as people-people, objects-objects interconnection. The characteristic of IoT that enables direct connection among each device makes security to be considered as more emphasized factor. Though a security module such as an authentication protocol for resolving various security problems that may occur in the IoT environment has been developed, some weak points in security are still being revealed. Therefore, this paper proposes a method for including a protocol including gateway authentication procedure and mutual authentication between the devices and gateways. Protocols with additional authentication procedures can appropriately respond to attackers' spoofing attacks. In addition, important information in the message used for authentication process is protected by encryption or hash function so that it can respond to wiretapping attacks.

Analysis Standardized of IoT-based Low-power·Light-weight Protocol (IoT 기반 저전력·경량 프로토콜 표준화 분석)

  • Jang, Young-hwan;Shim, Jae-sung;Park, Seok-cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1895-1902
    • /
    • 2016
  • People and goods through the recent smart device, IoT to things and things are connected, it has emerged as the driving force of a new economic growth in the future. While conducting research of this international standardization organization in the IoT-based protocol, to the institutions and companies that belong to the standards bodies interests are different from each other, protocols have been developed also, different order, heterogeneous device interoperability has emerged is a problem that the lowering of. Therefore, in this paper, to investigate the structure of the MQTT and CoAP that are commonly used and trying to figure out the trend of low power consumption, a lightweight protocol that is suitable for IoT environment, process and standardization trends of evolution, features, analysis and on, to derive the advantages and disadvantages, and comparative analysis, it presented a development scheme for each protocol.

Development of IoT Device Management System Using Blockchain DPoS Consensus Algorithm (블록체인 DPoS 합의 알고리즘을 활용한 IoT 장치 관리 시스템 개발)

  • Kim, Mihui;Kim, Youngmin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.508-516
    • /
    • 2019
  • Smart home with various IoT devices provides convenient and efficient services. However, security is important because sensitive information such as private video and audio can be collected and processed, as well as shared over the Internet. To manage such smart home IoT devices, we use blockchain technology that provides data integrity and secure management. In this paper, we utilize a PoS(Proof of Stake) method that verifies the block through the accumulated stake in the network rather than the computation power, out of the PoW(Proof of Work) block chain, in which the computation for the existing verification must be continuously performed. Among them, we propose a blockchain based system with DPoS(Delegated Proof of Stake) method to actively solve the scalability part, for security that is suitable for smart home IoT environment. We implement the proposed system with DPoS based EOSIO to show realization, and we show performance improvement in terms of transaction processing speed.

Low-Power-Consumption Repetitive Wake-up Scheme for IoT Systems (사물인터넷 시스템을 위한 저전력 반복 깨우기 기법)

  • Kang, Kai;Kim, Jinchun;Eun, Seongbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1596-1602
    • /
    • 2021
  • Battery-operated IoT devices in IoT systems require low power consumption. In general, IoT devices enter a sleep state synchronously to reduce power consumption. A problem arises when an IoT device has to handle asynchronous user requests, as the duty cycle must be reduced to enhance response time. In this paper, we propose a new low-power-consumption scheme, called Repetitive Wake-up scheme for IoT systems of asynchronous environments such as indoor lights control. The proposed scheme can reduce power consumption by sending wake-up signals from the smartphone repetitively and by retaining the IoT device in sleep state to the smallest possible duty cycle. In the various environments with IoT devices at home or office space, we showed that the proposed scheme can reduce power consumption by up to five times compared to the existing synchronous interlocking technique.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

Blockchain-based Important Information Management Techniques for IoT Environment (IoT 환경을 위한 블록체인 기반의 중요 정보 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.30-36
    • /
    • 2024
  • Recently, the Internet of Things (IoT), which has been applied to various industrial fields, is constantly evolving in the process of automation and digitization. However, in the network where IoT devices are built, research on IoT critical information-related data sharing, personal information protection, and data integrity among intermediate nodes is still being actively studied. In this study, we propose a blockchain-based IoT critical information management technique that is easy to implement without burdening the intermediate node in the network environment where IoT is built. The proposed technique allocates a random value of a random size to the IoT critical information arriving at the intermediate node and manages it to become a decentralized P2P blockchain. In addition, the proposed technique makes it easier to manage IoT critical data by creating licenses such as time limit and device limitation according to the weight condition of IoT critical information. Performance evaluation and proposed techniques have improved delay time and processing time by 7.6% and 10.1% on average compared to existing techniques.

Application on Autonomous Things Monitoring System for IoT Platform of Smart City (스마트시티 IoT플랫폼 구축을 위한 자율사물 모니터링 시스템 적용성 평가)

  • Yoo, Chan Ho;Baek, Seung Cheol
    • Land and Housing Review
    • /
    • v.11 no.1
    • /
    • pp.103-108
    • /
    • 2020
  • Autonomous things system is a technology that judges and acts based on using surrounding information by itself, and it is evaluated as a future technology that can replace the current IoT technology. The current IoT technology is widely used from facility monitoring to machine control but it is shown weakness as a evaluation and prediction technique despite of smart city important technology. In this study, in order to confirm the application of the autonomous things technology, a monitoring system was installed on a real reservoir dam facility and long-term monitoring was performed that the measuring device itself judges and control as a facility monitoring technology. The autonomous things technology was confirmed during 19 months and it is possible to continuous measurement in the same way as current automated instrumentation. In addition, it was confirmed that the ICT device itself could to control autonomously measurement cycle according to the rainfall by itself.

A Study on the Leakage Current Detection System of Lighting Installation Using IoT Technology (IoT를 기반한 조명설비 누전사고 감지시스템에 관한 연구)

  • Park, Kun-Young;Kwak, Dong-Kurl;Lee, Bong-Seob;Kim, Choon-Sam;Jeon, Ho-Jin
    • Proceedings of the KIPE Conference
    • /
    • 2018.11a
    • /
    • pp.7-8
    • /
    • 2018
  • In this study, we develop a leakage current detection device of lighting installation. The reed switch using in proposed device is activated when the leakage current is generated. We also design a GUI system of a management computer using LabVIEW and administrator's mobile phone app based on IoT. As results, this study is to build an IoT convergence system and it aims to protect people and property by coping with leakage current fault in real time.

  • PDF

A Study on Improvement of Low-power Memory Architecture in IoT/edge Computing (IoT/에지 컴퓨팅에서 저전력 메모리 아키텍처의 개선 연구)

  • Cho, Doosan
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.1
    • /
    • pp.69-77
    • /
    • 2021
  • The widely used low-cost design methodology for IoT devices is very popular. In such a networked device, memory is composed of flash memory, SRAM, DRAM, etc., and because it processes a large amount of data, memory design is an important factor for system performance. Therefore, each device selects optimized design factors such as function, performance and cost according to market demand. The design of a memory architecture available for low-cost IoT devices is very limited with the configuration of SRAM, flash memory, and DRAM. In order to process as much data as possible in the same space, an architecture that supports parallel processing units is usually provided. Such parallel architecture is a design method that provides high performance at low cost. However, it needs precise software techniques for instruction and data mapping on the parallel architecture. This paper proposes an instruction/data mapping method to support optimized parallel processing performance. The proposed method optimizes system performance by actively using hardware and software parallelism.