• Title/Summary/Keyword: IoT Device

Search Result 798, Processing Time 0.025 seconds

Challenges and solutions for Internet of Things Driven by IPv6

  • Emad-ul-Haq, Qazi;Aboalsamh, Hatim;Belghith, Abdelfettah;Hussain, Muhammad;Abdul, Wadood;Dahshan, Mostafa H.;Ghouzali, Sanaa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4739-4758
    • /
    • 2015
  • The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devices to the Internet as well as offering new services. Internet of Things, which provides interconnected uniquely identifiable devices in the existing Internet infrastructure, will be greatly affected by the lack of unique IP addresses. In order to connect to the existing Internet infrastructure, every new device needs a uniquely identified IP address for communication. It has been estimated that by the year 2020 more than 30 billion devices would be connected to the Internet. In order to meet the challenge of such vast requirement of unique IP addresses, the devices in IoT will have to adopt IPv6, which is the latest version of Internet Protocol. IPv6 uses 128-bit IP addresses and offers 2128 unique IP addresses. Therefore, it expands IPv4 and provides new features of end to end connections as well as new services. In this paper, the various challenges with respect to providing connectivity, security, mobility, etc., have been discussed and how IPv6 helps in meeting those challenges.

Development of A Machine-to-Machine (M2M)-based Public Restroom Management System (사물지능통신(M2M)을 이용한 공중화장실 관리시스템의 개발)

  • Kim, Jun Yeob;Ahn, Dae Gun;Bae, Byoung Wook;Choi, Yong Gu;Kang, Chang Soon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1473-1483
    • /
    • 2014
  • A public restroom is different from a household toilet in terms of location and a large number of sharing users. In addition, public restroom is usually messy and filthy. Recently, public toilet tends to be clearly managed than before, but it still has hygienic and clear problems. In this paper, we propose a machine-to-machine (M2M)-based public restroom management system to solve these problems, in which the system with a wireless communication device sends the status information of the toilet, such as blockage or trouble detected by a sensor, to the manager of the restroom at a remote location. In particular, we have developed a prototype management system for public restroom taking into account several system requirements, and verified the basic operations and performance of the management system. With the application of the system to public facilities, it will furnish users with more pleasant environments by restroom administrators who can respond effectively to the troubled toilet.

Performance Evaluation of Motorcycle's Anti-theft Device using NFC Authentication and Solenoid Valve (NFC 보안인증과 솔레노이드 밸브를 이용한 이륜차 이동제한장치 성능평가)

  • Moon, Boram;Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.82-86
    • /
    • 2016
  • This paper proposes a method for the immobilization of motorbike brakes in conjunction with near-field communication (NFC) technology in order to meet the increasing demand for security and convenience of motorbike drivers. We thought about the concept of wireless key, NFC security devices and automatic solenoid valve for setting the lock and unlock module. This paper propose the design and development of an innovative anti-theft alarm system for motorcycles using NFC smart devices based on RFID system, the basis of IoT and AES(advanced encryption standard) encryption Algorithm. The design concept is based on NFC communication strategy between the vehicle and owner. To do this concept, we designed motorcycle smart key system with general-purpose NFC system and the automatic solenoid valve for setting the lock and unlock module. First, we designed control unit and NFC card reader for motorcycle smart key system. Then we propose an AES encryption algorithm and prove that the motorcycle key system is controllable by showing the result of implementing and testing, after installing.

Implementation of Visible Light Communication Transceiver of Mobile Devices for Location-Based Services (위치기반서비스 제공을 위한 휴대기기용 가시광통신 송수신기 구현)

  • Park, Sangil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.889-891
    • /
    • 2017
  • Visible light communication technology, which is a communication using LED lighting, is defined by IEEE 802.15.7 WG and active research is under way. Visible light communication is advantageous not only to avoid interference with existing RF communication but also to provide location based service through accurate positioning by utilizing LOS (Line of Sight) characteristic. Therefore, it is very easy and efficient to locate and track the user's location. In this paper, we implemented a visible light communication transceiver using USB interface for easy application to portable devices. It supports the mobility of mobile devices through internet protocol and showed BER performance of less than $10^{-3}dBm$ at over 1m, which is the height of lighting and smart device during walking.

Improvement of Smart Surveillance Service using Service Priority (서비스 우선순위를 이용한 스마트 관제 서비스의 개선)

  • Seong, Dong-Su
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.1003-1010
    • /
    • 2018
  • When an applicant requests the emergency situation call or safe return service using a smart device, the smart surveillance service can select the CCTV(closed circuit television) cameras around the applicant using applicant's location information, then automatically takes a photograph to track the applicant. Since the surrounding CCTV camera shoots the applicant continuously using location information and the applicant can be observed by the monitor agent in real time, this service can be very helpful in an applicant's emergency situation or safe return. The existing smart surveillance service does not consider the priority of the emergency situation call and safe return service. Therefore, there is the disadvantage that the applicant who requests an emergency situation call service can not be photographed when safe return service has already preoccupied CCTV cameras which are capable of taking a picture of the applicant. The proposed smart surveillance service improves this disadvantage by using service priority.

Mobility Management for ILNP-based Tactical Network (전술 네트워크를 위한 ILNP 기반 환경에서의 이동성 관리 기술)

  • Sun, Kyoungjae;Kim, Younghan;Noh, Hongjun;Park, Hyungwon;Han, Myounghun;Kwon, Daehoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.246-256
    • /
    • 2020
  • In the future Network Centric Warfare(NCW), changing to IPv6 based network environment is required to enable various future technologies such as the Internet of Things(IoT) and cloud technology which are expected to be introduced to the tactical network evolution. With the change to the IPv6 network, an ID/LOC(Identifier/Location) separation protocol that decomposes context of the IP address to location and identifier can enhance network capacity of increasing number of device and provide efficient mobility management in the tactical network that changes topology dynamically. In this paper, we choose ILNP(Identifier-Locator Network Protocol) as an ID/LOC separation for tactical network environment. In addition to ILNP-based tactical network design, this paper proposes a network-based mobility management scheme for providing efficient mobility management. Through numerical performance analysis, we show that the proposed scheme can reduce network loads more effectively than the conventional IP-based mobility management scheme and common handover procedure in ILNP.

A Study on the Multi-Laser Image Tracking Method using the Latest Approach Angle (최근접 각도를 이용한 복수 레이저 영상 추적 방법 연구)

  • Jo, Jin-Pyo;Ko, Ho-Jeong;Kim, Jeong-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.37-43
    • /
    • 2020
  • The paper proposed the method of calculating the latest approach angle that can reliably recognize multiple laser images even with the change in separation distance between screen and laser launch device. This method recognizes the angle of the laser pattern angle by using the distance of the laser pattern angle, and the angle extraction of the laser detects the laser image from the acquired image using the labeling algorithm, and performs the huff conversion to extract the angle of the straight line. The distance of the reference angle and angle of the laser image extracted using Euclidean distance among similarity scales is calculated, and the furnace is recognized using the calculated distance result value. Experiments with changing the separation distance to "200 cm to 400 cm" showed 100% recognition of individual strands at all separation distances. The experiment confirmed the reliability of the proposed method.

Study on IoT Controller for Smart Home Service (스마트홈 서비스를 위한 사물인터넷 컨트롤러에 관한 연구)

  • Kwon, Dong-hyun;Lim, Ji-yong;Heo, Sung-uk;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.590-591
    • /
    • 2017
  • In the existing smart home, a separate platform was set up for each manufacturer to provide services through terminals. However, due to the development of Internet technology, various Internet devices and services have been launched, and there is a limit to the existing closed platforms for each manufacturer. Therefore, in this paper, we propose an object internet controller that integrates control of Internet devices in a smart home environment and provides various services through IFTTT. The proposed Internet controller is connected to the server via WiFi, and can control the Internet device and service of objects through the button input event. In addition, we expect to be able to provide a service environment that can create various smart home services by registering DIY products through open platform of oneM2M standard method.

  • PDF

Accelerated Large-Scale Simulation on DEVS based Hybrid System using Collaborative Computation on Multi-Cores and GPUs (멀티 코어와 GPU 결합 구조를 이용한 DEVS 기반 대규모 하이브리드 시스템 모델링 시뮬레이션의 가속화)

  • Kim, Seongseop;Cho, Jeonghun;Park, Daejin
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.1-11
    • /
    • 2018
  • Discrete event system specification (DEVS) has been used in many simulations including hybrid systems featuring both discrete and continuous behavior that require a lot of time to get results. Therefore, in this study, we proposed the acceleration of a DEVS-based hybrid system simulation using multi-cores and GPUs tightly coupled computing. We analyzed the proposed heterogeneous computing of the simulation in terms of the configuration of the target device, changing simulation parameters, and power consumption for efficient simulation. The result revealed that the proposed architecture offers an advantage for high-performance simulation in terms of execution time, although more power consumption is required. With these results, we discovered that our approach is applicable in hybrid system simulation, and we demonstrated the possibility of optimized hardware distribution in terms of power consumption versus execution time via experiments in the proposed architecture.

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.