• Title/Summary/Keyword: IoT Framework

Search Result 184, Processing Time 0.028 seconds

A study on detection methodology of threat on cars from the viewpoint of IoT (IoT 관점에서의 차량 위협 탐지 방안)

  • Kwak, Byung Il;Han, Mi Ran;Kang, Ah Reum;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.411-421
    • /
    • 2015
  • These days, a conversion of the fast-advancing ICT (Information and Communications Technologies) and the IoT (Internet of Things) has been in progress. However, these conversion Technology could lead to many of the security threat existing in the ICT environment. The security threats of car in the IoT environment could cause the property damage and casualty. There are the inadequate preparations for the car security and the difficulty of detection for the security threats by itself. In this paper, we proposed the decision-making framework for the anomaly detection and found out what are the threats of car in the IoT environment. The discrimination of the factor, path and type of threats from the attack against the car should take priority over the self-inspection and the swift handling of the attack on control system.

A Study for Implementation of System for protecting Privacy data from IoT Things (IoT 장치의 개인정보 데이터 보호 시스템 구현에 관한 연구)

  • Kim, Seon Uk;Hong, Seong Eun;Bang, Jun Il;Kim, Hwa Jong
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.84-91
    • /
    • 2021
  • In the EU GDPR, when collecting personal information, the right of the information subject(user) to consent or refuse is given the highest priority. Therefore, the information subject must be able to withdraw consent and be forgotten and claim the right at any time. Especially, restricted IoT devices(Constrained Node) implement the function of consent of the data subject regarding the collection and processing of privacy data, and it is very difficult to post the utilization content of the collected information. In this paper, we designed and implemented a management system that allows data subjects to monitor data collected and processed from IoT devices, recognize information leakage problems, connect, and control devices. Taking into account the common information of the standard OCF(Open Connectivity Foundation) of IoT devices and AllJoyn, a device connection framework, 10 meta-data for information protection were defined, and this was named DPD (Data Protection Descriptor). we developed DPM (Data Protection Manager), a software that allows information subjects to manage information based on DPD.

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.

Drsign and Evaluation of a GQS-based Fog Pub/Sub System for Delay-Sensitive IoT Applications (지연 민감형 IoT 응용을 위한 GQS 기반 포그 Pub/Sub 시스템의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1369-1378
    • /
    • 2017
  • Pub/Sub (Publish/Subscribe) paradigm is a simple and easy to use model for interconnecting applications in a distributed environment. In general, subscribers register their interests in a topic or a pattern of events and then asynchronously receive events matching their interest, regardless of the events' publisher. In order to build a low latency lightweight pub/sub system for Internet of Things (IoT) services, we propose a GQSFPS (Group Quorum System-based Fog Pub/Sub) system that is a core component in the event-driven service oriented architecture framework for IoT services. The GQSFPS organizes multiple installed pub/sub brokers in the fog servers into a group quorum based P2P (peer-to-peer) topology for the efficient searching and the low latency accessing of events. Therefore, the events of IoT are cached on the basis of group quorum, and the delay-sensitive IoT applications of edge devices can effectively access the cached events from group quorum fog servers in low latency. The performance of the proposed GQSFPS is evaluated through an analytical model, and is compared to the GQPS (grid quorum-based pud/sub system).

Development of web-based collaborative framework for the simulation of embedded systems

  • Yang, Woong;Lee, Soo-Hong;Jin, Yong Zhu;Hwang, Hyun-Tae
    • Journal of Computational Design and Engineering
    • /
    • v.3 no.4
    • /
    • pp.363-369
    • /
    • 2016
  • Cyber Physical System (CPS) and Internet of Things (IoT) are hot objects of interest as an extension of the embedded system. These interactive products and systems contain Mobile Devices which are most popular and used most frequently. Also these have been widely used from the control of the Nuclear Power Control System (NPCS) to IoT Home Service. Information & Communication Technology (ICT) topics of trend fused-complex current Information Technology (IT) and Communication Technology (CT) are closely linked to real space and virtual space. This immediately means the arrival of the ultra-connected society. It refers to a society in which various objects surrounding the human innovation and change in the social sector are expected through the connection between the data which are to be generated. In addition, studies of Tool-kit for the design of such systems are also actively pursued. However, only increased cooperation and information sharing between the physical object consists of a variety of machinery and equipment. We have taken into consideration a number of design variables of the high barriers to entry about the product. In this study, It has been developed a Web-based collaboration framework which can be a flexible connection between macroscopically virtual environment and the physical environment. This framework is able to verifiy and manage physical environments. Also it can resolve the bottlenecks encountered during the base expansion and development process of IoT (Internet of Things) environment.

Design of Web-Based Simulation Framework for Real-Time Infographics (실시간 인포그래픽을 위한 웹 기반의 시뮬레이션 프레임워크 설계)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.411-416
    • /
    • 2015
  • The service size of an IoT environment is determined by the various types of sensors. A gateway for relaying sensor information from various sensors is a representative middleware system, and an infographics showing the information with a graphical presentation of data and information is a client system for representing real-time information efficiently, it is necessary a similar test bed with IoT environment to develop a real-time infographics displaying a large amount of information effectively. The testing tools used in developing the existing network systems are mostly made to be suitable for functional testing and performance testing of the driven unit. In this paper, we proposed a mean which is web-based simulation framework to create a variety of information required for real-time infographics development, and evaluate the function of the system proposed by the test function of the comparison with the previous network test tool.

Study of IoT Framework using NFV/SDN (NFV/SDN를 통한 IoT 프레임워크 연구)

  • Lim, Hwan-Hee;Kim, Se-Jun;Lee, Byung-Jun;Kim, Kyung-Tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.203-204
    • /
    • 2018
  • 소프트웨어 정의 네트워킹 (SDN)과 네트워크 기능 가상화는 최근들어 급부상 하고 있는 기술이며, Big Data 시대에 큰 잠재력을 가지고 있다. 네트워크 기능 가상화 (NFV)는 방화벽이나 스위치, 라우터와 같은 네트워크 장비를 가상화하는 개념이다. 가상화란 실제로 존재하지 않는 것을 실제로 존재하는 것처럼 하는 것을 의미한다. 가상화 기술을 사용하여 네트워크 노드 기능의 전체 클래스를 통신 서비스를 생성하기 위해 연결하는 네트워크 아키텍쳐 개념이다. 본 논문에서는 IoT 아키텍쳐 설계를 위해 NFV를 이용해 설계하며 SDN 기반 IoT 프레임 워크를 제안한다.

  • PDF

Analyses of Security and Privacy Challenges in Industrial Based on Internet of Things (사물 인터넷망에 기반한 산업 시설의 보안 요구 사항 해석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.598-599
    • /
    • 2016
  • Today, embedded, mobile, and cyber-physical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as "Industry 4.0" and Internet of Things (IoT), promise innovative business models and novel user experiences through strong connectivity and effective use of next generation of embedded devices. We survey an introduction to Industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems in this paper.

  • PDF

Analyses of RFID Security Framework and Protocol Supporting Internet of Things (사물 인터넷망을 위한 RFID 보안 프레임워크와 프로토콜 분석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.373-374
    • /
    • 2014
  • Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through radio waves. Connecting RFID reader to the terminal of Internet, the readers can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IoT). RFID is often seen as a prerequisite for the IoT. This paper introduces amd surveyed the technologies of RFID and IoT, discusses the applications and challenges of RFID technology used in IoT.

  • PDF

Blockchain-based authentication for IoT

  • Alaa Alsubhi;Jawaher Alhrthi;Wajdi Alhakami
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.198-204
    • /
    • 2024
  • Correspondence security between IoT devices is a significant concern, and the blockchain makes the latest difference by reducing this matter. In the blockchain idea, the larger part or even all organization hubs check the legitimacy and precision of traded information before tolerating and recording them, regardless of whether this information is identified with monetary exchanges or estimations of a sensor or a confirmation message. In assessing the legitimacy of a traded information, hubs should agree to play out an uncommon activity. The chance to enter and record exchanges and problematic cooperation with the framework is fundamentally decreased. To share and access the executives of IoT devices data with disseminated demeanour, another confirmation convention dependent on block-chain is proposed, and it is guaranteed that this convention fulfils client protection saving and security. This paper highlights the recent approaches conducted by other researchers to secure the Internet of Things environments using blockchain. These approaches are studied and compared with each other to present their features and disadvantages.