• Title/Summary/Keyword: IoT Function

Search Result 270, Processing Time 0.029 seconds

A Study On IoT Data Consistency in IoT Environment (사물인터넷 환경에서 IoT 데이터 정합성 연구)

  • Choi, Changwon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.127-132
    • /
    • 2022
  • As the IoT technology is more developed, it is more important for the accuracy of IoT data. Since the IoT data supports a different formats and protocols, it is often happened that the IoT system is failed or the incorrect data is generated with the unreliable IoT devices(sensor, actuator). Because the abnormality of IoT device or the user situation is not detected correctly, this problem makes the user to be unsatisfied with the IoT system. This study proposes the decision methodology of IoT data consistency whether the IoT data is generated in normal range or not by using the mathematical functions('gradient descent function' and 'linear regression function'). It may be concluded that the gradient function method is suitable for the IoT data which the 'increasing velocity' is related with the next generated pattern(eg. sensor devices), the linear regression function method is suitable for the IoT data which the 'the difference from linear regression function' is related with the next generated pattern in case the data has a linear pattern(eg. water meter, electric meter).

Continuous Integration for Efficient IoT-Cloud Service Realization by Employing Application Performance Monitoring (효율적인 IoT-Cloud 서비스 실증을 위한 응용 성능 모니터링을 활용한 지속적인 통합)

  • Bae, Jeongju;Kim, Chorwon;Kim, JongWon
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.85-96
    • /
    • 2017
  • IoT-Cloud service, integration of Internet of Things (IoT) and Cloud, is becoming a critical model for realizing creative and futuristic application services. Since IoT machines have little computing capacity, it is effective to attaching public Cloud resources for realizing IoT-Cloud service. Furthermore, utilizing containers and adopting a microservice architecture for developing IoT-Cloud service are useful for effective realization. The quality of microservice based IoT-Cloud service is affected by service function chaining which inter-connects each functions. For example, an issue with some of the functions or a bottleneck of inter-connection can degrade the service quality. To ensure functionality of the entire service, various test procedures considering various service environments are required to improve the service continuously. Hence in this paper, we introduce experimental realization of continuous integration based on DevOps and employ application performance monitoring for Node.js based IoT-Cloud service. Then we discuss its effectiveness.

Intrusion Detection for IoT Traffic in Edge Cloud (에지 클라우드 환경에서 사물인터넷 트래픽 침입 탐지)

  • Shin, Kwang-Seong;Youm, Sungkwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.1
    • /
    • pp.138-140
    • /
    • 2020
  • As the IoT is applied to home and industrial networks, data generated by the IoT is being processed at the cloud edge. Intrusion detection function is very important because it can be operated by invading IoT devices through the cloud edge. Data delivered to the edge network in the cloud environment is traffic at the application layer. In order to determine the intrusion of the packet transmitted to the IoT, the intrusion should be detected at the application layer. This paper proposes the intrusion detection function at the application layer excluding normal traffic from IoT intrusion detection function. As the proposed method, we obtained the intrusion detection result by decision tree method and explained the detection result for each feature.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

A Study on the Design of Test Item Framework for the Reliability of Frozen and Refrigerated Products with IoT Function (IoT 기능을 보유한 냉동·냉장 제품의 신뢰성 확보를 위한 시험항목 프레임워크 설계에 관한 연구)

  • Cho, Kyoung Rok;Lee, Jung Jae;Lee, Eun-Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.6
    • /
    • pp.211-222
    • /
    • 2021
  • Recently, frozen and refrigerated appliances on the market are being released with additional IoT functions, but there are few tests on IoT functions. In particular, the existing test system does not have IoT test items for IoT-based frozen and refrigerated appliances, making it difficult for companies to find the cause even if defects occur, and test institutions are also restricted from selecting IoT-related test items and conducting correct performance tests. In this paper, we design a test item framework that can identify product defects and identify causes in the performance test process of frozen and refrigerated products with IoT functions among products in the home appliance field, and propose test methods and management measures using them. Through the proposed research, manufacturers and testing institutions can test the correct performance of IoT-based frozen and refrigerated products, thereby enhancing the completeness and securing reliability of the products.

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

A Study of Matrix Model for Core Quality Measurement based on the Structure and Function Diagnosis of IoT Networks (구조 및 기능 진단을 토대로 한 IoT네트워크 핵심품질 매트릭스 모델 연구)

  • Noh, SiChoon;Kim, Jeom Goo
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.45-51
    • /
    • 2014
  • The most important point in the QoS management system to ensure the quality of the IoT system design goal is quality measurement system and the quality evaluation system. This research study is a matrix model for the IoT based on key quality measures by diagnosis system structure and function. Developing for the quality metrics measured Internet of Things environment will provide the foundation for the Internet of Things quality measurement/analysis. IoT matrix system for quality evaluation is a method to describe the functional requirements and the quality requirements in a single unified table for quality estimation performed. Comprehensive functional requirements and quality requirements by assessing the association can improve the reliability and usability evaluation. When applying the proposed method IoT quality can be improved while reducing the QoS signaling, the processing, the basis for more efficient quality assurances as a whole.

Implementation of crypto key-based IoT network security system (암호키 기반 IoT 네트워크 보안 시스템 구현)

  • Jeon, Ji-Soo;Kang, Dong-Yeon;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.349-350
    • /
    • 2022
  • As research on IT convergence continues, the scope of IoT (Internet of Things) services continues to expand. The IoT service uses a device suitable for the purpose. These IoT devices require an authentication function. In addition, in IoT services that handle important information such as personal information, security of transmission data is required. In this study, we implement a crypto key-based IoT network security system that can authenticate devices for IoT services and securely transmit data between devices. Through this study, IoT service can authenticate the device itself and maintain the confidentiality of transmitted data. However, since it is an IoT service, additional research on the application efficiency of the encryption algorithm is required.

  • PDF

Analysis of Security Vulnerabilities for IoT Devices

  • Kim, Hee-Hyun;Yoo, Jinho
    • Journal of Information Processing Systems
    • /
    • v.18 no.4
    • /
    • pp.489-499
    • /
    • 2022
  • Recently, the number of Internet of Things (IoT) devices has been increasing exponentially. These IoT devices are directly connected to the internet to exchange information. IoT devices are becoming smaller and lighter. However, security measures are not taken in a timely manner compared to the security vulnerabilities of IoT devices. This is often the case when the security patches cannot be applied to the device because the security patches are not adequately applied or there is no patch function. Thus, security vulnerabilities continue to exist, and security incidents continue to increase. In this study, we classified and analyzed the most common security vulnerabilities for IoT devices and identify the essential vulnerabilities of IoT devices that should be considered for security when producing IoT devices. This paper will contribute to reducing the occurrence of security vulnerabilities in companies that produce IoT devices. Additionally, companies can identify vulnerabilities that frequently occur in IoT devices and take preemptive measures.

Extract of evidence on the IoT Device (IoT 단말기에서 증거추출 포렌식 연구)

  • Song, Jin-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.343-345
    • /
    • 2017
  • With the development of IoT technology, terminals connected with IoT are being used. However, security incidents are occurring as IoT is applied to society as a whole. IoT security incidents can be linked to personal risk and social disruption. In this study, we extract the evidence of security breach in IoT device. Analyze IoT security breach environment and extract Hashing function to secure original integrity and integrity. Then, the Forensic evidence is extracted from the IoT security device to verify the integrity of the original and Forensic reports should be written and studied to be used as legal evidence.

  • PDF