• Title/Summary/Keyword: IoT Function

Search Result 271, Processing Time 0.026 seconds

Ensure intellectual property rights for 3D pringting 3D modeling design (딥러닝 인공지능을 활용한 사물인터넷 비즈니스 모델 설계)

  • Lee, Yong-keu;Park, Dae-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.351-354
    • /
    • 2016
  • The competition of Go between AlphaGo and Lee Sedol attracted global interest leading AlphaGo to victory. The core function of AlphaGo is deep-learning system, studying by computer itself. Afterwards, the utilization of deep-learning system using artificial intelligence is said to be verified. Recently, the government passed the loT Act and developing its business model to promote loT. This study is on analyzing IoT business environment using deep-learning AI and constructing specialized business models.

  • PDF

A Realtime Traffic Shaping Method for VPN Tunneling on Smart Gateway Supporting IoT (사물인터넷지원 스마트게이트웨이의 VPN 터널링 실시간 속도제어 방법)

  • Yang, Seungeui;Kang, Inshik;Goh, Byungoh;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1121-1126
    • /
    • 2017
  • Recently, the importance of smart gateways that link these with the big data and the development of the Internet of things is getting bigger. The smart gateway includes a network function such as a router and a router, and a sensor network function that links various objects such as a sensor. As the internet market has expanded, network stability and security problems have arisen and VPN technology has been proposed as one of the ways to solve these security problems. Efficient design is needed to implement VPN in low-end smart gateway and SOHO-level Internet environment with poor line quality. In this paper, we propose the concept and principle of VPN tunneling implementation and real - time traffic shaping method according to internet line condition in the Smart Gateway that supports IOT developed based on OpenWRT, the implementation and measured performance indicators are presented.

Development of Log-Based Testing Framework for Unit Testing of Embedded Software (임베디드 소프트웨어의 단위 테스팅을 위한 로그 기반 테스팅 프레임워크 개발)

  • Ryu, Hodong;Jeong, Sooyong;Lee, Woo Jin;Kim, Hwangsoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.419-424
    • /
    • 2015
  • As Internet of Things (IoT) is recently serviced in several fields, the reliability and safety issues for IoT embedded systems are emerged. During the development of embedded systems, it is not easy to build the virtual execution environment and to test the developing version. Therefore, it is difficult to ensure its reliability due to lack of unit testing. In this paper, we propose a log-based unit testing framework for embedded software, which performs on real target board by extracting information of function execution. And, according to execution paths, duplicated logs are eliminated to keep a minimal log size. As a result, during system testing, testers can efficiently decide whether the executed paths of each function are correctly performed or not.

Implementation of MACsec Adapter for Layer 2 Security (레이어 2 보안을 위한 MACsec 어댑터 구현)

  • Jeong, Nahk-Ju;Park, Byung-Don;Park, Han-Su;Seo, Jong-Kyoun;Han, Ki-Cheon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.972-978
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2, the international standard defined in the IEEE 802.1AE. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly, and is exposed to the risk of a variety of Internet attacks. Traditional network security technologies were often made in Layer 3, such as IPsec. However, to be increased as rapidly as the current traffic situation is complicated, and became interested in the security function of protecting the entire traffic instead of for a specific application or protocol. It appeared as these technologies is technology MACsec technology to protect all traffic in Layer 2. In this paper, we propose a Layer 2 security technology adapter MACsec MACsec a technology that allows you to simply and easily add them to the existing Layer 2 networks.

Maximizing the capacity of the IoT-based WSNs by employing the MIM capability (MIM 적용을 통한 IoT 기반 무선 센서 네트워크 성능 최대화 방안)

  • Kang, Young-myoung
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.9-15
    • /
    • 2020
  • Wireless sensor nodes adopting the advanced preamble detection function, Message-In-Mesage (MIM), maximize the concurrent transmission opportunities due to the capture effect, result in improving the system performance significantly compared to the legacy IEEE 802.15.4 based sensor devices. In this paper, we propose an MIM capture probability model to analyze the performance gains by applying the MIM function to the wireless sensor nodes. We implemented the IEEE 802.15.4 and MIM by Python and performed extensive simulations to verify the performance gains through MIM capture effects. The evaluation results show that the MIM sensors achieve 34% system throughput gains and 31% transmission delay gains over the legacy IEEE 802.15.4-based sensors, which confirm that it was consistent with the analysis result of the proposed MIM capture probability model.

Development of Smart Etiquette System based on BLE and App (BLE 기반 스마트 에티켓 시스템 및 App 개발)

  • Hong, Seong-Pyo;Cho, Young-Ju
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.803-810
    • /
    • 2017
  • Currently, every person possesses a smart phone due to the development of the IT industry. There is an improper situation in which a smart phone is not set in silent mode, such as a lecture room, a library, and a theatre hall. The proposed system automatically automates the function of smart phones where they are designated as a public place or etiquette area and automatically return the function of the smartphone if they deviate from the location of the site. It is also equipped with a combination of autonomous devices and services, based on Bluetooth communications, which are applied to ultra-light low-power IoT(Internet of Things) devices, and has features that allow diverse types of features and services to be added without requiring deformation of the hardware.

Smart Outlet System for Single-person Household based on IoT (Internet of Things) (사물 인터넷 기반의 1인 가구를 위한 스마트 콘센트 시스템)

  • Kim, Hye-Suk;Park, Byeong-Ju;Cho, Young-Ju
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.895-904
    • /
    • 2017
  • In this paper, we propose an IoT based smart outlet system for one-person household with electric safety, electric energy consumption management and transmission of messages to the reserved contacts by connecting the emergency network. The proposed smart outlet system is implemented by parsing packet data and protocol between server, module, application and WiFi AP receiver. The WiFi AP built for communication can be used not only for the outlet but also for the gas barrier, the door lock and the like. In addition, the proposed method can provide the remote monitoring function by receiving the amount of power of the receptacle received through the AC current sensor (SCT-013) in real time. The smart outlet system is expected to be capable of automatically shutting off the power in case of emergency through automatic power use analysis in addition to the standby power cutoff function.

An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN (SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선)

  • Oh, Jeong Min;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.29-43
    • /
    • 2019
  • In recent years, as the network traffic in the WSN(Wireless Sensor Network) has been increased by the growing number of IoT wireless devices, SDWSN(Software-Defined Wireless Sensor Network) and its security that aims a secure SDN(Software-Defined Networking) for efficiently managing network resources in WSN have received much attention. In this paper, we study on how to efficiently and securely design a PUF(Physical Unclonable Function)-assisted group key distribution scheme for the SDWSN environment. Recently, Huang et al. have designed a group key distribution scheme using the strengths of SDN and the physical security features of PUF. However, we observe that Huang et al.'s scheme has weak points that it does not only lack of authentication for the auxiliary controller but also it maintains the redundant synchronization information. In this paper, we securely design an authentication process of the auxiliary controller and improve the vulnerabilities of Huang et al.'s scheme by adding counter strings and random information but deleting the redundant synchronization information.

A Smart Closet Using Deep Learning and Image Recognition for the Blind (시각장애인을 위한 딥러닝과 이미지인식을 이용한 스마트 옷장)

  • Choi, So-Hee;Kim, Ju-Ha;Oh, Jae-Dong;Kong, Ki-Sok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.51-58
    • /
    • 2020
  • The blind people have difficulty living an independent clothing life. The furniture and home appliance are adding AI or IoT with the recent growth of the smart appliance market. To support the independent clothing life of the blind, this paper suggests a smart wardrobe with closet control function, voice recognition function and clothes information recognition using CNN algorithm. The number of layers of the model was changed and Maxpooling was adjusted to create the model to increase accuracy in the process of recognizing clothes. Early Stopping Callback option is applied to ensure learning accuracy when creating a model. We added Dropout to prevent overfitting. The final model created by this process can be found to have 80 percent accuracy in clothing recognition.

Development of Crop Management Technology through Implementation of Heterogeneous Integrated Sensor-type Smart Tag Function (이기종 통합 센서형 스마트 태그 기능 구현을 통한 농작물 관리 기술 개발)

  • Bong-Hyun Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.61-67
    • /
    • 2024
  • In order to monitor the growth environment of new varieties of crops, it is necessary to build the agricultural production infrastructure and strengthen the agricultural resource management system using popular smart sensor tag technology. In addition, the infrastructure for improving high-quality new varieties of crops using IoT technology and the monitoring system must be strengthened. In other words, widespread smart sensor (RFID UHF Sensor Tag) technology for environmental monitoring required for improving new crop varieties is desperately needed in the smart farm environment. Therefore, in this paper, we implemented an integrated sensor that can implement smart tag functions based on heterogeneous integrated sensors. In addition, we developed a technology that can manage crops in real time through the implemented smart integrated tag and smartphone linkage. For this purpose, an integrated antenna capable of RFID and Bluetooth communication was constructed. In addition, a communication method that allows information to be collected directly from the smartphone through the Bluetooth function was used.