• Title/Summary/Keyword: IoT Information

Search Result 3,039, Processing Time 0.035 seconds

Implementation of Smart Information Services on Air Pollution based on IoT (IoT 기반 대기 오염 관련 스마트 생활 정보 서비스 구현)

  • Koh, Ga-Young;Chang, Byeong-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.9-17
    • /
    • 2019
  • The Internet of Things (IoT) is a technology that connects to the Internet with built-in sensors and communication functions on various objects and has been used in various fields such as smart home and smart factory. Recently, as interest in air pollution information such as fine dust is increasing, the apps for providing weather information and air pollution information based on IoT technology are being developed. In this study, we aims to provide visual air pollution and weather information and develop useful services such as appliance automation using this information. for this study, we designed and implemented Smart Services that provide home automation, messaging and alarm, visual air pollution and weather information using air pollution and weather information based on IoT.

FOTA System Configuration for IoT Firmware Security (IoT 펌웨어 보안을 위한 FOTA 시스템 구성)

  • Jisu-Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.196-199
    • /
    • 2023
  • 다양한 산업과 환경에서 IoT 기술이 사용되는 만큼 보안에 대한 위협도 증가하고 있다. IoT 서비스를 제공하는 디바이스와 시스템이 보안 공격을 당해 중단되는 경우 그에 따른 피해가 막대하기 때문에 IoT 의 보안 중요성은 날로 커지고 있다. IoT 디바이스 보안을 강화하기 위한 방법으로 FOTA 시스템를 통한 펌웨어 업데이트를 하는 것이 필요하다. 본 고에서는 IoT 디바이스 펌웨어 업데이트를 위해 필요한 FOTA 시스템에 대한 아키텍처와 구성 등을 제언한다.

A Method for Dynamic Clustering-based Efficient Management in Large-Scale IoT Environment (대규모 IoT 컴퓨팅 환경에서 동적 클러스터링 기반 효율적 관리 기법)

  • Kim, Dae Young;La, Hyun Jung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.85-97
    • /
    • 2014
  • IoT devices that collect information for end users and provide various services like giving traffic or weather information to them that are located everywhere aim to raise quality of life. Currently, the number of devices has dramatically increased so that there are many companies and laboratories for developing various IoT devices in the world. However, research about IoT computing such as connecting IoT devices or management is at an early stage. A server node that manages lots of IoT device in IoT computing environment is certainly needed. But, it is difficult to manage lots of devices efficiently. However, anyone cannot surly know about how many servers are needed or where they are located in the environment. In this paper, we suggest a method that is a way to dynamic clustering IoT computing environment by logical distance among devices. With our proposed method, we can ensure to manage the quality in large-scale IoT environment efficiently.

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.

사물인터넷을 위한 DNS 네이밍 서비스 기술동향

  • Lee, Geun-Tae;Jeong, Jae-Hun
    • Information and Communications Magazine
    • /
    • v.33 no.12
    • /
    • pp.3-11
    • /
    • 2016
  • 본고에서는 최근 가장 주목 받고 있는 연구 분야 중 하나인 사물인터넷(Internet of Things, IoT)을 위한 Domain Name System(DNS) 네이밍 서비스 기술동향에 대해 소개한다. IoT 환경에서 IoT 디바이스를 관리하기 위해 DNS 네임을 일일이 수동적으로 설정하는 것은 비효율적이다. 따라서 본고에서는 IoT 환경에서 수많은 IoT 디바이스의 관리를 위한 IoT 디바이스의 DNS 네임 자동설정 및 네이밍 서비스 기술에 대해 소개하고 분석한다. 본고에서 소개하는 IoT 네이밍 서비스 기술은 Internet Engineering Task Force(IETF)에서 제정된 표준 프로토콜을 이용하므로 구현이 용이하고 성능적인 면에서도 우수하다. IoT 디바이스의 DNS 네임이 사용자들에게 가독성 있으면서도 기계적으로 파싱이 용이하면 IoT 디바이스 관리를 효과적으로 수행할 수 있다. 즉 설정된 IoT 디바이스 DNS 네임으로 인터넷 사용자가 스마트폰과 태블릿과 같은 모바일 스마트 디바이스로 IoT 디바이스를 원격에서 모니터링 및 원격제어 할 수 있다. 본고에서는 IoT 디바이스에 연관된 네이밍 서비스 기술들을 비교 분석하고, 본 저자가 제안하는 IoT 디바이스 DNS 네이밍 기술을 소개하고자 한다.

Scheme for Constructing Infra-less based IoT Network (Infra-less 기반 IoT 네트워크 구성 기법)

  • Youn, JooSang;Hong, Yong-Geun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.227-229
    • /
    • 2015
  • 본 논문에서는 IETF 표준화 단체에서 고려되고 있는 저전력 손실 네트워크 환경으로 구성되는 로컬 Infra IoT 네트워크에서 로컬 Infra-less IoT 서비스를 제공하기 위한 네트워크 구성 방법을 제안한다. 우선, Infra IoT 네트워크를 분석하고 이 네트워크에서 Infra-less IoT 서비스 지원에 대한 문제점을 기술한다. 이후 로컬 Infra-less IoT 네트워크 모델을 정의하고 정의된 네트워크 모델에 필요한 네트워킹 요구 사항 및 네트워크 구성 방법을 제안한다.

  • PDF

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment (IoT환경에서 무아레 현상을 이용한 사용자 얼굴 인증 기법)

  • Cho, Ik-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.171-176
    • /
    • 2019
  • In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply $moir{\acute{e}}$ technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow $moir{\acute{e}}$ as a $moir{\acute{e}}$ phenomenon method, and the projection $moir{\acute{e}}$. When comparing the existing IoT products and IoT products applied with $moir{\acute{e}}$ technology, IoT products applied with $moir{\acute{e}}$ technology are safer in terms of security.

Multi-blockchain model ensures scalability and reliability based on intelligent Internet of Things (지능형 사물인터넷 기반의 확장성과 신뢰성을 보장하는 다중 블록체인 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.140-146
    • /
    • 2021
  • As the environment using intelligent IoT devices increases, various studies are underway to ensure the integrity of information sent and received from intelligent IoT devices. However, all IoT information generated in heterogeneous environments is not fully provided with reliable protocols and services. In this paper, we propose an intelligent-based multi-blockchain model that can extract only critical information among various information processed by intelligent IoT devices. In the proposed model, blockchain is used to ensure the integrity of IoT information sent and received from IoT devices. The proposed model uses the correlation index of the collected information to trust a large number of IoT information to extract only the information with a high correlation index and bind it with blockchain. This is because the collected information can be extended to the n-tier structure as well as guaranteed reliability. Furthermore, since the proposed model can give weight information to the collection information based on blockchain, similar information can be selected (or bound) according to priority. The proposed model is able to extend the collection information to the n-layer structure while maintaining the data processing cost processed in real time regardless of the number of IoT devices.

Lightweight IPsec protocol for IoT communication environments (IoT 통신 환경을 위한 경량 IPsec 프로토콜 연구)

  • Song, In-A;Oh, Jeong-Hyeon;Lee, Doo-Won;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.121-128
    • /
    • 2018
  • Internet of Things architecture connected to the Internet is a technology. However, Many paper research for the lightweight Protocol of IoT Environment. In these Paper excluded secure problem about protocol. So Light weight Protocol has weakness of secure in IoT environment. All of IoT devices need encryption algorithm and authentication message code for certain level of security. However, IoT environment is difficult to using existing security technology. For this reason, Studies for Lightweight IPsec is essential in IoT environment. For Study of Lightweight IPsec, We analyze existing protocols such as IPsec, 6LoWPAN for IEEE 802.15.4 layer and Lightweight IPsec based 6LoWPAN. The result is to be obtained for the lightweight IPsec protocols for IoT environment. This protocol can compatible with Internet network.

The Way of IoT Management Hub Connection for Convenient IoT Service (편리한 사물인터넷 서비스를 위한 IoT 관리 허브 연결 방법)

  • Kim, Sang-hyun;Kim, Young-don;Lee, Chang-seok;Lee, Dong-ho;Park, Hyun-ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2656-2664
    • /
    • 2015
  • IoT management hub has to request the WLAN AP list of the accessible areas in a place that is installed, or choose a specific WLAN AP you want to connect in order to be connected to the Internet. the specific method also is required to input the password when the security key was set. As that way, IoT management hub needs both the display device and the input device to see the list of WLAN AP and to input the security key. If the IoT management hub is consist of them, It is difficult to achieve the objective of the miniaturization and cost reduction. In this paper, we propose a method to connect to a WLAN AP network using a smart-phone without the display device and the input device.