• Title/Summary/Keyword: IoT Information

Search Result 3,035, Processing Time 0.033 seconds

Domestic Game Development based on IoT Applications (국내 게임 개발 기반의 IoT 응용)

  • Han, Sang-geun;Song, Seung-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.453-454
    • /
    • 2015
  • IoT is field that to create a globally huge added value is expected. In the game field, a game have appeared utilizing a variety of platforms based on the IoT. This paper aims to research on developed in IoT based platform, and to understand the feature of the released games in domestic. After many literature related to IoT reviewed, we understanded feature how the case studies that have been applications in IoT based games. In this study, become the guideline of game research of IoT-based platform, expect to present the direction of the IoT based game development.

  • PDF

Extract of evidence on the IoT Device (IoT 단말기에서 증거추출 포렌식 연구)

  • Song, Jin-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.343-345
    • /
    • 2017
  • With the development of IoT technology, terminals connected with IoT are being used. However, security incidents are occurring as IoT is applied to society as a whole. IoT security incidents can be linked to personal risk and social disruption. In this study, we extract the evidence of security breach in IoT device. Analyze IoT security breach environment and extract Hashing function to secure original integrity and integrity. Then, the Forensic evidence is extracted from the IoT security device to verify the integrity of the original and Forensic reports should be written and studied to be used as legal evidence.

  • PDF

An Analysis of Research Trends in IoT Privacy (IoT 기기의 개인정보보호에 대한 국내외 연구 동향 분석)

  • Seo, Jeong-Eun;Oh, Jun-Hyoung;Lee, Kyung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.268-271
    • /
    • 2018
  • 199년 MIT에 근무하던 캐빈 애시톤(Kevin Ashton)이 처음 언급했던 Internet of Things(이하 IoT)라는 말은 20년도 채 지나지 않은 2018년 현재, 대부분의 소비재 시장에 접목하여 사용하는 기술 중 하나가 되었다. IoT 기술의 발전과 함께 IoT 보안 시장이 성장하고 있고, IoT 보안관련 연구 또한 증가하는 추세이다. 그러나 국내외를 막론하고 개인정보 유출 사건으로 인해 개인정보보호에 대한 인식과 필요성이 커졌음에도 불구하고, IoT 기기의 개인정보보호에 대한 연구는 미흡한 상황이다. 이에 본 논문은 현재까지 게재된 논문들을 바탕으로 국내외 IoT 기기의 개인정보에 관한 연구 동향을 분석한다.

A Situation Information Model based on Ontology in IoT Environment (IoT 환경에서 온톨로지 기반의 상황정보 모델)

  • Kim, Eunhoe;Suh, Yuhwa
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.5
    • /
    • pp.380-388
    • /
    • 2017
  • The services of the IoT environment should constantly collect situation information, and perform appropriate actions according to the situation. Therefore, there is a need for a method that can express collected situation information. In this paper, we propose a situation information model based on ontology for IoT environment. Since the proposed model is ontology based, it supports semantic interoperability. We also build an upper-level ontology to model common situation information of various IoT domains. It is easy to understand and use because it expresses situation information consistently by expressing person, environment, and thing constituting IoT environment as class and defining properties indicating the situation. In addition, since the situation information need to reflect dynamic situation, it has a feature to model the creation time and the life time of the situation information so as to judge the validity of the information. The proposed ontology model is described using OWL, and the service can be described based on the constructed ontology.

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

A Study of Security Threats and Countermeasures in loT Environment (IoT 환경에서 보안위협과 대응방안에 관한 연구)

  • Jung, Hyun-Joo;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.537-539
    • /
    • 2014
  • IoT (Internet of Things), 사물 인터넷은 인터넷을 기반으로 네트워크로 연결해 다양한 분야에서 사람과 사물, 사물과 사물 간의 정보를 공유하는 지능형 기술 및 서비스로 각 분석기관마다 2014년 10대 기술 중 하나로 꼽고 있다. 각국과 다수의 업체들이 사물인터넷 시장에 적극적으로 참여중이고, 관련 시장 규모도 급성장 할 것으로 전망하고 있다. 하지만 IoT의 빠른 발전과 함께 나타나는 것은 '보안'이라는 해결 과제이다. 실제로 IoT 사용에 따른 보안 위협이 발생하고 있다는 보고가 적지 않게 나오고 있고, IoT 환경의 보안은 아직 시작단계에 불과하다. IoT에서 발생하는 보안 위협의 형태의 대부분은 데이터 전송 그 자체에서 발생할 것이고, 데이터 전송에서 취약한 암호화나 인가되지 않은 주체로부터 접근, 보안이 취약한 네트워크 등에서 많은 보안 문제가 발생할 것이다. 본 논문에서는 IoT 기술의 개요와 IoT 환경에서의 보안위협에 대해 살펴보고 향후 연구의 방향을 제시하고자 한다.

A Study on the integrated management system for tourism complexes based on IoT technology (IoT 기술을 기반으로 한 관광단지 통합관리시스템에 관한 연구)

  • An, Tai-Gi
    • Journal of Industrial Convergence
    • /
    • v.17 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • The purpose of this study is to analyze the actual condition of tourism complex and to apply IoT-based integrated management system to tourism complex to improve the utilization and management of tourism complex. Tourists need various information to take the lead in tourism activities, and all of these necessary information is collected through various routes such as information of the Internet, travel agencies, newspapers, and surrounding experiences. Recently, information provision through the Internet has taken a large part due to the development of information technology, and systems that combine IoT technology are being constructed. This is because the popularization of IoT technology improves the diversity, accessibility and convenience of information and makes it convenient to use. The purpose of this study is to suggest the importance of tourism information service using IoT-based system and future research directions. The previous studies on IoT-based system construction were also reviewed considering the efficiency of IoT technology. In order to solve the problems of tourism complex, this study improved the IoT-based tourism complex operation system and conducted operation management. IoT-based management system is expected to be improved as a tourism complex platform and is expected to be improved by overall management cases and experiences.

Hash-chain-based IoT authentication scheme suitable for small and medium enterprises (중소기업 환경에 적합한 해쉬 체인 기반의 IoT 인증 기법)

  • Jeong, Yoon-Su;Yon, Yong-Ho;Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.105-111
    • /
    • 2017
  • With the emergence of the fourth industrial revolution, more and more attempts have been made to apply IoT technology to the manufacturing process and launch the product. In this paper, we propose IoT authentication scheme based on hash chain which can easily apply IoT device to small and medium enterprises in Korea. In the proposed method, the companies that installed IoT devices suitable for the manufacturing environment are selected to maintain the linkage between IoT devices so that product information and release information can be efficiently collected and managed during the entire manufacturing process. In addition, the proposed scheme is characterized in that it does not require an additional encryption / decryption algorithm because the authentication information of the IoT device is constructed based on a hash chain. As a result of the performance evaluation, the efficiency of the manufacturing process was improved by 18.5% and the processing of the manufacturing process with the IoT device was shortened by 20.1% on the average according to the application of the IoT device. In addition, the labor cost reduction costs in the manufacturing process decreased by an average of 30.7%.

Secure Multicast using Proxy Re-Encryption in an IoT Environment

  • Kim, SuHyun;Hwang, YongWoon;Seo, JungTaek
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.946-959
    • /
    • 2018
  • Recently interest in Internet of Things(IoT) has attracted significant attention at national level. IoT can create new services as a technology to exchange data through connections among a huge number of objects around the user. Data communication between objects provides not only information collected in the surrounding environment but also various personalized information. IoT services which provide these various types of data are exposed to numerous security vulnerabilities. If data is maliciously collected and used by an attacker in an IoT environment that deals with various data, security threats are greater than those in existing network environments. Therefore, security of all data exchanged in the IoT environment is essential. However, lightweight terminal devices used in the IoT environment are not suitable for applying the existing encryption algorithm. In addition, IoT networks consisting of many sensors require group communication. Therefore, this paper proposes a secure multicast scheme using the proxy re-encryption method based on Vehicular ad-hoc networks(VANET) environment. The proposed method is suitable for a large-scale dynamic IoT network environment using unreliable servers.

A Real Time Location Based IoT Messaging System using MQTT (MQTT 활용 실시간 위치 기반 IoT 메시징 시스템)

  • Jung, In-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.27-36
    • /
    • 2018
  • In this paper, we design and implement a real time IoT messaging system that can collect location information of moving vehicles and pedestrians in real time using MQTT protocol and provides location based information service in administrative area. We implemented MQTT based IoT device for vehicle location information collection and communication and MQTT based smartphone application for pedestrian location information service. IoT clients can send messages to the server in administrative units by using the MQTT Topic which is equal to administrative names. The SLIMS (Seoul Location based IoT Messaging System) implemented in this study is able to analyze the real time traffic volume of pedestrians and vehicles by tracking clients. It also can deliver messages to clients based on coordinate range. SLIMS can be used as a real-time location-based information service for large-scale IoT devices such as real-time flow population and vehicle traffic analysis and location-based message delivery.