• Title/Summary/Keyword: IoT Key management

Search Result 89, Processing Time 0.029 seconds

Database Design for IoT-based Greenhouse Systems

  • Kang, Chunghan;Yu, Seulgi;Moon, Junghoon
    • Agribusiness and Information Management
    • /
    • v.7 no.2
    • /
    • pp.12-18
    • /
    • 2015
  • Since 2000s, proper utilization of IoT (Internet of Things) technology is a key factor for a firm to become more competitive, and this stream is not exceptional for the food and agriculture industry. Along with this stream, Korea government organization, for example MAFRA (Ministry of Agriculture, Food and Rural Affairs), elected to adopt IoT technology, such as USN and RFID technologies, in the food and agriculture industry. Based on the IoT technology, MAFARA launched six "IoT based farm" project in 2007. IoT based farm project includes IoT based greenhouse system project, and it shows drastic efficiency in terms of cost reduction. When it comes to the productivity, however, the effect of IoT based greenhouse system is still ambiguous. In this regard, this study conducted systems analysis and design for IoT based tomato greenhouse in order to help farmers' decision making related to the productivity by establishing standardized database structure and designing output form to analyze productivity indices. Proposed systems analysis and design can be utilized as a data analysis tools by farmers. Productivity data from the proposed systems is can be used by researchers to identify the relationship among environment, plant growth and productivity. Policy makers also can refer to the data and output forms to predict the quantity of fruit during certain period and to revise production guideline more precisely.

Users' Privacy Concerns in the Internet of Things (IoT): The Case of Activity Trackers (사물인터넷 환경에서 사용자 프라이버시 우려에 관한 연구: 운동추적기 사례를 중심으로)

  • Bae, Jinseok;Jung, Yoonhyuk;Cho, Wooje
    • Knowledge Management Research
    • /
    • v.16 no.3
    • /
    • pp.23-40
    • /
    • 2015
  • Despite much interest and investment in the Internet of Things (IoT) which expand the Internet to a ubiquitous network including objects in the physical world, there is growing concerns of privacy protections. Because the risk of privacy invasion is higher in IoT environments than ever before, privacy need to be a key issue in the diffusion of IoT. Considering that the privacy concern is a critical barrier for user to adopt information technologies, it is important to investigate users' privacy concerns related to IoT applications. From the triad perspective (i.e., risk on technology, risk on service provider, and trust on legislation), this study aims to examine users' privacy concerns in the context of activity trackers.

Spectrum Policy and Technologies for Promoting IoT Services (IoT 서비스 활성화를 위한 스펙트럼 정책 및 기술)

  • Kim, Young-Soo;Park, Duk-Kyu;Song, Kyeong-Min
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.7
    • /
    • pp.528-539
    • /
    • 2017
  • Since IoT is expected to enable hyper-connected society to be realized with the advent of the $4^{th}$ Industrial Revolution, many advanced foreign countries as well as United Kingdom identified IoT spectrum policy as one of the first priority in spectrum management in order to cope with the frequency demands required for the promotion of IoT service. In Korea, the frequencies of 110 MHz bandwidth has been also supplied additionaly for IoT in July 2016 in order to activate a promising new IoT industry based on wireless communication, which has great potential for future industrial growth. Therefore, in this paper, we propose spectrum policy and the research and innovation trends on IoT to promote IoT industry by analyzing the major communication network, the key challenge technologies and the spectrum policy framework of foreign countries.

A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment (IoT 환경에서 속성기반 암호화 기술을 활용한 메시지 통신 기법에 관한 연구)

  • Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.295-302
    • /
    • 2016
  • Many countries, especially ICT powers, are supporting IoT-based technology at a national level and this technology is actively being researched in the businesses and research institutes in an aim to develop technology and create an ecosystem. Roads in the Seoul city are building public facilities based on IoT to provide various services and conveniences for the users. However, for the full-fledged introduction and development of IoT, there are many cases where infringement on security and privacy and threat for life and safety happen. Also, as the IoT environment includes various environment technologies such as the existing sensor network, heterogeneous communication network, and devices optimized for the IoT environment, it inherits the existing security threat and various attack techniques. This paper researches the attribute based encryption technology for safe communication in the IoT environment. The data collected from the device is transmitted utilizing the attribute based encryption and by designing the key generation protocol, grades and authorities for the device and users are identified to transmit safe messages.

Analyses of Trend of Threat of Security in Internet of Things (사물 인터넷망에서의 보안 위협 기술 동향 분석)

  • Shin, Yoon-gu;Jung, Sungha;Do, Tahoon;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

A Review on Preserving Data Confidentiality in Blockchain-based IoT-Supply Chain Systems

  • Omimah Alsaedi;Omar Batarfi;Mohammed Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.110-116
    • /
    • 2023
  • Data confidentiality refers to the characteristic that information kept undisclosed or hidden from unauthorized parties. It considered a key security requirement in current supply chain management (SCM) systems. Currently, academia and industry tend to adopt blockchain and IoT technologies in order to develop efficient and secure SCM systems. However, providing confidential data sharing among these technologies is quite challenging due to the limitations associated with blockchain and IoT devices. This review paper illustrates the importance of preserving data confidentiality in SCM systems by highlighting the state of the art on confidentiality-preserving methodologies in the context of blockchain based IoT-SCM systems and the challenges associated with it.

A Study on AES-based Mutual Authentication Protocol for IoT Devices (사물인터넷 디바이스를 위한 AES 기반 상호인증 프로토콜)

  • Oh, Se-Jin;Lee, Seung-Woo
    • Journal of Industrial Convergence
    • /
    • v.18 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • The Internet of things (IoT) is the extension of Internet connectivity into various devices and everyday objects. Embedded with electronics, Internet connectivity and other forms of hardware. The IoT poses significant risk to the entire digital ecosystem. This is because so many of these devices are designed without a built-in security system to keep them from being hijacked by hackers. This paper proposed a mutual authentication protocol for IoT Devices using symmetric-key algorithm. The proposed protocol use symmetric key cryptographic algorithm to securely encrypt data on radio channel. In addition, the secret key used for encryption is random number of devices that improves security by using variable secret keys. The proposed protocol blocked attacker and enabled legal deives to communicate because only authenticated devices transmit data by a mutual authentication protocol. Finally, our scheme is safe for attacks such as eavesdropping attack, location tracking, replay attack, spoofing attack and denial of service attack and we confirmed the safety by attack scenario.

Business Process Support Based on IoT Technology (사물인터넷을 이용한 비즈니스 프로세스 지원방안)

  • Hong, Hyun-Gi
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.75-79
    • /
    • 2017
  • The purpose of this paper is to propose a method for business process system (BPS) based on the Internet of Things (IoT). As the results of this research the IoT architecture and the business process design are derived. The main findings include the proposed IoT-enabled BPS method, illustrated by the description of the application and its assessment. In addition, the key business processes namely; remote machine monitoring; maintenance of machine; material procurement; product pricing; and information reporting system, are affected by IoT technology. The proposed method of this research could be the reference for the companies which want to have better management performance based on IoT technologies.

Research on Secure IoT Lightweight Protocols (사물인터넷용 경량 프로토콜 비교 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • The use of Internet of Things(IoT) in smart cities and smart homes is essential. The security of the sensor nodes, which are the core of the IoT, is weak and hacking attacks are severe enough to have a fatal impact on real life. This research is conducted to improve the security of the Internet of Things by developing a lightweight secure communication protocol for the Internet of Things, and to build a safe Internet of Things environment suitable for the era of the 4th Industrial Revolution. It contributes to building a safe and convenient smart city and smart home by proposing key management and identifier development to increase the confidentiality of communication and the establishment of an Internet authentication system.

Analysis of IoT Usage in Korean Key Manufacturing Industries (주요 제조업의 사물인터넷 활용성 분석)

  • Hwang, Gyusun;Park, Juhyung;Lee, Jeongcheol;Park, Jinwoo;Chang, Tai-Woo;Won, Joongyeon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.81-93
    • /
    • 2016
  • Internet of Things (IoT) has been established in various industries and IoT technology is highlighted as a new value creation technology. Especially, Korean government has launched Manufacturing Innovation 3.0 Strategy for developing Smart Factory concept to improve national and corporate's competitiveness. This study tries to present new industry classification scheme considering 10 national key manufacturing industries. Based on the new scheme, 10 national main forces industries are categorized into 6 segments. We have conducted SWOT analysis to comprehend Korean IoT environment. Based on the analysis, we have positioned 6 segments at the strategic decision-making grid to analyze industries' IoT practical usage.