• Title/Summary/Keyword: IoT Key management

Search Result 92, Processing Time 0.023 seconds

A Framework for Time Awareness System in the Internet of Things (사물인터넷에서 시각 정보 관리 체계)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1069-1073
    • /
    • 2016
  • The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications and covers a variety of protocols, domains, and applications. Key system-level features that IoT needs to support can be summarized as device heterogeneity, scalability, ubiquitous data exchange through proximity wireless technologies, energy optimized solutions, localization and tracking capabilities, self-organization capabilities, semantic interoperability and data management, embedded security and privacy-preserving mechanisms. Time information is a critical piece of infrastructure for any distributed system. Time information and time synchronization are also fundamental building blocks in the IoT. The IoT requires new paradigms for combining time and data. This paper reviews conventional time keeping mechanisms in the Internet and presents issues to be considered for combining time and data in the IoT.

A User Authentication Scheme using Blockchain in Smart Grid-based Edge Computing Environments (스마트 그리드 기반 엣지 컴퓨팅 환경에서 블록체인을 이용한 사용자 인증 기법)

  • Hakjun Lee;Youngsook Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.71-79
    • /
    • 2022
  • The smart grid system has emerged to maximize energy efficiency through real-time information exchange between power providers and consumers by combining information technology and power supply systems. The authentication schemes using blockchain in a smart grid system have been proposed, which utilize an edge server's architecture to collect and store electric power-related information and process data between a central cloud server and smart grid-IoT devices. Although authentication schemes are being proposed to enhance security in the smart grid environment, many vulnerabilities are still reported. This paper presents a new mutual authentication scheme to guarantee users' privacy and anonymity in a smart grid based on edge computing using blockchain. In the proposed scheme, we use the smart contract for the key management's efficiency, such as updating and discarding key materials. Finally, we prove that the proposed scheme not only securely establishes a session key between the smart grid-IoT device of the user and the edge server but also guarantees anonymity.

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

Development Process on IoT Platform for Faults Detection of Outdoor LED Lighting Installation (옥외 LED 조명설비의 고장검출 IoT 플랫폼 개발을 위한 프로세스)

  • Park, Kun-Young;Kwak, Dong-Kurl;Jung, Min-Sang;Park, Dong-Hun
    • Proceedings of the KIPE Conference
    • /
    • 2018.07a
    • /
    • pp.273-274
    • /
    • 2018
  • Recently, many countries around the world are investing heavily in green industries based on green IT technology. The key industry in the green industry is LED. If we replace traditional lighting, we can save a lot of socioeconomic costs. Because it is energy efficient. However, the research and development on maintenance and management are still insignificant about LED lighting. Therefore, after the failure, the post-treatment is delayed and often occurs. In order to solve these problems, it is planned to detect the failure of the LED lighting and to establish a monitoring system that can monitor the situation in real time on the computer or mobile phone of the remote manager using the latest IoT network technology.

  • PDF

A Study on System and Application Performance Monitoring System Using Mass Processing Engine(ElasticSearch) (대량 처리 엔진(ElasticSearch)을 이용한 시스템 및 어플리케이션 성능 모니터링 시스템에 관한 연구)

  • Kim, Seung-Cheon;Jang, Hee-Don
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.147-152
    • /
    • 2019
  • Infrastructure is rapidly growing as Internet business grows with the latest IT technologies such as IoT, BigData, and AI. However, in most companies, a limited number of people need to manage a lot of hardware and software. Therefore, Polestar Enterprise Management System(PEMS) is applied to monitor the system operation status, IT service and key KPI monitoring. Real-time monitor screening prevents system malfunctions and quick response. With PEMS, you can see configuration information related to IT hardware and software at a glance, and monitor performance throughout the entire end-to-end period to see when problems occur in real time.

Recent Trends in Standards Related to the Internet of Things and Machine-to-Machine Communications

  • Husain, Syed;Prasad, Athul;Kunz, Andreas;Papageorgiou, Apostolos;Song, JaeSeung
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.228-236
    • /
    • 2014
  • One of major purposes of these standard technologies is to ensure interoperability between entities from different vendors and enable interworking between various technologies. As interoperability and interworking are essential for machine-to-machine communications (M2M) and Internet of Things (IoT) for them to achieve their ultimate goal, i.e., things to be connected each other, multiple standards organizations are now working on development M2M/IoT related specifications. This paper reviews the current activities of some of the most relevant standardization bodies in the area of M2M and IoT: third-generation partnership project (3GPP) core and radio network aspects, broadband forum, and oneM2M. The major features and issues being focused upon in these standards bodies are summarized. Finally, some key common trends among the different bodies are identified: a common service layer platform, new technologies mitigating an explosive growth of network traffic, and considerations and efforts related to the development of device management technologies.

A Survey on Blockchain Platforms for Supply Chain Management (공급망을 위한 블록체인 플랫폼 조사연구)

  • Jang, Jihyun;Song, Seounghan;Kim, Suntae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.259-265
    • /
    • 2018
  • As the supply method of products has become diverse and complex, problems such as manipulation of origin and product trace have occurred in the existing supply chain system. In order to deal with these issues, various Blockchain based studies have been actively carried in the SW industry and academy. However, there is a lack of comprehensive survey research on the applied Blockchain techniques, so that it hardly understand the pros and cons of the technologies. In this study, we intensively investigated the diverse studies from the Industrial and academic area based on the several criteria such as the goals, use of key Blockchain technologies, and IoT technologies.

Implementation of Sensors Information Alarm Service using an FCM based on Raspberry Pi (FCM을 이용한 라즈베리파이 기반의 센서정보 알림 구현)

  • Oh, Sejin
    • Journal of Industrial Convergence
    • /
    • v.20 no.8
    • /
    • pp.61-67
    • /
    • 2022
  • The Internet of Things(IoT) is one of the key technologies in the Fourth Industrial Revolution. The IoT is a system that acquires information from various sensors and provides meaningful information to users. The method of obtaining information from sensor is using WIFI, Bluetooth and Server. is not accessible to external users because of different type of networks or local area communication. For this reason, there is a problem that external user cannot receive notification in regard to sensor information. In this paper, we want to establish a cloud message environment using Google's FCM(Firebase Cloud Messaging) and find out through experiments how users can receive notifications even if they are outside.

Secure SLA Management Using Smart Contracts for SDN-Enabled WSN

  • Emre Karakoc;Celal Ceken
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3003-3029
    • /
    • 2023
  • The rapid evolution of the IoT has paved the way for new opportunities in smart city domains, including e-health, smart homes, and precision agriculture. However, this proliferation of services demands effective SLAs between customers and service providers, especially for critical services. Difficulties arise in maintaining the integrity of such agreements, especially in vulnerable wireless environments. This study proposes a novel SLA management model that uses an SDN-Enabled WSN consisting of wireless nodes to interact with smart contracts in a straightforward manner. The proposed model ensures the persistence of network metrics and SLA provisions through smart contracts, eliminating the need for intermediaries to audit payment and compensation procedures. The reliability and verifiability of the data prevents doubts from the contracting parties. To meet the high-performance requirements of the blockchain in the proposed model, low-cost algorithms have been developed for implementing blockchain technology in wireless sensor networks with low-energy and low-capacity nodes. Furthermore, a cryptographic signature control code is generated by wireless nodes using the in-memory private key and the dynamic random key from the smart contract at runtime to prevent tampering with data transmitted over the network. This control code enables the verification of end-to-end data signatures. The efficient generation of dynamic keys at runtime is ensured by the flexible and high-performance infrastructure of the SDN architecture.

Analyzing Technological Convergence for IoT Business Using Patent Co-classification Analysis and Text-mining (특허 동시분류분석과 텍스트마이닝을 활용한 사물인터넷 기술융합 분석)

  • Moon, Jinhee;Gwon, Uijun;Geum, Youngjung
    • Journal of Technology Innovation
    • /
    • v.25 no.3
    • /
    • pp.1-24
    • /
    • 2017
  • With the rise of internet of things (IoT), there have been several studies to analyze the technological trend and technological convergence. However, previous work have been relied on the qualitative work that investigate the IoT trend and implication for future business. In response, this study considers the patent information as the proxy measure of technology, and conducts a quantitative and analytic approach for analyzing technological convergence using patent co-classification analysis and text mining. First, this study investigate the characteristics of IoT business, and characterize IoT business into four dimensions: device, network, platform, and services. After this process, total 923 patent classes are classified into four types of IoT technology group. Since most of patent classes are classified into device technology, we developed a co-classification network for both device technology and all technologies. Patent keywords are also extracted and these keywords are also classified into four types: device, network, platform, and services. As a result, technologies for several IoT devices such as sensors, healthcare, and energy management are derived as a main convergence group for the device network. For the total IoT network, base network technology plays a key role to characterize technological convergence in the IoT network, mediating the technological convergence in each application area such as smart healthcare, smart home, and smart grid. This work is expected to effectively be utilized in the technology planning of IoT businesses.