• Title/Summary/Keyword: IoT Sensor Network

Search Result 320, Processing Time 0.027 seconds

Efficient LSTM Configuration in IoT Environment (IoT 환경에서의 효율적인 LSTM 구성)

  • Lee, Jongwon;Hwang, Chulhyun;Lee, Sungock;Song, Hyunok;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.345-346
    • /
    • 2018
  • Internet of Things (IoT) data is collected in real time and is treated as highly reliable data because of its high precision. However, IoT data is not always highly reliable data. Because, data be often incomplete values for reasons such as sensor aging and failure, poor operating environment, and communication problems. So, we propose the methodology for solve this problem. Our methodology implements multiple LSTM networks to individually process the data collected from the sensors and a single LSTM network that batches the input data into an array. And, we propose an efficient method for constructing LSTM in IoT environment.

  • PDF

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Middleware API Design for CoAP Usage (CoAP 사용을 위한 미들웨어 API 설계)

  • Kwon, Hak;Ra, Younggook;Jo, JaeDeok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2017
  • Developing the TCP/IP standard IBA which is higher organization of IETF decided to attach the TCP/IP protocol stack to small things, such as sensor. This means small object is also considered as on of the communication node, it has symbolic meaning that expand smart object has all five layer. Under this background, IoT/WoT configure the intelligent network between objects based on the internet to communication was introduced. Things has own IP address on IoT environment and are smart object that a lot of people communicate over the internet on Application Layer. In other words, IoT is that smart object are commercialized space. According to the interest of IoT, IETF establish CoAP for use as IoT protocol. CoAP is expected that standard protocols created by things is connected to the Internet protocol that can be used within a constrained environment. Accordingly, in this paper, we proposed Middleware API that can manage and collect the data of objects that connected CoAP network.

Proposal of Antenna of Subminiature Sensor Node for Multi-sensing of Marine IoT (해양 IoT 복합 센싱을 위한 초소형 센서 노드용 안테나의 제안)

  • Lee, Seong-Real;Kim, Eui-Young;Lee, Gyu-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.472-474
    • /
    • 2019
  • We propose an antenna for subminiature sensor node in the marine IoT service based on low power wide area (LPWA) network. The proposed antenna is designed for multi-band in ISM band. The specification of the proposed antenna expressed here is also for multi-band service.

  • PDF

A Smart Home Prototype Implementation Using Raspberry Pi (라즈베리파이를 이용한 스마트 홈 프로토타입 구현)

  • Kim, Jeong-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1139-1144
    • /
    • 2015
  • The internet of things(: IoT) which could produce new information as well as service through connecting small devices with internet interface becomes reality and could be utilized in home, office and plant. Especially the IoT can provide our home for safety, security, convenience, and power saving since all devices form a small internet. This paper proposes an IoT prototype for home with Raspberry Pi which has various sensors and monitors environment. This Raspberry Pi sensor node is small and inexpensive but can provide powerful service. The implemented node goes beyond simple role of sensor node and features a kind of sensor web node which performs various functions to outer network. So the proposed IoT prototype can provide flexibility as well as extensibility since it does not need expensive server.

A Study on the Development of Energy IoT Platform (에너지 IoT 플랫폼 개발에 관한 연구)

  • Park, Myung Hye;Kim, Young Hyun;Lee, Seung Bae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.311-318
    • /
    • 2016
  • IoT(Internet of Things areas) rich information based on the user easy access to service creation must be one of the power system of specificity due following: The IoT spread obstacle to the act be, and 'Smart Grid information of this is not easy under power plants approach the Directive on the protection measures, particularly when stringent security policies IoT technologies applied to Advanced Metering Infrastructure sector has been desired. This is a situation that occurs is limited to the application and use of IoT technologies in the power system. Power Information Network is whilst closed network operating is has a smart grid infrastructure, smart grid in an open two-way communication for review and although information security vulnerabilities increased risk of accidents increases as according to comprehensive security policies and technologies are required and can. In this paper, the IoT platform architecture design of information systems as part of the power of research and development IoT-based energy information platform aims. And to establish a standard framework for a connection to one 'Sensor-Gateway-Network-platform sensors Service' to provide power based on the IoT services and solutions. Framework is divided into "sensor-gateway" platform to link information modeling and gateways that can accommodate the interlocking standards and handling protocols variety of sensors Based on this real-time data collection, analysis and delivery platform that performs the role of the relevant and to secure technology.

IoT Sensor Network Platform based Life Protection Systems for Social Disaster (사회재난 대응을 위한 IoT 센서 네트워크 플랫폼)

  • Lee, Kyoung-Il;Kim, Jung-Gon;Lee, Dae-Sung;Lim, Ho-Jung;Hwang, Hak-In
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2015.11a
    • /
    • pp.92-95
    • /
    • 2015
  • 본 논문에서는 다양한 사회재난 대응을 위해 IoT 기술을 활용한 개방형 플랫폼 기술을 제안하고자 한다. 기존 재난 대응 시스템의 문제점을 분석하여 적응성, 확장성, 개방성을 가진 시스템 구조를 오픈 IoT 기술인 모비우스를 통해 구현하고 복합 감지 구조를 통해 상황 판단 정확도와 신뢰성을 높이는 기술을 제안하였다.

  • PDF

Zigbee Adaptor for Two-way Data/Event/Service Interoperation in Internet of Things (사물인터넷의 양방향 데이터/이벤트/서비스 연동을 위한 지그비 어댑터)

  • Back, Moon-Ki;Yim, Hyung-Jun;Lee, Kyu-Chul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.4
    • /
    • pp.107-114
    • /
    • 2014
  • Things in the IoT(Internet of Things) make various services by exchanging information over networks. The IoT includes many types of WSNs(Wireless Sensor Networks) that consists of spatially distributed wireless sensor nodes and operates with the various purposes with useful technologies such as identification, sensing and communication. Typically, Zigbee network composed of low-cost and lowpower devices is mainly used for wide-area monitoring and remote device control systems. The IoT composed of various WSNs cannot interoperate among networks because of heterogeneous communication protocol and different data representation of each network, but can facilitate interconnection and information exchange among networks via the DDS, which is communication middleware standard that aims to enable real-time, high performance and interoperable data exchanges. In this paper, we proposed design of Zigbee Adaptor for two-way interoperation and data exchange between Zigbee network and other networks in the IoT. Zigbee Adaptor communicates with Zigbee network according to the Zigbee protocol and communicates with external networks via DDS. DDS-based Zigbee Adaptor can facilitate interoperation between a Zigbee network and external networks by systematic cooperation among its components.

Uniform Sensor-node Request Scheme for the Recovery of Sensing Holes on IoT Network (IoT 네트워크의 센싱홀 복구를 위한 센서 이동 균등 요청 방법)

  • Kim, Moonseong;Park, Sooyeon;Lee, Woochan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.9-17
    • /
    • 2020
  • When IoT sensor nodes are deployed in areas where data collection is challenging, sensors must be relocated if sensing holes occur due to improper placement of sensors or energy depletion, and data collection is impossible. The sensing hole's cluster header transmits a request message for sensor relocation to an adjacent cluster header through a specific relay node. However, since a specific relay node is frequently used, a member sensor located in a specific cluster area adjacent to the sensing hole can continuously receive the movement message. In this paper, we propose a method that avoids the situation in which the sensing hole cluster header monopolizes a specific relay node and allows the cluster header to use multiple relay nodes fairly. Unlike the existing method in which the relay node immediately responds to the request of the header, the method proposed in this paper solves a ping-pong problem and a problem that the request message is concentrated on a specific relay node by applying a method of responding to the request of the header using a timer. OMNeT++ simulator was used to analyze the performance of the proposed method.

Space-Efficient Compressed-Column Management for IoT Collection Servers (IoT 수집 서버를 위한 공간효율적 압축-칼럼 관리)

  • Byun, Siwoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.1
    • /
    • pp.179-187
    • /
    • 2019
  • With the recent development of small computing devices, IoT sensor network can be widely deployed and is now readily available with sensing, calculation and communi-cation functions at low cost. Sensor data management is a major component of the Internet of Things environment. The huge volume of data produced and transmitted from sensing devices can provide a lot of useful information but is often considered the next big data for businesses. New column-wise compression technology is mounted to the large data server because of its superior space efficiency. Since sensor nodes have narrow bandwidth and fault-prone wireless channels, sensor-based storage systems are subject to incomplete data services. In this study, we will bring forth a short overview through providing an analysis on IoT sensor networks, and will propose a new storage management scheme for IoT data. Our management scheme is based on RAID storage model using column-wise segmentation and compression to improve space efficiency without sacrificing I/O performance. We conclude that proposed storage control scheme outperforms the previous RAID control by computer performance simulation.