• Title/Summary/Keyword: IoT Server

Search Result 368, Processing Time 0.027 seconds

Suggestion to Use Unmanned Vehicle with IoT about LoRa Network (LoRa망을 이용한 무인이동체 IoT 활용법 제안)

  • Lee, Jae-Ung;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1691-1697
    • /
    • 2018
  • There has been a steady study of unmanned vehicle. So far, continuous research has brought news of the commercialization of unmanned vehicle. In addition, it has been applied in a variety of fields with another industry. A lot of research has been done, too, to apply inert driving indoors. Using LoRa network, which is a network dedicated to IoT, unmanned vehicle control system that is applied to LoRa network from a small space, or from an office hospital to a factory, is installed to increase efficiency when the performs special tasks. This paper presents solutions to a variety of problems by using LoRa network, which is dedicated to IoT, to recognize an unmanned vehicle as a single object, to communicate with surrounding objects, and to receive information necessary for driving indoors from a cloud server.

Smart Sensor Management System Supporting Service Plug-In in MQTT-Based IIoT Applications

  • Lee, Young-Ran;Kim, Sung-Ki
    • Journal of Multimedia Information System
    • /
    • v.9 no.3
    • /
    • pp.209-218
    • /
    • 2022
  • Industrial IoT applications, including smart factories, require two problem-solving to build data monitoring systems required by services from distributed IoT sensors (smart sensors). One is to overcome proprietary protocols, data formats, and hardware differences and to uniquely identify and connect IoT sensors, and the other is to overcome the problem of changing the server-side data storage structure and sensor data transmission format according to the addition or change of service or IoT sensors. The IEEE 1451.4 standard-based or IPMI specification-based smart sensor technology supports the development of plug-and-play sensors that solve the first problem. However, there is a lack of research that requires a second problem-solving, which requires support for the plug-in of IoT sensors into remote services. To propose a solution for the integration of these two problem-solving, we present a IoT sensor platform, a service system architecture, and a service plugin protocol for the MQTT-based IIoT application environment.

Development of Urban Farm Management System using Commercial SNS as IoT Platform (SNS를 IoT 플랫폼으로 이용한 도시농장 관리시스템 개발)

  • Ryu, Dae-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.149-154
    • /
    • 2013
  • IoT is emerging topic of the post-smartphone era. But IoT service is actually not easy but due to the absence of the open standard IoT service platform. In this study, We propose and implement IoT services platform using commercial SNS platform like Tweet, Facebook or YouTube. we implement the intelligent control system of the urban farm using our IoT services platform as an example. Our system can save an additional server deployment and management cost using open SNS platform like Tweet or Facebook or Youtube. In addition, there are needs to develop App. for the smartphone because we can take advantage of the user interface which is developed by global enterprises.

IoT Platform Service to Support Characters (캐릭터를 지원하기 위한 IoT 플랫폼 서비스)

  • Oh, Won-Hwan;Nam, Kang-Hyun;Pak, Sang-Hyon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.643-650
    • /
    • 2018
  • This service uses beacon with BLE technology, and USER APP has priority with Anchor IPS which secures location and device. Since then, it has been linked with character beacons that can be used in various places. The character beacon which is recognized as a service is able to confirm the user's location through API key of the LBS CMS server, and receives various contents services of the UESR CMS server. The service network consists of character beacon, Anchor IPS, USER APP, LBS CMS server, and USER CMS server. The purpose of the service is to promote local tourism and local culture to tourists through local unique characters.

A Method for Dynamic Clustering-based Efficient Management in Large-Scale IoT Environment (대규모 IoT 컴퓨팅 환경에서 동적 클러스터링 기반 효율적 관리 기법)

  • Kim, Dae Young;La, Hyun Jung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.85-97
    • /
    • 2014
  • IoT devices that collect information for end users and provide various services like giving traffic or weather information to them that are located everywhere aim to raise quality of life. Currently, the number of devices has dramatically increased so that there are many companies and laboratories for developing various IoT devices in the world. However, research about IoT computing such as connecting IoT devices or management is at an early stage. A server node that manages lots of IoT device in IoT computing environment is certainly needed. But, it is difficult to manage lots of devices efficiently. However, anyone cannot surly know about how many servers are needed or where they are located in the environment. In this paper, we suggest a method that is a way to dynamic clustering IoT computing environment by logical distance among devices. With our proposed method, we can ensure to manage the quality in large-scale IoT environment efficiently.

Signal integrity analysis of system interconnection module of high-density server supporting serial RapidIO

  • Kwon, Hyukje;Kwon, Wonok;Oh, Myeong-Hoon;Kim, Hagyoung
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.670-683
    • /
    • 2019
  • In this paper, we analyzed the signal integrity of a system interconnection module for a proposed high-density server. The proposed server integrates several components into a chassis. Therefore, the proposed server can access multiple computing resources. To support the system interconnection, among the highly integrated computing resources, the interconnection module, which is based on Serial RapidIO, has been newly adopted and supports a bandwidth of 800 Gbps while routing 160 differential signal traces. The module was designed for two different stack-up types on a printed circuit board. Each module was designed into 12- (version 1) and 14-layer (version 2) versions with thicknesses of 1.5T and 1.8T, respectively. Version 1 has a structure with two consecutive high-speed signal-layers in the middle of two power planes, whereas Version 2 has a single high-speed signal placed only in the space between two power planes. To analyze the signal integrity of the module, we probed the S-parameters, eye-diagrams, and crosstalk voltages. The results show that the high-speed signal integrity of Version 2 has a better quality than Version 1, even if the signal trace length is increased.

Analysis and Design of Fitness Healthcare System based on IoT (사물인터넷 기반 피트니스 헬스케어 시스템의 분석 및 설계)

  • Cho, Byung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.187-192
    • /
    • 2020
  • It is very useful because we can measure precise exercise volume at indoor and outdoor space, and receive push message and retrieve for exercise information by smart-phone at any-time and any-place if a fitness healthcare system base on IoT is utilized. This system is interlocked with IoT module including sensing device in sports equipment, IoT gateway, smart-phone, smart-band and server by internet. In this paper, when this, "a fitness healthcare system base on IoT", software is developed, a proper analysis and design method for practical affairs try to be presented due to showing software development analysis method and design method such as flowchart and UI design.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

Development of an oneM2M-compliant IoT Platform for Wearable Data Collection

  • Ahn, Il Yeup;Sung, Nak-Myoung;Lim, Jae-Hyun;Seo, Jeongwook;Yun, Il Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.1-15
    • /
    • 2019
  • Internet of Things (IoT) is commonly referred to as a future internet technology to provide advanced services by interconnecting physical and virtual things, collecting and using many data from them. The IoT platform is a server platform with a common architecture to collect and share the data independent of the IoT devices and services. Recently, oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT announced the availability of oneM2M Release 2 specifications. Accordingly, this paper presents a new oneM2M-compliant IoT platform called Mobius 2.0 and proposes its application to collect the biosignal data from wearable IoT devices for emotion recognition. Experimental results show that we can collect various biosignal data seamlessly and extract meaningful features from the biosignal data to recognize two emotions of joy and sadness.

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.