• Title/Summary/Keyword: IoT Technology

Search Result 1,988, Processing Time 0.03 seconds

Perceived Connectivity, Perceived Belongingness and Intention to Use IoT Appliance Based Service (인지된 기기 연결성이 사물인터넷(IoT) 가전 기반 서비스의 사용의도에 미치는 영향에 대한 실증연구)

  • Jin, Yoonsun;Kwon, Ohbyung
    • Journal of Information Technology Services
    • /
    • v.18 no.4
    • /
    • pp.97-113
    • /
    • 2019
  • With the development of sensor, communication and intelligent software technology, expectation of IoT-based service which can receive desired service automatically and anytime, anywhere is getting higher. In addition, IoT-based services have begun to anticipate the development of a hyper-connected society. Despite these expectations and anticipations, few studies have empirically identified ways to improve the intentions of prospective customers to use IoT-based services. Therefore, the purpose of this paper is to propose a theoretical model that can explain the factors that determine the intention of using IoT-based services. In addition, this study investigates what factors affect the intention to use IoT-based services focusing on the connectedness. Especially, perceived connectivity with the (virtual) community, unlike the connectivity with the machines, is newly proposed, to understand the IoT technology adoption behavior. The empirical results suggest that social relationship is one of the critical factors to affect the use of services running on interconnected technology such as IoT. When IoT-based service is recognized as a link to other communities, it has been found to have a positive effect on intention to use via perceived belongingness.

An Analysis of Research Trends in IoT Security (IoT 보안에 대한 국내외 연구 동향 분석)

  • Yu, Woo Young
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.61-67
    • /
    • 2018
  • IoT technology is currently being applied at various industrial sites and is developing as a core technology in the fourth industrial revolution. Along with IoT developments, awareness and importance of IoT security is increasing, and research on IoT security is underway to counter these threats. However, research trends in the context of IoT security awareness are insufficient. This paper is a research that analyzes the progress of R&D and IoT security in both domestic and international IoT and thus leads to improvements. The research covered the 229 papers and articles of domestic and foreign journals covering security fields as a main theme. Among them, detailed analyses of 96 papers related to IoT security were performed. Research has shown that many studies are being conducted on trends in IoT security, key management and privacy. A detailed study on the characteristics of services to apply IoT technologies and access control and authentication between IoT devices is needed, and a study that addressed the issues of privacy in IoT environments in Korea.

  • PDF

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment (IoT환경에서 무아레 현상을 이용한 사용자 얼굴 인증 기법)

  • Cho, Ik-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.171-176
    • /
    • 2019
  • In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply $moir{\acute{e}}$ technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow $moir{\acute{e}}$ as a $moir{\acute{e}}$ phenomenon method, and the projection $moir{\acute{e}}$. When comparing the existing IoT products and IoT products applied with $moir{\acute{e}}$ technology, IoT products applied with $moir{\acute{e}}$ technology are safer in terms of security.

A Study on IoT Security Technology using LoRa (LoRa 기반 IoT 보안대책에 대한 연구)

  • Chung, Youngseek;Cha, Jaesang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.4
    • /
    • pp.185-189
    • /
    • 2017
  • According to the rapid growth of Internet of Things (IoT) technology, we are able to connect between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. These days, Low Power Wide Area (LPWA) technologies becomes popular more and more, to implement IoT infrastructure effectively. In this paper, this study aims to analyze LoRa, one of LPWA technologies, and suggest IoT security technology using LoRa to minimize threats to security.

Secret Key-Dimensional Distribution Mechanism Using Deep Learning to Minimize IoT Communication Noise Based on MIMO (MIMO 기반의 IoT 통신 잡음을 최소화하기 위해서 딥러닝을 활용한 비밀키 차원 분배 메커니즘)

  • Cho, Sung-Nam;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.23-29
    • /
    • 2020
  • As IoT devices increase exponentially, minimizing MIMO interference and increasing transmission capacity for sending and receiving IoT information through multiple antennas remain the biggest issues. In this paper, secret key-level distribution mechanism using deep learning is proposed to minimize MIMO-based IoT communication noise. The proposed mechanism minimizes resource loss during transmission and reception process by dispersing IoT information sent and received through multiple antennas in batches using deep learning. In addition, the proposed mechanism applied a multidimensional key distribution processing process to maximize capacity through multiple antenna multiple stream transmission at base stations without direct interference between the APs. In addition, the proposed mechanism synchronizes IoT information by deep learning the frequency of use of secret keys according to the number of IoT information by applying the method of distributing secret keys in dimension according to the number of frequency channels of IoT information in order to make the most of the multiple antenna technology.

A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment (IoT 환경에서 속성기반 암호화 기술을 활용한 메시지 통신 기법에 관한 연구)

  • Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.295-302
    • /
    • 2016
  • Many countries, especially ICT powers, are supporting IoT-based technology at a national level and this technology is actively being researched in the businesses and research institutes in an aim to develop technology and create an ecosystem. Roads in the Seoul city are building public facilities based on IoT to provide various services and conveniences for the users. However, for the full-fledged introduction and development of IoT, there are many cases where infringement on security and privacy and threat for life and safety happen. Also, as the IoT environment includes various environment technologies such as the existing sensor network, heterogeneous communication network, and devices optimized for the IoT environment, it inherits the existing security threat and various attack techniques. This paper researches the attribute based encryption technology for safe communication in the IoT environment. The data collected from the device is transmitted utilizing the attribute based encryption and by designing the key generation protocol, grades and authorities for the device and users are identified to transmit safe messages.

A Study on the Influential Factors of Intelligence Internet of Things for Establishing Smart Supply Chains (스마트 공급망 구축을 위한 지능형사물인터넷 영향요인에 관한 연구)

  • Kun-Shik Cho;Cheol-Soo Park
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.2
    • /
    • pp.51-66
    • /
    • 2024
  • Internet of Things (IoT) is a term that has been introduced in recent years, and it defines objects being able to connect and transfer data through the internet. Although some IoT-related products are currently available in the market, there are still some IoT problems that need to be overcome, such as the technology issues and lack of confidence and understanding of IoT. This study aims to analyze the influential factors in building successful IoT system for smart supply chain. This study develops the Analytic Hierarchy Process (AHP) to evaluate the influential factors in IoT. This study finds that tangible factors (Technology, Value and Connectivity) are more important than the intangible factors (Operation and Intelligence). Finally, this study concludes that after enterprises build a good IoT connectivity system, it is essential to combine this with good IoT technology to create a successful IoT environment. The findings may help practitioners implement IoT in smart supply chains to deal with disruptions, risks and vulnerabilities in the post-pandemic era.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Application Scenario of Integrated Development Environment for Autonomous IoT Applications based on Neuromorphic Architecture (뉴로모픽 아키텍처 기반 자율형 IoT 응용 통합개발환경 응용 시나리오)

  • Park, Jisu;Kim, Seoyeon;Kim, Hoinam;Jeong, Jaehyeok;Kim, Kyeongsoo;Jung, Jinman;Yun, Young-Sun
    • Smart Media Journal
    • /
    • v.11 no.2
    • /
    • pp.63-69
    • /
    • 2022
  • As the use of various IoT devices increases, the importance of IoT platforms is also rising. Recently, artificial intelligence technology is being combined with IoT devices, and research applying a neuromorphic architecture to IoT devices with low power is also increasing. In this paper, an application scenario is proposed based on NA-IDE (Neuromorphic Architecture-based autonomous IoT application integrated development environment) with IoT devices and FPGA devices in a GUI format. The proposed scenario connects a camera module to an IoT device, collects MNIST dataset images online, recognizes the collected images through a neuromorphic board, and displays the recognition results through a device module connected to other IoT devices. If the neuromorphic architecture is applied to many IoT devices and used for various application services, the autonomous IoT application integrated development environment based on the neuromorphic architecture is expected to emerge as a core technology leading the 4th industrial revolution.

SDN-Based Collection-path Steering for IoT-Cloud Service Monitoring Data over SmartX-mini Playground (SmartX-mini Playground 상의 IoT-Cloud 서비스에 대한 SDN 기반 모니터링 데이터 수집 경로 설정)

  • Yoon, Heebum;Kim, Seungryong;Kim, JongWon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1598-1607
    • /
    • 2016
  • Safe transmitting monitoring data is essential for supporting IoT-Cloud services efficiently. In this paper, we find ways to configure data path flexibly in SDN based for IoT-Cloud services utilizing SmartX-mini Playground. To do this, we use ONOS(Open Network Operating System) SDN Controller, ONOS NBI Applications made from us to check flexible and safe data path configuration for IoT-Cloud monitoring data transmitting in real IoT-SDN-Cloud environments.