• Title/Summary/Keyword: IoT Technology

Search Result 1,948, Processing Time 0.031 seconds

Development of Metrics to Measure Reusability of Services of IoT Software

  • Cho, Eun-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.151-158
    • /
    • 2021
  • Internet of Things (IoT) technology, which provides services by connecting various objects in the real world and objects in the virtual world based on the Internet, is emerging as a technology that enables a hyper-connected society in the era of the 4th industrial revolution. Since IoT technology is a convergence technology that encompasses devices, networks, platforms, and services, various studies are being conducted. Among these studies, studies on measures that can measure service quality provided by IoT software are still insufficient. IoT software has hardware parts of the Internet of Things, technologies based on them, features of embedded software, and network features. These features are used as elements defining IoT software quality measurement metrics. However, these features are considered in the metrics related to IoT software quality measurement so far. Therefore, this paper presents a metric for reusability measurement among various quality factors of IoT software in consideration of these factors. In particular, since IoT software is used through IoT devices, services in IoT software must be designed to be changed, replaced, or expanded, and metrics that can measure this are very necessary. In this paper, we propose three metrics: changeability, replaceability, and scalability that can measure and evaluate the reusability of IoT software services were presented, and the metrics presented through case studies were verified. It is expected that the service quality verification of IoT software will be carried out through the metrics presented in this paper, thereby contributing to the improvement of users' service satisfaction.

A IoT Security Service based on Authentication and Lightweight Cryptography Algorithm (인증 및 경량화 암호알고리즘 기반 IoT 보안 서비스)

  • Kim, Sun-Jib
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.1-7
    • /
    • 2021
  • The IoT market continues to expand and grow, but the security threat to IoT devices is also increasing. However, it is difficult to apply the security technology applied to the existing system to IoT devices that have a problem of resource limitation. Therefore, in this paper, we present a service that can improve the security of IoT devices by presenting authentication and lightweight cryptographic algorithms that can reduce the overhead of applying security features, taking into account the nature of resource limitations of IoT devices. We want to apply these service to home network IoT equipment to provide security. The authentication and lightweight cryptographic algorithm application protocols presented in this paper have secured the safety of the service through the use of LEA encryption algorithms and secret key generation by users, IoT devices and server in the IoT environment. Although there is no difference in speed from randomly generating secret keys in experiments, we verify that the problem of resource limitation of IoT devices can be solved by additionally not applying logic for secret key sharing to IoT devices.

Different Heterogeneous IoT Data Management Techniques for IoT Cloud Environments (IoT 클라우드 환경을 위한 서로 다른 이기종의 IoT 데이터 관리 기법)

  • Cho, Sung-Nam;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.15-21
    • /
    • 2020
  • Although IoT systems are used in a variety of heterogeneous environments as cloud environments develop, all IoT devices are not provided with reliable protocols and services. This paper proposes an IoT data management technique that can extend the IoT cloud environment to an n-layer multi-level structure so that information collected from different heterogeneous IoT devices can be efficiently sorted and processed. The proposed technique aims to classify and process IoT information by transmitting routing information and weight information through wireless data link data collected from heterogeneous IoT devices. The proposed technique not only delivers information classified from IoT devices to the corresponding routing path but also improves the efficiency of IoT data processing by assigning priority according to weight information. The IoT devices used in the proposed technique use each other's reliable protocols, and queries for other IoT devices locally through a local cloud composed of hierarchical structures have features that ensure scalability because they maintain a certain cost.y channels of IoT information in order to make the most of the multiple antenna technology.

Analysis for Efficiency of Long Range Wireless IoT Network (장거리무선통신 IoT 네트워크 효율성 분석)

  • Kim, Ki-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.617-623
    • /
    • 2016
  • Recently, IoT technology has been applied to the control of appliances in the home, and information about temperature, humidity, etc. is collected and the application of the system to control the indoor environment automatically is increasing. Currently, the network configuration of IoT devices is mainly used to connect IoT devices to the Internet through wireless gateways. Since such a method is dependent on a gateway, there are limitations in providing various services. Therefore, this paper proposes an independent method of gateway by using IoT network without using gateway by applying long distance wireless communication technology. IoT devices using the proposed long distance wireless internet technology can connect to a remote server and provide mobility that can not be supported by existing methods, thereby providing more various services. The performance evaluation of the proposed network configuration method is compared with the delay time and the amount of data generated in the existing network method constituted by the gateway and the proposed network configuration method respectively. Experimental results show that the proposed method decreases the delay time and the amount of data generated by the gateway.

Lightweight IPsec protocol for IoT communication environments (IoT 통신 환경을 위한 경량 IPsec 프로토콜 연구)

  • Song, In-A;Oh, Jeong-Hyeon;Lee, Doo-Won;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.121-128
    • /
    • 2018
  • Internet of Things architecture connected to the Internet is a technology. However, Many paper research for the lightweight Protocol of IoT Environment. In these Paper excluded secure problem about protocol. So Light weight Protocol has weakness of secure in IoT environment. All of IoT devices need encryption algorithm and authentication message code for certain level of security. However, IoT environment is difficult to using existing security technology. For this reason, Studies for Lightweight IPsec is essential in IoT environment. For Study of Lightweight IPsec, We analyze existing protocols such as IPsec, 6LoWPAN for IEEE 802.15.4 layer and Lightweight IPsec based 6LoWPAN. The result is to be obtained for the lightweight IPsec protocols for IoT environment. This protocol can compatible with Internet network.

Development of an IoT Smart Home System Using BLE (BLE통신을 이용한 IoT 스마트홈 모니터링 시스템 개발)

  • Duong, Cong Tan;Kim, Myung Kyun
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.909-917
    • /
    • 2018
  • Recently, the Internet of Thing (IoT) technology is expanding explosively in the number of devices and applications in many application areas. In IoT systems, sensors and actuators are connected to the Internet and cooperate to do some applications by exchanging information. In this paper an IoT smart home system is developed to monitor and control home devices easily. Our system consists of sensor devices, IoT gateways, and an IoT server. Sensor devices developed using Rfduino sense the physical world and transmit their data using BLE to the IoT server thru the IoT gateway. We implemented the IoT gateway using Raspberry Pi and the IoT server using ARTIK cloud. We installed our system and made a test in our lab, which showed that our system can be installed and managed easily and extended its functionality in an easy way. By taking advantage of the rule mechanism and action messages of ARTIK cloud, we implemented the control of device parameters easily by sending action messages to the ARTIK cloud.

A Study on the integrated management system for tourism complexes based on IoT technology (IoT 기술을 기반으로 한 관광단지 통합관리시스템에 관한 연구)

  • An, Tai-Gi
    • Journal of Industrial Convergence
    • /
    • v.17 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • The purpose of this study is to analyze the actual condition of tourism complex and to apply IoT-based integrated management system to tourism complex to improve the utilization and management of tourism complex. Tourists need various information to take the lead in tourism activities, and all of these necessary information is collected through various routes such as information of the Internet, travel agencies, newspapers, and surrounding experiences. Recently, information provision through the Internet has taken a large part due to the development of information technology, and systems that combine IoT technology are being constructed. This is because the popularization of IoT technology improves the diversity, accessibility and convenience of information and makes it convenient to use. The purpose of this study is to suggest the importance of tourism information service using IoT-based system and future research directions. The previous studies on IoT-based system construction were also reviewed considering the efficiency of IoT technology. In order to solve the problems of tourism complex, this study improved the IoT-based tourism complex operation system and conducted operation management. IoT-based management system is expected to be improved as a tourism complex platform and is expected to be improved by overall management cases and experiences.

A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure (IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구)

  • Hwang, Song-yi;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.617-635
    • /
    • 2021
  • Internet of Things (IoT) devices connected to the network without appropriate security solutions have become a serious security threat to ICT infrastructure. Moreover, due to the nature of IoT devices, it is difficult to apply currently existing security solutions. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are actually increasing every year. Even though several security solutions are being developed to protect IoT infrastructure, there is a great risk to apply unverified security solutions to real-world environments. Therefore, verification tools to verify the functionality and performance of the developed security solutions are also needed. Furthermore, just as security threats vary, there are several security solution s that defend against them, requiring suitable verification tools based on the characteristics of each security solution. In this paper, we propose an high-speed malware propagation tool that spreads malware at high speed in the IoT infrastructure. Also, we can verify the functionality of the security solution that detect and quickly block attacks spreading in IoT infrastructure by using the high-speed malware propagation tool.

Design Plan of Secure IoT System based Common Criteria (CC 기반의 안전한 IoT 시스템 설계 방안)

  • Kim, Ju-Hun;Jung, Hyun-Mi;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.61-66
    • /
    • 2017
  • Recently, IoT technology is rapidly developing with the keyword "Anytime, Anywhere, Convenient". In addition, security problems in IoT systems are exploding and the damage is increasing as well. In this paper, we propose a method to develop IoT system safely by using internationally recognized CC evaluation in ICT by identifying the standardization and security technology development status defining IoT system security requirements. For this purpose, IoT system and service security aspects are analyzed. Based on this, it is possible to design the security functional requirements and to demonstrate the rationale of the security objective through the correspondence relation, and it is possible to design the protection profile for the IoT system. This is a sufficient basis for the development methodology to be presented in this paper because it is used as a means of referring to the set of security requirements of administrators, developers, and users.

The Business Model of IoT Information Sharing Open Market for Promoting IoT Service (IoT 서비스 활성화를 위한 IoT 정보공유 오픈 마켓 비즈니스 모델)

  • Kim, Woo Sung
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.195-209
    • /
    • 2016
  • IoT (Internet of Things) is a collective term referring to application services that provide information through sensors/devices connected to the internet. The real world application of IoT is expanding fast along with growing number of sensors/devices. However, since IoT application relies on vertical combination of sensors/devices networks, information sharing within IoT services remains unresolved challenge. Consequently, IoT sensors/devices demand high construction and maintenance costs, rendering the creation of new IoT services potentially expensive. One solution is to launch an IoT open market for information sharing similar to that of App Store for smart-phones. Doing so will efficiently allow novel IoT services to emerge across various industries, because developers can purchase licenses to access IoT resources directly via an open market. Sharing IoT resource information through an open market will create an echo-system conducive for easy utilization of resources and communication between IoT service providers, resource owners, and developers. This paper proposes the new business model of IoT open market for information sharing, and the requirements for ensuring security and standardization of open markets.