• Title/Summary/Keyword: IoT Technology

Search Result 1,988, Processing Time 0.031 seconds

Analysis of Public Sector Sharing Rate based on the IoT Device Classification Methodology (사물인터넷(IoT) 기기 분류 체계 기반 공공분야 점유율 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2022
  • The Internet of Things (IoT) provides data convergence and sharing functions, and IoT technology is the most fundamental core technology in creating new services by convergence of various cutting-edge technologies. However, there are different classification systems for the Internet of Things, and when it is limited to the domestic public sector, it is difficult to properly grasp the current status of which devices are installed and operated with what share, and systematic data or research The results are very difficult to find. Therefore, in this study, the relevance of the classification system for IoT devices was analyzed according to reality based on sales, shipments, and growth rate, and based on this, the actual share of IoT devices among domestic public institutions was analyzed in detail. The derived detailed analysis results are expected to be efficiently utilized in the process of selecting IoT devices for research and analysis to advance information protection technology such as responding to malicious code attacks on IoT devices, analyzing incidents, and strengthening security vulnerabilities.

Institutional Improvements for Security of IoT Devices (IoT 기기의 보안성 확보를 위한 제도적 개선방안)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.607-615
    • /
    • 2017
  • Recently, IoT products with various functions are being developed. Through the combination of objects and information technology, convenient services that have not been imagined before are emerging. For a secure IoT environment, product security must be considered. However, the existing IoT products have various problems such as security vulnerability. In order to secure the security of IoT products, technical countermeasures as well as policy responses are needed. However, the legislation related to current IoT products has a limit to guarantee safety in IoT environment. In this paper, we analyze the limitations of the current legal system of IoT, and suggests ways to improve it.

Use of Blockchain to Support the Security of Internet of Things: A Review

  • Saher Un Nisa;Maryam Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.149-154
    • /
    • 2023
  • Internet of Things (IoT) is now spreading everywhere. It's the technology of every person's need so we can't step back from IoT but we can secure it as it is spreading quickly so it has greater chances of danger and being misused. There is an urgent need to make IoT devices secure from getting cracked or hacked. A lot of methods had tried and still trying to mitigate IoT security issues. In this paper Blockchain is going to be the solution of most of the IoT issues or problems. We have discussed or highlighted security issues with centralized IoT and then provided solution of such security challenges through the use of blockchain because is based on a decentralized technology that is hard to modify or update.

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.

Small size IoT Device Monitoring System Modeling applying DEVS methodology

  • Lee, Se-Han;Seo, Hee-Suk;Choi, Yo-Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.2
    • /
    • pp.45-51
    • /
    • 2018
  • In this paper, we propose a Designed and Developed home router management system. Through the fourth industrial revolution and development of IoT technology, now people can experience a wide range of IoT related services at their workplace or daily lives. At the industrial site, IoT devices are used to improve productivity such as factory automation, and at home, IoT technology is used to control home appliances from a remote distance. Usually IoT device is integrated and controlled by the router. Home router connects different IoT devices together at home, however when security issues arise, it can invade personal privacy. Even though these threats exist, the perception for home router security is still insufficient. In this paper, we have designed and developed home router management system using DEVS methodology to promote the safe use of home router. Through the DEVS methodology, we have designed the system and developed the mobile application. This management system enables users to set up security options for home router easily.

A Study on the Structure of Research Domain for Internet of Things Based on Keyword Analysis (키워드 분석 기반 사물인터넷 연구 도메인 구조 분석)

  • Namn, Su-Hyeon
    • Management & Information Systems Review
    • /
    • v.36 no.1
    • /
    • pp.273-290
    • /
    • 2017
  • Internet of Things (IoT) is considered to be the next wave of Information Technology transformation after the Internet has changed the process of doing business. Since the domain of IoT ranging from the sensor technology to service to the users is wide, the structure of the research domain is not delineated clearly. To do that we suggest to use the Technology Stack Model proposed by Porter et al.(2014) to measure the maturity level of IoT in organizations. Based on the Stack Model, for the general understandings of IoT, we do keyword analyses on the academic papers whose major research issue is IoT. It is found that the current status of IoT application from the perspectives of cloud and big data analytics is not active, meaning that the real value of IoT has not been realized. We also examine the cases which deal with the part of cloud process which is crucial for value accrual. Based on these findings, we suggest the future direction of IoT research. We also propose that IT is to value chain what IoT is to the Stack Model to derive value in organizations.

  • PDF

Building Fire Monitoring and Escape Navigation System Based on AR and IoT Technologies (AR과 IoT 기술을 기반으로 한 건물 화재 모니터링 및 탈출 내비게이션 시스템)

  • Wentao Wang;Seung-Yong Lee;Sanghun Park;Seung-Hyun Yoon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.30 no.3
    • /
    • pp.159-169
    • /
    • 2024
  • This paper proposes a new real-time fire monitoring and evacuation navigation system by integrating Augmented Reality (AR) technology with Internet of Things (IoT) technology. The proposed system collects temperature data through IoT temperature measurement devices installed in buildings and automatically transmits it to a MySQL cloud database via an IoT platform, enabling real-time and accurate data monitoring. Subsequently, the real-time IoT data is visualized on a 3D building model generated through Building Information Modeling (BIM), and the model is represented in the real world using AR technology, allowing intuitive identification of the fire origin. Furthermore, by utilizing Vuforia engine's Device Tracking and Area Targets features, the system tracks the user's real-time location and employs an enhanced A* algorithm to find the optimal evacuation route among multiple exits. The paper evaluates the proposed system's practicality and demonstrates its effectiveness in rapid and safe evacuation through user experiments based on various virtual fire scenarios.

IEC 61850 Based IoT Gateway Platform for Interworking to Microgrid Operational System (마이크로그리드 운영 시스템 연계를 위한 IEC 61850 기반 IoT 게이트웨이 플랫폼)

  • Park, Jeewon;Song, ByungKwen;Shin, InJae
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.67-73
    • /
    • 2018
  • There are many types of power facilities such as transformers, switches, and energy storage devices in the micro grid environment. However, with the development of IoT technology, opportunities to acquire sensor information such as temperature, pressure, and humidity are provided. In the existing micro grid environment, the communication protocols such as MMS transport protocol in IEC 61850 standard is applied in accordance with the integrated operation between the power facilities and the platform. Therefore, to accommodate IoT data, a gateway technology that can link IoT data to a data collection device (FEP) based on IEC 61850 is required. In this paper, we propose IEC 61850 based IoT gateway platform prototype for microgrid operating system linkage. The gateway platform consists of an IoT protocol interface module (MQTT, CoAP, AMQP) and database, IEC 61850 server. For databases, We used open source based NoSQL databases, Hbase and MongoDB, to store JSON data. We verified the interoperability between the IoT protocol and the IEC 61850 protocol using Sisco's MMS EASY Lite.

Scheme of Secure IoT based Group communication (확장성과 보안을 보장하는 IoT 디바이스 기반의 그룹통신 기법)

  • Kim, Ki-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.1
    • /
    • pp.98-103
    • /
    • 2021
  • In this study, we propose a group communication technique that guarantees security and expandability by configuring a network consisting of IoT terminals equipped with security functions. As the number of devices participating in the network increases, network resources are proportionally reduced, and adding a security function to the IoT device increases the delay time due to encryption in the IoT device. If the error rate that occurs in the network increases, network resources are quickly consumed due to retransmission. Therefore, IoT terminals are grouped to ensure scalability while supporting security, reducing the consumption of network resources even when the number of participating nodes increases, thus ensuring scalability. For the future implementation, the encryption method used in IoT terminals considered the standard of IEEE802.5.4, and the standardization trend was investigated and classified. The proposed method applies IoT devices that provide security functions of the IEEE802.5.4 standard to the group communication base to ensure reliability and scalability. In the performance evaluation, the effectiveness of the proposed method was confirmed by comparing the delay times when grouping IoT devices with security functions through simulation.

Smart healthcare policy trends using IoT technology (IoT 기술을 활용한 밀폐공간 사고 예방 사례 연구)

  • Choi, Hun;Choi, YooJung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.296-297
    • /
    • 2018
  • In recent years, as the number of death in accidents have increased in the working environment, the safety issue has emerged as an important social issue. Despite efforts to reduce safety accidents through many existing safety-related policies and systems, accident prevention is limited. Accident prevention services using IoT technology have been commercialized recently and the effect is very high. In this study, IOT technology is used to investigate the latest cases of reducing death accidents in the work environment.

  • PDF