• Title/Summary/Keyword: IoT Technology

Search Result 1,963, Processing Time 0.025 seconds

Home Situation Inference based on Smart Home IoT Data (스마트 홈 IoT 데이터 기반의 홈 상황 추론)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Lee, Hae-Yeoun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.994-996
    • /
    • 2016
  • 글로벌 비즈니스 시장에서 IoT 산업은 급속도로 성장하고 있고 IoT에 대한 많은 연구가 진행되고 잇다. 그 중에서 스마트 홈 IoT 시스템이 대표적이며 이를 상용화하여 서비스를 제공하는 업체도 증가하고 있다. 홈 내부에 여러 IoT 장치와 센서들을 설치하고, 해당 장치와 센서에서 지속적으로 데이터가 생성되고 생성된 데이터를 저장하여 사용자에게 새로운 정보를 제공할 수 있다. 특히, 홈 내부에 설치된 여러 센서들의 데이터를 이용하여 현재 홈 내부 상황을 추론하여 집안 내부의 상황을 사용자에게 알려줄 수 있다. 본 논문에서는 스마트 홈 IoT 데이터를 베이지안 네트워크를 이용해 집안 내부의 쾌적 상황을 추론하여 사용자에게 정보를 제공하고 상황에 따른 행동을 할 수 있도록 정보를 제공하는 방법에 대한 연구의 결과에 대하여 소개한다.

A Roadmap for IoT Network Research and Development

  • almudayni, Ziyad;Soh, Ben;Li, Alice
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2022
  • To make the research and development in IoT networks witness a significant improvement and last for a long period, it is always important to attract new researchers to work on this area and be a part of it. The best way to attract researchers to work in any research area and have their interest is to give them a clear background and roadmap about it. In this way, researchers can easily find a deep point to start their research based on their interest. This paper presents an overview and roadmap about IoT technologies from the most five vital aspects: IoT architecture, communication technologies, type of IoT applications, IoT applications protocols and IoT challenges.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

Extract of evidence on the IoT Device (IoT 단말기에서 증거추출 포렌식 연구)

  • Song, Jin-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.343-345
    • /
    • 2017
  • With the development of IoT technology, terminals connected with IoT are being used. However, security incidents are occurring as IoT is applied to society as a whole. IoT security incidents can be linked to personal risk and social disruption. In this study, we extract the evidence of security breach in IoT device. Analyze IoT security breach environment and extract Hashing function to secure original integrity and integrity. Then, the Forensic evidence is extracted from the IoT security device to verify the integrity of the original and Forensic reports should be written and studied to be used as legal evidence.

  • PDF

A Study on Interworking of Intelligent IoT Semantic Information Using IoT-Lite Ontology (IoT-Lite 온톨로지를 활용한 지능형 사물인터넷 시맨틱 정보연동에 관한 연구)

  • Park, Jong Sub;Hong, June Seok;Kim, Wooju
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.111-127
    • /
    • 2017
  • Computing Performance, sensor, storage, memory, and network costs have been steadily declining, and IoT services have recently become more active. The Internet of Things is linked with Big Data to create new business, and public institutions and corporations are hurry to import Internet of things. As the importance of the Internet of things has increased, the number of devices supporting the IoT has rapidly increased. With the development of the Internet of Things, various types of Internet services are being developed. For this reason, there is an increasing demand for IoT service designers and developers for IoT service case automatic search technology. IoT service designers can avoid duplication with existing services through service case retrieval and developers can save cost and time by combining existing reusable service equipment. This paper proposes IoT-Lite ontology for IoT and Semantic Web service to solve the above-mentioned problems. The existing ontologies for IoT, despite its many advantages, are not widely used by developers because it has not overcome the relatively slow drawbacks of increasing complexity and searching for development. To complement this, this study uses the IoT-Lite ontology introduced by W3C as a model and a semantic web service for automatic system retrieval. 3D camera, GPS, and 9-axis sensor, and IoT-Lite designed by IoT-Lite technique are integrated with the semantic technique and implemented directly.

Implementation of Fog Computing Architecture for IoT Service on Hybrid Broadcast Environment (하이브리드 방송 환경에서의 IoT 서비스 지원을 위한 Fog Computing Architecture 구현)

  • Kum, Seung Woo;Lim, Tae-Beom;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.22 no.1
    • /
    • pp.107-117
    • /
    • 2017
  • Recently, IoT applications are being deployed in Smart TVs, and these IoT applications are using smart TVs as application platforms rather than broadcast platforms. With the advent of Hybrid broadcast technologies, now it becomes available to develop IoT applications which are coupled to the broadcast information. However, the existing IoT services are not suitable for Hybrid broadcast application since they are built on cloud and require various protocol implementations. In this paper, a Fog Computing-based architecture for hybrid broadcast application is proposed. Instead of accessing IoT services from hybrid broadcast app directly, the proposed architecture places Fog Applet Server between them and distribute loads of hybrid broadcast app to the Fog Applet. The proposed architecture is implemented as a service to control IoT device with hybrid application.

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.

Performance Comparison of HTTP, HTTPS, and MQTT for IoT Applications

  • Sukjun Hong;Jinkyu Kang;Soonchul Kwon
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.9-17
    • /
    • 2023
  • Recently, IoT technology has been widely used in many industries. Also research on integrating IoT technology with IoT sensors is actively underway. One of the important challenges in IoT is to support low-latency communication. With the development of communication networks and protocols, a variety of protocols are being used, and their performance is improving. In this paper, we compare the performance and analyze the characteristics of some of the major communication protocols in IoT application, namely MQTT, HTTP, and HTTPS. IoT sensors acquired data by connecting an Arduino equipped with ESP8266 and a temperature and humidity sensor (DHT11). The server measured the performance by building servers for each protocol using AWS EC2. We analyzed the packets transmitted between the Arduino and the server during the data transmission. We measured the amount of data and transfer time. The measurement results showed that MQTT had the lowest data transmission time and data amount among the three protocols.

Trend of IoT-based Healthcare Service (사물인터넷 기반 헬스케어 서비스 기술 동향)

  • Heo, Sung-Phil;Noh, Dong-Hee;Moon, Chang Bae;Kim, Dong-Sung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.221-231
    • /
    • 2015
  • This paper provides the trend of Internet of Things (IoT) for smart healthcare services and applications. IoT has provided a promising opportunity to build intelligent healthcare system and smart wearable applications by using the growing capability of wireless mobile devices, interactive sensors/actuators, and RFID technologies. For analysis of state-of-art technology of smart healthcare system, this paper includes comparative analysis and investigation of existing standard, network protocol, and devices, etc. In this paper, we examine the market trend of IoT healthcare. In particular, we examine the variety of IoT based healthcare type such as mobile, wearable device. After that, we examine the technologies of IoT healthcare such as standard, sensor, network and security. This survey contributes to better understanding of the challenges in existing IoT healthcare and further new light on future research directions.