• Title/Summary/Keyword: IoT Technology

Search Result 1,979, Processing Time 0.026 seconds

IoT Security and Machine Learning

  • Almalki, Sarah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.103-114
    • /
    • 2022
  • The Internet of Things (IoT) is one of the fastest technologies that are used in various applications and fields. The concept of IoT will not only be limited to the fields of scientific and technical life but will also gradually spread to become an essential part of our daily life and routine. Before, IoT was a complex term unknown to many, but soon it will become something common. IoT is a natural and indispensable routine in which smart devices and sensors are connected wirelessly or wired over the Internet to exchange and process data. With all the benefits and advantages offered by the IoT, it does not face many security and privacy challenges because the current traditional security protocols are not suitable for IoT technologies. In this paper, we presented a comprehensive survey of the latest studies from 2018 to 2021 related to the security of the IoT and the use of machine learning (ML) and deep learning and their applications in addressing security and privacy in the IoT. A description was initially presented, followed by a comprehensive overview of the IoT and its applications and the basic important safety requirements of confidentiality, integrity, and availability and its application in the IoT. Then we reviewed the attacks and challenges facing the IoT. We also focused on ML and its applications in addressing the security problem on the IoT.

OAuth 2.0 For Event-based IoT Device Data Communication (이벤트 기반 IoT 디바이스 데이터 통신을 위한 OAuth 2.0)

  • Yuk, Kun Woong;Lim, Taebeom
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2015.07a
    • /
    • pp.531-532
    • /
    • 2015
  • 웹 서비스에 주로 적용되어 왔던 OAuth 2.0 사용자 인증 기법을 이벤트 기반 IoT 디바이스 데이터 통신 처리에 이용할 수 있도록 확장한다. OAuth 2.0 사용자 인증 기법은 최소화된 인증 절차에 맞추어져 있지만, 이벤트 기반의 IoT 디바이스의 데이터를 응용하기에는 적합하지 않은 실정이다. OAuth 2.0 사용자 인증 기법을 이용하여 이벤트 기반의 IoT 디바이스 데이터 통신으로 동작하기 위한 구성방법, Data Format, 그리고 전송 구조를 제안한다.

  • PDF

Comparison and Analysis of Functional Features of IoT Operating Systems (IOT 운영체제들의 기능적 특징들의 비교 및 분석)

  • Lee, Yo-Seob;Moon, Phil-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.337-344
    • /
    • 2017
  • The ICT industry is changing. From the PC to mobile devices, and from the mobile devices to wearable and IoT devices, it is changing. It requires the OS for the IoT, coming out various IoT OS have been developed in accordance with this need. In this paper, we discuss the kind of OS that supports IoT device, analyze the technology trends.

RF Energy Transfer Testbed Based on Off-the-shelf Components for IoT Application (IoT 응용을 위한 RF 에너지 전송 테스트베드 구현 및 실험)

  • Aziz, Arif Abdul;Tribudi, Dimas;Ginting, Lorenz;Rosyady, Phisca Aditya;Setiawan, Dedi;Choi, Kae Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1912-1921
    • /
    • 2015
  • In this paper, we introduce a testbed for testing the RF energy transfer technology in the Internet of Things (IoT) environment, and provide experimental results obtained by using the testbed. The IoT environment considered in this paper consists of a power beacon, which is able to wirelessly transfers energy via microwave, and multiple sensor nodes, which makes use of the energy received from the power beacon. We have implemented the testbed to experiment the RF energy transfer in such IoT environment. We have used off-the-shelf hardware components to build the testbed and have made the tesbed controlled by software so that various energy and data transmission protocol experiments can easily be conducted. We also provide experimental results and discuss the future research direction.

Privacy Protection for 5G Mobile-based IoT Users (5G 이동 통신 기반의 IoT 사용자를 위한 프라이버시 보호 기법)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Recently 5G technology is one of the technologies that has been receiving much positive responses from users as it is integrated with virtual technology. However, 5G's security issues have not been fully resolved and more security is soon required. In this paper, an approach technique is proposed as a probability-based hierarchy to provide personal privacy for 5G-based IoT users more safely. The proposed technique is aimed at not exposing the privacy of IoT users to third parties by using two random keys created personally by IoT users. In order to satisfy both safety and efficiency, the proposed technology divides the privacy of IoT users into two layers. In the first stage, IoT users will control access to intermediate media using anonymous keys generated by IoT users, and in the second stage, information of IoT users registered with servers will be darkened and replicated. The proposed technique has improved the accuracy of the privacy protection of IoT users as they assign weights to layered information after layering users' privacy information on a probabilistic basis.

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

A Privacy Approach Model for Multi-Access to IoT Users based on Society 5.0 (소사이어티 5.0 기반 IoT 사용자에 대한 다중 접근방식의 프라이버시 접근 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.4
    • /
    • pp.18-24
    • /
    • 2020
  • Recently, research on Society 5.0 has been actively carried out in Japan. The Society 5.0 is used in various areas using IoT sensors. This paper proposes a privacy approach model of multiple approaches to IoT users based on Society 5.0. The proposed model used multiple methods of synchronizing important information of IoT devices with one another in the virtual environment. The proposed model improved the efficiency of IoT information by accumulating the weight of IoT information on a probability-based basis. Further, it improves the accuracy of IoT information by segmenting it so that attribute information is linked to IoT information. As a result of the performance evaluation, the efficiency of IoT devices has improved by an average of 5.6 percent, depending on the number of IoT devices and the number of IoT hub devices. Accuracy has improved by an average of 15.9% depending on information collection and processing.

CAN interface supporting IoT application system Setup using open-source hardware and IoT platform (오픈소스 하드웨어와 IoT 플랫폼을 이용한 CAN Interface를 지원하는 차량용 IoT 응용시스템 구현)

  • Kim, Yong Hwan;Park, Su-Ho;Jeong, Jae-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.779-780
    • /
    • 2015
  • As IoT becomes a main technology of the age, many IoT products have developed and are being developed now. By using open-source hardware "Arduino"and open-source IoT platform "Temboo" to analize CAN signal from vehicle and make vehicle IoT environment to analize and use it through the mobile phone, figured out the way to develop the IoT environment with low cost. Also suggest the way to solve problems and improove.

  • PDF

Design and Implementation of Hadoop-based Big-data processing Platform for IoT Environment (사물인터넷 환경을 위한 하둡 기반 빅데이터 처리 플랫폼 설계 및 구현)

  • Heo, Seok-Yeol;Lee, Ho-Young;Lee, Wan-Jik
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.2
    • /
    • pp.194-202
    • /
    • 2019
  • In the information society represented by the Fourth Industrial Revolution, various types of data and information that are difficult to see are produced, processed, and processed and circulated to enhance the value of existing goods. The IoT(Internet of Things) paradigm will change the appearance of individual life, industry, disaster, safety and public service fields. In order to implement the IoT paradigm, several elements of technology are required. It is necessary that these various elements are efficiently connected to constitute one system as a whole. It is also necessary to collect, provide, transmit, store and analyze IoT data for implementation of IoT platform. We designed and implemented a big data processing IoT platform for IoT service implementation. Proposed platform system is consist of IoT sensing/control device, IoT message protocol, unstructured data server and big data analysis components. For platform testing, fixed IoT devices were implemented as solar power generation modules and mobile IoT devices as modules for table tennis stroke data measurement. The transmission part uses the HTTP and the CoAP, which are based on the Internet. The data server is composed of Hadoop and the big data is analyzed using R. Through the emprical test using fixed and mobile IoT devices we confirmed that proposed IoT platform system normally process and operate big data.

An Efficient IoT Platform for Fog Computing (포그 컴퓨팅을 위한 효율적인 IoT 플랫폼)

  • Lee, Han Sol;Choi, Jeong Woo;Byeon, Gi Beom;Hong, Ji Man
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2019
  • With IoT device technology developments, such devices now can perceive the surrounding environment and operate upon the condition, but a method for efficiently processing an enormous amount of IoT device data is required. The existing cloud computing has a transmission delay problem due to load and distance. Fog Computing, an environment to control IoT devices, therefore, emerged to solve this problem. In Fog Computing, IoT devices are located close to each other to solve the shortcomings of the cloud system. While many earlier studies on Fog Computing for IoT mainly focus on its structure and framework, we would like to propose an integrated Fog Computing platform that monitors, analyzes, and controls IoT devices.