• Title/Summary/Keyword: IoT Web

Search Result 206, Processing Time 0.032 seconds

Ontology Based-Security Issues for Internet of Thing (IoT): Ontology Development

  • Amir Mohamed Talib
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.168-176
    • /
    • 2023
  • The use of sensors and actuators as a form of controlling cyber-physical systems in resource networks has been integrated and referred to as the Internet of Things (IoT). However, the connectivity of many stand-alone IoT systems through the Internet introduces numerous security challenges as sensitive information is prone to be exposed to malicious users. In this paper, IoT based-security issues ontology is proposed to collect, examine, analyze, prepare, acquire and preserve evidence of IoT security issues challenges. Ontology development has consists three main steps, 1) domain, purpose and scope setting, 2) important terms acquisition, classes and class hierarchy conceptualization and 3) instances creation. Ontology congruent to this paper is method that will help to better understanding and defining terms of IoT based-security issue ontology. Our proposed IoT based-security issue ontology resulting from the protégé has a total of 44 classes and 43 subclasses.

Improvement of SWoT-Based Real Time Monitoring System (SWoT 기반 실시간 모니터링 시스템 개선)

  • Yu, Myung-han;Kim, Sangkyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.7
    • /
    • pp.227-234
    • /
    • 2015
  • USN-based real-time monitoring systems, which receive raw data from sensor nodes and store the processed information in traditional servers, recently get to be replaced by IoT(Internet of Things)/WoT(Web of Things)-based ones. Especially, Social Web of Things(SWoT) paradigm can make use of cloud storage over Social Network Service(SNS) and enable the possibility of integrated access, management and sharing. This paper proposes an improved SWoT-based real-time monitoring system which makes up for weak points of existing systems, and implements monitoring service integrating a legacy sensor network and commercial SNS without requiring additional servers. Especially, the proposed system can reduce emergency propagation time by employing PUSH messages.

Design and Implementation of Web Server for Controlling IoT Module Power (IoT 모듈 전원 제어를 위한 웹서버 설계 및 구현)

  • Kim, Ji-Seong;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.115-117
    • /
    • 2019
  • 현재 우리나라는 지속되는 인구의 고령화와 단순 노동인구의 저하 등의 이유로 곳곳에 노동력이 부족한 상황이다. 그로인해 노동력을 대신할 기계들과 자동화 시스템이 많이 개발되었고, 발전해 나가고 있다. 본 논문의 웹서버는 IoT모듈의 전원을 무선통신을 통해 제어함으로 전원의 on/off기능을 통해 원거리에서 제어할 수 있는 방법으로 인력을 감소시킬 수 있다. 본 논문에서는 아두이노의 릴레이모듈, WiFi 모듈, 무선통신 웹서버를 통해 IoT 모듈의 전원을 제어하는 방법을 제안한다. HTTP 통신을 이용하여 웹서버에서 현재 on/off 제어 데이터를 IoT 모듈에서 읽어갈 수 있게 하고, IoT 모듈은 웹서버에서 읽어온 정보를 기반으로 작동하고 웹 서버로 자신의 정보를 전달한다.

  • PDF

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

Analytical model for mean web object transfer latency estimation in the narrowband IoT environment (협대역 사물 인터넷 환경에서 웹 객체의 평균 전송시간을 추정하기 위한 해석적 모델)

  • Lee, Yong-Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.1-4
    • /
    • 2015
  • This paper aims to present the mathematical model to find the mean web object transfer latency in the slow-start phase of TCP congestion control mechanism, which is one of the main control techniques of Internet. Mean latency is an important service quality measure of end-user in the network. The application area of the proposed latency model is the narrowband environment including multi-hop wireless network and Internet of Things(IoT), where packet loss occurs in the slow-start phase only due to small window. The model finds the latency considering initial window size and the packet loss rate. Our model shows that for a given packet loss rate, round trip time and initial window size mainly affect the mean web object transfer latency. The proposed model can be applied to estimate the mean response time that end user requires in the IoT service applications.

Establishment of Analysis Model Using a Service Blueprint for Marketing Evaluation of IoT Services (IoT 서비스의 마케팅 평가를 위한 서비스 청사진 기법을 활용한 분석 모델 구축)

  • Jeon, Heewon;Park, Jae Wan
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.10
    • /
    • pp.71-79
    • /
    • 2018
  • The Internet of Things is a technology that makes it possible for objects made up of hardware and software to exchange information with one another via the Internet, thereby facilitating the servitization of the objects. An IoT service, which is composed of an IoT device and a web service, has recently been applied to the marketing field and is being used as a means to meet customer needs. However, applying appropriate marketing elements to IoT services is not easy. Therefore, analysis tools are needed to properly apply marketing elements to IoT services. This study aims to construct an analysis model for marketing evaluation of IoT services. In this study, the technical elements and marketing elements of IoT were derived through a literature review, and the analysis model for marketing evaluation of IoT services was established by exploring the relationship between the elements based on a service blueprint. We also applied real cases to verify the analytical model. This study is expected to contribute to the development of tools for evaluating IoT services.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

Ontology-based IoT Context Information Modeling and Semantic-based IoT Mashup Services Implementation (온톨로지 기반의 IoT 상황 정보 모델링 및 시맨틱 기반 IoT 매쉬업 서비스 구현)

  • Seok, Hyun-Seung;Lee, Yong-Ju
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.671-678
    • /
    • 2019
  • The semantic information provided through the semantic-based IoT system will produce new high value-added products that are completely different from what we have known and experienced. From this point of view, the key issue of current IoT technology and applications is the development of an intelligent IoT platform architecture. The proposed system collects the IoT data of the sensors from the cloud computer, converts them into RDF, and annotates them with semantics. The converted semantic data is shared and utilized through the ontology repository. We use KT's IoTMakers as a cloud computing environment, and the ontology repository uses Jena's Fuseki server to express SPARQL query results on the web using Daum Map API and Highcharts API. This gives people the opportunity to access the semantic IoT mash-up service easily and has various application possibilities.

A Design and Implementation for Registration Service of IoT Embedded Node using CoAP Protocol-based Resource Directory in Mobile Internet Environments (모바일 인터넷 환경에서 CoAP 프로토콜 기반의 RD를 이용한 IoT 임베디드 노드 등록 서비스 설계 및 구현)

  • Hang, Lei;Jin, Wenquan;Kim, Do-Hyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.147-153
    • /
    • 2016
  • Recently, IETF (Internet Engineering Task) working group has adopted CoAP (Constrained Application Protocol) as a standard IoT proctocol. CoAP is a specialized web transfer protocol for use with constrained nodes and constrained environment such as small memory and low power networks. In this paper, we design and implement a registration service with CoAP protocol based on RD(Resource Directory) to connect IoT nodes in mobile Internet environments. The resource directory between the mobile terminal and IoT nodes provides to discover the IoT nodes and get the context data. The mobile terminal has as the CoAP client and embedded IoT nodes includes as the CoAP server so that it can conveniently manage the constrained IoT nodes to get the context data and control devices in a mobile environments.

Design and Implementation of Personalized IoT Service base on Service Orchestration (서비스 오케스트레이션 기반 사용자 맞춤형 IoT 서비스의 설계 및 구현)

  • Cha, Siho;Ryu, Minwoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.21-29
    • /
    • 2015
  • The Internet of Things (IoT) is an Infrastructure which allows to connect with each device in physical world through the Internet. Thus IoT enables to provide meahup services or intelligent services to human user using collected data from those devices. Due to these advantages, IoT is used in divers service domains such as traffic, distribution, healthcare, and smart city. However, current IoT provides restricted services because it only supports monitor and control devices according to collected data from the devices. To resolve this problem, we propose a design and implementation of personalized IoT service base on service orchestration. The proposed service allows to discover specific services and then to combine the services according to a user location. To this end, we develop a service ontology to interpret user information according to meanings and smartphone web app to use the IoT service by human user. We also develop a service platform to work with external IoT platform. Finally, to show feasibility, we evaluate the proposed system via study.