Loading [MathJax]/jax/output/CommonHTML/jax.js
  • Title/Summary/Keyword: IoT based Management

Search Result 674, Processing Time 0.029 seconds

Recommendation Method considering New User in Internet of Things Environment (사물인터넷 환경에서 새로운 사용자를 고려한 정보 추천 기법)

  • Kwon, Joonhee;Kim, Sungrim
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.23-35
    • /
    • 2017
  • With the popularization of mobile devices, the number of social network service users is increasing, thereby the amount of data is also increasing accordingly. As Internet of Things environment is expanding to connect things and people, there is information much more than before. In such an environment, it becomes very important to recommend the necessary information to the user. In this paper, we propose a recommendation method that considers new users in IoT environment. In the proposed method, we recommend the information by applying the centrality-based social network analysis method to the recommendation method using the social relationships in the social IoT. We describe the seven-step recommendation method and apply them to the music circle scenario of the IoT environment. Through the music circle scenario, we show that we can recommend more suitable information to new users in the IoT environment than the existing recommendation method.

A Study on the Development of Secure Communication Channel Using PUF Technology in M-IoT Environment (M-IoT 환경에서 PUF 기술을 활용한 안전한 통신채널 구성 기법)

  • Kim, Sumin;Lee, Soo Jin
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.107-118
    • /
    • 2019
  • Based on the Internet of Things technology, one of the core technologies of the fourth industrial revolution, our Ministry of Defense is also pushing to establish M-IoT in defense area to improve management efficiency, innovate military culture and strengthen military power. However, devices connected to the Military Internet of Things can be easily exposed to various of cyber threats as most of them are developed and with a focus on improving sensing and communication skills that collect and transmit data. And it is not easy to uniquely identify the numerous heterogeneous devices, and to establish a secure communication channel between devices or between devices and management servers. In this paper, based on PUF technology, we propose a novel key management scheme that can uniquely identify the various devices, and generate the secret keys needed for the establishment of a secure communication channel using non-replicable information generated by the PUF. We also analyze the efficiency of our proposed scheme through comparison with existing key management scheme and verify the logic and security using BAN Logic.

Design of Remote Management System for Smart Factory

  • Hwang, Heejoung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.109-121
    • /
    • 2020
  • As a decrease in labor became a serious issue in the manufacturing industry, smart factory technology, which combines IT and the manufacturing business, began to attract attention as a solution. In this study, we have designed and implemented a real-time remote management system for smart factories, which is connected to an IoT sensor and gateway, for plastic manufacturing plants. By implementing the REST API in which an IoT sensor and smart gateway can communicate, the system enabled the data measured from the IoT sensor and equipment status data to the real-time monitoring system through the gateway. Also, a web-based management dashboard enabled remote monitoring and control of the equipment and raw material processing status. A comparative analysis experiment was conducted on the suggested system for the difference in processing speed based on equipment and measurement data number change. The experiment confirmed that saving equipment measurement data using cache mechanisim offered faster processing speed. Through the result our works can provide the basic framework to factory which need implement remote management system.

The influence of the IoT based healthcare user's experience value on the usage and continuous use intention -Focused on Xiaomi Mi band user in china- (IoT기반 헬스케어 사용자 경험가치가 사용량과 지속적 사용의도에 미치는 영향에 관한연구 -중국내 샤오미 미밴드 사용자를 중심으로-)

  • Shang, Meng;Shin, Yong Ho;Lee, Chul Woo
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.3
    • /
    • pp.689-706
    • /
    • 2016
  • Purpose: This study identifies causality in IoT-based healthcare user's experience(playful experience, economical experience), trust, usage, degree of dependence and continuous use intention, especially focused on chinese case. Methods: Face to face interviews was conducted for people who has experience in the use of the Xiaomi Mi band. This study used Partial Least Square(PLS) method with the questionnaires from the interview. Results: IoT-based healthcare users taking playful experience have a strong trust in a positive economic experiences. Also, the user recognizing the experience as an economic one shows stronger intention to use continuously. Conclusion: By getting healthcare users have more economic experience, they have continuous use intention of healthcare product. The empirical findings can be applied to the related companies strategy building.

Resource Collaboration System based on Private Mobile Object and Public Resource Management Object (개인 모바일 단말과 공용 자원 관리 단말 기반 자원 협업 시스템)

  • Jong-Hyun Park
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.6
    • /
    • pp.81-86
    • /
    • 2024
  • In an IoT environment, various objects operate in an organic relationship and provide a variety of services. This paper proposes a method to utilize shared resources instead of limited resources on a personal mobile device to provide user-requested services in an IoT environment. In order to recommend customized resources among various resources, the paper infers based on the user's sensitive information or usage history on the personal mobile terminal. The public resource management terminal identifies suitable resources, including new and alternative resources, based on environmental information and public information.

An Integrated Framework for Modeling the Influential Factors Affecting the Use of Voice-Enabled IoT Devices: A Case Study of Amazon Echo

  • Temidayo Oluwapelumi Shofolahan;Juyoung Kang
    • Asia pacific journal of information systems
    • /
    • v.28 no.4
    • /
    • pp.320-349
    • /
    • 2018
  • Purpose: The application of IoT is finding continuous acceptance in our daily lives, particularly, smart speakers are making life easier and convenient for consumers. This research aims to develop and test an integrated model of factors influencing consumer's adoption of voice-enabled IoT devices. Design/methodology/approach: Based on the VAM, an integrated voice-enabled IoT device adoption model is proposed. Gender differences on five constructs relating with perceived value (perceived usefulness, perceived enjoyment, perceived security risk, perceived technicality and perceived cost) was also examined through PLS-MGA technique. The usage experience of consumers was also controlled in the integrated VAM. Findings: Result shows that Perceived-Usefulness, Perceived-Enjoyment and Perceived-Cost have a strong effect on Perceived-Value. However, Perceived-Technicality and Perceived-Security-Risk are non-influential and have no significant effect on PV. Additionally, Perceived-Value and Social-Influence plays a significant role in predicting adoption intention. Gender differences also exist in consumers perception of usefulness, enjoyment and cost. In comparison to the basic value-based adoption model, the integrated model provides more insight on consumers adoption of voice-enabled IoT devices. Originality/value: Using an integrated model, this study is one of the first scholarly attempt at modelling the influential factors for adopting smart speakers i.e., voice-enabled IoT devices, with implications for improved adoption.

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery (EFcHD2) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed EFcHD2 method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of EFcHD2 method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

Analysis and Design of Smart Vending Machine System based on IoT (IoT 기반 스마트 자판기 시스템의 분석 및 설계)

  • Cho, Byung-Ho;Ahn, Heui-Hak
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.121-126
    • /
    • 2019
  • Recently IoT named Internet of Things technology is widely used throughout the industry. In this paper, a smart vending machine system is proposed to solve inconvenience of vending machine which is commonly seen. This allows users to purchase goods without cash and saves management costs by allowing vending machine managers to stock and sell conveniently. For the production of this smart vending machine, Analysis example using UML which is object-oriented analysis method and flowchart and screen design applying it are presented. Also this presented method is shown to being applied usefully for a guideline of building smart vending machine commercialization system based on IoT.

Federated Learning Based on Ethereum Network (이더리움 네트워크 기반의 연합학습)

  • Seung-Yeon Hwang;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.191-196
    • /
    • 2024
  • Recently, research on intelligent IoT technology has been actively conducted by various companies and research institutes to analyze various data collected from IoT devices and provide it through actual application services. However, security issues such as personal information leakage may arise in the process of transmitting and receiving data to use data collected from IoT devices for research and development. In addition, as data collected from multiple IoT devices increases, data management difficulties exist, and data movement is costly and time consuming. Therefore, in this paper, we intend to develop an Ethereum network-based federated learning system with guaranteed reliability to improve security issues and inefficiencies in a federated learning environment composed of various devices.

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment (IoT환경에서 무아레 현상을 이용한 사용자 얼굴 인증 기법)

  • Cho, Ik-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.171-176
    • /
    • 2019
  • In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply moirˊe technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow moirˊe as a moirˊe phenomenon method, and the projection moirˊe. When comparing the existing IoT products and IoT products applied with moirˊe technology, IoT products applied with moirˊe technology are safer in terms of security.