• Title/Summary/Keyword: IoT based Management

Search Result 674, Processing Time 0.029 seconds

Design of cloud computing-based framework using IoT paradigm (IoT 패러다임 적용 클라우드 컴퓨팅 기반의 프레임워크 설계)

  • Choi, Kang-im;Choi, Young-keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.248-249
    • /
    • 2015
  • In Anywhere - anytime communication environments, communication technology that combines all the things around was the advent of the IoT(Internet of Things) paradigm Internet technology and Cloud computing is enabling the processing and service for a large data processing technology. In the convergence of the IoT and the Cloud computing, I propose a framework to ensure that the high reliability and high performance of data treatment and management.

  • PDF

Open Research Problem for effective IoT Authentication

  • Mihir Mehta;Kajal Patel
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.174-178
    • /
    • 2024
  • IoT is collection of different "things" which are associated with open web. As all the things are connected to the Internet, it offers convenience to end users for accessing the resources from "Any Where, Any Time" throughout the globe. At the same time, open nature of IoT provides a fertile ground to an intruder for launching different security related threats. If we can no apply proper security safeguards to the IoT System, then it will be not useful to society. Authentication, Encryption, Trust Management and Secure Routing are different domains to offer security in IoT system. Among them, Authentication is very much important security service as it validates device identity before granting access to system services/ resources. Existing IoT Authentication algorithms are fail to verify device identity in unambiguous way. They are vulnerable to different security threats such as Key Stolen threat, MITM threat and Location Spoofing threat. So, it is a demand of time to design an efficient and secure Multi-factor IoT algorithm which can offer better security and validate device identity in unambiguous way.

Spectrum Policy and Technologies for Promoting IoT Services (IoT 서비스 활성화를 위한 스펙트럼 정책 및 기술)

  • Kim, Young-Soo;Park, Duk-Kyu;Song, Kyeong-Min
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.7
    • /
    • pp.528-539
    • /
    • 2017
  • Since IoT is expected to enable hyper-connected society to be realized with the advent of the 4th Industrial Revolution, many advanced foreign countries as well as United Kingdom identified IoT spectrum policy as one of the first priority in spectrum management in order to cope with the frequency demands required for the promotion of IoT service. In Korea, the frequencies of 110 MHz bandwidth has been also supplied additionaly for IoT in July 2016 in order to activate a promising new IoT industry based on wireless communication, which has great potential for future industrial growth. Therefore, in this paper, we propose spectrum policy and the research and innovation trends on IoT to promote IoT industry by analyzing the major communication network, the key challenge technologies and the spectrum policy framework of foreign countries.

Implementation and Analysis of CoAP-Based Lightweight OpenADR2.0b protocol for Smart Energy IoT Environment (스마트 에너지 IoT를 위한 CoAP 기반 Lightweight OpenADR2.0b 프로토콜의 구현 및 분석)

  • Park, Heon-Il;Kim, Se-Young;Kang, Seong-Cheol;Park, Hyun-Jin;Kim, Il-Yeon;Choi, Jin-Seek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.904-914
    • /
    • 2017
  • For efficient energy usage, the concept of demand response has been emerged and thereby Open Automated D emand Response(OpenADR) protocol is developed as a standard protocol to provide automated demand response. There have been emerging trends on the demand response services using the Internet of Things(IoT) for smart h ome energy management. In this smart home energy IoT environment, a lightweight protocol is needed rather tha n the existing HTTP/ XML based OpenADR protocol for demand response services since many small devices wi ll be interconnected. In this paper, we propose a lightweight OpenADR protocol based on CoAP protocol for pro viding demand response service in Smart Energy IoT environment, implement the proposed CoAP-based protocol, and analyzed the performance compared to existing HTTP/ XML-based OpenADR 2.0b protocol.

Development of IoT based Fishbowl Management System (IoT 어항 관리 시스템 개발)

  • Choi, Hyo Hyun;Koo, HyeonMo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.173-174
    • /
    • 2020
  • 본 논문에서는 IoT(Internet of Things)와 릴레이(Relay)를 활용한 어항관리 시스템을 개발하였다. 기존의 어항관리시스템(Fishbowl Management System)은 가격이 높거나, 호환성이 떨어지기 때문에 개인이 도입하기에는 어려운 점이 있었다. 본 논문에서 제시하는 어항관리 시스템은 이러한 기존 시스템들의 단점을 극복하고 더 효율적인 어항 운영을 위한 대안으로서 제시된다. 가격이 낮은 미니컴퓨터와 웹 서버, 그리고 릴레이를 이용하여 장치를 제어함으로써 호환성 부족의 문제를 개선하여 어항에 사용되는 장치의 제약을 줄였다. 또한 웹 서버와 외부 데이터베이스 서버를 두어 어항의 상태를 관리, 기록할 수 있어서 어항 운영의 안정성을 높였다.

  • PDF

A Study on Blockchain Networking for Internet of Things (사물인터넷을 위한 블록체인 네트워킹에 대한 연구)

  • Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.201-210
    • /
    • 2018
  • High expectations are posed on the blockchain-based internet of things (IoT), in which IoT and blockchain technology is combined to obtain trust in the Internet, where trust appears impossible to obtain. However, applications of current blockchain-based IoT technology to real-world scenarios appears to be significantly more difficult owing to limitations regarding scalability and security. In this paper, the difficulties to implement blockchain networking technologies for IoT and digital businesses are investigated and practical solutions such as sharding, off-chain, de-idetification and P2P crypto-currency exchange are explored. In further work, a blockchain platform for IoTs which provides scalability and security will be implemented according to this research results, and compared with conventional blockchain platforms.

A Study on Drowsy Rest Area Expressway Using IoT Technology (IoT기술을 활용한 스마트 졸음쉼터 운영연구)

  • Kim, Yu-Doo;Chung, Jason;Kwon, Soon-Bum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.545-547
    • /
    • 2018
  • In fact, the importance of installation and management is getting bigger and bigger due to the accident prevention effect of motorway sleep. By introducing a management system using IoT technology based on the sleepover room located in the remote area, it provided a convenient system for users to develop the environment and managers by providing efficient management system for the management of the Korea Highway Corporation.

  • PDF

A Case Study of the Characteristics of Fire-Detection Signals of IoT-based Fire-Detection System (사례 분석을 통한 IoT 기반 화재탐지시스템의 화재 감지신호 특성)

  • Park, Seung Hwan;Kim, Doo Hyun;Kim, Sung Chul
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.3
    • /
    • pp.16-23
    • /
    • 2022
  • This study aims to provide a fundamental material for identifying fire and no-fire signals using the detection signal characteristics of IoT-based fire-detection systems. Unlike analog automatic fire-detection equipment, IoT-based fire-detection systems employ wireless digital communication and are connected to a server. If a detection signal exceeds a threshold value, the measured values are saved to a server within seconds. This study was conducted with the detection data saved from seven fire accidents that took place in traditional markets from 2020 to 2021, in addition to 233 fire alarm data that have been saved in the K institute from 2016 to 2020. The saved values demonstrated variable and continuous VC-Signals. Additionally, we discovered that the detection signals of two fire accidents in the K institution had a VC-Signal. In the 233 fire alarms that took place over the span of 5 years, 31% of smoke alarms and 30% of temperature alarms demonstrated a VC-Signal. Therefore, if we selectively recognize VC-Signals as fire signals, we can reduce about 70% of false alarms.

Space-Efficient Compressed-Column Management for IoT Collection Servers (IoT 수집 서버를 위한 공간효율적 압축-칼럼 관리)

  • Byun, Siwoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.1
    • /
    • pp.179-187
    • /
    • 2019
  • With the recent development of small computing devices, IoT sensor network can be widely deployed and is now readily available with sensing, calculation and communi-cation functions at low cost. Sensor data management is a major component of the Internet of Things environment. The huge volume of data produced and transmitted from sensing devices can provide a lot of useful information but is often considered the next big data for businesses. New column-wise compression technology is mounted to the large data server because of its superior space efficiency. Since sensor nodes have narrow bandwidth and fault-prone wireless channels, sensor-based storage systems are subject to incomplete data services. In this study, we will bring forth a short overview through providing an analysis on IoT sensor networks, and will propose a new storage management scheme for IoT data. Our management scheme is based on RAID storage model using column-wise segmentation and compression to improve space efficiency without sacrificing I/O performance. We conclude that proposed storage control scheme outperforms the previous RAID control by computer performance simulation.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.