• Title/Summary/Keyword: IoT standards

Search Result 90, Processing Time 0.026 seconds

A Study on IoT Devices Vulnerability and Security (IoT 디바이스 보안위협 및 대응방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.9-17
    • /
    • 2021
  • Numerous IoT devices are connected to a wireless network environment to collect and transmit data without time and space limitations, but many security vulnerabilities are exposed in these process. But IoT security is not easy to create feasible security standards and device authentication due to differences in the approach or implementation of devices and networks. However, it is clear that the improvement and application of the standard framework for enhancing the security level of the device is the starting point to help the most successful security effect. In this study, we investigate the confidentiality, integrity, availability, and access control implementation plans for IoT devices (which are the basic goals of information security), and standardized security evaluation criteria for IoT devices, and study ways to improve them.

Trends in standardization of IoT based electrical safety technology (사물인터넷 기반 전기안전 기술 및 표준화 동향)

  • An, Y.Y.;Kim, S.H.;Jeong, S.J.;Kang, H.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.1
    • /
    • pp.49-59
    • /
    • 2020
  • This paper describes an IoT-based electrical safety management system for managing the electrical power distribution systems in factories or buildings and for managing private electrical devices in apartment complex. The IoT-based electrical safety management system collects IoT data from the electrical facilities or devices to provide various electrical safety services. In some cases, it uses an IoT adaptor to collect data from legacy facilities. By monitoring and analyzing the IoT data, it is possible to provide protection from and prevent electrical hazards. In addition, an IoT-based electrical safety management system can benefit from using the IoT identification system and standardized data model of the electrical facilities and devices. An IoT identification system is used to increase manageability of large-scale electrical facilities which consists of numerous IoT devices. A standardized data model is used to support interoperability. This paper also explores some international and Korean standards related to IoT-based electrical safety management.

Recent Trends in Standards Related to the Internet of Things and Machine-to-Machine Communications

  • Husain, Syed;Prasad, Athul;Kunz, Andreas;Papageorgiou, Apostolos;Song, JaeSeung
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.228-236
    • /
    • 2014
  • One of major purposes of these standard technologies is to ensure interoperability between entities from different vendors and enable interworking between various technologies. As interoperability and interworking are essential for machine-to-machine communications (M2M) and Internet of Things (IoT) for them to achieve their ultimate goal, i.e., things to be connected each other, multiple standards organizations are now working on development M2M/IoT related specifications. This paper reviews the current activities of some of the most relevant standardization bodies in the area of M2M and IoT: third-generation partnership project (3GPP) core and radio network aspects, broadband forum, and oneM2M. The major features and issues being focused upon in these standards bodies are summarized. Finally, some key common trends among the different bodies are identified: a common service layer platform, new technologies mitigating an explosive growth of network traffic, and considerations and efforts related to the development of device management technologies.

Development of an oneM2M-compliant IoT Platform for Wearable Data Collection

  • Ahn, Il Yeup;Sung, Nak-Myoung;Lim, Jae-Hyun;Seo, Jeongwook;Yun, Il Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.1-15
    • /
    • 2019
  • Internet of Things (IoT) is commonly referred to as a future internet technology to provide advanced services by interconnecting physical and virtual things, collecting and using many data from them. The IoT platform is a server platform with a common architecture to collect and share the data independent of the IoT devices and services. Recently, oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT announced the availability of oneM2M Release 2 specifications. Accordingly, this paper presents a new oneM2M-compliant IoT platform called Mobius 2.0 and proposes its application to collect the biosignal data from wearable IoT devices for emotion recognition. Experimental results show that we can collect various biosignal data seamlessly and extract meaningful features from the biosignal data to recognize two emotions of joy and sadness.

Design of a Lightweight Security Protocol Using Post Quantum Cryptography (양자내성암호를 활용한 경량 보안 프로토콜 설계)

  • Jang, Kyung Bae;Sim, Min Joo;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.8
    • /
    • pp.165-170
    • /
    • 2020
  • As the IoT (Internet of Things) era is activated, a lot of information including personal information is being transmitted through IoT devices. For information protection, it is important to perform cryptography communication, and it is required to use a lightweight security protocol due to performance limitations. Currently, most of the encryption methods used in the security protocol use RSA and ECC (Elliptic Curve Cryptography). However, if a high performance quantum computer is developed and the Shor algorithm is used, it can no longer be used because it can easily solve the stability problems based on the previous RSA and ECC. Therefore, in this paper, we designed a security protocol that is resistant to the computational power of quantum computers. The code-based crypto ROLLO, which is undergoing the NIST (National Institute of Standards and Technology) post quantum cryptography standardization, was used, and a hash and XOR computation with low computational consumption were used for mutual communication between IoT devices. Finally, a comparative analysis and safety analysis of the proposed protocol and the existing protocol were performed.

Dynamic Service Composition and Development Using Heterogeneous IoT Systems

  • Ryu, Minwoo;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.91-97
    • /
    • 2017
  • IoT (Internet of Things) systems are based on heterogeneous hardware systems of different types of devices interconnected each other, ranging from miniaturized and low-power wireless sensor node to cloud servers. These IoT systems composed of heterogeneous hardware utilize data sets collected from a particular set of sensors or control designated actuators when needed using open APIs created through abstraction of devices' resources associated to service applications. However, previously existing IoT services have been usually developed based on vertical platforms, whose sharing and exchange of data is limited within each industry domain, for example, healthcare. Such problem is called 'data silo', and considered one of crucial issues to be solved for the success of establishing IoT ecosystems. Also, IoT services may need to dynamically organize their services according to the change of status of connected devices due to their mobility and dynamic network connectivity. We propose a way of dynamically composing IoT services under the concept of WoT (Web of Things) where heterogeneous devices across different industries are fully integrated into the Web. Our approach allows developers to create IoT services or mash them up in an efficient way using Web objects registered into multiple standardized horizontal IoT platforms where their resources are discoverable and accessible. A Web-based service composition tool is developed to evaluate the practical feasibility of our approach under real-world service development.

A Study on Security Requirments Analysis through Security Threat Modeling of Home IoT Appliance (Home IoT 가전의 보안위협모델링을 통한 보안요구사항 분석에 관한 연구)

  • Yun, Suk-Jin;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • Today many companies are offering IoT-enabled products and place emphasis on security from the planning stage to protect their products and user information from external threats. The present security levels, however, remain low because the time and resources invested in developing security requirements for each device are far from enough to meet the needs of a wide range of IoT products. Nevertheless, vulnerabilities of IoT devices have been reported continuously, which calls for more detailed security requirements for home IoT devices. In this context, this research identified threats of home IoT systems by using Microsoft Threat Modeling Tool. It then suggested measures to enhance the security of home IoT devices by developing security assessment items through comparative analysis of the identified threats, domestic and global vulnerability assessment standards and related research. It also verified the effectiveness of the developed security requirements by testing them against the existing ones, and the results revealed the security requirements developed in this research proved to be more effective in identifying vulnerabilities.

Scheme for Reliable CoAP Message Transmission in IoT (IoT에서 신뢰적 CoAP 메시지 전송 기법)

  • Youn, Joo-Sang;Hong, Yong-Geun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.355-356
    • /
    • 2014
  • 본 논문에서는 IoT 환경에서 constrained node의 특징을 고려한 4.5 계층의 신뢰적 메시지 전송 방법을 제안한다. 더불어 IoT 서비스 특징 중 데이터 전송과 관련된 내용을 보면 데이터 사이즈는 작고, 자주 데이터를 발생 시키지 않는다. 따라서 IoT 디바이스에서 발생하는 데이터는 신뢰적 전송 서비스가 요구 된다. 따라서 본 논문에서는 오버헤드가 적은 전송 서비스를 제공하는 신뢰적 메시지 전송 방법과 더불어 이 방법에는 sleepy node를 인지하고 이를 지원하는 방법을 포함한다.

  • PDF

A Study on the Rice growing water-management System based on IoT (IoT 기반 벼농사 생장 물 관리 시스템 연구)

  • Nam, Kang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.10
    • /
    • pp.989-994
    • /
    • 2016
  • This study was conducted the management of a water level through the water sensor, the waterline and the drain applied to the rice paddy. The gateway transfers the information to oneM2M(: Machine to Machine) platform of IoT(: Internet of Thing) standards to the height of the water level sensor information through the LoRa connection. Depending on the water level requested by the IoT platform, the gateway is to On or Off waterline or drain motor switch and send the information of the water level sensor. IoT platform performs the intelligent application function according to the condition of the water level.

Transmission Scheme of IPv6 Packets over Near Field Communication (NFC 통신 기반 IPv6 데이터 전송 기법)

  • Youn, JooSang;Choi, Younghwan;Hong, Yong-Geun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.57-58
    • /
    • 2015
  • 본 논문은 근거리 통신 기술인 NFC 통신을 통해 IPv6 패킷을 전송하기 위한 프로토콜 스택 및 기법을 제안한다. 제안하는 기법은 최근 사물인터넷 환경에서 NFC를 탐재한 IoT 디바이스에 인터넷 연결 서비스를 제공하기 위한 기법이다. 현재 제안한 기법은 IETF 6lo WG에서 표준기술로 진행 중이며 추후 NFC 기기의 인터넷 연결성 제공을 위한 기술로 활용될 것이다.

  • PDF