• Title/Summary/Keyword: IoT technologies

Search Result 646, Processing Time 0.028 seconds

An Analysis of Research Trends in IoT Security (IoT 보안에 대한 국내외 연구 동향 분석)

  • Yu, Woo Young
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.61-67
    • /
    • 2018
  • IoT technology is currently being applied at various industrial sites and is developing as a core technology in the fourth industrial revolution. Along with IoT developments, awareness and importance of IoT security is increasing, and research on IoT security is underway to counter these threats. However, research trends in the context of IoT security awareness are insufficient. This paper is a research that analyzes the progress of R&D and IoT security in both domestic and international IoT and thus leads to improvements. The research covered the 229 papers and articles of domestic and foreign journals covering security fields as a main theme. Among them, detailed analyses of 96 papers related to IoT security were performed. Research has shown that many studies are being conducted on trends in IoT security, key management and privacy. A detailed study on the characteristics of services to apply IoT technologies and access control and authentication between IoT devices is needed, and a study that addressed the issues of privacy in IoT environments in Korea.

  • PDF

A study on detection methodology of threat on cars from the viewpoint of IoT (IoT 관점에서의 차량 위협 탐지 방안)

  • Kwak, Byung Il;Han, Mi Ran;Kang, Ah Reum;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.411-421
    • /
    • 2015
  • These days, a conversion of the fast-advancing ICT (Information and Communications Technologies) and the IoT (Internet of Things) has been in progress. However, these conversion Technology could lead to many of the security threat existing in the ICT environment. The security threats of car in the IoT environment could cause the property damage and casualty. There are the inadequate preparations for the car security and the difficulty of detection for the security threats by itself. In this paper, we proposed the decision-making framework for the anomaly detection and found out what are the threats of car in the IoT environment. The discrimination of the factor, path and type of threats from the attack against the car should take priority over the self-inspection and the swift handling of the attack on control system.

Design and Implementation of Hospital Room Management System Based on IoT CareBots (IoT 케어봇 기반 병실 관리 시스템의 설계 및 구현)

  • Jo, Sang-Young;Jeong, Jin-Woo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.370-378
    • /
    • 2018
  • Recent advances in network infrastructures, sensors, and IoT devices have accelerated the research and development of monitoring and interaction technologies designed for people, buildings, and environments. In particular, there has been an increasing demand for monitoring technologies for vulnerable people such as the infirm, disabled, and children. In this paper, we propose an efficient hospital room management system based on IoT care robots. The status of hospital rooms can be monitored and controlled more efficiently and intuitively by utilizing IoT devices and a cloud platform. We demonstrated the feasibility of the proposed system through the implementation of a prototype based on ARTIK IoT devices and the ARTIK Cloud platform. We found that the proposed system requires approximately 600 ms and 130 ms to collect sensor data and respond to alerts, respectively, which demonstrates it can operate in real-time.

A Study on the Improvement of Availability of Distributed Processing Systems Using Edge Computing (엣지컴퓨팅을 활용한 분산처리 시스템의 가용성 향상에 관한 연구)

  • Lee, Kun-Woo;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.83-88
    • /
    • 2022
  • Internet of Things (hereinafter referred to as IoT) related technologies are continuously developing in line with the recent development of information and communication technologies. IoT system sends and receives unique data through network based on various sensors. Data generated by IoT systems can be defined as big data in that they occur in real time, and that the amount is proportional to the amount of sensors installed. Until now, IoT systems have applied data storage, processing and computation through centralized processing methods. However, existing centralized processing servers can be under load due to bottlenecks if the deployment grows in size and a large amount of sensors are used. Therefore, in this paper, we propose a distributed processing system for applying a data importance-based algorithm aimed at the high availability of the system to efficiently handle real-time sensor data arising in IoT environments.

ECQV Certificate Based Security Mechanism for End-to-End Security in IoT (IoT 종단간 보안을 위한 ECQV 인증서 기반의 보안 메커니즘)

  • Yeon, Han-Beol;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.53-61
    • /
    • 2017
  • IoT technology is evolving and related services and technologies are spreading throughout the life. These IoT technologies make life easier for users, but they also have big threats like double-edged swords. Therefore, the importance of security is emerging and related researches are actively proceeding. Existing researches have focused on reducing the computational load on the constrained devices, performing the DTLS for the end-to-end security from a network architecture perspective. In this paper, we propose a DTLS protocol that uses ECQV certificate instead of existing X.509 certificate to reduce the load of DTLS protocol from the network perspective. In addition, the proposed scheme is implemented and compared with PSK and RPK modes.

Research on Convergence of Internet-of-Things and Cloud Computing (사물인터넷과 클라우드 컴퓨팅의 융합에 대한 연구)

  • Choi, Kyung;Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.5
    • /
    • pp.1-12
    • /
    • 2016
  • Internet of Things (IoTs) technologies have been computerized information generated from a variety of objects and humans, and have been applied to various fields by connecting via the Internet. In order to compensate for the marginal characteristics of IoT smart devices, such as low-power, limited processing and capacities, combining IoT and cloud computing technologies is now established itself as one of the paradigms. In this paper, we look at the definition, features and services of IoT and cloud computing technology, and we investigate and analyze the conversing needs of IoT and could computing, existing conversion paradigms, convergence cases, and platforms. In results, there are challenges to be solved, even though the cloud technologies complement a number of restrictions of IoT and offer various advantages such as scalability, interoperability, reliability, efficiency, availability, security, ease of access, ease of use, and reduced cost of deployment. We analyze the new research issues of convergence paradigm, and finally suggest a research challenges for convergence.

Practical Methods for Managing Faults in IoT Computing (IoT 컴퓨팅의 실용적 결함 관리 기법)

  • Park, Chun Woo;Kim, Soo Dong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.75-86
    • /
    • 2015
  • Internet of Thing (IoT) computing is an environment where various devices with sensors and actuators are connect, and interact together to acquire contexts and provide useful services. With the advances of IoT technologies, its usability becomes an in important issue. However, there exist various types of faults in IoT computing which are not conventionally addressed in software research community. Providing reliable IoT services is challenging. In this paper, we present a hierarchy of IoT faults and analyze causes and symptoms of the faults. Based on the analysis, we define effective methods for managing IoT faults. We believe that our proposed framework for managing IoT faults can be utilized in reducing the development cost of IoT applications and enhancing the quality of the applications.

Cloud Computing에서의 IoT(Internet of Things) 보안 동향

  • Shon, Tae-Shik;Ko, Jong-Bin
    • Review of KIISC
    • /
    • v.22 no.1
    • /
    • pp.20-30
    • /
    • 2012
  • 클라우드 컴퓨팅과 IoT 기술은 미래 ICT(Information Communication Technologies)의 핵심이 되는 기술이다. 급속한 ICT 기술의 발전과 함께 우리 주변의 모든 사물을 연결하고 주변의 다양한 정보를 습득하는 IoT 인프라에서 발생하는 데이터의 처리와 활용을 위해서도 클라우드 컴퓨팅 환경은 밀접히 고려되어야 할 것이다. 하지만 이러한 두 기술 모두 각각의 보안 취약점이 존재하고, 미래에 두 기술이 병합될 때 추가적인 보안위협이 발생될 수 있다. 본 논문에서는 클라우드 컴퓨팅과 IoT 기술 및 보안 동향에 대해 알아보고 두 기술의 접목 시 발생하게 될 보안 위협요소를 식별하여 이에 대한 대응방안에 대해 검토하여 보고자 한다.

Performance Evaluation of Low Power Communication Techniques Coverage for Internet of Things (IoT를 위한 저전력 통신 기술의 성능 평가)

  • Yoon, JeongHyeon;Kim, Seungku
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.9
    • /
    • pp.1211-1223
    • /
    • 2021
  • Internet of Things(IoT) services have increased the demand for connectivity among electronics devices. As a result, various types of novel wireless communication technologies have been standardized and developed. In this paper, we evaluate the performance of low power wireless communication technologies such as Bluetooth, IEEE 802.15.4, DASH 7, IEEE 802.15.4g, LoRa, and SigFox in various environments. This is the first experiment evaluating various low power wireless communication technologies in real testbed. We expect that the evaluation results will be useful data to other researchers in applying the IoT technology in the future.

One Time Password-Based SEED Algorithm for IoT Systems (IoT 시스템을 위한 시간 동기화 방식 기반 SEED 알고리즘)

  • Lee, Sung-Won;Park, Seung-Min;Sim, Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.9
    • /
    • pp.766-772
    • /
    • 2016
  • Recent advances in networking and computers, especially internet of things (IoT) technologies, have improved the quality of home life and industrial sites. However, the security vulnerability of IoT technologies causes life-threatening issues and information leakage concerns. Studies regarding security algorithms are being conducted. In this paper, we proposed SEED algorithms based on one time passwords (OTPs). The specified server sent time data to the client every 10 seconds. The client changed the security key using time data and generated a ciphertext by combining the changed security key and the matrix. We applied the SEED algorithms with enhanced security to Linux-based embedded boards and android smart phones, then conducted a door lock control experiment (door lock & unlock). In this process, the power consumed for decryption was measured. The power consumption of the OTP-based algorithm was measured as 0.405-0.465W. The OTP-based algorithm didn't show any difference from the existing SEED algorithms, but showed a better performance than the existing algorithms.