• Title/Summary/Keyword: IoT-related Companies

Search Result 43, Processing Time 0.027 seconds

Digital Forensic for Location Information using Hierarchical Clustering and k-means Algorithm

  • Lee, Chanjin;Chung, Mokdong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.30-40
    • /
    • 2016
  • Recently, the competition among global IT companies for the market occupancy of the IoT(Internet of Things) is fierce. Internet of Things are all the things and people around the world connected to the Internet, and it is becoming more and more intelligent. In addition, for the purpose of providing users with a customized services to variety of context-awareness, IoT platform and related research have been active area. In this paper, we analyze third party instant messengers of Windows 8 Style UI and propose a digital forensic methodology. And, we are well aware of the Android-based map and navigation applications. What we want to show is GPS information analysis by using the R. In addition, we propose a structured data analysis applying the hierarchical clustering model using GPS data in the digital forensics modules. The proposed model is expected to help support the IOT services and efficient criminal investigation process.

Privacy-Preserving IoT Data Collection in Fog-Cloud Computing Environment

  • Lim, Jong-Hyun;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.43-49
    • /
    • 2019
  • Today, with the development of the internet of things, wearable devices related to personal health care have become widespread. Various global information and communication technology companies are developing various wearable health devices, which can collect personal health information such as heart rate, steps, and calories, using sensors built into the device. However, since individual health data includes sensitive information, the collection of irrelevant health data can lead to personal privacy issue. Therefore, there is a growing need to develop technology for collecting sensitive health data from wearable health devices, while preserving privacy. In recent years, local differential privacy (LDP), which enables sensitive data collection while preserving privacy, has attracted much attention. In this paper, we develop a technology for collecting vast amount of health data from a smartwatch device, which is one of popular wearable health devices, using local difference privacy. Experiment results with real data show that the proposed method is able to effectively collect sensitive health data from smartwatch users, while preserving privacy.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

Study on Building Smart Home Testbed for Collecting Daily Health Condition based on Internet of Things (사물인터넷 기반의 일상 건강정보 수집을 위한 스마트 홈 테스트베드 구축)

  • Chae, Myungsu;Kim, Yongrok;Kim, Sangsik;Kim, Sangtae;Jung, Sungkwan
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.284-292
    • /
    • 2017
  • With the development of Internet of Things (IoT) technology, the combination of ICT and medical services has been increasing to improve the quality of medical services. Using the IoTs, we can collect personal health information continuously in a patient's everyday life. We expect that this will improve the quality of medical service through analysis. However, the problem of ensuring the protection of personal information within the personal health information has been hampering the research, development, and application of such services. Other problems include lack of IoT devices and lack of user convenience for collecting health information about a patient's everyday life. Therefore, in this study, we construct a daily health information management service that can collect the health related information at any time and store this data in personal storage. This data is then only provided to the healthcare worker when necessary. We built a test bed for an IoT-based smart home platform and are currently conducting user experiments. Based on the results of this study, we are attempting to provide a high quality medical trial service based on daily health information through linkage with medical device manufacturers, medical clinics, insurance companies, etc. We expect the proposed health information management service will contribute to the revitalization of smart health care services via activating various health related IoT devices and analyzing daily health information.

Research about the IoT based on Korean style Smart Factory Decision Support System Platform - based on Daegu/Kyeongsangbuk-do region component manufacture companies (IoT 기반의 한국형 Smart Factory 의사결정시스템 플랫폼에 대한 연구 - 대구/경북 부품소재 기업을 중심으로)

  • Sagong, Woon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.1-12
    • /
    • 2016
  • The current economic crisis is making new demands on manufacturing industry, in particular, in terms of the flexibility and efficiency of production processes. This requires production and administrative processes to be meshed with each other by means of IT systems to optimise the use and capacity utilisation of machines and lines but also to be able to respond rapidly to wrong developments in production and thus to minimise adverse impacts on the business. The future scenario of the "smart factory" represents the zenith of this development. The factory can be modified and expanded at will, combines all components from different manufacturers and enables them to take on context-related tasks autonomously. Integrated user interfaces will still be required at most for basic functionalities. The complex control operations will run wirelessly and ad hoc via mobile terminals such as PDAs or smartphones. The comnination of IoT, and Big Data optimisation is bringing about huge opportunities. these processes are not just limited to manufacturing, anywhere a supply chain environment exists can benefit from information provided by linked devices and access to big data to inform their decision support. Building a smart factory with smart assets at its core means reaching those desired new levels of productivity and efficiency. It means smart products that leverage advanced traceability, connectivity and intelligence. For businesses, it means being able to address the talent crunch through more autonomous. In a Smart Factory, machinery and equipment will have the ability to improve processes through self-optimization and autonomous decision-making.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

A Study on the Service Improvement Strategies by Enterprise through the Analysis of Customer Response Reviews in Smart Home Applications : Based on the Classification of Functional Elements and Design Elements of smart Home Usability Values (스마트 홈 어플리케이션의 고객반응리뷰분석을 통한 기업별 서비스개선전략에 대한 연구 : 스마트 홈 사용성 가치의 기능적요소와 디자인적 요소 분류를 바탕으로)

  • Heo, Ji Yeon;Kim, Min Ji;Cha, Kyung Jin
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.85-107
    • /
    • 2020
  • The Internet of Things market, a technology that connects the Internet to various things, is growing day by day. Besides, various smart home services using IoT and AI (Artificial Intelligence) are being launched in homes. Related to this, existing smart home-related studies focus primarily on ICT technology, not on what service improvements should be made in customer positions. In this study, we will use smart home application customer review data to classify functional and design elements of smart home usability value and examine the ways customers think of service improvement. For this, LG Electronics and Samsung Electronics" Smart Home application, the main provider of Smart Home in Korea, customer reviews were crawled to conduct a comparative analysis between them. In this study, the review of IoT home-applications was analyzed to find service improvement insights from customer perspective, and related analysis of text mining, social network analysis and Doc2vec was used to efficiently analyze data equivalent to about 16,000 user reviews. Through this research, we hope that related companies effectively seek ways to improve smart home services that reflect customer needs and are expected to help them establish competitive strategies by identifying weaknesses and strengths among competitors.

A Study on System and Application Performance Monitoring System Using Mass Processing Engine(ElasticSearch) (대량 처리 엔진(ElasticSearch)을 이용한 시스템 및 어플리케이션 성능 모니터링 시스템에 관한 연구)

  • Kim, Seung-Cheon;Jang, Hee-Don
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.147-152
    • /
    • 2019
  • Infrastructure is rapidly growing as Internet business grows with the latest IT technologies such as IoT, BigData, and AI. However, in most companies, a limited number of people need to manage a lot of hardware and software. Therefore, Polestar Enterprise Management System(PEMS) is applied to monitor the system operation status, IT service and key KPI monitoring. Real-time monitor screening prevents system malfunctions and quick response. With PEMS, you can see configuration information related to IT hardware and software at a glance, and monitor performance throughout the entire end-to-end period to see when problems occur in real time.

A Study on the Technological Priorities of Manufacturing and Service Companies for Response to the 4th Industrial Revolution and Transformation into a Smart Company (4차 산업혁명 대응과 스마트 기업으로의 변화를 위한 제조 및 서비스 기업의 기술적용 우선순위에 대한 연구)

  • Park, Chan-Kwon;Seo, Yeong-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.83-101
    • /
    • 2021
  • This study is to investigate, using AHP, what technologies should be applied first to Korean SMEs in order to respond to the 4th industrial revolution and change to a smart enterprise. To this end, technologies related to the 4th industrial revolution and smart factory are synthesized, and the classification criteria of Dae-Hoon Kim et al. (2019) are applied, but additional opinions of experts are collected and related technologies are converted to artificial intelligence (AI), Big Data, and Cloud Computing. As a base technology, mobile, Internet of Things (IoT), block chain as hyper-connected technology, unmanned transportation (autonomous driving), robot, 3D printing, drone as a convergence technology, smart manufacturing and logistics, smart healthcare, smart transportation and smart finance were classified as smart industrial technologies. As a result of confirming the priorities for technical use by AHP analysis and calculating the total weight, manufacturing companies have a high ranking in mobile, artificial intelligence (AI), big data, and robots, while service companies are in big data and robots, artificial intelligence (AI), and smart healthcare are ranked high, and in all companies, it is in the order of big data, artificial intelligence (AI), robot, and mobile. Through this study, it was clearly identified which technologies should be applied first in order to respond to the 4th industrial revolution and change to a smart company.