• Title/Summary/Keyword: Public Internet of Things

Search Result 162, Processing Time 0.026 seconds

Cyber Insurance and Distribution Channels

  • Kwak, Young-Arm;Cho, Young-Sang
    • Journal of Distribution Science
    • /
    • v.16 no.5
    • /
    • pp.61-70
    • /
    • 2018
  • Purpose - These days, an individual user, private entity, hears everyday news of hacking and personal information leakage in the era of a most-connected society. This study investigates cyber attack, cyber insurance and distribution channels for insurance goods in South Korea by analyzing various cases of cyber attacks in domestic and overseas case. Research design, data and methodology - This study adopted various study cases instead of the one large case for deep quality analysis, and focused on various cases of domestic and overseas cyber attacks with insurance. Result - As a result of analyzing the cases that were hacked, types of massive losses and damages arising out of internet blackout due to cyber risks are paralyzation of public and private website and portal, electronic administrative system, public infrastructure, and consequently a normal operation of nation is impossible. These losses and damages however can be coverable under cyber insurance. Conclusions - This paper suggests insurance carriers, as suppliers, should provide multiple channels to sell to the customer and should expand the strategy of advertisement and promotion in order for them to change their mind and compare the price and value of the information of individual users and private entity in view of cost savings.

Secure Configuration Scheme for Internet of Things using NFC as OOB Channel (NFC를 OOB 채널로 활용한 사물인터넷 보안 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • The PSK (Pre-shared Secret Key) based method is appropriate for the IoT environment consisting of lightweight devices since this method requires less computing time and energy than the method to configure the session key based on the public key algorithm. A fundamental prerequisite for the PSK based method is that PSK should have been configured between the communication entities safely in advance. However, in case of a small sensor or actuator, no input and output interface such as keyboard and monitor required for configuration exists, so it is more difficult to configure PSK for such lightweight devices safely in the IoT environment than the previous Internet devices. Especially, normal users lack expertise in security so they face difficulty in configuration. Therefore, the default value configured at the time of manufacturing at factories is used or the device installer configures PSK in most cases. In such case, it is a matter for consideration whether all installers and manufacturers can be trusted or not. In order to solve such problem, this paper proposes a secure bootstrapping scheme, which utilizes the NFC (Near Field Communication) as an OOB (Out-Of-Band) channel, for lightweight devices with limited resources.

Automatic Detection System for Dangerous Abandoned Objects Based on Vision Technology (비전 기술에 기반한 위험 유기물의 자동 검출 시스템)

  • Kim, Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.69-74
    • /
    • 2009
  • Abandoned objects should be treated as possibly dangerous things for public areas until they turn out to be safe because explosive material or chemical substance is intentionally contained in them for public terrors. For large public areas such as airports or train stations, there are limits in man-power for security staffs to check all the monitors for covering the entire area under surveillance. This is the basic motivation of developing the automatic detection system for dangerous abandoned objects based on vision technology. In this research, well-known DBE is applied to stably extract background images and the HOG algorithm is adapted to discriminate between human and stuff for object classification. To show the effectiveness of the proposed system, experiments are carried out in detecting intrusion for a forbidden area and alarming for abandoned objects in a room under surveillance.

  • PDF

Artificial neural fuzzy system and monitoring the process via IoT for optimization synthesis of nano-size polymeric chains

  • Hou, Shihao;Qiao, Luyu;Xing, Lumin
    • Advances in nano research
    • /
    • v.12 no.4
    • /
    • pp.375-386
    • /
    • 2022
  • Synthesis of acrylate-based dispersion resins involves many parameters including temperature, ingredients concentrations, and rate of adding ingredients. Proper controlling of these parameters results in a uniform nano-size chain of polymer on one side and elimination of hazardous residual monomer on the other side. In this study, we aim to screen the process parameters via Internet of Things (IoT) to ensure that, first, the nano-size polymeric chains are in an acceptable range to acquire high adhesion property and second, the remaining hazardous substance concentration is under the minimum value for safety of public and personnel health. In this regard, a set of experiments is conducted to observe the influences of the process parameters on the size and dispersity of polymer chain and residual monomer concentration. The obtained dataset is further used to train an Adaptive Neural network Fuzzy Inference System (ANFIS) to achieve a model that predicts these two output parameters based on the input parameters. Finally, the ANFIS will return values to the automation system for further decisions on parameter adjustment or halting the process to preserve the health of the personnel and final product consumers as well.

Influences and Barriers in the Kingdom of Saudi Arabia Affecting Technology Adoption in Healthcare: A Review Paper

  • Abdulaziz Alomari;Ben Soh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.59-67
    • /
    • 2023
  • The healthcare industry continues to adopt and integrate smart technology in its operations, from medical devices to managing operations. However, the adoption curve has not been smooth, and the historical record of technology adoption in the Kingdom of Saudi Arabia reveals the existence of both known and unknown issues. This review paper is aimed to explain the influences and barriers present in the Saudi healthcare sector affecting IoT technology adoption. A comprehensive discussion of the literature illustrated that Vision 2030, the privatisation trend, transformation in disease patterns and ageing, issues in management and increasing public awareness are the key drivers that may influence the need for the medical Internet of Things (mIoT) in Saudi healthcare. However, based on the past trend, the introduction and adoption of mIoT will likely experience issues such as noncompliance from doctors and nurses due to negative beliefs, lack of knowledge and inadequate perception of effort requirements. Thus, in-depth research of the factors associated with mIoT technology adoption is suggested for a smooth transition.

A Study on Building a Test Bed for Smart Manufacturing Technology (스마트 제조기술을 위한 테스트베드 구축에 관한 연구)

  • Cho, Choon-Nam
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.34 no.6
    • /
    • pp.475-479
    • /
    • 2021
  • There are many difficulties in the applications of smart manufacturing technology in the era of the 4th industrial revolution. In this paper, a test bed was built to aim for acquiring smart manufacturing technology, and the test bed was designed to acquire basic technologies necessary for PLC (Programmable Logic Controller), HMI, Internet of Things (IoT), artificial intelligence (AI) and big data. By building a vehicle maintenance lift that can be easily accessed by the general public, PLC control technology and HMI drawing technology can be acquired, and by using cloud services, workers can respond to emergencies and alarms regardless of time and space. In addition, by managing and monitoring data for smart manufacturing, it is possible to acquire basic technologies necessary for embedded systems, the Internet of Things, artificial intelligence, and big data. It is expected that the improvement of smart manufacturing technology capability according to the results of this study will contribute to the effect of creating added value according to the applications of smart manufacturing technology in the future.

Reliability-based Message Transmission System in Healthcare Devices (헬스케어 디바이스에서의 신뢰성 기반 메시지 전달 시스템)

  • Lee, Young-Dong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.3
    • /
    • pp.142-147
    • /
    • 2020
  • The Internet of Things is valuable as a means of solving social problems such as personal, public, and industrial. Recently, the application of IoT technology to the healthcare industry is increasing. It is important to ensure reliability and security in IoT-based healthcare services. Communication protocols, wireless transmit/receive techniques, and reliability-based message delivery are essential elements in IoT healthcare devices. The system was designed and implemented to measure body temperature and activity through body temperature and acceleration sensors and deliver them to the oneM2M-based Mobius platform.

Study of Modular Multiplication Methods for Embedded Processors

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.3
    • /
    • pp.145-153
    • /
    • 2014
  • The improvements of embedded processors make future technologies including wireless sensor network and internet of things feasible. These applications firstly gather information from target field through wireless network. However, this networking process is highly vulnerable to malicious attacks including eavesdropping and forgery. In order to ensure secure and robust networking, information should be kept in secret with cryptography. Well known approach is public key cryptography and this algorithm consists of finite field arithmetic. There are many works considering high speed finite field arithmetic. One of the famous approach is Montgomery multiplication. In this study, we investigated Montgomery multiplication for public key cryptography on embedded microprocessors. This paper includes helpful information on Montgomery multiplication implementation methods and techniques for various target devices including 8-bit and 16-bit microprocessors. Further, we expect that the results reported in this paper will become part of a reference book for advanced Montgomery multiplication methods for future researchers.

The Bizarreness Phenomenon in The Contemporary Fashion - Focused on the works of korean fashion designers - (현대패션에 나타난 엽기현상 - 국내 패션디자이너의 작품을 중심으로 -)

  • 박옥미;송정선
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.2
    • /
    • pp.53-65
    • /
    • 2004
  • As the contemporary public consensus prefers individuality to classical things, they have gotten sick of the universality and pursue fashion anew. As a result the new concept of artistic value delivers a shock to ordinary and traditional images. The bizarreness culture of fashion contains two extremes, horror and humor. which make people uneasy but amused by sensuous descriptions. Bizarre things captivate the audience regardless of the violent stimuli. The conversion of aesthetic consciousness is brought accordingly by horror and humor. In this paper, It is discussed that the concept of history of bizarreness and the social effect from its phenomena in current fashion are expressed through the two methods above. The bizarreness phenomena in current fashion is shown as a new hybrid type which has been recreated and came out of the internet. This phenomena has caused abnormal results and ironically mixed products, what was once directness, violence and disgust, are on the other hand enjoyment and amusement. A widening field, the bizarreness phenomenon, as an important implication in which can completely change the current trend, will be on track as a crucial concept representing contemporary cultures.

An Analysis on Media Trends in Public Agency for Social Service Applying Text Mining (텍스트 마이닝을 적용한 사회서비스원 언론보도기사 분석)

  • Park, Hae-Keung;Youn, Ki-Hyok
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.41-48
    • /
    • 2022
  • This study tried to empirically explore which issues related to the social service agency for public(as below SSA), that is, social perceptions were formed, by using mess media related to the SSA. This study is meaningful in that it identifies the overall social perception and trend of SSA through public opinion. In order to extract media trend data, the search used the big data analysis system, Textom, to collect data from the representative portals Naver News and Daum News. The collected texts were 1,299 in 2020 and 1,410 in 2021, for a total of 2,709. As a result of the analysis, first, the most derived words in relation to the frequency of text appearance were 'SSA', 'establishment', and 'operation'. Second, as a result of the N-gram analysis, the pairs of words directly related to the SSA 'SSA and public', 'SSA and opening', 'SSA and launch', and 'SSA and Department Director', 'SSA and Staff', 'SSA and Caregiver' etc. Third, in the results of TF-IDF analysis and word network analysis, similar to the word occurrence frequency and N-gram results, 'establishment', 'operation', 'public', 'launch', 'provided', 'opened', ' 'Holding' and 'Care' were derived. Based on the above analysis results, it was suggested to strengthen the emergency care support group, to commercialize it in detail, and to stabilize jobs.