• Title/Summary/Keyword: Public Internet of Things

Search Result 162, Processing Time 0.023 seconds

Implementation of a real-time public transportation monitoring system (실시간 대중교통 모니터링 시스템 구현)

  • Eun-seo Oh;So-ryeong Gwon;Joung-min Oh;Bo Peng;Tae-kook Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.4
    • /
    • pp.9-19
    • /
    • 2024
  • In this paper, a real-time public transportation monitoring system is proposed. The proposed system was implemented by developing a public transportation app and utilizing optical sensors, pressure sensors, and an object detection algorithm. Additionally, a bus model was created to verify the system's functionality. The proposed real-time public transportation monitoring system has three key features. First, the app can monitor congestion levels within public transportation by detecting seat occupancy and the total number of passengers based on changes in optical and pressure sensor readings. Second, to prevent errors in the optical sensor that can occur when multiple passengers board or disembark simultaneously, we explored the possibility of using the YOLO object detection algorithm to verify the number of passengers through CCTV footage. Third, convenience is enhanced by displaying occupied seats in different colors on a separate screen. The system also allows users to check their current location, available public transportation options, and remaining time until arrival. Therefore, the proposed system is expected to offer greater convenience to public transportation users.

Evaluation Of LoRaWAN In A Highly Dense Environment With Design Of Common Automated Metering Platform (CAMP) Based On LoRaWAN Protocol

  • Paul, Timothy D;Rathinasabapathy, Vimalathithan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1540-1560
    • /
    • 2022
  • Latest technological innovation in the development of compact lower power radios has led to the explosion of Internet of Things. With Wi-Fi, Zigbee and other physical layer protocols offering short coverage area there was a need for a RF protocol that had a larger coverage area with low power consumption. LoRa offers Long Range with lower power consumption. LoRa offers point to point and point to multipoint connections. with Single hop communication in place the need for routing protocols are eliminated. LoRa Wide Area Network stack can accommodate thousands of nodes under a single LoRa gateway with a single hop communication between the end nodes and LoRaWAN gateway. This paper takes an experimental approach to analyze the basic physical layer parameters of LoRa and the practical coverage offered by a LoRaWAN under highly dense urban conditions with variable topography. The insights gained from the practical deployment of the LoRaWAN network, and the subsequent performance analysis is used to design a novel public utility monitoring platform. The second half of the papers is designing a robust platform to integrate both existing wired sensor water meters, current and future generation wireless water meters. The Common Automated Metering Platform is designed to integrate both wired sensors and wireless (LoRaWAN and Wi-Fi) supported water meters. This integrated platform reduces the number of nodes under each LoRaWAN gateway and thus improves the scalability of the network. This architecture is currently designed to accommodate one utility application but can be modified to integrate multi-utility applications.

A Study on Priority of Certification Criteria for IoT Security Certification Service (IoT 보안인증서비스 인증기준 중요도 우선순위에 관한 연구)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.7
    • /
    • pp.13-21
    • /
    • 2019
  • Because security of Internet of Things(IoT) products and others is poor, there are many hacking incidents To prevent security threats, it is important for companies to first make products with high security levels and choose products that are safe for users. In response, the Korea Internet & Security Agency is testing the security of IoT products and linked mobile apps to impose ratings. Security certification service is a service that tests IoT products and linked mobile apps to ensure certain levels of security and issues certificates when they meet the criteria. It can induce autonomous security enhancement of IoT products, contribute to strengthening security capabilities of IoT companies in Korea and vitalizing their overseas advancement, and have the expected effect of resolving public anxiety over IoT products. In this study, the criteria for IoT security certification are presented, but the importance priority is sought to be derived for assessment items that need to be strengthened. This will help to provide guidelines that can contribute to strengthening the security capabilities of domestic Internet companies and boosting their overseas advancement.

A Study on Increasing Security Following Mutual Interaction and Integration of Dualized Security Category between Information Security and Personal Information Protection (정보보안과 개인정보보호 간의 이원화 보안범주의 상호연계 및 통합에 따른 보안성 증대에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.601-608
    • /
    • 2018
  • While the legislation on the protection of personal information in public institutions was enacted and amended, the guidelines and laws on information security were focused, contracted and realized with focus on specific institutions. Mutual laws and guidelines have been applied and realized for the dual purpose of securing both the asset of macroscopic information and the asset of personally identification information, which are mutually different media information. However, in a bid to present the definition and direction of the fourth industrial revolution in 2017, a variety of products and solutions for security designed to ensure the best safety line of the 21st century, and the third technology with the comprehensive coverage for all these fields, a number of solutions and technologies, including IOT(: Internet of Things), ICT Internet of Things(: ICT), ICT Cloud, and AI (: Artificial Intelligence) are pouring into the security market as if plastic doll toys were manufactured in massive scale into the market. With the rising need for guaranteeing the interrelation for securities with dualistic physical, administrative, logical and psychological differences, that is, information security and personal information security that are classified into two main categories and for the enhanced security for integrated management and technical application, the study aims to acquire the optimal security by analyzing the interrelationship between the two cases and applying it to the study results.

Design of Elementary, Middle and High School SW·AI-based Learning Platform in IoT Environment (사물인터넷 환경에서의 초·중·고 SW·AI기반 학습 플랫폼 설계)

  • Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.117-123
    • /
    • 2023
  • While applying new digital technologies, interest in software and artificial intelligence is quite high. In particular, many changes are being made for the development of software and artificial intelligence in the field of education. From 2025, software and artificial intelligence-related curricula will be applied to public education in elementary, middle and high schools. The Ministry of Education is also conducting various camps to experience software and artificial intelligence in various ways in elementary, middle and high schools before they are applied to public education. Several platforms for experience camps related to software and artificial intelligence are also being used. In this study, we intend to increase the educational efficiency of the learning method for software and artificial intelligence to be developed in the future by designing a model for software and artificial intelligence experiential learning platforms.

Security and Privacy in Ubiquitous Sensor Networks

  • Perez, Alfredo J.;Zeadally, Sherali;Jabeur, Nafaa
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.286-308
    • /
    • 2018
  • The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.

IoT Compliant HD Digital Signage Controller Design using Raspberry Pi

  • Yang, Seungyoun;Shin, Jaekwon;Lee, Sunghwa;Kim, Jintae
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.18-21
    • /
    • 2017
  • In this paper we present IoT compliant HD Digital Signage Controller design using Raspberry Pi. Nowadays, the digital signage system have gained increasing popularity and rapidly growing communications medium that offers a wide range of exciting ways with customers, enhance brand awareness, increase sales and margin uplift by replacing the traditional static signage system. This paper presents a cost-effective IoT based HD Digital Signage Controller (DSC) using R-Pi computer that can use various kinds of displays in order to make the system as efficient and affordable as possible to provide advertisement or other relevant information to people in public areas. The system is designed in such way the information about surrounding related place is taken through sensors and directly uploaded to the internet, and thus can be accessed anytime and displayed on screens by using Raspberry Pi that serves as controller in the system. The design and implementation of the system developed by using python programming language and its hardware consists of sensors, Arduino, Raspberry Pi 3 model B board and the displays. The main targets of this study are build a cost effective Digital Signage system as well as broadcasting information at display contents in public areas and control those digital signs.

Design and Implementation of A Dynamic API Platform for Interworking Across Heterogeneous Platforms (이기종 플랫폼간 상호연동을 위한 동적 API 플랫폼의 설계 및 구현)

  • Ryu, Minwoo;Cha, Si-Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.2
    • /
    • pp.29-35
    • /
    • 2021
  • Recently, with the widespread use of the Internet of Things (IoT), the service structure has been studied to interact with various service domains. A common way to interact with other service domains is to develop the APIs needed to interact on the platform. However, to use a common method, we consider many costs and resources as APIs can increase while adding connections from other service domains. To address this issue, we propose the design and implementation of a dynamic API platform. The proposed platform can dynamically create APIs when requesting service applications, depending on the target service domain. To demonstrate the feasibility of the proposed platform, we develop a COVID-19 weekly infection status, regional infection status, and vaccination status service using dynamic APIs from the Public Data Portal using the proposed dynamic API platform and Node-RED.

MoTE-ECC Based Encryption on MSP430

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.160-164
    • /
    • 2017
  • Public key cryptography (PKC) is the basic building block for the cryptography applications such as encryption, key distribution, and digital signature scheme. Among many PKC, elliptic curve cryptography (ECC) is the most widely used in IT systems. Recently, very efficient Montgomery-Twisted-Edward (MoTE)-ECC was suggested, which supports low complexity for the finite field arithmetic, group operation, and scalar multiplication. However, we cannot directly adopt the MoTE-ECC to new PKC systems since the cryptography is not fully evaluated in terms of performance on the Internet of Things (IoT) platforms, which only supports very limited computation power, energy, and storage. In this paper, we fully evaluate the MoTE-ECC implementations on the representative IoT devices (16-bit MSP processors). The implementation is highly optimized for the target platform and compared in three different factors (ROM, RAM, and execution time). The work provides good reference results for a gradual transition from legacy ECC to MoTE-ECC on emerging IoT platforms.

The Blockchain based Undeniable Multi-Signature Scheme for Protection of Multiple Authorship on Wisdom Contents (지혜콘텐츠 공동저작권 보호에 적합한 블록체인 기반 부인봉쇄 다중서명 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2021
  • Wisdom Contents are created with experiences and ideas of multiple authors, and consumed in Internet based Social Network Services that are not subjected to regional restrictions. Existing copyright management systems are designed for the protection of professional authors' rights, and effective in domestic area. On the contrary, the blockchain protocol is subjected to the service and the block is added by the consensus of participating nodes. If the data is stored to the blockchain, it cannot be modified or deleted. In this paper, we propose the blockchain based undeniable multi-signature scheme for the protection of multiple authorship on Wizdom Contents. The proposed scheme is consisted of co-authors' common public key generation, multi-signature generation and verification protocols. In the undeniable signature scheme, the signature cannot be verified without help of the signer. The proposed scheme is best suited to the contents purchase protocol. All co-authors cannot deny the fairness of the automated profit distribution through the verification of multiple authorship on Wizdom Contents.