• Title/Summary/Keyword: Secure IoT

Search Result 239, Processing Time 0.029 seconds

Development of Surface Roughness Index using Gyroscope (자이로스코프를 이용한 노면 평탄도 분류지수 개발)

  • Hong, Sun-Gi;Park, Jun-Mo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.3
    • /
    • pp.127-132
    • /
    • 2020
  • In this study, the process of providing information necessary to remove physical barriers such as road slopes that obstruct the activities of the disabled is in progress. Through experiments, we implement a quantified road surface roughness index that enables the implementation of IoT-based systems necessary for the elderly and the disabled to safely move to their destination. As a preliminary study, a road surface measurement device using a gyroscope was devised. To check the roughness and flatness of the road surface, X, Y displacement, and acceleration displacement were measured using a gyroscope. By calculating the measured data, the roughness and flatness of the road surface were quantified from 0 to 100. We implemented an algorithm that divides this index into 4 stages, displays it on a map, and provides it to users. Finally, a system for the disabled and elderly electric wheelchair users to secure basic mobility was established.

A Design of Industrial Safety Service using LoRa Gateway Networks (LoRa 게이트웨이 네트워크를 활용한 산업안전서비스 설계)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.313-316
    • /
    • 2021
  • In the IoT(IoT: Internet of Things) environment, network configuration is essential to collect data generated from objects. Various communication methods are used to process data of objects, and wireless communication methods such as Bluetooth and WiFi are mainly used. In order to collect data of objects, a communication module must be installed to collect data generated from sensors or edge devices in real time. And in order to deliver data to the database, a software architecture must be configured. Data generated from objects can be stored and managed in a database in real time, and data necessary for industrial safety can be extracted and utilized for industrial safety service applications. In this paper, a network environment was constructed using a LoRa(LoRa: Long Range) gateway to collect object data, and a client/server data collection model was designed to collect object data transmitted from the LoRa module. In order to secure the resources necessary for data collection and storage management without data leakage, data collection should be possible in real time. As an application service, location data required for industrial safety can be stored and managed in a database in real time.

  • PDF

Service Platform Technology of Wagering Contents Collaboration of N Screens (N 스크린 간의 웨이저링 콘텐츠 협업 서비스 플랫폼 기술)

  • Hong, YoHoon;Lee, Dongwoo;Kim, Daehyun
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.137-142
    • /
    • 2017
  • In this paper, we propose proposed mobile wagering platform technology, where the buying lottery contents registered in secure storage through lottery technology can be used as a common experience in smartphones, smart pads, and PCs, etc. Currently, many people are producing and consuming various types of contents in bulk, and it is expected that real-time contents and old contents coexist as IoT(Internet of Things) technology is commonly deployed in the future. Therefore, we need to develop a differentiated service that can compete with global services in lottery contents authoring and collaboration systems to create new markets. Accordingly, we implemented an wagering service platform to occupy cloud markets with high quality lottery contents produced through collaboration.

Service Platform Technology of Dynamic Contents Collaboration of Clouds (클라우드 간의 콘텐츠 동적협업 서비스 플랫폼 기술)

  • Hong, YoHoon;Kusmawan, Putu;Rho, Jungkyu
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.2
    • /
    • pp.1-7
    • /
    • 2016
  • In this paper, we propose contents authoring, management, and distribution technologies where the contents registered in secure storage through a content acquisition and authoring tool can be used as a common experience in smartphones, smart pads, and PCs. Currently, many people are producing and consuming various types of contents in bulk, and it is expected that real-time contents and old contents coexist as IoT(Internet of Things) technology is commonly deployed in the future. Therefore, we need to develop a differentiated service that can compete with global services in contents authoring and collaboration systems to create new markets. Accordingly, we implemented an authoring service platform to occupy cloud markets with high quality contents produced through collaboration.

Device Security Bootstrapping Mechanism on the IEEE 802.15.4-Based LoWPAN (IEEE 802.15.4 기반 LoWPAN에서의 디바이스 보안 설정 메커니즘)

  • Lee, Jong-Hoon;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1561-1569
    • /
    • 2016
  • As the use of the sensor device increases in IoT environment, the need for device security is becoming more and more important When a sensor device is deployed in IEEE 802.15.4-based LoWPAN, it has to perform the join operation with PAN Coordinator and the binding operation with another device. In the join and binding process, authentication and key distribution of the device are performed using the pre-distributed network key or certificate. However, the network key used in the conventional method has problems that it's role is limited to the group authentication and individual identification is not applied in certificate issuing. In this paper, we propose a secure join and binding protocol in LoWPAN environment that solves the problems of pre-distributed network key.

Development of Low Cost Cloud Server System using Node-Red based on Raspberry Pi (Raspberry Pi기반 Node-Red를 이용한 Low Cost 클라우드 서버 시스템 구현)

  • Lin, Zhi-Ming;Lee, Yang-weon;Kim, Chul-won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.261-264
    • /
    • 2018
  • As the application of IoT has diversified, there is a growing need to store information of sensors on servers in real time. However, building servers and collecting data requires a lot of money to secure existing PCs and storage space. This paper presents an easy way to build a cloud system at a low cost. This system presents the process of simply proposing and implementing a cloud system using Raspberry which is open hardware and Node-Red which is open software.

  • PDF

Lightweight DTLS Message Authentication Based on a Hash Tree (해시 트리 기반의 경량화된 DTLS 메시지 인증)

  • Lee, Boo-Hyung;Lee, Sung-Bum;Moon, Ji-Yeon;Lee, Jong-Hyouk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1969-1975
    • /
    • 2015
  • The Internet of Things (IoT), in which resource constrained devices communicate with each other, requires a lightweight security protocol. In this paper, we propose a new message authentication scheme using a hash tree for lightweight message authentication in the Datagram Transport Layer Security (DTLS) protocol. The proposed scheme provides lightweight secure operations compared with those of the DTLS protocol. Besides, it provides more suitable performance than the DTLS protocol for an IoT environment, thanks to the reduced use of message authentication code.

A Survey on Microservices Approach for the Internet of Things (IoT를 위한 Microservices 접근법에 대한 조사)

  • Kabulo, Nday Sinai;Landry, Moungala Alban;Yum, Sun-Ho;Namgung, Jung-Il;Shin, Soo-Young;Park, Soo-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.608-610
    • /
    • 2018
  • The future of Internet of Things ecosystem seems to be worth it, however by using a monolithic approach we might end up by dealing with complexity of the system as long as the statistics show that by 2020 IoT devices will reach around 50 billion. The microservice architecture approach utilizes the service-oriented architecture together with best practices and latest developments in software virtualization to overcome complexity issues, allow reusability of services or microservices instead of creating new ones. The microservice architecture provides secure platforms if it is developed and deployed in a container. Thus, this paper surveys on the microservices, microservices architecture and containers, microservices based Internet of Things.

On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up (데이터센터 물리 보안 수준 향상을 위한 물리보안 위협 분할도(PS-TBS)개발 연구)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.439-449
    • /
    • 2019
  • The development of information technology represented by ICBMA (IoT, Cloud, Big Data, Mobile, AI), is leading to a surge in data and a numerical and quantitative increase in data centers to accommodate it. As the data center is recognized as a social infrastructure, It is very important to identify physical security threats in advance in order to secure safety, such as responding to a terrorist attack. In this paper, we develop physical security threat breakdown structure (PS-TBS) for easy identification and classification of threats, and verify the feasibility and effectiveness of the PS-TBS through expert questionnaires. In addition, we intend to contribute to the improvement of physical security level by practical use in detailed definition on items of PS-TBS.

Secure SLA Management Using Smart Contracts for SDN-Enabled WSN

  • Emre Karakoc;Celal Ceken
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3003-3029
    • /
    • 2023
  • The rapid evolution of the IoT has paved the way for new opportunities in smart city domains, including e-health, smart homes, and precision agriculture. However, this proliferation of services demands effective SLAs between customers and service providers, especially for critical services. Difficulties arise in maintaining the integrity of such agreements, especially in vulnerable wireless environments. This study proposes a novel SLA management model that uses an SDN-Enabled WSN consisting of wireless nodes to interact with smart contracts in a straightforward manner. The proposed model ensures the persistence of network metrics and SLA provisions through smart contracts, eliminating the need for intermediaries to audit payment and compensation procedures. The reliability and verifiability of the data prevents doubts from the contracting parties. To meet the high-performance requirements of the blockchain in the proposed model, low-cost algorithms have been developed for implementing blockchain technology in wireless sensor networks with low-energy and low-capacity nodes. Furthermore, a cryptographic signature control code is generated by wireless nodes using the in-memory private key and the dynamic random key from the smart contract at runtime to prevent tampering with data transmitted over the network. This control code enables the verification of end-to-end data signatures. The efficient generation of dynamic keys at runtime is ensured by the flexible and high-performance infrastructure of the SDN architecture.