• Title/Summary/Keyword: Secure IoT

Search Result 240, Processing Time 0.02 seconds

A Study on the Diffusion of Emergency Situation Information in Association with Beacon Positioning Technology and Administrative Address (Beacon 위치측위 기술과 행정주소를 연계한 재난재해 상황 전파 연구)

  • Mo, Eunsu;Lee, Jeakwang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.211-216
    • /
    • 2016
  • Worldwide casualties caused by earthquakes, floods, fire or other disaster has been increasing. So many researchers are being actively done technical studies to ensure golden-time. In this paper if a disaster occurs, use the IoT technologies in order to secure golden-time and transmits the message after to find the user of the accident area first. When the previous job is finished, gradually finds a user of the surrounding area and transmits the message. For national emergency information, OPEN API of Korea Meteorological Administration was used. To collect detailed information on a relevant area in real time, this study established the system that connects and integrates Crowd Sensing technology with BLE (Bluetooth Low Energy) Beacon technology. Up to now, the CBS based on base station has been applied. However, this study designed and mapped DB in the integration of Beacon based user positioning and national administrative address system in order to estimate local users. In this experiment, the accuracy and speed of information dif6fusion algorithm were measured with a rise in the number of users. The experiments were conducted in a manner that increases the number of users by one thousand and was measured the accuracy and speed of the message spread transfer algorithm. Finally, became operational in less than one second in 20,000 users, it was confirmed that the notification message is sent.

A Study on Librarians' Awareness of Construction of Libraries Based on Smart-Digital Environment (스마트디지털 환경 기반 도서관 구축에 관한 사서 인식 연구)

  • Kang, Pil Soo;Noh, Younghee;Kim, Yoon Jeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.5-33
    • /
    • 2021
  • This Study seeks for a plan for promotion of smartification of digital services for improving convenience in use and user services of public libraries in smart digital environment. Thus, in this Study, a survey on awareness of a plan for revitalization of digital data and smart libraries has been conducted for the persons in charge of digital data and librarians from public libraries. The result of this Survey are as follows: first, the introduction of smart libraries was effective by first implementing them in small and medium-sized cities with high interest in in information technology, and spreading them to public libraries in metropolitan cities and special autonomous cities; second, it is analyzed that the essential factor of success in introduction of smart libraries is the contents free from the terminals and the upgrade of computer equipment of users available for the use of these services. Terminals are to be individually utilized by smartphone users but it is necessary for upgrade and introduction of 5G which can secure the mobility of users including open type Wi-Fi; third, it is discovered that the information technology the applicability of which is expected to be easy while introducing smart libraries is RFID, which has been already generalized, and bigtata technology. The introduction of IoT technology in which the stakeholders of public libraries in metropolitan cities and special self-governing cities must be considered first.

Development of Deep Learning Model for Detecting Road Cracks Based on Drone Image Data (드론 촬영 이미지 데이터를 기반으로 한 도로 균열 탐지 딥러닝 모델 개발)

  • Young-Ju Kwon;Sung-ho Mun
    • Land and Housing Review
    • /
    • v.14 no.2
    • /
    • pp.125-135
    • /
    • 2023
  • Drones are used in various fields, including land survey, transportation, forestry/agriculture, marine, environment, disaster prevention, water resources, cultural assets, and construction, as their industrial importance and market size have increased. In this study, image data for deep learning was collected using a mavic3 drone capturing images at a shooting altitude was 20 m with ×7 magnification. Swin Transformer and UperNet were employed as the backbone and architecture of the deep learning model. About 800 sheets of labeled data were augmented to increase the amount of data. The learning process encompassed three rounds. The Cross-Entropy loss function was used in the first and second learning; the Tversky loss function was used in the third learning. In the future, when the crack detection model is advanced through convergence with the Internet of Things (IoT) through additional research, it will be possible to detect patching or potholes. In addition, it is expected that real-time detection tasks of drones can quickly secure the detection of pavement maintenance sections.

Research on Management Strategies for Intellectual Property Activities to Improve Corporate Performance (기업의 성과 제고를 위한 지식재산활동의 경영전략 연구)

  • Sangho Lee;Kwangmoon Cho
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.83-92
    • /
    • 2023
  • The purpose of this study is to provide a rational management strategy to improve the management performance of companies through intellectual property activities. Through this study, we aim to explore countermeasures to strengthen competitiveness in a changing global environment. A survey of 200 companies was conducted from September 1 to October 30, 2023. Statistical analysis was conducted using frequency analysis, exploratory factor analysis, reliability analysis, correlation analysis, multiple regression analysis, and difference analysis. The conclusions are as follows. First, the impact of intellectual property activities on management performance was found to be creation and utilization. Second, the impact of management strategies on management performance was found to be differentiation strategy, cost advantage strategy, and concentration strategy. Third, cost advantage strategy has a partial mediation effect on the relationship between creation activities and managerial performance of intellectual property activities. Fourth, the differentiation strategy has a partial mediating effect on the relationship between the creation of intellectual property activities and managerial performance. In addition, differentiation strategy has a full mediating effect on the relationship between the utilization of intellectual property activities and performance. Fifth, concentration strategy has a partial mediating effect on the relationship between intellectual property activity utilization and management performance. Sixth, there is a difference between creation activities, protection activities, utilization activities, cost advantage strategy, differentiation strategy, financial performance, and non-financial performance based on venture certification status. As the importance of intellectual property is increasing in the era of technological hegemony, IoT companies will need to improve their management performance through venture certification and strategies utilizing intellectual property in order to secure future competitiveness. Based on this study, we hope that IoT companies will maximize their performance by implementing efficient strategies that consider IP activities.

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

Review of the suitability to introduce new identity verification means in South Korea : Focused on Block Chain and FIDO (우리나라의 본인확인수단에 관한 신규 인증수단의 도입 적합성 검토 : Block Chain과 FIDO를 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.85-93
    • /
    • 2018
  • This study investigates the suitability of the blockchain and FIDO among non-face-to-face authentication means in order to secure diversity of identfication means operated in South Korea. In order to do this, the study selected and analyzed seven conformance criteria (universality, persistence, uniqueness, convenience, security, applicability, and economics), and the results were appropriate. Accordingly, in order to apply the blockchain and FIDO as the identification means, the related regulations and notices should be revised to improve the identification procedure. In addition, differentiated certification standards should be established for each service field to apply various authentication means as well as existing identification means, and the authentication means should be continuously developed and linked with the service. In the future, the identification means will bring security of the information circulation environment in the IoT, so it should be implemented in a variety of services by supporting application of identification means.

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

Access Control Mechanism for Secure CoAP Applications Based on DTLS (DTLS 기반의 안전한 CoAP 응용을 위한 접근제어 메커니즘)

  • Jeong, Yeon-seong;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1307-1315
    • /
    • 2017
  • While the PSK mode of the DTLS is the most efficient in terms of the performance, it is not easy to pre-distribute and manage the symmetric key pairs as the number of sensor devices increases. On the other hand, both the RPK and certificate modes offer a convenient key management tool, but they do not guarantee a good computational performance. In this paper, the end-to-end security protocol suitable for the constrained devices is proposed, based on both the ECQV certificate and the PSK mode. Namely, the initial DTLS handshake is performed using the ECQV certificate, and the subsequent DTLS handshakes with the other CoAP servers in the same group are performed using the PSK mode for the purpose of reducing the overall computational load. Furthermore, a fine-grained access control for the CoAP client can be enforced to allow access to the limited number of CoAP servers.

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.