• Title/Summary/Keyword: Secure IoT

Search Result 239, Processing Time 0.02 seconds

An Analysis of Policy and Technology Status of Smart City for Revitalization of Smart City Industry (스마트도시 산업 활성화를 위한 스마트도시 정책 및 기술현황 분석에 관한 연구)

  • Kim, Dae Ill;Park, Sung Chan;Yeom, Chun Ho
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.127-144
    • /
    • 2022
  • Recently, Korea is promoting cooperation with various countries, centering on ASEAN countries, with the aim of exporting Korean smart cities for the globalization of smart cities. The purpose of this study is to select excellent smart city technologies through analysis of smart city technologies owned by domestic companies and company status, and to prepare a plan for revitalization of companies with smart city technologies. Through prior research, the implications were derived through research on the existing smart city. Next, established a smart city policy analysis and smart city technology classification criteria through Korea and Overseas smart city policy and Korea smart city technology status DB. And the big data of smart city technology possessed by Korea companies and a plan for selecting a smart city export technology was prepared through analysis by region and company. As a result, to activate the technology possessed by Korea companies and to export overseas, it seems to need financial support and tax incentives that secure a pathway to export specialized smart technologies of SMEs, along with citizen participation and institutional supplementation. The smart city technology fields with the highest utilization in Korea were traffic, green energy, e-government, crime prevention, and construction, and the service types were platform, IoT, AI, big data, and GIS/GPS. These technologies are expected to contribute to building a platform for overseas smart city technology exports.

Blockchain (A-PBFT) Based Authentication Method for Secure Lora Network (안전한 Lora 네트워크를 위한 블록체인(A-PBFT) 기반 인증 기법)

  • Kim, Sang-Geun
    • Journal of Industrial Convergence
    • /
    • v.20 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • Lora, a non-band network technology of the long-distance wireless standard LPWAN standard, uses ABP and OTTA methods and AES-128-based encryption algorithm (shared key) for internal terminal authentication and integrity verification. Lora's recent firmware tampering vulnerability and shared-key encryption algorithm structure make it difficult to defend against MITM attacks. In this study, the consensus algorithm(PBFT) is applied to the Lora network to enhance safety. It performs authentication and PBFT block chain creation by searching for node groups using the GPS module. As a result of the performance analysis, we established a new Lora trust network and proved that the latency of the consensus algorithm was improved. This study is a 4th industry convergence study and is intended to help improve the security technology of Lora devices in the future.

An Influence of the Fourth Industrial Revolution on International Trade and Countermeasure Strategies to Promote Export in Korea (4차 산업혁명이 무역에 미칠 영향과 이에 대비한 수출촉진전략)

  • Lee, Byung-Mun;Jeong, Hee-Jin;Park, Kwang-So
    • Korea Trade Review
    • /
    • v.42 no.3
    • /
    • pp.1-24
    • /
    • 2017
  • This study investigates any possible influences of the fourth industrial revolution on international trade in Korea and suggests strategies to promote export of Korea in order to secure one of the biggest international trade countries. The fourth industrial revolution is the fourth major industrial era since the third industrial revolution in the 18th century which used electronics and information technology to automate production. This can be characterized as a range of emerging technologies that are fusing the physical, digital and biological worlds, and impacting all disciplines, economies and industries. Since this revolution is expected to have effects on international trade as well as whole industrial society, it examines how it may affect international trade of Korea in terms of the subject, the object, markets and forms of international trade. After that, it provides the strategies to promote Korean export in order to overcome the risks around the low economic growth of the recent years and the depressed domestic economy.

  • PDF

A Study on hotel AI robot service built on the value-attitude-behavior(VAB) model (가치-태도-행동 모델을 적용한 호텔 AI 로봇서비스에 관한 연구)

  • Hejin Chun;Heeseung Lee
    • Smart Media Journal
    • /
    • v.12 no.8
    • /
    • pp.60-68
    • /
    • 2023
  • After COVID-19, hotel industry is rapidly experiencing changes in the business environment, and under the influence of the Fourth Industrial Revolution, hotel industry is striving to secure competitive advantages through differentiation, including the use of big data and the IoT in service provision, as well as the introduction of artificial intelligence(AI) robot services. This study analyzed the perceived value of AI robot services and their impact on usage attitudes and behavioral intentions of customers who have used hotels that have introduced AI robot services. The results of the study showed that the value of robot services perceived by customers who have used robot services in hotels is categorized into three dimensions: social, experiential, and functional, and all of them have a positive effect on usage attitudes, with social, functional, and experiential values having a positive effect on usage attitudes in that order. Attitude toward use was also analyzed to have a positive effect on behavioral intention, which is consistent with the value-attitude-behavior model. Therefore, it is necessary for hotels to improve the satisfaction of hotel guests through diversified services of AI robot service.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

A Study on the Introduction of Performance Certification System of Inspection and Diagnostic Equipment for Infrastructure (시설물 진단장비의 성능인증제 도입에 관한 연구)

  • Hong, Sung-Ho;Kim, Jung-Gon;Cho, Jae-Young;Kim, Do-Hyoung;Kim, Jung-Yeol;Kim, Young-Min
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.104-115
    • /
    • 2022
  • Purpose: Infrastructure inspection and its diagnostics technique have been rapidly developing recently. Therefore, it is important to secure the reliability of diagnostic equipment, and this paper deals with inspection of diagnostic equipment, introduction to a certification system and development plans for infrastructure. Method: Several certification systems are established and introduction plans are reviewed through experts by synthesizing the contents of certification research for existing infrastructure diagnosis equipment. In addition, the revision of the law for introduction of the system is reviewed, detailed operation regulations are prepared and phased development plans are reviewed, which are based on the operation scenario. Result: Inspection and certification plans were constructed through four routes in order to consider infrastructure inspection and diagnostic equipment in use, and new diagnostic equipment using state-of-the-art technology. Furthermore, market confusion depending on the introduction of a new certification system is minimized and reliability is secured by transforming a simple inspection system in the short term into a formal certification system in the long term. The law amendments according to the introduction of the system were reviewed and detailed operation regulations were developed. Also, phased development plans, which are based on the long-term development scenario including manpower, infrastructure and specifications, were presented. Conclusion: It is important to secure reliability through the distribution and certification of diagnostic equipment using 4th industrial technology to strengthen the safety management of infrastructure at the national level since the infrastructure is various in type and increasingly large in size. It is also essential to train human resources who can use new technology with inspection and diagnosis system in order to enhance the safety management of all infrastructures. Moreover, it is necessary to introduce a regular inspection system for infrastructure that combines loT technology in the long-term point of view and to promote the introduction by giving active incentives to institutions that actively accept it.

A Study on IoT and Cloud-based Real-time Bridge Height Measurement Service (사물인터넷과 클라우드 기반의 실시간 교량 높이 계측 서비스 연구)

  • Choi, Cha-Hwan;Cheon, Young-Man;Jeong, Seung-Hun;Tcha, Dek-Kie;Lee, Young-Jae
    • Journal of Cadastre & Land InformatiX
    • /
    • v.47 no.2
    • /
    • pp.145-157
    • /
    • 2017
  • Currently, the height of ships that can pass under Busan Harbor Bridge is limited to 60m or shorter, so that large-sized ships of 60m or taller cannot use Busan Harbor international passenger terminal. Accordingly, this study has developed a service which measures continuously the change of bridge height by water level changes and provides such in real-time for safe bridge passage of large-sized ships of 60m or taller. The measurement system comprised of high-precision laser distance measurement device, GPS sensor, optical module, and damping structure is used to measure the bridge height change according to tide level changes, and the measured information is provided in real-time through cloud-based mobile app. Also, in order to secure objective bridge height data for changes to height limits and navigation supports, the observation data was analyzed and forecast model was drawn. As a result, it became an objective evidence to revise the passage height rules of the Busan Port Bridge from 60 meters to 63 meters.

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.