• Title/Summary/Keyword: Secure IoT

Search Result 249, Processing Time 0.027 seconds

Intelligent Green House Control System based on Deep Learning for Saving Electric Power Consumption (전력 소모 절감을 위한 딥 러닝기반의 지능형 그린 하우스 제어 시스템)

  • Shin, Hyeonyeop;Yim, Hyokyun;Kim, Won-Tae
    • Journal of IKEEE
    • /
    • v.22 no.1
    • /
    • pp.53-60
    • /
    • 2018
  • Smart farm dissemination by continuously developing IoT is one of the best solution for decreasing labor in Korea farming area because of ageing. For this reason, the number of Smart farm in Korea is being increased. The Smart farm can control farming environment such as temperature for human. Specially, The important thing is controlling proper temperature for farming. In order to control the temperature, legacy smart farms are usually using pans or air conditioners which can control the temperature. However, those devices result in increasing production cost because the electric power consumption is high. For this reason, we propose a smart farm which can predict the proper temperature after an hour by using Deep learning to minimize the electric power consumption by controlling window instead of pans or air conditioners. We can see the 83% of electric power saving by means of the proposed smart farm.

Policy Reorganization Method for Performance Improvements in SELinux using Loadable Module Policy (로드 가능한 모듈 정책을 사용하는 SELinux의 성능 향상을 위한 정책 재구성 방법)

  • Ko, Jae-Yong;Lee, Sanggil;Cho, Kyung-Yeon;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.309-319
    • /
    • 2018
  • SELinux is used for system level security in various systems using Linux, and is now being used for device security such as IoT. However, since SELinux has inherent problems of execution time degradation, various studies have been conducted to solve this problem. In this paper, we show that performance can be improved through policy reconfiguration in the environment where the loadable module policy method, which is a general method using SELinux, is applied. By reconfiguring the access query table through the Priority-TE policy that gives priority to the type, it is possible to provide faster execution time for types requiring faster access query performance. This paper introduces the differences between SELinux policy configuration method in Monolithic environment and performance analysis. This can be used as a reference by security administrators or developers in applying SELinux.

Cryptft+ : Python/Pyqt based File Encryption & Decryption System Using AES and HASH Algorithm (Crypft+ : Python/PyQt 기반 AES와 HASH 알고리즘을 이용한 파일 암복호화 시스템)

  • Shin, Dongho;Bae, Woori;Shin, Hyeonggyu;Nam, Seungjin;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.43-51
    • /
    • 2016
  • In this paper, we have developed Crypft+ as an enhanced file encryption/decryption system to improve the security of IoT system or individual document file management process. The Crypft+ system was developed as a core security module using Python, and designed and implemented a user interface using PyQt. We also implemented encryption and decryption function of important files stored in the computer system using AES based symmetric key encryption algorithm and SHA-512 based hash algorithm. In addition, Cx-Freezes module is used to convert the program as an exe-based executable code. Additionally, the manual for understanding the Cryptft+ SW is included in the internal program so that it can be downloaded directly.

The Effects of Technology Readiness Index of Artificial Intelligence and Internet of Things on the Recognition of Substitute Employment of Medical Personnel (인공지능, 사물인터넷의 기술준비도가 의료인력 고용대체인지도에 미치는 영향)

  • Kang, Han Seom;Kim, Young Hoon
    • Korea Journal of Hospital Management
    • /
    • v.23 no.2
    • /
    • pp.54-66
    • /
    • 2018
  • Purpose: This study was to figure out relationships of perceived Technology Readiness Index(TRI), usefulness, acceptance intension, and the recognition of substitute employment of medical personnel on the artificial intelligence (AI) and internet of things (IoT) among main technologies. Methodology: To achieve the purpose, this study utilized structured survey tools to conduct a questionnaire survey of nursing, administrative and medical technology professionals at six university hospitals in Korea metropolitan area. A PLS(Partial Least Square) Path analysis was utilized To analyze the material. Findings: In the relation with the technology readiness and perceived usefulness, it had a positive influence to the perceived usefulness when the optimism and innovativeness were higher and the discomfort was lower. In the relation with the technology readiness and acceptance intension, it showed a positive influence when the innovativeness was higher and the discomfort was lower. In the relation with the perceived usefulness and acceptance intension, it had a positive influence to the acceptance intension when the perceived usefulness was higher. In the relation with the acceptance intension and the recognition of substitute employment, it showed a positive influence to the recognition of substitute employment when the acceptance intension was higher. Practical Implications: Judging based on the above study results and reference reviews, it confirmed that it is necessary to prepare in the level of hospital organization in the $4^{th}$ Industrial Revolution. They should increase the efficiency of human resources through the technological factors or changes of employment types for the additional demands of human resources to handle increasing medical demands or induce to secure necessary abilities which are changing at the right time by performing the $4^{th}$ Industrial Revolution related re-training continuously to develop the value of existing human resources.

Side Channel Attacks on HIGHT and Its Countermeasures (HIGHT에 대한 부채널 분석 및 대응 방법)

  • Kim, Tae-Jong;Won, Yoo-Seung;Park, Jin-Hak;An, Hyun-Jin;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.457-465
    • /
    • 2015
  • Internet of Things(IoT) technologies should be able to communication with various embedded platforms. We will need to select an appropriate cryptographic algorithm in various embedded environments because we should consider security elements in IoT communications. Therefore the lightweight block cryptographic algorithm is essential for secure communication between these kinds of embedded platforms. However, the lightweight block cryptographic algorithm has a vulnerability which can be leaked in side channel analysis. Thus we also have to consider side channel countermeasure. In this paper, we will propose the scenario of side channel analysis and confirm the vulnerability for HIGHT algorithm which is composed of ARX structure. Additionally, we will suggest countermeasure for HIGHT against side channel analysis. Finally, we will explain how much the effectiveness can be provided through comparison between countermeasure for AES and HIGHT.

Implementation of Domain Separation-based Security Platform for Smart Device (안전한 스마트 단말을 위한 도메인 분리 기반 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.471-476
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices. The domain separation based smart device security platform technology in this paper blocks unauthorized access and leakage of sensitive information in device. Also it will be the solution can block transmission and execution of malicious code in various area including variety of IoT devices in internet rather than just smart devices.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

A Study on the Application of AI and Linkage System for Safety in the Autonomous Driving (자율주행시 안전을 위한 AI와 연계 시스템 적용연구)

  • Seo, Dae-Sung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.95-100
    • /
    • 2019
  • In this paper, autonomous vehicles of service with existing vehicle accident for the prevention of the vehicle communication technology, self-driving techniques, brakes automatic control technology, artificial intelligence technologies such as well and developed the vehicle accident this occur to death or has been techniques, can prepare various safety cases intended to minimize the injury. In this paper, it is a study to secure safety in autonomous vehicles. This is determined according to spatial factors such as chip signals for general low-power short-range wireless communication and micro road AI. On the other hand, in this paper, the safety of boarding is improved by checking the signal from the electronic chip, up to "recognition of the emotion from residence time in the sensing area" to the biological electronic chip. As a result of demonstrating the reliability of the world countries the world, inducing safety autonomous system of all passengers in terms of safety. Unmanned autonomous vehicle riding and commercialization will lead to AI systems and biochips (Verification), linked IoT on the road in the near future, and the safety technology reliability of the world will be highlighted.

A Study on an Operational Optimization Algorithm of Software Basic Education (소프트웨어 기초 교육의 최적 운영 알고리즘에 관한 연구)

  • Goo, Eun-Hee;Woo, Chan-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.587-592
    • /
    • 2019
  • The importance of software technologies is becoming more prominent because of the competition to secure a competitive edge in software, which has been intensified since the emergence of smartphones and IoT. Thus, to assure the initiative in the global software industry and to foster superior human resources, there is a growing need for outstanding software development professionals. This paper analyzes the factors that affect the basic perception of software, the need for software development, and the enhancement of software coding ability based on a compulsory software class, which aims to increase the workforce of the converged software industry. The analysis shows that among other technical practices to enhance coding ability, learner-centered technical contents showed the most positive effect regarding the recognition and motive of development and are an essential factor in improving coding skills. The findings indicate that the need for program development and active involvement in the development of the program are the most important factors in improving the practical ability. The analysis presents meaningful results by suggesting a methodology for improving software development capabilities.

An Enhanced Scheme of PUF-Assisted Group Key Distribution in SDWSN (SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선)

  • Oh, Jeong Min;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.29-43
    • /
    • 2019
  • In recent years, as the network traffic in the WSN(Wireless Sensor Network) has been increased by the growing number of IoT wireless devices, SDWSN(Software-Defined Wireless Sensor Network) and its security that aims a secure SDN(Software-Defined Networking) for efficiently managing network resources in WSN have received much attention. In this paper, we study on how to efficiently and securely design a PUF(Physical Unclonable Function)-assisted group key distribution scheme for the SDWSN environment. Recently, Huang et al. have designed a group key distribution scheme using the strengths of SDN and the physical security features of PUF. However, we observe that Huang et al.'s scheme has weak points that it does not only lack of authentication for the auxiliary controller but also it maintains the redundant synchronization information. In this paper, we securely design an authentication process of the auxiliary controller and improve the vulnerabilities of Huang et al.'s scheme by adding counter strings and random information but deleting the redundant synchronization information.