• Title/Summary/Keyword: Smart IoT

Search Result 1,345, Processing Time 0.037 seconds

Security Problems and Measures for IP Cameras in the environment of IoT

  • Kang, Gil-uk;Han, Sang-Hoon;Lee, Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.107-113
    • /
    • 2019
  • Along with the development of IOT, the number of people using IOT devices has enormously increased and the IOT era has come. Especially, people using the IP cameras among Internet devices have been drastically increasing. It is because the IP cameras are well networked and comparatively cheap compared with CCTVs, and they can also be monitored and controlled in real time through PCs and smart phones for the purposes of general theft prevention and shop surveillance. However, due to the user's serious lack of security awareness and the fact that anyone can easily hack only with simple hacking tools and hacking sites information, security crimes that exploit those have been increasing as well. Therefore, this paper describes how easily the IP cameras can be hacked in the era of IOT, what kind of security incidents occurred, and also suggests possible government measures and new technical solutions to those problems.

Applied Practice on Fresh Food Cold Chain System with Blockchain Solution

  • Jang, Eun Choul;Kim, Janghwan;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.207-213
    • /
    • 2021
  • Informatization and digital transformation across industries are big trends in the world. However, although a few food groups are investing in informatization on a pilot basis, informatization is still delayed in related industries, such as distribution, logistics, etc. Therefore, consumers often are not able to have easy access to detailed information about products. In this paper, to improve these problems, we propose a fresh food logistics solution that adopts Proof of Nonce (PoN) consensus algorithm with Internet of Thing (IoT) technology. The recently developed PoN algorithm dramatically reduces a time for generating a block and is suitable for a platform that collects and services real-time information. We expect to improve their trust in the platform by preventing forgery/falsification of information recorded in real time through this paper.

The Trends of Next Generation Cyber Security (차세대 사이버 보안 동향)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1478-1481
    • /
    • 2019
  • As core technologies(IoT, 5G, Cloud, Bigdata, AI etc) leading the Fourth Industrial Revolution promote smart convergence across the national socio-economic infrastructure, the threat of new forms of cyber attacks is increasing and the possibility of massive damage is also increasing. Reflecting this trend, cyber security is expanding from simple information protection to CPS(Cyber Physical System) protection that combines safety and security that implements hyper-connectivity and ultra-reliability. This study introduces the recent evolution of cyber attacks and looks at the next generation cyber security technologies based on the conceptual changes of cyber security technologies such as SOAR(Security Orchestration, Automation and Response) and Zero Trust.

Proposal of a Model for Co-processing of Real Estate Mortgage Registration in China's Internet Environment

  • Wang, Long;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.53-58
    • /
    • 2021
  • In this paper, based on the real estate registration model in the Chinese internet environment, we propose a model for the joint business of banking collateral registration. This is to increase the efficiency and service level of the real estate mortgage registration process. And it can solve the problems that in the process of registering a mortgage loan, difficulty of data sharing between the real estate registration agency and the bank, and ordinary users and bank clerks duplicate unnecessary work. In addition, it realizes joint processing and data sharing of real estate registration work with real estate registration agencies and banks, increases the efficiency and level of government affairs services, and offers an optimized solution to realize a one-stop service for real estate security registration. The results of this study are expected to provide theoretical support for the application and innovation of the Internet environment real estate registration model.

Achievable Power Allocation Interval of Rate-lossless non-SIC NOMA for Asymmetric 2PAM

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • In the Internet-of-Things (IoT) and artificial intelligence (AI), complete implementations are dependent largely on the speed of the fifth generation (5G) networks. However, successive interference cancellation (SIC) in non-orthogonal multiple access (NOMA) of the 5G mobile networks can be still decoding latency and receiver complexity in the conventional SIC NOMA scheme. Thus, in order to reduce latency and complexity of inherent SIC in conventional SIC NOMA schemes, we propose a rate-lossless non-SIC NOMA scheme. First, we derive the closed-form expression for the achievable data rate of the asymmetric 2PAM non-SIC NOMA, i.e., without SIC. Second, the exact achievable power allocation interval of this rate-lossless non-SIC NOMA scheme is also derived. Then it is shown that over the derived achievable power allocation interval of user-fairness, rate-lossless non-SIC NOMA can be implemented. As a result, the asymmetric 2PAM could be a promising modulation scheme for rate-lossless non-SIC NOMA of 5G networks, under user-fairness.

A Residual Power Estimation Scheme Using Machine Learning in Wireless Sensor Networks (센서 네트워크에서 기계학습을 사용한 잔류 전력 추정 방안)

  • Bae, Shi-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.67-74
    • /
    • 2021
  • As IoT(Internet Of Things) devices like a smart sensor have constrained power sources, a power strategy is critical in WSN(Wireless Sensor Networks). Therefore, it is necessary to figure out the residual power of each sensor node for managing power strategies in WSN, which, however, requires additional data transmission, leading to more power consumption. In this paper, a residual power estimation method was proposed, which uses ignorantly small amount of power consumption in the resource-constrained wireless networks including WSN. A residual power prediction is possible with the least data transmission by using Machine Learning method with some training data in this proposal. The performance of the proposed scheme was evaluated by machine learning method, simulation, and analysis.

Expansion of ATSC 3.0-Based Disaster Broadcasting Service for the Visually and Hearing Impaired

  • Song, Chong-Hyun
    • Journal of Multimedia Information System
    • /
    • v.9 no.3
    • /
    • pp.227-232
    • /
    • 2022
  • Disasters are now becoming commonplace and especially the vulnerable group such as the disabled, the elderly, children and foreigners are in a state of overlapping disasters. In this situation, ATSC 3.0-based UHDTV disaster information service for the visually and hearing impaired has been developing. This study focuses on the demand data collected through in-depth interview with the impaired. The demand analysis data is very important to development process of technology. The results of the interview show that it is essential to link the UHDTV disaster signals with home-network, IoT, wearable devices, and various assistive devices for the impaired (hearing aid, smart light bulbs, warning light, etc.). In outdoor space, UHDTV disaster information must be connected to public display media, digital signage, kiosk, screens in bus or taxi. If communication aids for the visually and hearing impaired are equipped with a function that can transmit and receive disaster information, it will help to minimize disaster damage.

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.

Interactive MR Contents for Alternative Suggestions for Smartphone

  • Chan Lim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.276-282
    • /
    • 2023
  • IoT technology application has been part of modern people's everyday life. This technology makes people to depend on smart devices. 'Smartphone' is the most typical example. Despite the advantages given by this device, the bad side effects are also notable. This paper presents interactive content on the dependence of smartphone device. The research objective is to make individuals to reduce the use of smartphones by realizing their own problems of smartphone dependency. Research was progressed by analyzing aspects obtained from users participating in the self-developed interactive game contents. As a result of the analysis, approximately 68% of people were aware of the problem through this content. This indicates the potential of using convergence research in interactive contents with other fields furthermore.

Smart port electrica l / electr onic equipment maintenance solution development using VR HMD (VR HMD 를 이용한 스마트항만 전기/전자장비 유지보수 솔루션 개발 - 스마트 항 유지보수 교육매니저)

  • Park, Hae-Mi;Kang, Seo-Hyun;Kim, Nam-Hee;Choi, Yu-Na;Park, Young-sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.648-650
    • /
    • 2020
  • 본 프로젝트는 최근 주목받고 있는 Unity 3D 엔진 및 IoT 센서, 가상현실 기술을 활용하여 작업자들이 시간과 장소의 제약 없이 현실감 있는 환경에서 효율적으로 항만 유지/보수 교육을 받을 수 있는 환경을 제공하고자 한다.