• Title/Summary/Keyword: Smart IoT

Search Result 1,345, Processing Time 0.032 seconds

Mutual Authentication based on Home-certificate among loT Devices in the Smart Home Network (스마트홈 네트워크에서 댁내 인증서 기반의 IoT 디바이스 상호인증 방안)

  • Ahn, Hee-Sung;Jhee, Eun-Wha;Seo, Chang-Ho;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.513-515
    • /
    • 2014
  • IoT 디바이스의 범위와 서비스 시장의 확산과 함께, 스마트홈 환경에서 사용되는 디바이스의 종류도 점점 증가하고 있다. 이에 따라 IoT 디바이스의 제어 및 관리의 관점에서 사용자 도용, 불법적인 접근 같이 다양한 보안 위협도 고려해야 한다. 이러한 위협으로 인해 스마트홈 내 디바이스 간의 신뢰적인 인증이 필수적으로 갖춰야할 요구사항이 되었다. 즉, 스마트홈 내에서 유효한 권한을 가진 디바이스의 접근만을 허용하여 안전한 서비스를 제공해야 한다. 본 논문에서는 스마트홈 네트워크 환경에서 IoT 디바이스 간 신뢰적으로 통신할 수 있도록, 댁내 인증서 기반의 디바이스 등록 및 인증서 발급 절차와 디바이스 인증 및 서비스 제공 절차를 통한 IoT 디바이스 상호 인증 방안을 제안한다.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation (사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용)

  • Han, Seul Ki;Kim, Myuhng Joo
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • As the demand for Internet of Things(IoT) increases, the need for the security of IoT devices is increasing steadily. It is difficult to apply the conventional security theory to IoT devices because IoT devices are subject to be constrained by some factors such as hardware, processor, and energy. Nowadays we have several security guidelines and related documents on IoT device. Most of them, however, do not consider the characteristics of specific IoT devices. Since they describes the security issues comprehensively, it is not easy to explain the specific security level reflecting each characteristics of IoT devices. In addition, most existing guidelines and related documents are described in view of developers and service proposers, and thus ordinary users are not able to assess whether a specific IoT device can protect their information securely or not. We propose an security evaluation model, based on the existing guidelines and related documents, for more specific IoT devices and prove that this approach is more convenient to ordinary users by creating checklists for the smart watch.

  • PDF

A Study on Performance Analysis of a Messaging System in IoT Environments (IoT 환경에서의 메시징 시스템의 성능 분석에 관한 연구)

  • Young-Dong Lee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.112-118
    • /
    • 2023
  • Internet of Things(IoT) technology is developing to a stage where the Internet and objects are connected and objects themselves analyze and judge data to interconnect the real world and the virtual world in real time. This technology consists of sensors, actuators, devices, and networks, and it is being applied in various fields. As the number of IoT devices and applications increases, data traffic also increases. In this paper, a messaging system is designed and implemented in order to analyze the performance between an IoT device and MQTT broker. The experimental was performed to measure MQTT-based round-trip time and message transmission time between the IoT device and the broker. The result shows that there is no packet loss, and propagation delay affects round-trip time.

PROFINET-based Data Collection IIoT Device Development Method (PROFINET 기반 데이터 수집을 위한 IIoT 장치 개발 방안)

  • Kim, Seong-Chang;Kim, Jin-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.92-93
    • /
    • 2022
  • As the importance of smart factories is emphasized, the use of industrial Ethernet-based devices is expected to increase to build smart factories. PROFINET is an industrial Ethernet protocol developed by SIEMENS, and a number of smart factories are currently being built as PROFINET-based products. Accordingly, in order to develop and utilize various industrial IoT-based services, an IIoT device capable of collecting various sensor data and information from PROFINET-based manufacturing equipment and transmitting data to an edge computer is required.

  • PDF

Indoor Temperature Analysis by Point According to Facility Operation of IoT-based Vertical Smart Farm (IoT 기반 수직형 스마트 팜의 설비운영에 따른 지점별 실내온도분석)

  • Kim, Handon;Jung, Mincheol;Oh, Donggeun;Cho, Hyunsang;Choi, Seun;Jang, Hyounseung;Kim, Jimin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.1
    • /
    • pp.98-105
    • /
    • 2022
  • It is essential for vertical smart farms that artificially grow crops in an enclosed space to properly utilize air environment facilities to create an appropriate growth environment. However, domestic vertical smart farm companies are creating a growing environment by relying on empirical data rather than systematic methods. Using IoT to create a growing environment based on systematic and precise monitoring can increase crop production yield and maximize profitability. This study aims to construct a monitoring system using IoT and to analyze the cause by demonstrating the imbalance of temperature environment, which is a significant factor in crop cultivation. 1) The horizontal temperature distribution of the multi-layer shelf was measured with different operating methods of LED and air conditioner. As a result, there was a temperature difference of "up to 1.7℃" between the sensors. 2) As a result of measuring the vertical temperature distribution, the temperature difference was "up to 6.3℃". In order to reduce this temperature gap, a strategy for proper arrangement and operation of air conditioning equipment is required.

Analysis of Countermeasures and Network Security Vulnerability for IoT Smart Home (IoT 스마트 홈 네트워크 보안 취약점 분석 및 대응 방안)

  • Yang, Seung-Su;Shim, Jae-Sung;Park, Seok-Cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.324-325
    • /
    • 2016
  • 최근 IoT 서비스의 확산으로 스마트 홈 기반의 다양한 서비스들이 이슈화 되고 있다. 특히 스마트기기의 다양화와 이기종 간의 통신망 연결로 인한 보안 문제가 제기되고 있다. 따라서 본 논문에서는 보안 패러다임 변화에 따른 스마트 홈 보안 취약점을 분석하고 이에 대한 대응 방안을 제시하였다.

IoT Based Smart Parking Management System (IoT 기반 스마트 주차 안내 시스템)

  • Kim, Yung-Ung;Jung, In-Hwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.467-468
    • /
    • 2015
  • 본 논문에서는 주차장의 주차 공간 정보와 블루투스 비콘 정보를 활용하여 IoT 기반 스마트 주차정보 시스템을 구현하였다. 주차장의 주차 센서는 주차 정보를 실시간으로 서버에게 전달하며 차량 운전자는 스마트폰 앱을 실행하고 주차장에 진입한다. 스마트폰은 그 주차장의 블루투스 비콘 신호를 이용하여 주차 위치를 자동으로 인식하며 주차하려는 층의 주차 정보를 한눈에 확인할 수 있다.

Malware Detector Classification Based on the SPRT in IoT

  • Jun-Won Ho
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.59-63
    • /
    • 2023
  • We create a malware detector classification method with using the Sequential Probability Ratio Test (SPRT) in IoT. More specifically, we adapt the SPRT to classify malware detectors into two categories of basic and advanced in line with malware detection capability. We perform evaluation of our scheme through simulation. Our simulation results show that the number of advanced detectors is changed in line with threshold for fraction of advanced malware information, which is used to judge advanced detectors in the SPRT.

The Internet of Things(IoT) applications and value creation in the retail industry: focusing on consumer decision-making stages (리테일 산업에서의 구매단계별 사물인터넷 활용과 가치 창출)

  • Park, In-hyoung;Jeong, So Won
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.187-198
    • /
    • 2021
  • This study aims to understand the current status of the use of IoT-based products and services from the perspective of consumers and analyze the role and consumption value of each service-generated from the products and services. Their features and generated consumption value have been identified The decision-making process was divided into based on three stages (pre-purchase, purchase, and post-purchase) stages, and IoT services were classified in stages. In the pre-purchase stage, the IoT service provides information and alternatives, and is used for interaction and automatic payment systems in the purchasing stage. In the post-purchase stage, repetitive purchases are encouraged and after-sale services are provided. Throughout the decision-making process, smart retai application and servicel provides epistemic and functional value. In addition, it provides conditional and social value in the pre-purchase stage, and conditional value in the post-purchase stage. This study aims to provideprovides marketers and retailers an insight advice for the enhanced satisfaction of consumersimproving the satisfaction of consumers and the development of smart retail by examining the consumer-centered consumption value.