• Title/Summary/Keyword: Smart IoT

Search Result 1,354, Processing Time 0.028 seconds

A Study of Temporary Positioning Scheme with IoT devices for Disastrous Situations in Indoor Spaces Without Permanent Network Infrastructure (상설 네트워크 인프라가 없는 실내 공간에서 재난시 IoT 기기를 활용한 부착형 실내 위치 추적 기술 연구)

  • Lee, Jeongpyo;Yun, Younguk;Kim, Sangsoo;Kim, Youngok
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.315-324
    • /
    • 2018
  • Purpose: This paper propose a temporary indoor positioning scheme with devices of internet of things (IoT) for disastrous situations in places without the infrastructure of networks. Method: The proposed scheme is based on the weighted centroid localization scheme that can estimate the position of a target with simple computation. Results: It also is implemented with the IoT devices at the underground parking lot, where the network is not installed, of general office building. According to the experiment results, the positioning error was around 10m without a priori calibration process at $82.5m{\times}56.4m$ underground space. Conclusion: The proposed scheme can be deployed many places without the infrastructure of networks, such as parking lots, warehouses, factory, etc.

IoT based User Remote Control Analysis Algorithm (IoT 기반 사용자 원격 제어 분석 알고리즘)

  • Jeong, Dohyeong;Yu, Donggyun;Lee, Kyouhwan;Kim, Hosung;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.725-726
    • /
    • 2017
  • Recently, IoT (Internet of Things) has been applied to various fields, not limited to places, through continuous research. However, the existing IoT system is based on the surrounding environment rather than the user-oriented operation of the device. therefore, there is a problem in that the efficiency and accuracy of the work are low. In this paper, we propose a user remote control analysis algorithm to solve these problems. When the user performs the remote control, the command is collected and the data is sorted according to the device and time. Analyze time-dependent behavior of devices based on sorted data. based on the results of the analysis, the environment is controlled by operating the device inside the home. Therefore, it is expected that the accuracy and convenience of device operation will be increased by providing customized service to users.

  • PDF

Social network analysis of keyword community network in IoT patent data (키워드 커뮤니티 네트워크의 소셜 네트워크 분석을 이용한 사물 인터넷 특허 분석)

  • Kim, Do Hyun;Kim, Hyon Hee;Kim, Donggeon;Jo, Jinnam
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2016
  • In this paper, we analyzed IoT patent data using the social network analysis of keyword community network in patents related to Internet of Things technology. To identify the difference of IoT patent trends between Korea and USA, 100 Korea patents and 100 USA patents were collected, respectively. First, we first extracted important keywords from IoT patent abstracts using the TF-IDF weight and their correlation and then constructed the keyword network based on the selected keywords. Second, we constructed a keyword community network based on the keyword community and performed social network analysis. Our experimental results showed while Korea patents focus on the core technologies of IoT (such as security, semiconductors and image process areas), USA patents focus on the applications of IoT (such as the smart home, interactive media and telecommunications).

Big Data-based Sensor Data Processing and Analysis for IoT Environment (IoT 환경을 위한 빅데이터 기반 센서 데이터 처리 및 분석)

  • Shin, Dong-Jin;Park, Ji-Hun;Kim, Ju-Ho;Kwak, Kwang-Jin;Park, Jeong-Min;Kim, Jeong-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.117-126
    • /
    • 2019
  • The data generated in the IoT environment is very diverse. Especially, the development of the fourth industrial revolution has made it possible to increase the number of fixed and unstructured data generated in manufacturing facilities such as Smart Factory. With Big Data related solutions, it is possible to collect, store, process, analyze and visualize various large volumes of data quickly and accurately. Therefore, in this paper, we will directly generate data using Raspberry Pi used in IoT environment, and analyze using various Big Data solutions. Collected by using an Sqoop solution collected and stored in the database to the HDFS, and the process is to process the data by using the solutions available Hive parallel processing is associated with Hadoop. Finally, the analysis and visualization of the processed data via the R programming will be used universally to end verification.

Analysis on Big data, IoT, Artificial intelligence using Keyword Network (빅데이터, IoT, 인공지능 키워드 네트워크 분석)

  • Koo, Young-Duk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1137-1144
    • /
    • 2020
  • This paper aims to provide strategic suggestions by analyzing technology trends related to big data, IoT, and artificial intelligence. To this end, analysis was performed using the 2018 national R&D information, and major basic analysis and language network analysis were performed. As a result of the analysis, research and development related to big data, IoT, and artificial intelligence are being conducted by focusing on the basic and development stages, and it was found that universities and SMEs have a high proportion. In addition, as a result of the language network analysis, it is judged that the related fields are mainly research for use in the smart farm and healthcare fields. Based on these research results, first, big data is essential to use artificial intelligence, and personal identification research should be conducted more actively. Second, they argued that full-cycle support is needed for technology commercialization, not simple R&D activities, and the need to expand application fields.

Research on Sharding Model for Enabling Cross Heterogeneous Blockchain Transactions (이기종 블록체인간 거래를 위한 샤딩모델 연구)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.315-320
    • /
    • 2021
  • While blockchain platforms for various purposes have been developed and the blockchain ecosystem is being developed, interoperability problems are emerging in which each blockchain is isolated and operated. In this study, we introduce interchain and sidechain technologies, which are blockchain that connect blockchain, and explain examples of using heterogeneous blockchain transactions and functions by applying them. In addition, blockchain, artificial intelligence, and IoT technologies, which are drawing attention in the fourth industrial revolution, are going through a process of converging and developing beyond their own development. In this regard, we present processes for combining artificial intelligence or IoT in blockchain, and propose a model that can operate without intervention by applying the combination of blockchain and artificial intelligence IoT to processes for trading and exchange between heterogeneous blockchain.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

Comparison of Efficiency Analysis of Device Energy Used in Object Communication (사물통신에 사용되는 디바이스 에너지의 효율화 분석 고찰)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1106-1112
    • /
    • 2017
  • As the Internet of Things (IOT) is evolving into an industry-wide service and expanded to the concept of Internet of Everything (IoE), services using IoT devices are easily accessible in everyday life. IoT requires more devices to collect information and is expected to increase the number of devices by 50 billion by 2020, and is about the number of devices currently available. Gradually, the number of mobile devices, smart devices, and Internet devices is increasing, and energy resources are required to operate such a large number of Internet devices, and the energy consumed by each device is small. In this paper, we consider the number of devices to be increased and generate a signal irrespective of transmission information so that power other than the energy required for signal transmission is consumed. When transmission information is generated and near to a receiver to receive information, The method to be used as an analysis is designed through experiments.

Development of Accident-prevention Smart Monitoring System for Woman Diver using Zigbee Module and GPS Sensor (Zigbee와 GPS를 이용한 해녀 사고예방 스마트 모니터링 시스템 개발)

  • Choi, Min Ho;Kim, Young Sang
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.74-80
    • /
    • 2016
  • In this paper, we propose an accident-prevention smart monitoring system for Haenyeo(Woman diver) using Zigbee module and GPS sensor. This system can collect such information as the diving location, the body temperature, the depth of diving, and the diving time of a Woman diver working under the water and then respond immediately to an accident occurring. The research developed a smart Teawak and smart swimming goggles which can measure the state of a Woman diver and her diving activities. Smart Teawak, the buoy tool while a Woman diver is collecting seafoods under water, is able to receive GPS and transmit the data from smart swimming goggles and Zigbee Module to IHSS(IoT based Haenyeo Safety service Software) server. In addition, IHSS, a responsive web, provides the diving location and the state of a Woman diver on the smart phone. As a result, the system will be useful in the aspects of Woman diver' health care and the safety, furthermore, which will significantly contribute to global marketing of Woman diver with its being designated as a UNESCO intangible cultural asset.