• Title/Summary/Keyword: Smart IoT

Search Result 1,345, Processing Time 0.022 seconds

Life-Road : Development of an Emergency Evacuation Application using Augmented Reality and Beacon (Life-Road : 증강현실과 비콘을 사용하는 긴급대피용 애플리케이션 개발)

  • Myeon-gyun Cho
    • Journal of Digital Policy
    • /
    • v.2 no.4
    • /
    • pp.11-15
    • /
    • 2023
  • Recently, a fire suddenly broke out in a crowded theater, and many people were unable to find an escape route, becoming entangled, injured, and suffocating from smoke inhalation, resulting in a large-scale fire accident. Even though most of the people were young, they were unable to evacuate. If they had been elderly, it could have resulted in greater casualties. In particular, since it is difficult to receive accurate location information from GPS indoor, there is an urgent need for location-based services using beacons and an emergency evacuation system that intuitively shows evacuation routes in augmented reality using smart-phones. In this paper, an augmented reality-based emergency evacuation smartphone app was developed based on identifying fire locations and evacuation routes using beacons and fire sensors (IoT). In the future, if the proposed system is applied to indoor spaces where people are crowded, rapid evacuation will be possible even in a sudden fire accident, minimizing human damage.

Wearable Device Security Threat Analysis and Response Plan (웨어러블 디바이스 보안 위협 및 대응 방안)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.55-61
    • /
    • 2024
  • With the development of IoT technology, wearable services have also developed rapidly. Wearable devices required for this service are used as sensors and controllers in the form of smart bands. Wearable devices implement very concise SWlogic for possible long-term use and use wireless communication protocols to improve convenience. However, because this wearable device aims to be lightweight, it is more vulnerable to security than terminals used for other information services. Many smart healthcare or smart medical services are passive or do not apply security technology. By exploiting this security environment, attackers can obtain or modify important information through access to wearable devices. In this study, we analyzed the technical operating environment of wearable services and identified authentication information reuse attacks, BIAS attacks, battery drain attacks and firmware attacks on wearable devices. And we analyzed the mechanism of each security threat and confirmed the attack effect. In this study, we presented a response plan to respond to the identified security threats. When developing wearable services, it is expected that safer services can be built if the response plan proposed in this study is considered.

A Case Study of 'Smart Farm' Model Product Manufacturing and Recognition of Model Manufacturing Lesson Based on IoT(Internet of Things) by Pre-service Technology Teachers (예비기술교사를 대상으로 한 사물인터넷 기반의 모형 제작 수업에 대한 인식 및 '스마트 농장' 제작 사례 분석)

  • Kim, Seong-Il;Choi, Woon-Shik;Kim, Ki-Sun;Hwang, Sun-jong;Ju, Eun-Hee;Kang, Huyn-Jong
    • 대한공업교육학회지
    • /
    • v.43 no.1
    • /
    • pp.158-176
    • /
    • 2018
  • The purpose of this study is to analyze the satisfaction of the manufacturing process and the satisfaction of manufacturing lesson in the lesson of model product manufacturing based on IoT(Internet of Things) for pre-service technology teachers. and we also analyzed 'smart farm' model production manufacturing among various products. The survey questionnaires with 8 questions to investigate satisfaction level of model manufacturing process, difficulties in manufacturing, and the satisfaction level of manufacturing lesson were collected from the 15 pre-service technology teachers and analyzed by using SPSS program. and The results of this study were as follows: First, the lesson satisfaction average level of pre-service technology teachers was high(M=4.22) in model product manufacturing process for the 'smart farm' model making based on the IoT. Second, the average satisfaction level of 'patent search and prior art search report writing education' was as high as 4.07. Therefore, the application of 'prior art search report writing education' showed that it helped to make the product. Third, the best high satisfaction level in the model production manufacturing procedure was 'education of inventive thinking method'(M=4.40). Therefore, the pre-service technology teachers showed that the 'education of inventive thinking methods' was very helpful from the idea design to the optimal selection of idea. The next order of satisfaction level was high(M=4.33) in 'design education and counseling' and 'guidance through selection of professor who guide the production manufacturing in addition to professors who are in charge of lesson'. Because they were helpful in solving the lack of knowledge of pre-service technology teachers. Fourth, satisfaction level with 'the presentation of model making results and exhibitions', 'presentations and participations of external event' was high (M = 4.13). Although the results of interviews with pre-service technology teachers showed that they suffered from lack of knowledge in various technologies, but it was an opportunity to learn things and felt a sense of accomplishment.

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

A Study on the Design of Smart Contracts mechanism based on the Blockchain for anti-money laundering (자금 세탁 방지를 위한 블록체인 기반 스마트 컨트랙트 메커니즘 설계)

  • Kang, Heejung;Kim, Hye Ri;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.1-11
    • /
    • 2018
  • The Blockchain is a technique that prevents data from being manipulated and guarantees the integrity and reliability of the data by all participants in the network jointly owning and validating the data. Since the Blockchain characterized by security, scalability and transparency, it is used in a variety of fields including logistics, distribution, IoT and healthcare, including remittance. In particular, there is a growing interest in smart contract that can create different forms of contracts and automate implementation based on Blockchain. Smart Contract can be used to pre-programme contracts and are implemented immediately when conditions are met. As a result, digital data can be more reliable. In this paper, we are conducting a study on the smart contract design as a way to solve such problems as illegal misuse of funds on virtual currency, which has become an issue recently. Through this process, we applied the customer identification and money laundering prevention process using smart contract, and then check the possibility of preventing money laundering and propose the ASM (AML SmartContract Mechant) design.

Research on Digital twin-based Smart City model: Survey (디지털 트윈 기반 스마트 시티 모델 연구 동향 분석)

  • Han, Kun-Hee;Hong, Sunghyuck
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.172-177
    • /
    • 2021
  • As part of the digital era, a digital twin that simulates the weak part of a product by performing a stress test that reduces the lifespan of some expensive equipment that cannot be done in reality by accurately moving the real world to virtual reality is being actively used in the manufacturing industry. Due to the development of IoT, the digital twin, which accurately collects data collected from the real world and makes it the same in the virtual space, is mutually beneficial through accurate prediction of urban life problems such as traffic, disaster, housing, quarantine, energy, environment, and aging. Based on its action, it is positioned as a necessary tool for smart city construction. Although digital twin is widely applied to the manufacturing field, this study proposes a smart city model suitable for the 4th industrial revolution era by using it to smart cities and increasing citizens' safety, welfare, and convenience through the proposed model. In addition, when a digital twin is applied to a smart city, it is expected that more accurate prediction and analysis will be possible by real-time synchronization between the real and virtual by maintaining realism and immediacy through real-time interaction.

Design and Implementation of Fruit harvest time Predicting System based on Machine Learning (머신러닝 적용 과일 수확시기 예측시스템 설계 및 구현)

  • Oh, Jung Won;Kim, Hangkon;Kim, Il-Tae
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.74-81
    • /
    • 2019
  • Recently, machine learning technology has had a significant impact on society, particularly in the medical, manufacturing, marketing, finance, broadcasting, and agricultural aspects of human lives. In this paper, we study how to apply machine learning techniques to foods, which have the greatest influence on the human survival. In the field of Smart Farm, which integrates the Internet of Things (IoT) technology into agriculture, we focus on optimizing the crop growth environment by monitoring the growth environment in real time. KT Smart Farm Solution 2.0 has adopted machine learning to optimize temperature and humidity in the greenhouse. Most existing smart farm businesses mainly focus on controlling the growth environment and improving productivity. On the other hand, in this study, we are studying how to apply machine learning with respect to harvest time so that we will be able to harvest fruits of the highest quality and ship them at an excellent cost. In order to apply machine learning techniques to the field of smart farms, it is important to acquire abundant voluminous data. Therefore, to apply accurate machine learning technology, it is necessary to continuously collect large data. Therefore, the color, value, internal temperature, and moisture of greenhouse-grown fruits are collected and secured in real time using color, weight, and temperature/humidity sensors. The proposed FPSML provides an architecture that can be used repeatedly for a similar fruit crop. It allows for a more accurate harvest time as massive data is accumulated continuously.

Access Control as a Service for Information Protection in Semantic Web based Smart Environment

  • Siddiqui, Isma Farah;Lee, Scott Uk-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.9-16
    • /
    • 2016
  • Pervasive computing and Internet of Things (IoT) have recently received considerable interest to deploy solutions for the future Internet. Smart environments are integrated with Semantic Web to provide context-awareness to the processed information. Self-learning techniques have been adopted within smart solutions for efficient retrieval of data but do not process data with privacy parameters for in-place authorization. To overcome this issue, we present a novel approach of deploying access control as a service mechanism within Semantic Web based smart environment by using eXtensible Access Control Markup Language (XACML). The proposed XACML as a Service (XACMLaaS) approach offers fine-grained access control for protecting information within smart environment. In this paper, we have defined mathematical rules for each components of proposed access control service layer. These rules are for implementation of access control using XACML. The proposed approach allows the adaptation of authorization of information at component level and provides scalable solution for authorization policies and rule enforcement within smart environment.

Analysis of Field Conditions and Requirements for Deploying Smart Factory (스마트공장 구축을 위한 현장실태 및 요구사항 분석)

  • Lee, Hyunjeong;Kim, Yong Jin;Yim, Jeongil;Kim, Yong-Woon;Lee, Soo-Hyung
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.34 no.1
    • /
    • pp.29-34
    • /
    • 2017
  • The operating environments of factories and manufacturing units have changed dramatically due to globalization, population, and customization. The existing factories are converted into smart units using information and communications technology (ICT). These smart factories can produce, control, repair, and manage themselves. The manufacturing processes are efficiently optimized using the monitoring and analysis methods of ICT. In this experimental study, we carried out a survey on the system solution providers and consumer companies to determine the field conditions and requirements necessary for assembling a smart factory. Using the results of this survey, we effectively devised smart factory solutions and implemented them on the existing conditions in various factories.