• Title/Summary/Keyword: Smart things

Search Result 927, Processing Time 0.024 seconds

A Development of Semantic Connected Service between Vehicles and Things for IoV (차량 인터넷 기술을 위한 시맨틱 차량-사물 연결 서비스 구현)

  • Ryu, Minwoo;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • The recent efforts in academia and industry represent a paradigm shift that will extend the IoT from the home environment so that it is interoperable with the Internet of Vehicles (IoV). IoV is a special kind of IoT. It allows to connect between vehicle and things located in infrastructure. Furthermore, IoV enable to create new intelligent services through collaboration with existing various services such as smart city and connected home. In this paper, we develop a service in order to realize IoV. To this end, we design a novel vehicle service platform which could automatical controlling the IoT device according to drivers' voice. To show practical usability of our proposed platform, we develop a prototype service could be call car-to-thing (C2T). We expect that our proposed platform could eventually contribute to realizing IoV.

A Case Study of the Impact of a Cybersecurity Breach on a Smart Grid Based on an AMI Attack Scenario (AMI 공격 시나리오에 기반한 스마트그리드 보안피해비용 산정 사례)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.809-820
    • /
    • 2016
  • The smart grid, a new open platform, is a core application for facilitating a creative economy in the era of the Internet of Things (IoT). Advanced Metering Infrastructure (AMI) is one of the components of the smart grid and a two-way communications infrastructure between the main utility operator and customer. The smart meter records consumption of electrical energy and communicates that information back to the utility for monitoring and billing. This paper investigates the impact of a cybersecurity attack on the smart meter. We analyze the cost to the smart grid in the case of a smart meter attack by authorized users based on a high risk scenario from NESCOR. Our findings could be used by policy makers and utility operators to create investment decision-making models for smart grid security.

Deep Learning-Based Smart Meter Wattage Prediction Analysis Platform

  • Jang, Seonghoon;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.173-178
    • /
    • 2020
  • As the fourth industrial revolution, in which people, objects, and information are connected as one, various fields such as smart energy, smart cities, artificial intelligence, the Internet of Things, unmanned cars, and robot industries are becoming the mainstream, drawing attention to big data. Among them, Smart Grid is a technology that maximizes energy efficiency by converging information and communication technologies into the power grid to establish a smart grid that can know electricity usage, supply volume, and power line conditions. Smart meters are equient that monitors and communicates power usage. We start with the goal of building a virtual smart grid and constructing a virtual environment in which real-time data is generated to accommodate large volumes of data that are small in capacity but regularly generated. A major role is given in creating a software/hardware architecture deployment environment suitable for the system for test operations. It is necessary to identify the advantages and disadvantages of the software according to the characteristics of the collected data and select sub-projects suitable for the purpose. The collected data was collected/loaded/processed/analyzed by the Hadoop ecosystem-based big data platform, and used to predict power demand through deep learning.

The Factors Influencing Value Awareness of Personalized Service and Intention to Use Smart Home: An Analysis of Differences between "Generation MZ" and "Generation X and Baby Boomers" (스마트홈 개인화 서비스에 대한 가치 인식 및 사용의도에의 영향 요인: "MZ세대"와 "X세대 및 베이비붐 세대" 간 차이 분석)

  • Sang-Keul Lee;Ae Ri Lee
    • Information Systems Review
    • /
    • v.23 no.3
    • /
    • pp.201-223
    • /
    • 2021
  • Smart home is an advanced Internet of Things (IoT) service that enhances the convenience of human daily life and improves the quality of life at home. Recently, with the emergence of smart home products and services to which artificial intelligence (AI) technology is applied, interest in smart home is increasing. To gain a competitive edge in the smart home market, companies are providing "personalized service" to users, which is a key service that can promote smart home use. This study investigates the factors affecting the value awareness of personalized service and intention to use smart home. This research focuses on four-dimensional motivated innovativeness (cognitive, functional, hedonic, and social innovativeness) and privacy risk awareness as key factors that influence the value awareness of personalized service of smart home. In particular, this study conducts a comparative analysis between the generation MZ (young people in late teens to 30s), who are showing socially differentiated characteristics, and the generation X and baby boomers in 40s to 50s or older. Based on the analysis results, this study derives the distinctive characteristics of generation MZ that are different from the older generation, and provides academic and practical implications for expanding the use of smart home services.

A Study on UI Prototyping Based on Personality of Things for Interusability in IoT Environment (IoT 환경에서 인터유저빌리티(Interusability) 개선을 위한 사물성격(Personality of Things)중심의 UI 프로토타이핑에 대한 연구)

  • Ahn, Mikyung;Park, Namchoon
    • Journal of the HCI Society of Korea
    • /
    • v.13 no.2
    • /
    • pp.31-44
    • /
    • 2018
  • In the IoT environment, various things could be connected. Those connected things learn and operate themselves, by acquiring data. As human being, they have self-learning and self-operating systems. In the field of IoT study, therefore, the key issue is to design communication system connecting both of the two different types of subjects, human being(user) and the things. With the advent of the IoT environment, much research has been done in the field of UI design. It can be seen that research has been conducted to take complex factors into account through keywords such as multi-modality and interusability. However, the existing UI design method has limitations in structuring or testing interaction between things and users of IoT environment. Therefore, this paper suggests a new UI prototyping method. In this paper, the major analysis and studies are as follows: (1) defined what is the behavior process of the things (2) analyzed the existing IoT product (3) built a new framework driving personality types (4) extracted three representative personality models (5) applied the three models to the smart home service and tested UI prototyping. It is meaningful with that this study can confirm user experience (UX) about IoT service in a more comprehensive way. Moreover, the concept of the personality of things will be utilized as a tool for establishing the identity of artificial intelligence (AI) services in the future.

  • PDF

Deep Learning City: A Big Data Analytics Framework for Smart Cities (딥러닝 시티: 스마트 시티의 빅데이터 분석 프레임워크 제안)

  • Kim, Hwa-Jong
    • Informatization Policy
    • /
    • v.24 no.4
    • /
    • pp.79-92
    • /
    • 2017
  • As city functions develop more complex and advanced, interests in smart cities are also increasing. Smart cities refer to the cities effectively solving urban problems such as traffic, safety, welfare, and living issues by utilizing ICT. Recently, many countries are attempting to introduce big data, Internet of Things, and artificial intelligence into smart cities, but they have not yet developed into comprehensive urban services. In this paper, we review the current status of domestic and overseas smart cities and suggest ways to solve issues of data sharing and service compatibility. To this end, we propose a "Deep Learning City Framework" that incorporates the deep learning technology into smart city services, and propose a new smart city strategy that safely shares spatial and temporal data in cities and converges learning data of various cities.

Research on the construction concept and general framework of Smart Water Resource

  • Tian, Yu;Li, JianGuo;Jiang, Yun-zhong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.216-216
    • /
    • 2015
  • Frequent hydro-meteorological events caused by global climate change and human exacerbate activities, make the water resource problem more complicated. The increasing speed urbanization brings a significant impact on the city flood control and security, water supply safety, water ecological security, water environment safety and the water engineering security in China, and puts forward higher requirements to urban water integrated management, undoubtedly which become the biggest obstacle for water ecological civilization construction, thus urgent requiring an advanced methods to enhance the effectiveness of the water integrated management. The other fields of smart ideas point out a development path for water resource development. The construction demand of smart water resource is expounded in the paper, combining the philosophy of modern Internet of things with the application of cloud computing technology. The concept of smart water resource is analyzed, the connotation characteristics of smart water resource is extracted, and the general model of smart water resource is refined. Then, the frame structure of smart water resource is put forward. The connotation and the overall framework of the smart water resource represent a higher level of water resource informationization development and provide a comprehensive scientific and technological support to transform water resource management from an extensive, passive, static, branch and traditional management to a fine, active, dynamic, collaborative and modern management.

  • PDF

Vulnerability Analysis Model for IoT Smart Home Camera

  • Aljahdali, Asia Othman;Alsaidi, Nawal;Alsafri, Maram
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.229-239
    • /
    • 2022
  • Today's Internet of Things (IoT) has had a dramatic increase in the use of various daily aspects. As a consequence, many homes adopt IoT technology to move towards the smart home. So, the home can be called smart when it has a range of smart devices that are united into one network, such as cameras, sensors, etc. While IoT smart home devices bring numerous benefits to human life, there are many security concerns associated with these devices. These security concerns, such as user privacy, can result in an insecure application. In this research, we focused on analyzing the vulnerabilities of IoT smart home cameras. This will be done by designing a new model that follows the STRIDE approach to identify these threats in order to afford an efficient and secure IoT device. Then, apply a number of test cases on a smart home camera in order to verify the usage of the proposed model. Lastly, we present a scheme for mitigation techniques to prevent any vulnerabilities that might occur in IoT devices.

Comparative Analysis of IoT Enabled Multi Scanning Parking Model for Prediction of Available Parking Space with Existing Models

  • Anchal, Anchal;Mittal, Pooja
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.404-412
    • /
    • 2022
  • The development in the field of the internet of things (IoT) have improved the quality of the life and also strengthened different areas in the society. All cities across the world are seeking to become smarter. The creation of a smart parking system is the essential use case in smart cities. In recent couple of years, the number of vehicles has increased significantly. As a result, it is critical to make the use of technology that enables hassle-free parking in both public and private spaces. In conventional parking systems, drivers are not able to find free parking space. Conventional systems requires more human interference in a parking lots. To manage these circumstances there is an intense need of IoT enabled parking solution that includes the well defined architecture that will contain the following components such as smart sensors, communication agreement and software solution. For implementing such a smart parking system in this paper we proposed a design of smart parking system and also compare it with convetional system. The proposed design utilizes sensors based on IoT and Data Mining techniques to handle real time management of the parking system. IoT enabled smart parking solution minimizes the human interference and also saves energy, money and time.

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.