• Title/Summary/Keyword: Things

Search Result 5,740, Processing Time 0.033 seconds

Defining the Scope of the Internet of Things with a Particular Focus on Its Role in Healthcare: A Review Paper

  • Abdulaziz Alomari;Ben Soh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.187-197
    • /
    • 2023
  • Today's world is experiencing rapid technological advancement like never before. The ever-changing technology space has overwhelmed citizens with a substantial load of information, which has made it difficult for them to keep up with the technology awareness. This review paper is written to provide information about the Internet of Things in a way that technical along with nontechnical individuals can understand the definition, historical evolution, components, and scope of IoT technology. Relevant literature published between January 2009 and February 2023 was included in this paper. The applications of the Internet of Things in healthcare have been a special focus of this paper as IoT has massive potential in this field and healthcare professionals often face significant issues in keeping their technology knowledge up to date. Moreover, some of the most common issues associated with IoT introduction in healthcare are also discussed in the paper along with some suitable recommendations. Although, IoT can significantly transform our lives and can introduce convenience and efficiency, particularly in the healthcare sector. However, its adoption in healthcare is still a major task due to various challenges presented by the health workforce. Thus, in-depth empirical research is suggested to assist the IoT technology transition.

Implementation of IoT using Raspberry Pi and Bluetooth Serial Communication (라즈베리파이와 블루투스 시리얼 통신을 활용한 IoT 구현)

  • Choi, Jun-hyeong;Choi, Byeong-yoon;Lee, Sung-jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.202-204
    • /
    • 2021
  • The Internet of Things (IoT) is a term first used by Kevin Ashton, director of MIT's Auto ID Center, in 1999, and refers to the connection of things to the Internet. Bluetooth, one of the wireless networks, is a technology developed as an industry standard for personal short-range wireless communication first developed by Ericsson in 1994. Since the Raspberry Pi has Bluetooth built-in, a wireless network is possible. This paper implements a module for the Internet of Things by implementing serial communication in the Bluetooth built-in Raspberry Pi 3 B+. There was a problem that Bluetooth communication was impossible between raspberries, so the discovery function was activated and serial communication was added to successfully link the communication.

  • PDF

A Review of Security Threats of Internet of Things

  • Nargis Jamal;Sataish Riaz;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.99-108
    • /
    • 2024
  • The Internet of Things (IoT) is a novel concept that allows a large number of objects to be connected to the Internet while also allowing them to be controlled remotely. The Internet of Things is extensive and has become an almost inseparable part of our daily lives. Users' personal data is frequently obtained by these linked gadgets and stored online. In recent years, the security of acquired data has become a major concern. As devices grow more linked, privacy and security concerns grow more pressing, and they must be addressed as soon as possible. IoT implementations and devices are particularly vulnerable to attacks that might adversely affect customer security and privacy, which might have an impact on their practical utility. The goal of this study is to bring attention to the security and privacy concerns that exist in IoT systems. To that purpose, the paper examines security challenges at each level of the IoT protocol stack, identifies underlying impediments and critical security requirements, and provides a rapid overview of available security solutions for securing IoT in a layered environment.

Acoustic Event Detection and Matlab/Simulink Interoperation for Individualized Things-Human Interaction (사물-사람 간 개인화된 상호작용을 위한 음향신호 이벤트 감지 및 Matlab/Simulink 연동환경)

  • Lee, Sanghyun;Kim, Tag Gon;Cho, Jeonghun;Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2015
  • Most IoT-related approaches have tried to establish the relation by connecting the network between things. The proposed research will present how the pervasive interaction of eco-system formed by touching the objects between humans and things can be recognized on purpose. By collecting and sharing the detected patterns among all kinds of things, we can construct the environment which enables individualized interactions of different objects. To perform the aforementioned, we are going to utilize technical procedures such as event-driven signal processing, pattern matching for signal recognition, and hardware in the loop simulation. We will also aim to implement the prototype of sensor processor based on Arduino MCU, which can be integrated with system using Arduino-Matlab/Simulink hybrid-interoperation environment. In the experiment, we use piezo transducer to detect the vibration or vibrates the surface using acoustic wave, which has specific frequency spectrum and individualized signal shape in terms of time axis. The signal distortion in time and frequency domain is recorded into memory tracer within sensor processor to extract the meaningful pattern by comparing the stored with lookup table(LUT). In this paper, we will contribute the initial prototypes for the acoustic touch processor by using off-the-shelf MCU and the integrated framework based on Matlab/Simulink model to provide the individualization of the touch-sensing for the user on purpose.

Bug Reports Attribute Analysis for Fixing The Bug on The Internet of Things (사물인터넷 관련 버그 정정을 위한 버그리포트 속성 분석)

  • Knon, Ki Mun;Jeong, Seong Soon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.5
    • /
    • pp.235-241
    • /
    • 2015
  • Nowadays, research and industry on the internet of things is rapidly developing. Bug fixed field of the Software development related internet of things is a very important things. In this study, we analyze the properties that can affect what the bug fix-time by analyzing the time required to fix a bug associated with the Internet of Things. Using the k-NN classification method based on the attribute information to be classified as bug reports. Extracts a bug report based on the results of a similar property. Bug fixed by calculating the time of a similar bug report predicts the fix-time for new bugs. Depending on the prediction of the properties that affect the bug correction time, the properties of os, component, reporter, and assignee showed the best prediction accuracy.

A Priority Analysis on Mobile Telecom Internet of Things Using the AHP (analytic hierarchy process) (계층분석기법(AHP)을 이용한 이동통신 사물인터넷 서비스 우선순위 분석)

  • Nam, Soo-Tai;Jin, Chan-Yong;Kim, Do-Goan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1191-1196
    • /
    • 2017
  • Lately, the three mobile telecom companies in Korea are competing for the launch of Internet of Things services for using home. Typical launched services are in the smart home related fields. However, Internet of Things as mobile telecom based are at an early stage, expected that various services will be started continuously. At this point, we have been planning to analyze the preference of Internet of Things for objects based on the services already launched. In order to apply the analytic hierarchy method, the first stage factors were designed as Safety, Security, Health care, Intelligence and Home appliances. In addition, the second stage factors were organized into 18 detailed services presented in the conceptual model. As a result, Health care (23.2%) was the most preferred priority. These results can be interpreted as the result of interest in health by improving income. We presented the theoretical and practical implications of these results.

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

Design of Learning Model using Triz for PBL(Project-based Learning) in IoT Environment (사물인터넷환경에서 프로젝트중심학습에 Triz를 이용한 학습 모델 설계)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.81-87
    • /
    • 2019
  • It is changing to the 4th Industrial Revolution rapidly as the information age through the Internet is changing, and it is rapidly changing to the era of the IoT using all things. In education, with the change to the Internet of Things, interest in education for the 4th Industrial Revolution is increasing. It is necessary to change from NetPBL method using Internet to T-PBL using Triz. In this paper, we focus on the task-based learning (T-PBL) method using Triz and examine the necessity and importance of its use. We propose a teaching model using Triz as a tool for T-PBL. Triz is being used as a tool to solve problems in creative ways. We will design a model applying Triz to the blockchain system security class related to the IoT.

Context-Aware Modeling with User Demand in an Internet of Things Environment (사물 인터넷 환경에서 사용자 요구를 포함한 상황 인지 모델)

  • Ryu, Shinhye;Kim, Sangwook
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.11
    • /
    • pp.641-649
    • /
    • 2017
  • As Internet of Things devices become pervasive, services improve to better assess the context and to alert other users to deal with emergencies. Such services use Internet of Things devices to detect the context around the user and promptly notify public institutions, hospitals or other parental users in emergencies. Most of these systems analyze an event when the value of the device is unchanged for a period of time or if it detects an abnormal value. However, just monitoring sensor values makes it difficult to accurately understand the context surrounding a user. Also if the device is inactive, it can not identify the context or provide services again. However, understanding the user requirements, services provided through other devices, information sent to other users lets, appropriate actions be taken. This paper, proposes a device search method and system based on a context-aware model that includes user demands. The proposed system analyzes the user's context and demands by using data collected from the internet of things devices. If user devices are inactive, they can recognize other devices by searching for other devices and providing services to users again. Through the proposed method, the user-centric services are provided. This method also analyzes and responds to requirements in various emergencies.

Application of Analytic Hierarchy Process for Relative Importance Determination of Internet of Things Standardization (사물인터넷 표준화의 상대적 중요도 결정을 위한 계층분석방법 응용)

  • Woo, Hoon-Shik
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.1
    • /
    • pp.47-55
    • /
    • 2016
  • As one of recent issues in the information and communication industry, internet of things has attracted attention to provide intelligent infrastructure services which connect and share data and information between real and virtual world. According to the development of these internet of things technologies, types of machines, telecommunication devices, and terminals are increasing tremendously. In this situation, connectivity and interoperability between internet of things components are important issues to build a hyper connected society. To visualize this society, it is important to set up and develop information and communication technology (ICT) standards among stakeholders. However, under limited budget and human resources, it is essential to rank standardization work items for setting standards with respect to efficiency. The purpose of this study is to provide a method for setting standardization strategies within group decision making. As a multi-criteria group decision making tool, analytic hierarchy process (AHP) is adopted and applied to determine the priorities of setting work items. The proposed method first defines decision making problem with objective, criteria, and alternatives which produces a hierarchy consisting of upper and lower criteria. Then, pairwise comparisons of academy and public sector experts are performed with respect to their relative meaning and importance. Individual surveys of expert groups are collected and summarized to determine relative criteria importance measures. Furthermore, to deliver reliable importance criteria measures, differences between academy and public sector expert groups are compared and tested using Mann-Whitney non-parametric test. The results are illustrated for useful guidelines to practical group decision making in standardization strategy establishments.