• Title/Summary/Keyword: Use IoT

Search Result 646, Processing Time 0.025 seconds

Perceived Connectivity, Perceived Belongingness and Intention to Use IoT Appliance Based Service (인지된 기기 연결성이 사물인터넷(IoT) 가전 기반 서비스의 사용의도에 미치는 영향에 대한 실증연구)

  • Jin, Yoonsun;Kwon, Ohbyung
    • Journal of Information Technology Services
    • /
    • v.18 no.4
    • /
    • pp.97-113
    • /
    • 2019
  • With the development of sensor, communication and intelligent software technology, expectation of IoT-based service which can receive desired service automatically and anytime, anywhere is getting higher. In addition, IoT-based services have begun to anticipate the development of a hyper-connected society. Despite these expectations and anticipations, few studies have empirically identified ways to improve the intentions of prospective customers to use IoT-based services. Therefore, the purpose of this paper is to propose a theoretical model that can explain the factors that determine the intention of using IoT-based services. In addition, this study investigates what factors affect the intention to use IoT-based services focusing on the connectedness. Especially, perceived connectivity with the (virtual) community, unlike the connectivity with the machines, is newly proposed, to understand the IoT technology adoption behavior. The empirical results suggest that social relationship is one of the critical factors to affect the use of services running on interconnected technology such as IoT. When IoT-based service is recognized as a link to other communities, it has been found to have a positive effect on intention to use via perceived belongingness.

IoT Device Testing for Efficient IoT Device Framework

  • Gong, Dong-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.77-82
    • /
    • 2020
  • IoT devices frequently require input resources to communicate with various sensors or IoT platforms. IoT device wastes a lot of time as idle time or waiting time to check the data of the input resource and use the input resource. In addition, IoT devices use various input resources. We compares and analyzes input idle time and input waiting time generated from hardware serial input resource, software serial input resource, digital port input resource, and analog port input resource using Arduino widely used as IoT device. In order to design the IoT device framework, it is necessary to understand the characteristics of input resources and to design them to minimize unnecessary input idle time and input waiting time. The analog input wait time has a much larger input wait time than the digital input wait time, so it must be designed to receive analog information periodically at the appropriate timing. The characteristics of the input resources analyzed in this way help to design an efficient IoT device.

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

Blockchain-Based IoT Device Authentication Scheme (블록체인 기반 IoT 디바이스 인증 스킴)

  • Park, Byeong-ju;Lee, Tae-jin;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.343-351
    • /
    • 2017
  • With ICT technology develops, IoT environment is attracting attention. However, IoT devices have various CPU performance as much as various purpose of use. Some IoT devices use the cpu that doesn't support public key cryptogrphy or crypto acceleration. In this paper, we study Blockchain-based IoT Device Authentication Scheme that provides authentication, integirity and non-repudation through analysis of Lamport Hash-chain, Lamport Signature, Blockchain and existing Authentication protocols. The proposed scheme requires only simple hash operation in IoT devices and it can operate in low performance IoT device, thus ensuring secure authentication in IoT environment.

A Framework for Internet of Things (IoT) Data Management

  • Kim, Kyung-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.159-166
    • /
    • 2019
  • The collection and manipulation of Internet of Things (IoT) data is increasing at a fast pace and its importance is recognized in every sector of our society. For efficient utilization of IoT data, the vast and varied IoT data needs to be reliable and meaningful. In this paper, we propose an IoT framework to realize this need. The IoT framework is based on a four layer IoT architecture onto which context aware computing technology is applied. If the collected IoT data is unreliable it cannot be used for its intended purpose and the whole service using the data must be abandoned. In this paper, we include techniques to remove uncertainty in the early stage of IoT data capture and collection resulting in reliable data. Since the data coming out of the various IoT devices have different formats, it is important to convert them into a standard format before further processing, We propose the RDF format to be the standard format for all IoT data. In addition, it is not feasible to process all captured Iot data from the sensor devices. In order to decide which data to process and understand, we propose to use contexts and reasoning based on these contexts. For reasoning, we propose to use standard AI and statistical techniques. We also propose an experiment environment that can be used to develop an IoT application to realize the IoT framework.

A Study on the Use of IoT in Infant Care (영아 돌봄에서 IoT 활용에 대한 일고찰)

  • Yee, YoungHwan;Hwang, Sheenhai
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.4
    • /
    • pp.59-66
    • /
    • 2017
  • These days, IoT attached diaper are available in markets. It measures child's temperature, oxygen rate, or even humidity of diaper and send the result directly to parent's smartphone. This research emphasize the followings, due to the fact that use of IoT in context of infant care should ultimately be leaded to infant's wellbeing and healthy development. First, there can be many problems when you only focus on usability without careful consideration of the accuracy of the infant's health information produced by the IoT. Second, infant's needs and nature of child should be reflected when developing IoT which supports infant care. The use of the IoT should not take away the chance of physical contact such as eye-contact or patting and hugging between the caregiver and baby. IoT is very important, however in terms of infant development, connect with IoT cannot antecede contact with child.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Use of Blockchain to Support the Security of Internet of Things: A Review

  • Saher Un Nisa;Maryam Khalid
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.149-154
    • /
    • 2023
  • Internet of Things (IoT) is now spreading everywhere. It's the technology of every person's need so we can't step back from IoT but we can secure it as it is spreading quickly so it has greater chances of danger and being misused. There is an urgent need to make IoT devices secure from getting cracked or hacked. A lot of methods had tried and still trying to mitigate IoT security issues. In this paper Blockchain is going to be the solution of most of the IoT issues or problems. We have discussed or highlighted security issues with centralized IoT and then provided solution of such security challenges through the use of blockchain because is based on a decentralized technology that is hard to modify or update.

Autoencoder-Based Anomaly Detection Method for IoT Device Traffics (오토인코더 기반 IoT 디바이스 트래픽 이상징후 탐지 방법 연구)

  • Seung-A Park;Yejin Jang;Da Seul Kim;Mee Lan Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.281-288
    • /
    • 2024
  • The sixth generation(6G) wireless communication technology is advancing toward ultra-high speed, ultra-high bandwidth, and hyper-connectivity. With the development of communication technologies, the formation of a hyper-connected society is rapidly accelerating, expanding from the IoT(Internet of Things) to the IoE(Internet of Everything). However, at the same time, security threats targeting IoT devices have become widespread, and there are concerns about security incidents such as unauthorized access and information leakage. As a result, the need for security-enhancing solutions is increasing. In this paper, we implement an autoencoder-based anomaly detection model utilizing real-time collected network traffics in respond to IoT security threats. Considering the difficulty of capturing IoT device traffic data for each attack in real IoT environments, we use an unsupervised learning-based autoencoder and implement 6 different autoencoder models based on the use of noise in the training data and the dimensions of the latent space. By comparing the model performance through experiments, we provide a performance evaluation of the anomaly detection model for detecting abnormal network traffic.

CAN interface supporting IoT application system Setup using open-source hardware and IoT platform (오픈소스 하드웨어와 IoT 플랫폼을 이용한 CAN Interface를 지원하는 차량용 IoT 응용시스템 구현)

  • Kim, Yong Hwan;Park, Su-Ho;Jeong, Jae-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.779-780
    • /
    • 2015
  • As IoT becomes a main technology of the age, many IoT products have developed and are being developed now. By using open-source hardware "Arduino"and open-source IoT platform "Temboo" to analize CAN signal from vehicle and make vehicle IoT environment to analize and use it through the mobile phone, figured out the way to develop the IoT environment with low cost. Also suggest the way to solve problems and improove.

  • PDF