• Title/Summary/Keyword: industrial IoT

Search Result 603, Processing Time 0.024 seconds

Temperature Detection and Monitoring System of Livestock Through Ear-Tag Based on IoT (IoT 기반의 이표를 통한 가축 온도 변화 감지 및 모니터링 시스템)

  • Park, Young-Soo;Park, Kyoung-Yong;Kim, Min-Sun;Park, Jun-Kyu;Kwon, Seong-Geun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.3
    • /
    • pp.474-481
    • /
    • 2017
  • In Korea, foot-and-mouth disease has not been reported for several decades, but it began to develop again in 2000. For 2010~2011, when the worst occurred, 3.5 million animals were disposed of resulting in a loss of 2.8 trillion won. In order to prevent the harmful effects of foot-and-mouth disease, vaccination and housing management are being implemented. Despite these measures, foot-and-mouth disease is infected with air through the respiratory tract and accompanies fever after latency. Therefore, it is recognized that measuring and managing the body temperature of livestock at the early stage is the first step of managing this disease. In this paper, we propose a temperature monitoring system that can measure the body temperature by incorporating temperature sensor mounted in ear-tag of cattle and collect body temperature data of each individual cattle through BLE into the control server. The proposed body temperature monitoring system has various advantages such as easy installation without the help of livestock specialists and not damaging the organs of the livestock. So, it is possible to manage the abnormal symptom of cattle in real time and it is believed that the proposed monitoring system will revolutionize the prevention of foot-and-mouth disease.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

Information Security Model in the Smart Military Environment (스마트 밀리터리 환경의 정보보안 모델에 관한 연구)

  • Jung, Seunghoon;An, Jae-Choon;Kim, Jae-Hong;Hwang, Seong-Weon;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.199-208
    • /
    • 2017
  • IoT, Cloud, Bigdata, Mobile, AI, and 3D print, which are called as the main axis of the 4th Industrial Revolution, can be predicted to be changed when the technology is applied to the military. Especially, when I think about the purpose of battle, I think that IoT, Cloud, Bigdata, Mobile, and AI will play many role. Therefore, in this paper, Smart Military is defined as the future military that incorporates these five technologies, and the architecture is established and the appropriate information security model is studied. For this purpose, we studied the existing literature related to IoT, Cloud, Bigdata, Mobile, and AI and found common elements and presented the architecture accordingly. The proposed architecture is divided into strategic information security and tactical information security in the Smart Military environment. In the case of vulnerability, the information security is divided into strategic information security and tactical information security. If a protection system is established, it is expected that the optimum information protection can be constructed within an effective budget range.

Development of Performance Verification Method for Components of IoT-based Industrial Valve Safety Management System (IoT 기반 산업용 밸브 안전관리 시스템 구성장치의 성능검증 방안 개발)

  • Kim, Jae-Ok;Lyu, Geun-Jun;Lee, Kyung-Sik;Kim, Jung-Hoon
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.5
    • /
    • pp.10-19
    • /
    • 2020
  • Valve leak accidents in petrochemistry plants and gas utilities cause human and property damage. The main reason why happen gas inhalation, poisoning, fire and explosion accidents is gas valve leakage. To prevent gas leakage, inspectors check the facilities in the field. And they are at risk of gas leak accidents. So we applied IoT-based risk assessment, monitoring and automatic control system. It can detect both internal and external gas leakage, do real-time monitoring of industrial valve in the plant by using hybrid sensor. As the new safety management system for industrial valve is developed, it needs method to evaluate device performance and environmental components for the system. This study is about development of method to verify performance of the explosion-proofed hybrid sensing system include gas detector and optical fiber sensor supporting wire and wireless communication.

IEEE 802.15.4 Ad-Hoc Wireless Sensor Network Routing Method Applying EtherCAT Communication Method (EtherCAT 통신방식을 응용한 IEEE 802.15.4 Ad-Hoc 무선 센서 네트워크 라우팅 방식)

  • Park, Jeong-Hyeon;Seo, Chang-Jun
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.289-301
    • /
    • 2018
  • IIoT, the IoT technology applied to the industrial field, is being used as a monitoring technology for increasing in production rate and safety of workers. However, monitoring through the construction of IIoT network using Ethernet and RS485 in production lines where dozens to hundreds of machine tools are manufacturing components, have difficulties of infrastructure cost and network flexibility and fluidity. Therefore, in this paper, using IEEE 802.15.4 standard WSN device to construct a Ad-Hoc WSN in the production line. In addition, the transmission period and order of the sensor nodes are set by applying the EtherCAT communication method in which the payload frames are shared by all the sensor nodes. From this, we have overcome the problem of reliability decline and real-time issue due to the packet collision of wireless network and confirmed that it is a wireless network routing method that can be used in the actual industrial field.

A study on BEMS-linked Indoor Air Quality Monitoring Server using Industrial IoT

  • Park, Taejoon;Cha, Jaesang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.65-69
    • /
    • 2018
  • In this paper, we propose an interworking architecture for building indoor air quality monitoring server (BEMS) using IIoT (Industrial Internet of Things). The proposed monitoring server adopts IIoT-based standard protocol so that interaction with BEMS installed in existing buildings can be performed easily. It can effectively communicate with indoor air quality measurement sensor installed in the building based on IIoT, Indoor air quality monitoring is possible. We implemented a proposed monitoring server, and confirmed the availability and monitoring of data from sensors in the building.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

A Study on IoT/ICT Convergence Smart Safety Management System for Safety of High Risk Workers (고위험 직업군의 안전을 위한 IoT/ICT융합 스마트 안전관리 시스템에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik;Moon, Byungmoo;Oh, Seyong
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.39-48
    • /
    • 2019
  • Purpose: This study aims at developing and implementing Smart Safety Management System based on IoT/ICT Convergence for safety of high-risk groups working at disaster or industrial field. Its functions are as follows. Method: We will develop three devices for keeping the safety of high-risk jobs: Sensor of inactivity, Lora based Refitting technology for communication between high-risk workers, and Lora Gateway for monitoring entire situations. Then we will test three devices in respect of their functions, and propose their applicabilities in the field. Results: The system can send and receive safety tags and danger signals by which sensor technology can detect dangerous state of workers. And its command terminal was developed by low-power wireless communication technology and LoRa Gateway, which can fulfill the lifting functions between safety tags. And, furthermore, the command terminal can monitor dangerous situations of disaster sites in real time and can perform the preemptive rescues. Conclusion: This study proves the functional efficacy of Smart Safety Management System for worker safety in various high-risk occupational groups, and also suggests ways to secure worker safety in disaster area and various high risk industrial sites.

A Study on Forensic Tool Design For Anticipatory Security Management In IoT Environment (IoT 환경에서 선제적 보안관리를 위한 포렌식 도구 설계)

  • Park, Gwangmin;Na, Onechul;Kim, Eunji;Chang, Hangbae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.399-401
    • /
    • 2015
  • 디지털 포렌식은 그동안 보안의 차선이 되어왔다. 디지털 포렌식은 늘 보안 사건이 일어난 후에만 사용되는 것으로 인식되었다. 산업의 규모가 커지고 보안의 범위가 넓어지면서 보안은 자본주의 사회에서 필수가 되었다. 이에 따라 디지털 포렌식의 역할은 중요해졌고 관심도 늘어나게 되었다. 하지만 보안 사건이 일어난 후, 그 뒤를 따라가는 것은 힘들고 한계가 있다. 특히 정보는 한번 새어나가면 걷잡을 수 없고, 경제적 손실도 막대하다. 또한 디지털 포렌식을 통해 증거를 수집한다고 해도 디지털 정보는 특성상 조작하기가 쉽기 때문에 법원에서 증거로 인정받기 위해서는 매우 까다로운 절차를 거쳐야 한다. 아직까지 한국에서는 디지털 증거를 어디까지 인정해야 하는지에 대한 명확한 기준이 없기 때문에 까다로운 절차를 거쳤다고 해서 증거로 인정받는다는 보장이 없다. 따라서 보안에 대해서는 예방하는 것이 최선이고 필수이다. 이 논문에서는 그동안 차선으로 인식되었던 디지털 포렌식 도구를 이용하여 보안 사건보다 한 발짝 앞서 보안을 관리하는 방법에 대해 검토하고자 한다.

Developing Evaluation Indicators for Selecting Suppliers based on IoT Business Model in Servitization Using Delphi Method (델파이 기법을 사용한 사물인터넷 비즈니스 모델 기반의 서비타이제이션 협력업체 선정 평가지표 개발)

  • Yang, Jae-Yong;Lee, Sang-Ryul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.1
    • /
    • pp.21-32
    • /
    • 2019
  • The flow of the $4^{th}$ Industrial Revolution calls for the innovation of the traditional business models of the manufacturers. Servitization is a corporate strategy to respond to changes in the business environment. These days, the value that the market demands can be created on the basis of the product-service integration. Thus the manufacturers must pursue the fundamental innovation of the current strategy and business models. It is necessary to create common values with customers through providing product-service integrated offerings beyond the development, production, and delivery. The purpose of this study is to develop the evaluation indicators for selecting suppliers when the manufacturer who offers the value of product-service integration needs to obtain the resources from outside. The case company in this study is the manufacture firm conducting the retail IoT business as a new business. The Delphi method is used to develop the evaluation indicators for selecting suppliers. This study suggests the academic implications providing the perspective of Servitizaiton by using Delphi method, and the practical implications applying the creating value method of Servitization by collecting the opinions from both value providers and value consumers in the process of developing the evaluation indicators.