• Title/Summary/Keyword: industrial IoT

Search Result 592, Processing Time 0.031 seconds

Development of Smart Safety Management System using IoT based assistant equipment for Industrial Fields (산업현장에서 IoT 기반의 작업자 보조기기를 활용한 스마트 안전 관리 시스템 개발)

  • Kim, Ju-Su;Umarov, Jamshid;Kim, Deo-Hoo;Lee, Chol-U;Oh, Ryum-Duck
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.93-94
    • /
    • 2015
  • 최근 산업 현장에서 재해는 설비의 다양화, 인적 구성의 복잡성, 작업환경의 변화 등으로 다양하게 발생되고 있다. 특히 경제적 자립도가 취약한 중소기업에서는 관리능력이 미흡하여 안전에 대한 조직 및 관리, 교육 등이 큰 문제점으로 대두되고 있다. 우리나라의 안전관리의 현실은 대기업 중심으로 이루어지고 있는 실정이나 재해율은 일본 등 주변국보다 2~4배 높은 수준으로 선진국에 비해 아직도 매우 심각한 문제이다. 한편, 환경과 재난방지, 헬스케어 등과 같은 분야에 널리 활용되고 있는 고도화된 IoT 기술은 최근 빌딩, 도시 관제 시스템뿐만 아니라 산업 현장의 설비와 인력관리 등 IoT 기술의 활용이 활발해지는 추세다. 본 논문에서는 IoT를 활용한 기술 개발을 통해 다양한 분야의 산업현장에 산재하고 있는 각종 위험인자를 포함하여 작업자의 근로 환경 정보를 영상 및 센싱 데이터를 이용하여 인지하고 작업자에게 현장 위해요인을 파악함으로써 합리적인 대책의 마련을 통해 작업자의 안전을 보장하고, 이와 더불어 업무지원 정보를 실시간으로 제공하여 인명피해의 감소, 작업능률과 생산성 향상을 야기할 수 있는 스마트 안전제어 및 원격 업무 지원을 위한 지능형 산업안전 관리 시스템을 개발하였다.

  • PDF

Implementation of automatic detection system of IoT based sensor device (Considering the application service of reduction of consumption current)

  • Kwon, Myung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.113-122
    • /
    • 2018
  • In this paper, IoT(Internet of things) technology, which is the core of the 4th industrial revolution, was applied to the study of reduction of consumption current. The IoT is a sensor that collects data, a sensor communication, a gateway that processes and stores the collected data. Data application of IoT technology is applied to smart home, smart city, healthcare, smart factory, etc. and it needs to be applied to various industrial fields. By sensing the location of the sensor device, the specific functions of the gateway and the platform are turned ON and OFF to reduce the consumption current of the equipment during the OFF period. When the sensor device accesses the gateway, the specific function of the gateway is turned ON and When the device is separated from the gateway, it senses the sensitivity of the wireless signal and automatically turns off the certain functions. As a resurt, it has reduced the consumption of current. In this paper, we propose a novel system for detecting the location of sensor devices by applying IoT technology. The system implementation is realized by software based, and defines the requirements for the implementation of the sensor device gateway. The gateway automatically detects the location, movement of the device and performs necessary functions. Finally verifies the automatic detection performance of the gateway according to the location of the device. It will contribute greatly to the development of the smart city and office.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

A Patent Trend Analysis for Technological Convergence of IoT and Wearables (IoT와 Wearables 기술융합을 위한 특허동향분석)

  • Kang, Ji Ho;Kim, Jong Chan;Lee, Jun Hyuck;Park, Sang Sung;Jang, Dong Sik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.3
    • /
    • pp.306-311
    • /
    • 2015
  • This study aims at analyzing the convergence of Internet-of-Things and wearables technologies using cooperative patent classification(CPC). CPC, introduced to an increasing number of technological fields of Korean patents, is expected to be widely used in Patent Informatics because the classification codes in CPC are more specific than those of IPC, which reflect the characteristics of technologies in detail with accuracy. CPC has seldom been used up to date and most of the previous researches on technological convergence used IPC. As a pre-analysis step for analyzing the trend of technological convergence of IoT and wearables, CPC and IPC codes assigned to each patent were compared. By applying association rule mining to the analysis of CPC codes, we identified the technological fields where convergence frequently takes place and examined the trend of technological convergence over time.

Hybrid Offloading Technique Based on Auction Theory and Reinforcement Learning in MEC Industrial IoT Environment (MEC 산업용 IoT 환경에서 경매 이론과 강화 학습 기반의 하이브리드 오프로딩 기법)

  • Bae Hyeon Ji;Kim Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.263-272
    • /
    • 2023
  • Industrial Internet of Things (IIoT) is an important factor in increasing production efficiency in industrial sectors, along with data collection, exchange and analysis through large-scale connectivity. However, as traffic increases explosively due to the recent spread of IIoT, an allocation method that can efficiently process traffic is required. In this thesis, I propose a two-stage task offloading decision method to increase successful task throughput in an IIoT environment. In addition, I consider a hybrid offloading system that can offload compute-intensive tasks to a mobile edge computing server via a cellular link or to a nearby IIoT device via a Device to Device (D2D) link. The first stage is to design an incentive mechanism to prevent devices participating in task offloading from acting selfishly and giving difficulties in improving task throughput. Among the mechanism design, McAfee's mechanism is used to control the selfish behavior of the devices that process the task and to increase the overall system throughput. After that, in stage 2, I propose a multi-armed bandit (MAB)-based task offloading decision method in a non-stationary environment by considering the irregular movement of the IIoT device. Experimental results show that the proposed method can obtain better performance in terms of overall system throughput, communication failure rate and regret compared to other existing methods.

The Requirements of Internet of Thing Platform for Railway Environments (철도 환경에 적합한 사물인터넷 플랫폼의 요구사항 분석)

  • Kim, Juyeop;Song, Yong-Soo;Kim, Yong-Kyu;Choi, Sang Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.7
    • /
    • pp.833-842
    • /
    • 2016
  • The governments in many country recently focus their efforts on developing the industry of Internet of Thing (IoT). At the same time, each industrial field considers to apply the IoT concept and develops their own IoT system for upgrading the existing services or launching new services. In the railway field, many organizations such as Korea Rail Network Authority (KR) expect that the IoT concept can bring many good effects and try to adopt IoT to their existing railway services. In this paper, we survey the current technology level of IoT platform, which is a core technology to realize IoT, and figure out the technical requirements and challenges to apply IoT platform to railway environments.

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

A Name-based Service Discovering Mechanism for Efficient Service Delivery in IoT (IoT에서 효율적인 서비스 제공을 위한 이름 기반 서비스 탐색 메커니즘)

  • Cho, Kuk-Hyun;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.46-54
    • /
    • 2018
  • The Internet of Things (IoT) is an environment in which various devices provide services to users through communications. Because of the nature of the IoT, data are stored and distributed in heterogeneous information systems. In this situation, IoT end applications should be able to access data without having information on where the data are or what the type of storage is. This mechanism is called Service Discovery (SD). However, some problems arise, since the current SD architectures search for data in physical devices. First, turnaround time increases from searching for services based on physical location. Second, there is a need for a data structure to manage devices and services separately. These increase the administrator's service configuration complexity. As a result, the device-oriented SD structure is not suitable to the IoT. Therefore, we propose an SD structure called Name-based Service-centric Service Discovery (NSSD). NSSD provides name-based centralized SD and uses the IoT edge gateway as a cache server to speed up service discovery. Simulation results show that NSSD provides about twice the improvement in average turnaround time, compared to existing domain name system and distributed hash table SD architectures.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

Analysis of IoT Usage in Korean Key Manufacturing Industries (주요 제조업의 사물인터넷 활용성 분석)

  • Hwang, Gyusun;Park, Juhyung;Lee, Jeongcheol;Park, Jinwoo;Chang, Tai-Woo;Won, Joongyeon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.4
    • /
    • pp.81-93
    • /
    • 2016
  • Internet of Things (IoT) has been established in various industries and IoT technology is highlighted as a new value creation technology. Especially, Korean government has launched Manufacturing Innovation 3.0 Strategy for developing Smart Factory concept to improve national and corporate's competitiveness. This study tries to present new industry classification scheme considering 10 national key manufacturing industries. Based on the new scheme, 10 national main forces industries are categorized into 6 segments. We have conducted SWOT analysis to comprehend Korean IoT environment. Based on the analysis, we have positioned 6 segments at the strategic decision-making grid to analyze industries' IoT practical usage.