• Title/Summary/Keyword: industrial IoT

Search Result 595, Processing Time 0.031 seconds

Development of Metrics to Measure Reusability of Services of IoT Software

  • Cho, Eun-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.151-158
    • /
    • 2021
  • Internet of Things (IoT) technology, which provides services by connecting various objects in the real world and objects in the virtual world based on the Internet, is emerging as a technology that enables a hyper-connected society in the era of the 4th industrial revolution. Since IoT technology is a convergence technology that encompasses devices, networks, platforms, and services, various studies are being conducted. Among these studies, studies on measures that can measure service quality provided by IoT software are still insufficient. IoT software has hardware parts of the Internet of Things, technologies based on them, features of embedded software, and network features. These features are used as elements defining IoT software quality measurement metrics. However, these features are considered in the metrics related to IoT software quality measurement so far. Therefore, this paper presents a metric for reusability measurement among various quality factors of IoT software in consideration of these factors. In particular, since IoT software is used through IoT devices, services in IoT software must be designed to be changed, replaced, or expanded, and metrics that can measure this are very necessary. In this paper, we propose three metrics: changeability, replaceability, and scalability that can measure and evaluate the reusability of IoT software services were presented, and the metrics presented through case studies were verified. It is expected that the service quality verification of IoT software will be carried out through the metrics presented in this paper, thereby contributing to the improvement of users' service satisfaction.

Zone based Ad Hoc Network Construction Scheme for Local IoT Networks

  • Youn, Joosang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.95-100
    • /
    • 2017
  • In this paper, we propose a zone based ad hoc network construction scheme which support ad hoc path between nodes in local IoT networks consisting of IoT devices with the constrained feature, such as low power, the limited transmission rate and low computing capacity. Recently, the various routing protocols have been studied to support ad hoc networking of local IoT environments. This is, because basis RPL protocol is deigned to be used for the connecting service with Internet through gateway, ad hoc path between nodes in local IoT networks is not supported in basis RPL protocol. Thus, in this paper, the proposed routing scheme provides both ad hoc path and Infra path through gateway, supporting basis RPL protocol simultaneously. Through simulation, we show that the proposed routing scheme with zone based path selection scheme improves the performance of the success rate of end-to-end data transmission and the end-to-end delay, compared to basis RPL protocol.

Study on IoT Gateway based Common Service Discovery Scheme (IoT 게이트웨이 기반 공통 서비스 탐색 기법 연구)

  • Youn, Joosang;Lee, TaeJin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.41-42
    • /
    • 2018
  • 본 논문에서는 IoT 게이트웨이 기반 서비스 탐색 관련 상호운용성 지원을 공통 서비스 탐색 기법을 제안한다. 사물인터넷 분야에서는 다양한 서비스 탐색 기법이 제안되어 있다. 특히, 중앙 관리 방식과 분산 관리 방식으로 구분되어 제안되었다. 또한 네트워크 인터페이스 타입에 따라서 다른 프로토콜이 사용되고 있다. 이런 로컬 네트워크 내에 상이한 서비스 탐색 프로토콜의 사용을 서비스 탐색과 관련된 홍보기능이 제공되지 못하기 때문에 디바이스간 서비스 탐색이 이루어지지 못한다. 본 논문에서는 이런 문제점을 해결하기 위한 IoT 게이트웨이 내부에 서비스 디렉토리를 새롭게 정의하고 이를 이용하는 공통 서비스 탐색 방법을 제시한다.

  • PDF

IoT-based Digital Life Care Industry Trends

  • Kim, Young-Hak
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.87-94
    • /
    • 2019
  • IoT-based services are being released in accordance with the aging population and the demand for well-being pursuit needs. In addition to medical device companies, companies with ideas ranging from global ICT companies to startup companies are accelerating their market entry. The areas where these services are most commonly applied are health/medical, life/safety, city/energy, automotive and transportation. Furthermore, by expanding IoT technology convergence into the area of life care services, it contributes greatly to the development of service models in the public sector. It also provides an important opportunity for IoT-related companies to open up new markets. By addressing the problems of life care services that are still insufficient. We are providing opportunities to pursue the common interests of both users and workers and improve the quality of life. In order to establish IoT-based digital life care services, it is necessary to develop convergence technologies using cloud computing systems, big data analytics, medical information, and smart healthcare infrastructure.

A Study on the Establishment of Massive IoT based on Low Power Wide Area Network Technology (저전력 광역 네트워크 기술 기반 Massive IoT 구축 연구)

  • Lee, Gyeongheon;Hong, Jiyeon;Youn, Joosang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.103-104
    • /
    • 2019
  • 최근 스마트시티 구축 사업에서 사물인터넷 기반 서비스 개발이 활발히 진행 중이다. 그 서비스들을 제공하기 위해 사용되어야 할 디바이스 수가 수백만 개까지 증가할 것으로 예상하고 있으며 수백만 개의 디바이스들을 수용하기 위해서는 Massive IoT 네트워크의 환경 구축을 필요로 하고 있다. 따라서 본 논문에서는 Massive IoT 네트워크 환경을 구축하기 위해 저전력 광역 네트워크(LPWAN) 기술 중 LoRa(Long Range) 네트워크가 적용이 가능한지를 LoRaSim을 이용하여 시뮬레이션한다. 시뮬레이션한 결과 중 충돌 횟수를 통해 충동률을 구하고 그래프를 이용하여 신뢰성을 나타내며, Massive IoT 네트워크에 적합성에 대해 분석한다.

  • PDF

Interpretive Structural Modeling in the Adoption of IoT Services

  • Kim, Yonghee;Park, Youngju;Song, Gwangsuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1184-1198
    • /
    • 2019
  • This study aims to use ISM to identify the enablers affecting the acceptance of IoT services. For this purpose, this study conducted an ISM analysis and a MICMAC analysis, extracted the enablers from Internet of Things - An Action Plan for Europe published by the EU for the research, and conducted interviews and surveys. The study found that it would be preferentially necessary to prepare the base for successful IoT services through international cooperation and the security of objective data. In addition, it turned out that it would be necessary to make efforts to spread and develop IoT services by conducting R&D and implementing projects through public-private partnerships and the organization of a consultative group. Lastly, since information security and standardization are the desired objects of the IoT industry, it was found that both the government and the industrial world should focus on them. This study has significance in that it can provide practical implications for the effective acceptance of IoT services.

A new method to detect attacks on the Internet of Things (IoT) using adaptive learning based on cellular learning automata

  • Dogani, Javad;Farahmand, Mahdieh;Daryanavard, Hassan
    • ETRI Journal
    • /
    • v.44 no.1
    • /
    • pp.155-167
    • /
    • 2022
  • The Internet of Things (IoT) is a new paradigm that connects physical and virtual objects from various domains such as home automation, industrial processes, human health, and monitoring. IoT sensors receive information from their environment and forward it to their neighboring nodes. However, the large amounts of exchanged data are vulnerable to attacks that reduce the network performance. Most of the previous security methods for IoT have neglected the energy consumption of IoT, thereby affecting the performance and reducing the network lifetime. This paper presents a new multistep routing protocol based on cellular learning automata. The network lifetime is improved by a performance-based adaptive reward and fine parameters. Nodes can vote on the reliability of their neighbors, achieving network reliability and a reasonable level of security. Overall, the proposed method balances the security and reliability with the energy consumption of the network.

Detection of Deterioration of Traffic Signal Controller Through Real-Time Monitoring (실시간 감시를 통한 교통신호제어기의 열화 감지)

  • Kim, Eun Y.;Jang, Joong S.;Oh, Bong S.;Park, Sang C.
    • Journal of Applied Reliability
    • /
    • v.18 no.2
    • /
    • pp.153-160
    • /
    • 2018
  • Purpose: A traffic signal controller needs to control and coordinate to ensure that traffic and pedestrians move as smoothly as possible. Since a traffic signal controller has a significant impact on the safety of vehicles and pedestrians, it is important to monitor the failure and deterioration of the traffic signal controller. The purpose of this paper is to propose an IoT (Internet of Things)-based monitoring system for a traffic signal controller. Methods: Every traffic signal controller has a nominal system trajectory specified when it is deployed. The proposed IoT-based monitoring system collects the system trajectory information through real-time monitoring. By comparing the nominal system trajectory and the monitored system trajectory, we are able to detect the failure and deterioration of the traffic signal controller. Conclusion: The proposed IoT-based monitoring system can contribute to the safety of vehicles and pedestrians by maximizing the availability of a traffic signal controller.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

Towards Open Interfaces of Smart IoT Cloud Services

  • Kim, Kyoung-Sook;Ogawa, Hirotaka
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.235-238
    • /
    • 2016
  • With the vision of Internet of Things (IoT), physical world itself is becoming a connected information system on the Internet and cyber world is computing as a physical act to sense and respond to real-world events collaboratively. The systems that tightly interlink the cyber and physical worlds are often referred to as Smart Systems or Cyber-Physical Systems. Smart IoT Clouds aim to provide a cyber-physical infrastructure for utility (pay-as-you-go) computing to easily and rapidly build, modify and provision auto-scale smart systems that continuously monitor and collect data about real-world events and automatically control their environment. Developing specifications for service interoperability is critical to enable to achieve this vision. In this paper, we bring an issue to extend Open Cloud Computing Interface for uniform, interoperable interfaces for Smart IoT Cloud Services to access services and build a smart system through orchestrating the cloud services.

  • PDF