• Title/Summary/Keyword: internet of Things

Search Result 2,832, Processing Time 0.024 seconds

Past, Present, and Future of IoT (IoT의 과거, 현재 그리고 미래)

  • Kim, H.;Hwang, S.K.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.2
    • /
    • pp.1-9
    • /
    • 2018
  • In the past, the Internet connected people together; recently, however it has been extended to the Internet of Things (IoT), allowing all things in the physical world to be connected. We call a new society in which everything is connected through IoT a 'hyper-connected society'. IoT for a hyper-connected society is more than just connecting things to the Internet, it is an infrastructure providing intelligent services without human intervention by connecting things to the Internet using sensors and communication functions, collecting data from connected things, and analyzing and predicting information. Therefore, IoT is a convergence technology that includes not only sensors and communication networks but also big data and AI. This paper examines the short history of IoT, reviews its current trends, and finally, discusses its future direction.

Design of Improved Authentication Protocol for Sensor Networks in IoT Environment (사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계)

  • Kim, Deuk-Hun;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.467-478
    • /
    • 2015
  • Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. Especially sensor network area of the device is an increased using and diversified for a low specification devices because of characteristic of the Internet of Things. However, there is difficulty in directly applying the security technologies such as the current authentication technologies to a low specification device, so also increased security threats. Therefore, authentication protocol between entities on the sensor network communication in Internet of Things has being studied. In 2014, Porambage et al. suggested elliptic curve cryptography algorithm based on a sensor network authentication protocol for advance security of Internet of Things environment, but it is vulnerability exists. Accordingly, in this paper, we analyze the vulnerability in elliptic curve cryptography algorithm based on authentication protocol proposed by Porambage et al. and propose an improved authentication protocol for sensor networks in Internet of Things environment.

A Study on the Global Companies Trend of Industrial Internet of Things (산업용 사물인터넷의 글로벌 기업 동향 연구)

  • Kim, Hong-han;Song, Sung-il
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.4
    • /
    • pp.387-394
    • /
    • 2019
  • The purpose of this study is to analyze and identify the strengths of companies selected in each field based on data released by the IOTONE to see if the most influential companies in the industrial Internet of Things are gaining high competitiveness by exercising their capabilities in each field. The industrial Internet of Things is emerging as an essential element in the overall realm of business activity, as well as to make manufacturing factories competitive smart factories. Appropriate platforms should be applied to apply the industrial Internet of Things throughout the enterprise. Globally, many companies are proposing a platform for the industrial Internet of Things. We analyzed the strengths of the most influential companies in each field of connected machines, cybersecurity, analysis platforms, embedded computing, platform connectivity and hardware connectivity in the industrial Internet of Things, and looked at trends such as the current state of operations and the characteristics of the platform.

An Investigation Study to Reduce Security Threat in the Internet of Things Environment (IoT 환경에서 보안위협을 최소화하기 위한 방안 연구)

  • Shin, Seung-Soo;Chae, Gyoo-Soo;Lee, Tae-Hyun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • Recently, the necessity of Internet of Things in conjunction between devices is increasing. However, there are increasing security threats while applying various communication technologies in the Internet of Things. In this paper, we propose a security countermeasures to minimize damage to the security of a variety of security technologies used in the Internet of Things in order to improve the efficiency of the Internet of Things. The proposed method defined the environment to minimize security damage between home devices such as TV, washing machine, refrigerator, boiler and medical devices such as Analyzers, blood glucose meters, blood pressure monitors that are used in daily life. In addition, a variety of technologies(Zigbee, Wi-Fi, NFC, RFID, etc.) that are used in the Internet of Things may be under integrated management.

  • PDF

IoT data analytics architecture for smart healthcare using RFID and WSN

  • Ogur, Nur Banu;Al-Hubaishi, Mohammed;Ceken, Celal
    • ETRI Journal
    • /
    • v.44 no.1
    • /
    • pp.135-146
    • /
    • 2022
  • The importance of big data analytics has become apparent with the increasing volume of data on the Internet. The amount of data will increase even more with the widespread use of Internet of Things (IoT). One of the most important application areas of the IoT is healthcare. This study introduces new real-time data analytics architecture for an IoT-based smart healthcare system, which consists of a wireless sensor network and a radio-frequency identification technology in a vertical domain. The proposed platform also includes high-performance data analytics tools, such as Kafka, Spark, MongoDB, and NodeJS, in a horizontal domain. To investigate the performance of the system developed, a diagnosis of Wolff-Parkinson-White syndrome by logistic regression is discussed. The results show that the proposed IoT data analytics system can successfully process health data in real-time with an accuracy rate of 95% and it can handle large volumes of data. The developed system also communicates with a riverbed modeler using Transmission Control Protocol (TCP) to model any IoT-enabling technology. Therefore, the proposed architecture can be used as a time-saving experimental environment for any IoT-based system.

IP camera security: "Security Eyes"

  • Alshamrani, Sultan S
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.75-80
    • /
    • 2022
  • With the rapid growth of Internet of Things (IoT) applications and devices, there are still defects in safety and privacy. Current researches indicate that there are weak security mechanisms to protect these devices. Humans use the Internet of Things to control and connect their devices with the Internet. Using the Internet of things has been increased over time. Therefore, capture of sensitive user data has increased intentionally or not [1]. The IP Camera is a type of (IOT) devices. Therefore, in this paper we aim to create a "Security Eyes" application that protects IP Cameras from security attacks according to certain security mechanisms (increasing the strength of encryption and filling the usual security holes in IP cameras … etc) and alerts the user when the live broadcast is interrupted or an error occurs.

Internet of Things Fundamentals, Architectures, Challenges and Solutions: A Survey

  • Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.189-198
    • /
    • 2022
  • As the number of people using the Internet increases, a new application known as the Internet of Things (IoT) has been emerged. Internet of Things makes it easier for machines and objects to exchange, compute, and coordinate information autonomously without human interference. It is a tool for attaching intelligence to a variety of contemporary objects in houses, hospitals, buildings, vehicles, and even cities. As a new emerging technology, the focus in current IoT surveys does not shed the light on deep understanding for IoT fundamentals, architectures, challenges, and solutions. For this reason, the objective of this paper is to introduce specifications for IoT definitions, characteristics, functional blocks, and different architectures as a cement for better understanding. Additionally, we present current documented IoT challenges, with the existing available solution for each challenge.

Mission Description Structure for Autonomous Collaboration of Media Things

  • Chun, Jonghoon;Kim, Sang-Kyun
    • Journal of Broadcast Engineering
    • /
    • v.27 no.7
    • /
    • pp.1034-1042
    • /
    • 2022
  • Internet of Media Things (IoMT) aims to provide intelligent media services to users by connecting (media) things to each other and exchanging media data. The mission given by the user is automatically executed, and intelligent media service can be provided to the user. To achieve this, ISO/IEC 23093-5 started standardization work on the mission data given by the user to the media thing and the media thing controller (MController) that controls the media things. This paper introduces the contents of ISO/IEC 23093-5.

Development of Internet of Things Sensor-based Information System Robust to Security Attack (보안 공격에 강인한 사물인터넷 센서 기반 정보 시스템 개발)

  • Yun, Junhyeok;Kim, Mihui
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.95-107
    • /
    • 2022
  • With the rapid development of Internet of Things sensor devices and big data processing techniques, Internet of Things sensor-based information systems have been applied in various industries. Depending on the industry in which the information systems are applied, the accuracy of the information derived can affect the industry's efficiency and safety. Therefore, security techniques that protect sensing data from security attacks and enable information systems to derive accurate information are essential. In this paper, we examine security threats targeting each processing step of an Internet of Things sensor-based information system and propose security mechanisms for each security threat. Furthermore, we present an Internet of Things sensor-based information system structure that is robust to security attacks by integrating the proposed security mechanisms. In the proposed system, by applying lightweight security techniques such as a lightweight encryption algorithm and obfuscation-based data validation, security can be secured with minimal processing delay even in low-power and low-performance IoT sensor devices. Finally, we demonstrate the feasibility of the proposed system by implementing and performance evaluating each security mechanism.

A Study on Mitigation of Container Terminal Congestion under IoT Environment (IoT 환경에서 컨테이너 터미널 혼잡도 완화방안 연구)

  • Lee, Jang-Kun;Shin, Jae-Young
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.05a
    • /
    • pp.57-58
    • /
    • 2018
  • As interest in the Internet of Things increases, technologies are being studied to handle information exchanged between things using the Internet of Things. Specially, as container terminals are automated, the use of the Internet of Things in the terminals increases and varies. However, the use of the Internet of Things to enhance the efficiency of the container terminal operation is insufficient. Currently, the container terminal shows that the arrival pattern of the external truck is concentrated at a particular time. This resuls in gate congestion and affects the waiting times of the truck. The damage is caused by environmental pollution problems and social problems in neighboring port areas. Therefore, in this thesis, we will analyze the causes of the external truck's waiting time problems affecting the gate congestion at container terminals and study methods to mitigate congestion under Internet of Things environment.

  • PDF