• Title/Summary/Keyword: things

Search Result 5,716, Processing Time 0.031 seconds

Keywords and Spatial Based Indexing for Searching the Things on Web

  • Faheem, Muhammad R.;Anees, Tayyaba;Hussain, Muzammil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1489-1515
    • /
    • 2022
  • The number of interconnected real-world devices such as sensors, actuators, and physical devices has increased with the advancement of technology. Due to this advancement, users face difficulties searching for the location of these devices, and the central issue is the findability of Things. In the WoT environment, keyword-based and geospatial searching approaches are used to locate these devices anywhere and on the web interface. A few static methods of indexing and ranking are discussed in the literature, but they are not suitable for finding devices dynamically. The authors have proposed a mechanism for dynamic and efficient searching of the devices in this paper. Indexing and ranking approaches can improve dynamic searching in different ways. The present paper has focused on indexing for improving dynamic searching and has indexed the Things Description in Solr. This paper presents the Things Description according to the model of W3C JSON-LD along with the open-access APIs. Search efficiency can be analyzed with query response timings, and the accuracy of response timings is critical for search results. Therefore, in this paper, the authors have evaluated their approach by analyzing the search query response timings and the accuracy of their search results. This study utilized different indexing approaches such as key-words-based, spatial, and hybrid. Results indicate that response time and accuracy are better with the hybrid approach than with keyword-based and spatial indexing approaches.

A Study on the Secure Communication at Android Things Environment using the SEED Library (SEED 암호 라이브러리를 활용한 안전한 Android Things 통신 환경연구)

  • Park, Hwa Hyeon;Yoon, Mi Kyung;Lee, Hyeon Ju;Lee, Hae Young;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.4
    • /
    • pp.67-74
    • /
    • 2019
  • As the market for Internet of Things (IoT) service grows, the security issue of the data from IoT devices becomes more important. In this paper, we implemented a cryptographic library for confidentiality of sensor data from Android Things based IoT services. The library made use of the SEED algorithm for encryption/decryption of data and we verified the library by implementing a service environment. With the library, the data is securely encrypted and stored in the database and the service environment is able to represent the current sensing status with the decrypted sensor data. The contribution of this work is in verifying the usability of SEED based encryption library by implementation in IoT sensor based service environment.

Design of Improved Authentication Protocol for Sensor Networks in IoT Environment (사물인터넷 환경에서 센서 네트워크에 대한 개선된 인증 프로토콜 설계)

  • Kim, Deuk-Hun;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.467-478
    • /
    • 2015
  • Recently interest in Internet of Things(IoT) is increasing, and a variety of the security technologies that are suitable for Internet of Things has being studied. Especially sensor network area of the device is an increased using and diversified for a low specification devices because of characteristic of the Internet of Things. However, there is difficulty in directly applying the security technologies such as the current authentication technologies to a low specification device, so also increased security threats. Therefore, authentication protocol between entities on the sensor network communication in Internet of Things has being studied. In 2014, Porambage et al. suggested elliptic curve cryptography algorithm based on a sensor network authentication protocol for advance security of Internet of Things environment, but it is vulnerability exists. Accordingly, in this paper, we analyze the vulnerability in elliptic curve cryptography algorithm based on authentication protocol proposed by Porambage et al. and propose an improved authentication protocol for sensor networks in Internet of Things environment.

IoT-based Indoor Localization Scheme (IoT 기반의 실내 위치 추정 기법)

  • Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.4
    • /
    • pp.35-39
    • /
    • 2016
  • This paper is about IoT(Internet of Things)-based indoor localization scheme. GPS and WiFi are widely used to estimate the location of things. However, GPS has drawback of poor reception and radio disturbance in doors. To estimate the location in WiFi-based method, the user collects the information by scanning nearby WiFi(s) and transferring the information to WiFi database server. This is a fingerprint method with disadvantage of having an additional DB server. IoT is the internetworking of things, and this is on rapid rise. I propose the IoT-based indoor localization scheme. Under the proposed method, a device internetworking with another device with its own location information like GPS coordinate can estimate its own location through RSSI. With more devices localizing its own, the localization accuracy goes high. The proposed method allows the user to estimate the location without GPS and WiFi DB server.

An Investigation Study to Reduce Security Threat in the Internet of Things Environment (IoT 환경에서 보안위협을 최소화하기 위한 방안 연구)

  • Shin, Seung-Soo;Chae, Gyoo-Soo;Lee, Tae-Hyun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.31-36
    • /
    • 2015
  • Recently, the necessity of Internet of Things in conjunction between devices is increasing. However, there are increasing security threats while applying various communication technologies in the Internet of Things. In this paper, we propose a security countermeasures to minimize damage to the security of a variety of security technologies used in the Internet of Things in order to improve the efficiency of the Internet of Things. The proposed method defined the environment to minimize security damage between home devices such as TV, washing machine, refrigerator, boiler and medical devices such as Analyzers, blood glucose meters, blood pressure monitors that are used in daily life. In addition, a variety of technologies(Zigbee, Wi-Fi, NFC, RFID, etc.) that are used in the Internet of Things may be under integrated management.

  • PDF

An Implementation of Smart Dormitory System Based on Internet of Things (사물인터넷 기반의 스마트 기숙사 시스템 구현)

  • Lee, Woo-Young;Ko, Hwa-Mun;Yu, Je-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.4
    • /
    • pp.295-300
    • /
    • 2016
  • Internet of things which helps communication between human and thing and between things by connecting networks on them is developing. Develops of Internet of things, network technique, and smart machine result interest on home network system. In this paper, we suggested a system with the home network to the dormitory using pressure sensors, infrared sensor, ultrasonic sensor, switch, arduino, raspberrypi, android application. Smart dormitory system based on the internet of things provide information whether public things in dormitory like laundry machine, computer, treadmill is being used now, and package is arrived through android application.

A Study on Mitigation of Container Terminal Congestion under IoT Environment (IoT 환경에서 컨테이너 터미널 혼잡도 완화방안 연구)

  • Lee, Jang-Kun;Shin, Jae-Young
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2018.05a
    • /
    • pp.57-58
    • /
    • 2018
  • As interest in the Internet of Things increases, technologies are being studied to handle information exchanged between things using the Internet of Things. Specially, as container terminals are automated, the use of the Internet of Things in the terminals increases and varies. However, the use of the Internet of Things to enhance the efficiency of the container terminal operation is insufficient. Currently, the container terminal shows that the arrival pattern of the external truck is concentrated at a particular time. This resuls in gate congestion and affects the waiting times of the truck. The damage is caused by environmental pollution problems and social problems in neighboring port areas. Therefore, in this thesis, we will analyze the causes of the external truck's waiting time problems affecting the gate congestion at container terminals and study methods to mitigate congestion under Internet of Things environment.

  • PDF

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

An Analysis of the Media's Report on the Adoption of the Address of Things using Topic Modeling and Network Analysis (토픽 모델링과 네트워크 분석을 활용한 사물주소 도입에 대한 언론보도 분석)

  • Mo, Sung Hoon;Lim, Cheol Hyeon;Kim, Hyun Jae;Lee, Jung Woo
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.38-47
    • /
    • 2021
  • This study analyzed media reports on the Address of Things, which are being introduced through the amendment of related law and pilot projects. The titles and its texts in the media's reports were collected by searching for 'Address of Things' on the Naver News Platform. Then, we analyzed the corpus using by topic modeling and network analysis. As a result, there were four topics: 'Promotion of the address of things system', Proof of assigning Address of Things', 'Improvement of usage of the Roadname Address Systems', and 'Education and public relation for the address activation'. It was confirmed that the topic 'Proof of assigning Address of Things' was the main agenda. We presented some implication by comparing the results with the 「3rd Basic Plan for Address Policy (2018-2022)」 of the Ministry of Public Administration and Security.

A Study on the Global Companies Trend of Industrial Internet of Things (산업용 사물인터넷의 글로벌 기업 동향 연구)

  • Kim, Hong-han;Song, Sung-il
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.4
    • /
    • pp.387-394
    • /
    • 2019
  • The purpose of this study is to analyze and identify the strengths of companies selected in each field based on data released by the IOTONE to see if the most influential companies in the industrial Internet of Things are gaining high competitiveness by exercising their capabilities in each field. The industrial Internet of Things is emerging as an essential element in the overall realm of business activity, as well as to make manufacturing factories competitive smart factories. Appropriate platforms should be applied to apply the industrial Internet of Things throughout the enterprise. Globally, many companies are proposing a platform for the industrial Internet of Things. We analyzed the strengths of the most influential companies in each field of connected machines, cybersecurity, analysis platforms, embedded computing, platform connectivity and hardware connectivity in the industrial Internet of Things, and looked at trends such as the current state of operations and the characteristics of the platform.