• Title/Summary/Keyword: IoT%28Internet of Things

Search Result 37, Processing Time 0.025 seconds

An Authentication Management using Biometric Information and ECC in IoT-Edge Computing Environments (IoT-EC 환경에서 일회용 생체정보와 ECC를 이용한 인증 관리)

  • Seungjin Han
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.142-148
    • /
    • 2024
  • It is difficult to apply authentication methods of existing wired or wireless networks to Internet of Things (IoT) devices due to their poor environment, low capacity, and low-performance processor. In particular, there are many problems in applying methods such as blockchain to the IoT environment. In this paper, edge computing is used to serve as a server that authenticates disposable templates among biometric information in an IoT environment. In this environment, we propose a lightweight and strong authentication procedure using the IoT-edge computing (IoT-EC) system based on elliptic curve cryptographic (ECC) and evaluate its safety.

Business Model Framework for IoT: Case Studies and Strategic Implications for IoT Businesses

  • Kim, Dongwook;Kim, Sungbum;Lee, Junghwan
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.1
    • /
    • pp.1-28
    • /
    • 2022
  • To realize the vision of internet of things (IoT), where it is expected to bring significant impact to the global economy in the future, consideration of business models in the IoT context is necessary. This research attempts to build an enhanced artifact business model framework based on the definitions of IoT and literature on business models for analysis of IoT businesses. The framework is used to analyze four different types of players: the owner of things, vendors of devices, providers of connectivity and providers of IoT application services. The findings suggest that the owners of things tend to partner with ICT players to complement their weakness, and it tends to be connectivity providers. The device vendors leverage their strength of devices and device platforms to attract and enable 3rd party sensor/devices to interconnect, while the service providers are aiming to penetrate into customer premise. These lead to the following recommendations for non-IT players to consider in expanding into IoT business: 1) take into account differences in product development process between IT and non-IT businesses in expanding into IoT market; 2) collaborate with ICT players that acknowledge and understand the differences.

A Study on the Secure Communication at Android Things Environment using the SEED Library (SEED 암호 라이브러리를 활용한 안전한 Android Things 통신 환경연구)

  • Park, Hwa Hyeon;Yoon, Mi Kyung;Lee, Hyeon Ju;Lee, Hae Young;Kim, Hyung-Jong
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.4
    • /
    • pp.67-74
    • /
    • 2019
  • As the market for Internet of Things (IoT) service grows, the security issue of the data from IoT devices becomes more important. In this paper, we implemented a cryptographic library for confidentiality of sensor data from Android Things based IoT services. The library made use of the SEED algorithm for encryption/decryption of data and we verified the library by implementing a service environment. With the library, the data is securely encrypted and stored in the database and the service environment is able to represent the current sensing status with the decrypted sensor data. The contribution of this work is in verifying the usability of SEED based encryption library by implementation in IoT sensor based service environment.

Utilization and Optimized Implementation of Format Preserving Encryption Algorithm for IoT and BLE Communications (IoT와 BLE 통신상의 형태보존암호 활용 및 최적화 구현 기법)

  • Lim, Ji-hwan;Kwon, Hyuk-dong;Woo, Jae-min;An, Kyu-hwang;Kim, Do-young;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1371-1378
    • /
    • 2018
  • Bluetooth is the key technology in the wireless connection of many Internet of Things (IoT) devices, especially focused on smartphones today. In addition, Bluetooth communication between the IoT device and the user is mainly performed via Bluetooth Low Energy (BLE), but as the Bluetooth technology gradually develops, the security vulnerability of the existing BLE is more prominent. Research on Bluetooth accessibility has been conducted steadily so far, but there is lack of research for data protection in Bluetooth communication. Therefore, in this paper, when sending and receiving data in BLE communication between IoT and users, we propose effective methods for communicating with each other through the Format Preserving Encryption Algorithm (FEA), not the plain text, and measures performance of FEA which is optimized in Arduino and PC.

Effects of Internet of Things (IoT) exhibition service quality on exhibition acceptance (사물인터넷(IoT) 전시 서비스품질이 전시수용에 미치는 영향)

  • Kim, In-hwan;Nam, Yun-Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.13-28
    • /
    • 2021
  • The purpose of this study is to demonstrate the causal relationship between exhibition acceptance through the quality factors of Internet of Things (IoT) exhibition services and ease and usefulness of technology acceptance factors for domestic exhibition visitors. Through this, the company intends to present effective and efficient development plans in the IoT exhibition industry. Therefore, we present a research model that applies DeLone & McLean's quality factors to key variables in the information system success model and ease and usefulness in the Technology Acceptance Model (TAM). A survey was conducted on ordinary people with experience using the Internet of Water (IoT) exhibition service. The survey was conducted for two weeks from July 15 to August 20, 2021. A total of 276 surveys were used for data analysis during this period. The hypothesis results related to the information system success model of the Internet of Things (IoT) exhibition show that, first, system quality had no significant effect on usefulness, but significantly on ease. Second, information quality has been shown to have a significant effect on usability and ease. Third, service quality has been shown to have a significant impact on usability and ease. Fourth, usefulness has been shown to have a significant effect on exhibition acceptance. Fifth, ease has been shown to have a significant effect on usability. Sixth, ease was shown to have a significant effect on exhibition acceptance.

Internet of Things 기술 및 발전 방향

  • Kim, Dae-Yeong;Kim, Seong-Hun;Ha, Min-Geun;Kim, Tae-Hong;Lee, Yo-Han
    • Information and Communications Magazine
    • /
    • v.28 no.9
    • /
    • pp.49-57
    • /
    • 2011
  • 지금까지의 인터넷은 인간이 정보의 생산자 혹은 소비자로서 정보를 공유할 수 있는 최적의 공간으로 활용되어왔다. 미래에는 인간이 생산해내는 정보뿐만이 아니라 일상 사물까지도 인터넷에 연결되어 사물의 정보와 사물이 센싱하는 환경 정보까지도 인터넷을 통하여 공유할 수 있는 사물인터넷(Internet of Things, IoT)으로 진화할 것으로 예견되고 있다. 본고에서는 IoT틀 바라보는 다양한 관점과 정외에 대하여 살펴보고 IoT의 비전을 실현하는데 있어 필요한 핵심기술들을 네트워크기술과 소프트웨어 기술의 관점에서 정리한다. 네트워크 관련 기술은 사물의 식별과 트랙킹을 위한 RFID, 무선 센서네트워크, 인터넷 호환성을 제공하는 IP 기반 센서 사물 정보 명세를 위한 메타데이터 기술, 사물을 인터넷 기반의 웹으로 표현하기 위한 Web of Things 기술을 바탕으로 진화할 것이다. 마지막으로 IoT와 관련된 국내외 기술 및 표준화 동향을 정리한다.

Lightweight Protocol for Low Power and Reliability Improvement Based on CoAP in the Internet of Things(IoT) Environment (사물인터넷 환경에서 CoAP 기반의 저전력, 신뢰성 향상을 위한 경량 프로토콜)

  • Seo, Doook;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.21-28
    • /
    • 2019
  • Internet of Things(IoT) is a technology or environment that collects data by attaching sensors to objects and transmits the collected information to each other through wired / wireless communication in real time. It is expected that when the Internet of objects is activated, many objects can identify and recognize each other by themselves and provide various services to facilitate our lives through mutual information exchange. In addition, the internet market for things is growing rapidly each year, and various IT technologies are expected to converge. In the Internet environment of objects, data exchange technology between object devices, that is, message protocol, is classified as one of important technologies. In this paper, we examine various lightweight message protocols suitable for the Internet environment of objects, and compare the reliability of the CoAP protocol structure with the MQTT protocol for a limited environment. Finally, we confirm the reliability of TCP / TLS and WebSockets-based CoAP transmission protocol of IETF's CoRE WG that can use various transport layers other than UDP in Internet environment including cloud infrastructure.

Analysis of Technology Convergence of 'Internet of Things' Patents by IPC Code Analysis (IPC 코드 분석에 의한 '사물인터넷(IoT)' 특허의 기술 융복합 분석)

  • Shim, Jae-ruen
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.3
    • /
    • pp.266-272
    • /
    • 2016
  • In this study, we analysed the technology convergence of Internet of Things(IoT) by International Patent Classification(IPC) code analysis. 163 patent applications in Korea are the subjects of this study. We confirmed that the most representative IPC code combinations between Main and Sub categories are G06Q 50/24-G06Q 50/22(6 cases), H04L 29/02-H04L 12/28(4 cases), G06F 15/16-G06F 3/048(3 cases), G06F 15/16-G06F 9/44(3 cases), and G06Q 50/22-G06Q 50/24(3 cases). The field of Health Care business have been prepared 9 patent applications by technology convergence between 'Health Care(G06Q 50/22)' and 'Patient Record Management(G06Q 50/24)'. Finally we also concluded that the core IPC code are G06F 15/16, G06Q 50/22, G06Q 50/24, and H04L 12/28 by the technology convergence interconnections analysis of IoT patent applications.

A Study on the Blue-green algae Monitoring Applications Design using Raspberry Pi (라즈베리 파이를 이용한 녹조 모니터링 프로그램 설계에 관한 연구)

  • KIM, Kyung-Min;KIM, Tae-Hyeon
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.2
    • /
    • pp.376-383
    • /
    • 2016
  • In this paper, the blue-green algae monitoring program of applying IoT(Internet of things) technologies is designed and implemented that can check out the status of the river's water quality in real time. The proposed system is to extract the image data from the camera of raspberry pi by an wireless network, and it is analyzed through the HSV color model. We measure the temperature using a DS18B20 1-wire temperature sensor. The extracted information of image data and temperature is then analyzed in C and Python programs for use with Raspberry Pi. The XML data in PHP program is made from the analyzed information and provides Web services. It also allows to refer the XML data using mobile devices.

TCP/IP Using Minimal Resources in IoT Systems

  • Lee, Seung-Chul;Shin, Dongha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.125-133
    • /
    • 2020
  • In this paper, we design 4-layer TCP/IP that utilizes minimal memory and processor resources in Internet of Things(IoT) systems. The TCP/IP designed in this paper has the following characteristics. First, memory resource is minimized by using minimal memory allocation. Second, processor resource is minimized by using minimal memory copy. Third, the execution time of the TCP/IP can be completed in a deterministic time. Fourth, there is no memory leak problem. The standard in minimal resources for memory and processor derived in this paper can be used to check whether the network subsystems of the already implemented IoT systems are efficiently implemented. As the result of measuring the amount of memory allocation and copy of the network subsystem of Zephyr, an open source IoT kernel recently released by the Linux Foundation, we found that it was bigger than the standard in minimal resources derived in this paper. The network subsystem of Zephyr was improved according to the design proposed in this paper, confirming that the amount of memory allocation and copy were decreased by about 39% and 67%, respectively, and the execution time was also reduced by about 28%.