• Title/Summary/Keyword: IoT Technology

Search Result 1,941, Processing Time 0.023 seconds

A Study on the Improvement of Security Threat Analysis and Response Technology by IoT Layer (IoT 계층별 보안위협 분석 및 대응기술 개선 방안 연구)

  • Won, Jong-Hyuk;Hong, Jung-Wan;You, Yen-Yoo
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.149-157
    • /
    • 2018
  • In this paper, we propose an attack detection technology using SDN Controller to study security threats in IoT environment. The research methodology has been developed by applying IoT security threat management technology to the IoT layer and analyzing the research trend of applied security technology. The study results show that the effectiveness of the detection method using the sampling method is studied by adding OpenFlow based SDN Controller to the network switch equipment of the existing IoT network. This method can detect the monitoring and attack of the whole network by interworking with IDS and IPS without affecting the performance of existing IoT devices. By applying such improved security threat countermeasure technology, we expect to be able to relieve anxiety of IoT security threat and increase service reliability.

System Design for Real-Time Data Transmission in Web-based Open IoT System (웹 기반 개방형 IoT 환경에서 실시간 데이터 전송을 위한 시스템 설계)

  • Phyo, Gyung-soo;Park, Jin-tae;Moon, Il-young
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.6
    • /
    • pp.562-567
    • /
    • 2016
  • IoT is attracting attention as the development of the Internet and the spread of smart devices are rapidly increasing worldwide. As IoT is integrated into everyday life, the market is getting bigger. So, experts predict that IoT devices will grow to more than one trillion in a decade. Techniques related to IoT are also being developed steadily, and studies are underway to develop IoT in various fields. However, vendors launching IoT services do not interact with data from other platforms. Therefore, it is limited to growing into a big market by facing the obstacle called the silo phenomenon. To solve this problem, web technology attracts attention. Web technology can interact with data regardless of platform, and it can not only develop various services using the data, but also reduce unnecessary costs for developers. In this paper, we have studied a web - based open IoT system that can transmit data independently in real time to the IoT platform.

A Game Design for IoT environment (IoT 환경을 위한 게임 기획)

  • Lee, MyounJae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.133-138
    • /
    • 2015
  • The basic idea of IoT(Internet of Things) is interconnection and cooperation with a variety of things in real life such as Radio-Frequency Identification(RFID) tags, sensors, mobile phone, etc, through internet. IoT technologies which applied to these fields consist of sensor network technology and middleware, application. Currently, IoT technology is applied to various fields such as health care, home care, automotive, transportation, construction, agriculture, environment, food, and etc, based on its technologies. This paper focuses on discussion of the game planning method in IoT environment. In order to achieve this purpose, first, introduce the IoT technologies. Second, propose a game design elements and considerations in IoT environments. It can help for game developers by using IoT technologies.

A Research on IoT Security Technology based on Blockchain and Lightweight Cryptographic Algorithms

  • Sun-Jib Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.343-348
    • /
    • 2023
  • As the IoT market continues to grow, security threats to IoT devices with limited resources are also increasing. However, the application of security technology to the existing system to IoT devices with limited resources is impossible due to the inherent characteristics of IoT devices. Various methods for solving related problems have been studied in existing studies to solve this problem. Therefore, this study analyzes the characteristics of domestic IoT authentication standards and existing research to propose an algorithm that applies blockchain-based authentication and lightweight encryption algorithms to IoT equipment with limited resources. In this study, a key generation method was applied using a Lamport hash-chain and data integrity between IoT devices were provided using a Merkle Tree, and an LEA encryption algorithm was applied using confidentiality in data communication. In the experiment, it was verified that the efficiency is high when the LEA encryption algorithm, which is a lightweight encryption algorithm, is applied to IoT devices with limited resources.

Field Empirical Result Analysis According to the Operation Reliability Test of the Wireless Gas Shut-off Device (무선가스 차단 장치 동작 신뢰성 시험에 따른 현장 실증 결과분석)

  • Hwang, Do-Yeon;Lee, Kyung-Sik
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.5
    • /
    • pp.70-77
    • /
    • 2021
  • As IoT technology develops along with the 4th industrial revolution, gas safety products to which IoT technology is applied are being developed. However, since the gas safety system was not allowed, system improvement and operation reliability test for IoT gas safety products are required. This thesis researches IoT fuse cock and smart multi-function meter among IoT gas safety products, and analyzes the empirical data of IoT fuse cock to secure operational reliability data, thereby becoming a leader in IoT gas safety products. It aims to develop gas barrier technology one step further through various test evaluations and methods in the future.

IoT network configuration utilizing Xbee (Xbee를 활용한 IoT 활용 방법)

  • Kim, Min-kyu;Kim, Ki-Hwan;Lee, Hoonjae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.546-548
    • /
    • 2016
  • Recently, everyone enjoys the convenience of the rapid development of wireless network technology. There is the IoT (Internet of Things) with the technology come into the spotlight in the network technology. The IoT technology it is possible to view or manipulate the state of the object at a distance to connect to the Internet, all of the individual objects. The IoT existing technology was connected through the wireless technology used the wired network or Wi-Fi. In this paper, change the wireless network connection Xbee saw a brief to study the IoT network.

  • PDF

A Study on IoT Service for Game Development (게임 개발을 위한 IoT 서비스)

  • Lee, MyounJae
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.291-297
    • /
    • 2015
  • The basic idea of IoT(Internet of Things) is interconnection and cooperation with a variety of things in real life such as Radio-Frequency Identification(RFID) tags, sensors, mobile phone, etc, through internet. IoT technologies which applied to these fields consist of sensor network technology and middleware, application. Currently, IoT technology is applied to various fields such as health care, home care, automotive, transportation, construction, agriculture, environment, food, and etc, based on its technologies. This paper focuses on discussion of the IoT development trend in game field. In order to achieve this purpose, first, the IoT technologies for game development based on sensor network technology and middleware, application is mentioned. Second, covers serious game and gamification that is expected to be a growing that is expected to be a growing, by applying IoT technologies to the game field. It can help for game developers by using IoT technologies.

A Study on the Effect of the IoT Technology on SCM (IoT 기술이 공급사슬관리에 미치는 영향에 관한 연구)

  • Lee, Kangbae;Baek, Daehan;Kim, Doohawn
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.227-243
    • /
    • 2016
  • In order to maximize profitability by optimizing the entire supply chain process, enterprises have made efforts to apply IT technologies such as POS, MES, and TMS. In addition, academic societies have also made efforts to verify the effects of IT technology introduction through various researches. However, until now, there is almost no research that analyzes the relationship between the IoT, a new IT technology, and the SCM. To study the effect of IoT technology on SCM, this study conducted professional Delphi surveys for three times. Through this method, this study analyzed changes that will be caused by the IoT technology, the priority area in IoT introduction, and the expected difficulty in IoT introduction on SCM. As a result of the Delphi surveys and analyses, it was expected that when IoT technology is introduced, the level of SCM's IT use and partnership will increase. However, the effect of the increased performance of the supply chain, which includes inventory management and quality control, will become weaker. The reason is that the development of operation and management skills, as well as the improvement of IT technology, are also important elements for the performance improvement of the supply chain. As for the priority area in IoT introduction, it was expected that the effect will be greater when IoT is introduced in customer service, transportation, and delivery areas. As difficulties in IoT technology introduction, such as the shortage of IoT platform development personnel, standardization, integration with the existing system, securing professional manpower, expenses, data management, and operation, were derived, it has thus become necessary for us to exert greater efforts in order to come up with solutions.

A Study of Data Communication Between the Web and the IoT Platform in WoT (WoT 환경에서 웹과 IoT 플랫폼 사이의 데이터 통신 연구)

  • Phyo, Gyung-soo;Park, Jin-tae;Moon, Il-young
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.4
    • /
    • pp.374-379
    • /
    • 2016
  • Recently, IoT(Internet of Things) to connect the objects and people has attracted attention. And it is rapidly developing. IoT is to develop, experts are predicting that the device is connected to the Internet to break through around 100 billion within 10 years. However, the current IoT companies are having a difficult state to the other each other IoT platform for interaction between data silos effects. These silos effects will limit the IoT grow to a larger market. Thus, the IoT service supplier shall develop an open platform for interaction IoT data between each IoT platform. These web technologies for current open IoT platform has emerged. If developers are using familiar, easy-to-learn Web technologies, developers can take advantage of a variety of services for the collected data, and found the IoT devices can be bypassed if there is a problem on the network. In this paper, we investigate the data communications technology that can be used in WoT environment to overcome these silos effects. As a result, the polling method that can simply send the IoT information the fastest.

An IoT Information Security Model for Securing Bigdata Information for IoT Users (IoT 사용자의 빅데이터 정보를 안전하게 보호하기 위한 IoT 정보 보안 모델)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.8-14
    • /
    • 2019
  • Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.