• Title/Summary/Keyword: IoT device

Search Result 778, Processing Time 0.026 seconds

Implement IoT device Authentication System (IoT 단말 인증 시스템 구현)

  • Kang, Dong-Yeon;Jeon, Ji-Soo;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.344-345
    • /
    • 2022
  • ogy is being used in many fields, such as smart farms, smart oceans, smart homes, and smart energy. Various IoT terminals are used for these IoT services. Here, IoT devices are physically installed in various places. A malicious attacker can access the IoT service using an unauthorized IoT device, access unauthorized important information, and then modify it. In this study, to solve these problems, we propose an authentication system for IoT devices used in IoT services. The IoT device authentication system proposed in this study consists of an authentication module mounted on the IoT device and an authentication module of the IoT server. If the IoT device authentication system proposed in this study is used, only authorized IoT devices can access the service and access of unauthorized IoT devices can be denied. Since this study proposes only the basic IoT device authentication mechanism, additional research on additional IoT device authentication functions according to the security strength is required.IoT technol

  • PDF

Device Authentication System in IoT environment (IoT 환경의 단말 인증 시스템)

  • Dong-Yeon, Kang;Ji-Soo, Jeon;Sung-Hwa, Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.97-102
    • /
    • 2023
  • IoT is being used in a lot of industry domain such as smart home, smart ocean, smart energy, and smart farm, as well as legacy information services. For a server, an IoT device using the same protocol is a trusted object. Therefore, a malicious attacker can use an unauthorized IoT device to access IoT-based information services and access unauthorized important information, and then modify or extract it to the outside. In this study, to improve these problems, we propose an IoT device authentication system used in IoT-based information service. The IoT device authentication system proposed in this study applies identifier-based authentication such as MAC address. If the IoT device authentication function proposed in this study is used, only the authenticated IoT device can access the server. Since this study applies a method of terminating the session of an unauthorized IoT device, additional research on the access deny method, which is a more secure authentication method, is needed.

IoT Device Testing for Efficient IoT Device Framework

  • Gong, Dong-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.77-82
    • /
    • 2020
  • IoT devices frequently require input resources to communicate with various sensors or IoT platforms. IoT device wastes a lot of time as idle time or waiting time to check the data of the input resource and use the input resource. In addition, IoT devices use various input resources. We compares and analyzes input idle time and input waiting time generated from hardware serial input resource, software serial input resource, digital port input resource, and analog port input resource using Arduino widely used as IoT device. In order to design the IoT device framework, it is necessary to understand the characteristics of input resources and to design them to minimize unnecessary input idle time and input waiting time. The analog input wait time has a much larger input wait time than the digital input wait time, so it must be designed to receive analog information periodically at the appropriate timing. The characteristics of the input resources analyzed in this way help to design an efficient IoT device.

A Study of Virtual IoT System using Edge Computing (엣지 컴퓨팅 기반 가상 IoT 시스템 연구)

  • Kim, Min-A;Seok, Seung-Joon
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.51-62
    • /
    • 2020
  • Open IoT platform that shares communication infrastructure and provides cloud resources can flexibly reduce development period and cost of smart service. In this paper, as an open IoT platform, we propose a virtual IoT system based on edge computing that implements a virtual IoT device for a physical IoT device and allows service developers to interact with the virtual device. A management server in the edge cloud, near the IoT physical device, manages the creation, movement, and removal of virtual IoT devices corresponding to the physical IoT devices. This paper define the operations of the management server, the physical IoT device, and the virtual IoT device, which are major components of the virtual IoT system, and design the communication protocol required to perform the operations. Finally, through simulations, this paper evaluate the performance of the edge computing based virtual IoT system by confirming that each component performs the defined states and operations as designed.

A Framework for Effectively Managing Dynamism of IoT Devices (IoT 디바이스의 동적 특성의 효과적 관리를 위한 프레임워크)

  • La, Hyun Jung;Park, Chun Woo;Kim, Soo Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.41 no.8
    • /
    • pp.545-556
    • /
    • 2014
  • Internet of Things (IoT), one of the emerging research areas, is the computing paradigm where various things connect to the network and cooperate with their neighbors to reach common goals. Computing with IoT devices opens up a new array of opportunities for providing value-added smart services and applications to end users. That is, IoT devices play an important role of providing useful services to the users. However, the states of IoT devices are dynamically changed at runtime, which come from their mobility, network connectivity, and a battery drain problem. This dynamism results in difficulties in managing these IoT devices. In this paper, we propose a framework to manage those IoT devices with dynamism. Hence, we first derive issues from IoT devices' dynamism. And, we define a set of requirements to manage the IoT devices and present a framework to manage the device dynamism. The framework is equipped by a device discovery method, a device status monitoring method, a device selection and connection method, and a device replacement method. Finally, we verify the feasibility and effectiveness of the framework through experiments.

IoT notification system for marine emergencies

  • Gong, Dong-Hwan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2022
  • Minimization of human casualties in disaster situations is of paramount importance. In particular, if a marine disaster occurs, it can be directly connected to human casualties, so prompt action is needed. In the event of a marine disaster, the route and location of movement should be identified and life tubes should be used to float on the water. This paper designs and proposes an emergency IoT notification system that can quickly rescue drowning people. The maritime emergency IoT notification system consists of four main types. First, an emergency IoT device that detects the expansion of the life tube and delivers location and situation information to the emergency IoT notification server. Second, an emergency IoT web server that manages emergency information and provides notification. Third, a database server that stores and manages emergency IoT notification information. And finally, an emergency notification app that can receive and respond to emergency notification information. The emergency IoT device consists of a TPMS(Tube Pressure Monitoring System) device that checks the pressure value of the TPMS in real time and sends it to the IoT device, and an IoT device that sends the rescuer's voice information and emergency information to the emergency IoT server. Emergency information is delivered using the MQTT(Message Queuing Telemetry Transport) protocol, and voice information is delivered to the IoT server as HTTP FormData.

An IoT Tag and Social Message-based Device Control System (IoT 태그 및 소셜 메시지 기반 사물 제어 시스템)

  • Baek, Seung Min;Jin, Yeon Ju;Ha, Kwon Woo;Han, Sang Wook;Jeong, Jin-Woo
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.550-556
    • /
    • 2017
  • Due to the rapid growth and development of Internet of Things (IoT), various devices are now accessible and controllable anytime from anywhere. However, the current IoT system requires a series of complex steps (e.g., launch an application, choose a space and thing, control the thing, etc.) to control the IoT devices; therefore, IoT suffers from a lack of efficient and intuitive methods of interacting with users. To address this problem, we propose a novel IoT control framework based on IoT tags and social messages. The proposed system provides an intuitive and efficient way to control the device based on the device ownership: 1) users can easily control the device by IoT tagging, or 2) users can send an IoT social message to the device owner to request control of the tagged device. Through the development of the prototype system, we show that the proposed system provides an efficient and intuitive way to control devices in the IoT environment.

An efficient access control techniques between different IoT devices in a cloud environment (클라우드 환경에서 서로 다른 IoT 장치간 효율적인 접근제어 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.57-63
    • /
    • 2018
  • IoT devices are used in many areas to perform various roles and functions in a cloud environment. However, a method of access control that can stably control the IoT device has not been proposed yet. In this paper, we propose a hierarchical multi-level property access control scheme that can perform stable access of IoT devices used in a cluster environment. In order to facilitate the access of the IoT device, the proposed method not only provides the ID key (security token) unique to the IoT device by providing the IoT Hub, but also allows the IoT Hub to authenticate the X.509 certificate and the private key, So that the private key of the IoT device can not be seen outside the IoT device. As a result of the performance evaluation, the proposed method improved the authentication accuracy by 10.5% on average and the processing time by 14.3%. The overhead of IoT Hub according to the number of IoT attributes was 9.1% lower than the conventional method.

A Study on the Penetratrion Testing Next-generation IoT environment(ARMv7 Thumb Architecture) (차세대 IoT환경(ARMv7 Thumb Architecture) 침투테스트에 관한 연구)

  • Kim, Si-Wan;Seong, Ki-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.585-588
    • /
    • 2016
  • Due to the nature IoT Device (or Sensor) of the IoT System it may be susceptible (or attached) to our daily lives, so easy to direct physical access to IoT Device, which caused physical security is very weak. In this study, we implemented "Zero-Day Attack" on the ARMv7 Thumb Architecture as a direct target local system.

  • PDF

Design of Edge Device for Marine/Industry IoT (해상/산업용 IoT를 위한 Edge Device 설계)

  • Lee, Seong-Real;Yim, Chun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.676-678
    • /
    • 2021
  • This paper shows the design of edge device for marine and industry IoT sevice. Edge device gather IoT sensing data and then send these data into external network. For transmitting the gathered data, commercial LoRa and LTE Cat.M1 are applied into the edge device.

  • PDF