RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Security Threats and Attacks in Internet of Things (IOTs)

        Almtrafi, Sara Mutlaq,Alkhudadi, Bdour Abduallatif,Sami, Gofran,Alhakami, Wajdi International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.1

        The term Internet of Things (IoTs) refers to the future where things are known daily through the Internet, whether in one way or another, as it is done by the method of collecting various information from various sensors to form a huge network through which people, things and machines are helped to make a link between them at all time and anywhere. The IoTs is everywhere around us such as connected appliances, smart homes security systems and wearable health monitors. However, the question is what if there is a malfunction or outside interference that affects the work of these IoTs based devises? This is the reason of the spread of security causes great concern with the widespread availability of the Internet and Internet devices that are subject to many attacks. Since there aren't many studies that combines requirements, mechanisms, and the attacks of the IoTs, this paper which explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality Additionally, the paper addresses the different types of attacks in IoTs. We have also addressed the different approaches aim to prevention mechanisms according to several researchers' conclusions and recommendations.

      • Future Perspective and Current Aspects of Internet of Things Enable Design

        Evedeep Kaur Bhatia,Simran Ohri,Gurbani Kaur,Minal Dhankar,Sweety Dabas 보안공학연구지원센터 2015 International Journal of Software Engineering and Vol.9 No.8

        In this work, we are going to survey the latest progress in Internet of Things (IoTs) and also design IoTs enable electronics design like frame buffer, content addressable memory, and key generator for encryption and decryption. We are analyzing future perspective, overall impact, and its role in every corner of life, characteristics features and current aspects of IoTs. Apart from this, we study how this concept came into existence and its emergence changes our lives. In this paper, we have also designed IoTs enable Frame Buffer on FPGA for Object Tracking, IoTs enable Content Addressable Memory for processor and IoTs enable Key Generator for Green Communication. In order to make IOTs enable design, we are embedding a 128-bit Internet Protocol Version 6 (IPv6) address in each and every design that enables.

      • KCI등재

        A Mass-Processing Simulation Framework for Resource Management in Dense 5G-IoT Scenarios

        ( Lusheng Wang ),( Kun Chang ),( Xiumin Wang ),( Zhen Wei ),( Qingxin Hu ),( Caihong Kai ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.9

        Because of the increment in network scale and test expenditure, simulators gradually become main tools for research on key problems of wireless networking, such as radio resource management (RRM) techniques. However, existing simulators are generally event-driven, causing unacceptably large simulation time owing to the tremendous number of events handled during a simulation. In this article, a mass-processing framework for RRM simulations is proposed for the scenarios with a massive amount of terminals of Internet of Things accessing 5G communication systems, which divides the time axis into RRM periods and each period into a number of mini-slots. Transmissions within the coverage of each access point are arranged into mini-slots based on the simulated RRM schemes, and mini-slots are almost fully occupied in dense scenarios. Because the sizes of matrices during this process are only decided by the fixed number of mini-slots in a period, the time expended for performance calculation is not affected by the number of terminals or packets. Therefore, by avoiding the event-driven process, the proposal can simulate dense scenarios in a quite limited time. By comparing with a classical event-driven simulator, NS2, we show the significant merits of our proposal on low time and memory costs.

      • KCI등재

        BST-IGT Model: Synthetic Benchmark Generation Technique Maintaining Trend of Time Series Data

        Kyung Min Kim(김경민),Jong Wook Kwak(곽종욱) 한국컴퓨터정보학회 2020 韓國컴퓨터情報學會論文誌 Vol.25 No.2

        본 논문에서는 시계열 데이터를 기반으로 합성 벤치마크를 생성하는 기법을 소개한다. IoT 기기에서 측정되는 많은 데이터는 시간에 따른 수치 변화를 측정하는 시계열적 특성이 있다. 하지만 긴 기간 동안 측정되는 데이터를 일반화된 시계열 데이터로 모델링하기 힘든 문제점이 존재한다. 이런 문제를 개선하기 위해 본 논문에서는 BST-IGT 모델을 소개한다. BST-IGT 모델은 전체 데이터를 시계열 모델링이 쉬운 구간으로 분리하여 생성 데이터를 템플릿으로 수집하고 이를 기반으로 특성을 공유하거나 변형되는 새로운 합성 벤치마크를 생성한다. 제안된 모델링 기법을 이용하여 신규 벤치마크를 생성한 결과, 기존 데이터의 통계적 특성을 유지하는 합성 벤치마크와 다른 벤치마크와의 혼합으로 여러 특성을 가지는 벤치마크의 생성을 수행할 수 있었다. In this paper, we introduce a technique for generating synthetic benchmarks based on time series data. Many of the data measured on IoT devices have a time series characteristic that measures numerical changes over time. However, there is a problem that it is difficult to model the data measured over a long period as generalized time series data. To solve this problem, this paper introduces the BST-IGT model. The BST-IGT model separates the entire data into sections that can be easily time-series modeled, collects the generated data into templates, and produces new synthetic benchmarks that share or modify characteristics based on them. As a result of making a new benchmark using the proposed modeling method, we could create a benchmark with multiple aspects by mixing the composite benchmark with the statistical features of the existing data and other benchmarks.

      • NOP: An Efficient Non-optimization-based Method for RFID Network Topology Design

        Po-jen Chuang,Wei-Ting Tsai 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.12

        For Radio Frequency IDentification (RFID) applications in Internet of Things, proper reader deployment is important because unguarded deployment may cause reader-to-tag or reader-to-reader interferences, incurring huge deployment cost. Current RFID topology designs are optimization-based whose heuristic search for optimal or sub-optimal solutions may take much complexity and whose improper utilization or concurrent consideration on the involved objectives may generate unfavorable results. To pursue more desirable reader deployment for RFID networks, this paper presents an efficient new topology design – NOP. NOP involves a Non-OPtimization practice to avoid the tediously long heuristic search in optimization-based methods and gives proper sequential considerations on involved objectives to avoid improper objective utilization. The conducted experimental evaluation shows that our NOP method can produce better reader deployment by reduced complexity. Specifically, it outperforms optimization-based methods, such as GA, GAA and IGAA, by yielding higher fitness values at less processing time and deployment cost.

      • KCI등재

        Development of an Early Diagnostic Device for African Swine Fever through Real-time Temperature Monitoring Ear-tags (RTMEs)

        김태현,홍민종,신정활 한국센서학회 2023 센서학회지 Vol.32 No.5

        Throughout the 20th century, the transition of pig farms from extensive to intensive commercial operations amplified the risk of diseasetransmission, particularly involving African swine fever (ASF). Real-time temperature monitoring systems have emerged as essentialtools for early ASF diagnosis. In this paper, we introduce new real-time temperature monitoring ear tags (RTMEs) modeled afterexisting ear tag designs. Our crafted Pig-Temp platforms have three primary advantages. First, they can be effortlessly attached to pigears, ensuring superior compatibility. Second, they enable real-time temperature detection, and the data can be displayed on a personalcomputer or smartphone application. Furthermore, they demonstrate excellent measurement accuracy, ranging from 98.9% to 99.8% attemperatures between 2.2 and360o C. A linear regression approach enables fever symptoms associated with ASF to be identified within3 min using RTMEs. The communication range extends to approximately 12 m (452m2 ), enabling measurements from an estimated75 to 2,260 pigs per gateway. These newly developed Pig-Temp platforms offer singifcant enhancement of early ASF detection.

      • KCI등재후보

        IoT 및 네트워크 관리 지원을 위한 컴포넌트 아키텍처 개발

        서희경(Hee Kyoung Seo) 한국스마트미디어학회 2017 스마트미디어저널 Vol.6 No.2

        IoT 에서는 인간과 사물, 사물과 사물들이 통신하며 공통적인 네트워크를 형성하여 자동화 서비스를 실현하는 것이 무엇보다 중요하다. 인간과 사물, 사물과 사물을 공통적인 네트워크로 공유하는 방식으로 웹은 가장 강력한 수단 중의 하나이다. 따라서 IoT에서 사용되는 각 디바이스와 웹과의 통신방식의 효율성은 IoT의 성패를 가름할 수 있다. 웹 응용에서 소프트웨어의 재사용은 소프트웨어의 고품질과 고생산성을 위한 최상의 방법으로 여겨진다. 모듈, 클래스, 패턴, 프레임워크, 비즈니스 컴포넌트들은 다양한 관점의 재사용 요소들이다. 컴포넌트는 잘 정의된 인터페이스를 통해서 다른 것들과 쉽게 플러깅함으로써 응용 개발의 근본 문제인 복잡성을 극복하고 개발과 운용의 다양성을 제공할 수 있다. IoT 및 Network Management를 위한 웹 기반의 분산 환경은 각종 디바이스에서 수집되는 정보를 이용하는 응용의 개발과 활용을 위한 표준 아키텍처이다. 따라서 IoT 및 NM 응용에서 최상의 서비스 제어를 위해 구성 자원들을 관리, 체계화하는 네트워크 관리는 개별 응용 뿐 아니라 응용의 대부분에서 하부 계층 지원 서비스로 요구된다. 본 논문에서는 이질적인 인터 네트워크상에서 컴포넌트 기반 IOT 및 관련 네트워크 관리 시스템 개발을 목적으로 한다. 이를 위해 필요한 컴포넌트들의 분류 계층화를 위한 컴포넌트 아키텍처를 정의하고 네트워크 도메인에서 필요로 하는 컴포넌트를 식별, 분류하며 실제 네트워크 관리 시스템의 유형을 제시한다. It is important to realize automation services by communicating in IoT with humans, objects & objects, and forming a common network. People used web like the most powerful network way to sharing things and communication. Therefore the efficiency method communication between each device and the web in IoT could be different from ones. The best method for high quality software product in web applications is software reuse ; Modules, classes, patterns, frameworks, and business components are reusable elements of various perspectives. Components is plugged with others through well-defined interfaces, which can overcome the operation and complexity of application development . A web-based distributed environment for IoT applications is a standard architecture use information collected from various devices for developing and using applications . For that reason, the network management which manages the constituent resources for the best service control in IoT application is required as a sub-layer support service in most applications as well as individual applications. In this paper, we measure to develop a network management system based not only by components but on heterogeneous internetworks. For procedure this, we clarify a component architecture for classifying and classify also the component needed in the IOT and network domain or order the type of real network management system.

      • KCI등재

        IoT기반 실외 도로건설 위험방지시스템에서의 보안취약점 분석과 대응

        지승현 한국컴퓨터정보학회 2020 韓國컴퓨터情報學會論文誌 Vol.25 No.7

        사물인터넷(Internet of Things: IoT) 기술 발전에 따라서, IoT기술의 적용범위는 실내 환경의 생활 편의성 개선에서 벗어나 실외 환경에서의 발생가능한 위험을 사전에 감지·예방하는 산업안전분야로 확대되고 있다. 이러한 IoT서비스 확대는 많은 장점을 제공함에도 데이터 유출과 변조 등의 보안 문제도 함께 발생시키므로 이에 따른 보안 대응전략 연구도 활발히 진행되고 있다. 본논문에서는 실외환경에서의 IoT기반 도로건설 위험방지시스템을 연구대상으로 IoT 보안관리 가이드라인을 제안한다. 연구대상에 적용한 저전력-광역(LPWA, BLE) 통신프로토콜의 보안취약점을조사한 결과, 정보보안의 3대 요소인 기밀성, 무결성, 가용성 측면에서 보안취약점을 확인하여 이를 최소화할 수 있도록 취약점 별 대응방안을 제안하였다. 본 연구는 기 구현된 실외환경에서의IoT기반 도로건설 위험방지시스템 운영에서 발생할 수 있는 취약점 조사·분석과 취약점별 실질적인 보안지침을 제안하는데 연구의 의의가 있다. Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼