DOI QR코드

DOI QR Code

사물인터넷 신뢰 연구와 시사점: EU FP7을 중심으로

Researches on Trust in IoT and Implications: Focusing on EU Framework Programme 7 (FP7)

  • 윤영석 (한국전자통신연구원 초연결통신연구소) ;
  • 조성균 (한국전자통신연구원 초연결통신연구소) ;
  • 이현우 (한국전자통신연구원 초연결통신연구소)
  • 투고 : 2016.01.29
  • 심사 : 2016.03.02
  • 발행 : 2016.03.31

초록

IoT (Internet of Things)는 기기, 사람, 이들의 데이터를 연결하여 새로운 비즈니스 기회를 제공할 것으로 예상된다. 그러나 신뢰가 결여된다면 IoT (Internet of Things)가 제안하는 가치는 달성될 수 없다. IoT는 끊임없는 연결을 추구한다는 측면에서 사람, 사물과 같은 연결 대상에 대한 신뢰가 전제되어야 한다. 그러나 현재까지 진행된 IoT 연구의 대부분은 플랫폼과 어플리케이션 개발에 집중되어 있어 신뢰할 수 있는 연결과 상호작용에 대한 논의는 상대적으로 부족하다. uTRUSTit, ABC4Trust, Inter-Trust, COMPOSE, SMARTIE와 같은 유럽의 FP7 ICT 연구 프로그램은 이러한 간극을 해소하고자 하는 연구들이다. 본고에서는 이들 프로젝트의 목적과 연구 방향을 소개하고 논의하였다. 각각의 연구가 취하고 있는 접근은 조금씩 상이하지만 이들 연구의 공통점은 신뢰할 수 있는 연결을 통해 프라이버시와 안전을 모두 담보하고자 하는 것이다. IoT의 기대를 충족시키기 위해서는 국내에서도 연결된 사물들에 대한 신뢰 연구가 필요한 시점임은 분명하다.

The Internet of Things (IoT) is expected to provide new business opportunities by connecting devices, persons, and their data. However, the value proposed by IoT cannot be realized without trust. As IoT premises on the seamless connections, it should guarantee trust among the connected persons and things. However, there is lack of relevant discussion on how to achieve trustworthy connections and interactions because most of academic studies have mainly focused on the development of IoT platforms and applications. To fill the gaps, recent EU-funded projects such as uTRUSTit, ABC4Trust, Inter-Trust, COMPOSE, and SMARTIE have been conducted under the FP7-ICT Framework Programme. This paper presents and discusses each project's purpose and approach. Although their approaches are somewhat different from each other, all of them dedicate to achieving both privacy and security by providing the trustworthy connections. It seems to be clear that Korea also needs more academic and practical contribution in terms of researches, to implement "trust"among connected things, which will eventually satisfy what really IoT is expected for.

키워드

참고문헌

  1. 김호원 (2014). "사물인터넷 환경에서의 보안/프라이버시 이슈." TTA 저널, 153: 35-39.
  2. 표철식.강호용.김내수.방효찬 (2013). "IoT(M2M) 기술동향 및 발전 전망." 한국통신학회지, 30(8): 3-10.
  3. ABC4Trust (2011). "ABC4Trust D2.1 Architecture for Attribute-based Credential Technologies - Version 1." https://abc4trust.eu/download/ABC4Trust-D2.1-Architecture-V1.2.pdf (Retrieved Oct 22, 2015).
  4. ABC4Trust (2012). "ABC4Trust D5.1 Scenario Definition for both Pilots: ABC4Trust." https://abc4trust.eu/download/ABC4Trust-D5.1-Scenario-Definition.pdf. (Retrieved Oct 22, 2015).
  5. ABC4Trust (2015a). "R2.1 Privacy-ABC Technologies, Personal Data Ecosystem, and Business Models: A feasibility study report: ABC4Trust." https://abc4trust.eu/download/R2.1%20-%20PDE%20and%20ABC%20Review%20V1.0.pdf (Retrieved Dec 4, 2015).
  6. ABC4Trust (2015b)." ABC4Trust." https://abc4trust.eu/(Retrieved Oct 18, 2015).
  7. Chaudhuri, A. & Holbrook, M. B. (2001). "The Chain of Effects from Brand Trust and Brand Affect to Brand Performance: The Role of Brand Loyalty." Journal of Marketing, 65(2): 81-93. https://doi.org/10.1509/jmkg.65.2.81.18255
  8. COMPOSE (2014a). "D1.2.2 Final COMPOSE architecture document: COMPOSE." http://www.compose-project.eu/sites/default/files/publications/D1.2.2%20-%20Final%20COMPOSE%20architecture.pdf (Retrieved Dec 10, 2015).
  9. COMPOSE (2014b). "D5.3.1 Reputation Management Report: COMPOSE." http://www.compose-project.eu/sites/default/files/publications/D5.3.1%20-%20Reputation%20management%20report.pdf (Retrieved Dec 12, 2015).
  10. COMPOSE (2014c). "D7.2.1 Business Modeling Analysis: COMPOSE." http://www.compose-project.eu/document/d721-business-modeling-analysis (Retrieved Dec 9, 2015).
  11. COMPOSE (2014d). "D7.3.2 Use Cases Implementation - Final Version: COMPOSE." http://www.compose-project.eu/document/d732-use-cases-implementation-%E2%80%93-final-version (Retrieved Nov 13, 2015).
  12. COMPOSE (2015). "COMPOSE." http://www.compose-project.eu/ (Retrieved Nov 11, 2015).
  13. Corbitt, B. J., Thanasankit, T. & Yi, H. (2003). "Trust and e-commerce: a study of consumer perceptions." Electronic Commerce Research and Applications, 2(3): 203-215. https://doi.org/10.1016/S1567-4223(03)00024-3
  14. Sirdeshmukh , D., Singh, J. & Sabol, B. (2002). Consumer Trust, Value, and Loyalty in Relational Exchanges. Journal of Marketing, 66(1): 15-37. https://doi.org/10.1509/jmkg.66.1.15.18449
  15. Dumortier, J. & Vandezande, N. (2012). "Trust in the proposed EU regulation on trust services?" Computer Law & Security Review, 28(5): 568-576. https://doi.org/10.1016/j.clsr.2012.07.010
  16. Hong, I. B. & Cho, H. (2011). "The impact of consumer trust on attitudinal loyalty and purchase intentions in B2C e-marketplaces: Intermediary trust vs. seller trust." International Journal of Information Management, 31(5): 469-479. https://doi.org/10.1016/j.ijinfomgt.2011.02.001
  17. Inter-Trust (2013a). "D.2.3.1 INTER-TRUST Approach and Framework Specification (first version)." http://inter-trust.lcc.uma.es/documents/10180/15714/INTER-TRUST-T2.3-IT-DELV-D2.3.1-ApproachAndFrameworkSpecification-First-V1.0/51c97210-be53-4e49-827f-d4e666ded4bf (Retrieved Dec 19, 2015).
  18. Inter-Trust (2013b). "D2.4.1. Market analysis (first version)." http://inter-trust.lcc.uma.es/deliverables (Retrieved Dec 3, 2015)
  19. Inter-Trust (2013c). "Inter-trust D2.2.1 Gap and Standards Analysis First Version." http://inter-trust.lcc.uma.es/documents/10180/15714/INTER-TRUST-T2.2-UMU-DELV-D2.2.1-GapStandardsAn-First-V1.00.pdf/dcc886d8-1824-4973-8e73-2a91c7a3f85e (Retrieved Nov 1, 2015).
  20. Inter-Trust (2014). "Inter-TRUST D3.3 Guidelines for Deployment." http://inter-trust.lcc.uma.es/documents/10180/15714/INTER-TRUST-T3.4-SCYTL-DELV-D3.3-GuideDeploy-V1.00.pdf/e4218bab-c76e-440e-9f9d-e4e1d96a510b (Retrieved Oct 21, 2015)
  21. Inter-Trust (2015). "Interoperable Trust Assurance Infrastructure" http://inter-trust.lcc.uma.es/ (Retrieved Oct 17, 2015).
  22. IoT-A (2011). "D1.2 - Initial Architectural Reference Model for IoT: IoT-A." http://www.iot-a.eu/public/public-documents/d1.2/view (Retrieved Dec 2, 2015)
  23. Mayer, R. C., Davis, J. H. & Schoorman, F. D. (1995). "An Integrative Model of Organizational Trust." The Academy of Management Review, 20(3): 709-734. https://doi.org/10.5465/amr.1995.9508080335
  24. Ranaweera, C. & Prabhu, J. (2003). "On the relative importance of customer satisfaction and trust as determinants of customer retention and positive word of mouth." Journal of Targeting, Measurement and Analysis for Marketing, 12(1): 82-90. https://doi.org/10.1057/palgrave.jt.5740100
  25. SMARTIE (2013). "SMARTIE D2.2 Requirements." http://www.smartie-project.eu/publication_deli.html. (Retrieved Oct 19, 2015).
  26. SMARTIE (2014a)." D2.1 Use Cases: SMARTIE." http://www.smartie-project.eu/download/D2.1-Use%20Cases.pdf (Retrieved Dec 8, 2015).
  27. SMARTIE (2014b). "D3.1 Components for secure information gathering and storage: SMARTIE." http://www.smartie-project.eu/download/D3.1-Components_for_secure_information_gathering_and_storage_Final.pdf (Retrieved Nov 14, 2015).
  28. SMARTIE (2015a). "D5.1 Integration and Validation Plan: SMATIE." http://www.smartie-project.eu/download/D5.1-Integration%20and%20Validation%20Plan.pdf (Retrieved Dec 9, 2015).
  29. SMARTIE (2015b). "Welcome to SMARTIE Project." http://www.smartie-project.eu/ (Retrieved Dec 9, 2015).
  30. uTRUSTit (2011). "D.2.2 Definition of User Scenarios: uTRUSTit." http://www.utrustit.eu/ (Retrieved Sep 3, 2015)
  31. uTRUSTit (2012a). "uTRUSTit D2.7 Updated Design Guidelines on the Security Feedback Provided by the Things." http://www.utrustit.eu/ (Retrieved Sep 4, 2015).
  32. uTRUSTit (2012b). "uTRUSTit Deliverables." http://www.utrustit.eu/ (Retrieved Sep 2, 2015).
  33. uTRUSTit (2013). "uTRUSTit D2.8 Final UI-Guidelines for the Trust Feedback Provided by the IoT." http://www.utrustit.eu/ (Retrieved Sep 1, 2015).