사물인터넷 경량장치를 위한 안전한 초기 설정 기술 동향

  • Published : 2017.02.28

Abstract

사물인터넷(Internet of Things, IoT) 기술의 발전에 따라 서비스 또한 다양해지고 있으며 실제 삶 속에 스며들어가고 있다. 이러한 사물인터넷 기술은 산업체에게 새로운 시장 창출의 기회를 제공하고 있고 사용자에게는 더욱 스마트한 삶을 영위할 수 있도록 해준다. 그러나 빠르게 증가하면서 연결되는 사물들에 보안 기술이 안전하게 적용되지 않을 경우 새로운 위협 요소가 된다. 본고에서는 미흡한 보안 설정으로 인해 야기되는 IoT 장치에 대한 보안 공격 동향과 이에 대응하기 위해 제안되는 안전한 초기 설정 방법들에 대해 알아본다.

Keywords

References

  1. A. Coppa, "Secure and User-Friendly Commissioning and Bootstrapping of Constrained Devices,"Norwegian University of Science and Technology, December, 2015
  2. C. Botnet, Internet Census 2012 - Port scanning/0 using insecure embedded devices, October, 2012 (http://internetcensus2012.bitbucket.org/paper.html)
  3. M. B. Barcena and C. Wueest, "Insecurity in the Internet of Things," Symantec, March, 2015 (https://www.symantec.com/content/dam/symantec/docs/white-papers/insecurity-in-the-internet-ofthings-en.pdf)
  4. Symantec, "Internet Security Threat Report (ISTR)," Symantec, Vol.21, April, 2016 (https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf)
  5. ENISA, "Cyber security and resilience for Smart Hospitals," ENISA, November, 2016 (https://www.enisa.europa.eu/publications/cyber-security-andresilience-for-smart-hospitals)
  6. D. Plonka, "The Internet of Things Unchecked", IETF Journal, November, 2016 (https://www.ietfjournal.org/the-internet-of-things-unchecked/)
  7. B. Kenyon, "Security in 2017 and Beyond: Symantec's Predictions for the Year Ahead," Symantec, December, 2016 (https://www.symantec.com/connect/blogs/security-2017-and-beyondsymantec-s-predictions-year-ahead)
  8. 트렌드마이크로, "넥스트 티어(The Next Tier) -2017 년 보안 예측," 트렌드마이크로, 2016 (http://www.trendmicro.co.kr/cloud-content/kr/pdfs/the_next_tier_kr.pdf)
  9. Electric Imp, "Electric Imp BlinkUp" (https://youtu.be/a8-G4m1LYWs)
  10. X . Huang, X . Gao and Z . Yan, "Security protocols in body sensor networks using visible light communications," International Journal of Communication Systems, Vol. 29, No. 16, 2015
  11. T. Kovacevic, T. Perkovic and M. Cagalj, "Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices," Security and Communication Networks, December, 2015
  12. J. HAN, Y.H. Lin, A.Perrig and F.Bai, "MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles (CMU-CyLab-14-006)," 2014
  13. R . Nandakumar, K. K. Chintalapudi, V . Padmanabhan and R. Venkatesan, "Dhwani: secure peer-to-peer acoustic NFC," ACM SIGCOMM Computer Communication Review, Vol.43, No.4, ACM, August, 2013, pp. 63-74
  14. C.Jennings, "Transitive Trust Enrollment for Constrained Devices,"IETF draft, October 13, 2012