사물인터넷 보안 표준화 동향

  • Published : 2017.02.28

Abstract

최근 다양한 산업 분야에서 사물인터넷(Internet of Things; IoT)에 관련된 연구가 활발히 진행되고 있다. 기존 네트워크 환경에서와 같이 IoT 또한 다양한 보안 공격으로부터 노출 되어 있으며, 여러 가지 보안 이슈가 존재한다. IoT 환경에서는 디바이스, 플랫폼, 통신프로토콜의 이종성 문제로 인하여 공통의 보안 서비스 제공이 힘들게 되고 이를 해결하기 위하여 상호운용성 제공이 가능한 표준이 필요하게 된다. 본고에서는 다양한 보안 이슈들로부터 안전한 IoT 환경 구축을 위하여, IoT 보안 관련 국내외 표준화 기관를 분석하고, 각 기관에서 제시하고 있는 IoT 보안 관련 표준 및 표준화 동향을 분석하고자 한다.

Keywords

References

  1. H. Kim, D. Kim, "IoT Technologies and security", Review of KIISC, Vol. 22, No.1, pp. 7-13, 2012.
  2. M. Hossain, M. Fotouhi, R. Hasan, "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things", IEEE World Congress on Services, New York, USA, pp. 21-28, 2015.
  3. V. Gazis, "A Survey of Standards for Machine to Machine (M2M) and the Internet of Things (IoT)" IEEE Communications Surveys & Tutorials, 2016.
  4. 국가기술표준원, "표준의 정의", http://standard.go.kr
  5. 한국정보통신기술협회(TTA), "표준화의 개요", http://www.tta.or.kr
  6. ITU-T, http://www.itu.int
  7. ISO/IEC JTC 1, http://www.iso.org/iso/jtc1_home.html
  8. ETSI, http://www.etsi.org
  9. IEEE-SA, https://standards.ieee.org
  10. IEEE Internet of Things, http://iot.ieee.org
  11. IEEE P2143, http://grouper.ieee.org/groups/2413
  12. 송재승, "IEEE의 사물인터넷 기술표준 및 글로벌 협력", TTA저널, pp.36-40, 2016
  13. 사물인터넷포럼, http://iotforum.kr
  14. IETF, https://www.ietf.org
  15. OneM2M, http://www.onem2m.org
  16. OGC, http://www.opengeospatial.org
  17. Allseen Alliance, https://allseenalliance.org
  18. OIF, https://openconnectivity.org
  19. ITU-T, "Common requirements for Internet of things (IoT) applications", F.748.0, ed. 1.0, ITU-T, 2014.
  20. ITU-T, "OID-based resolution framework for heterogeneous identifiers and locators", X.675, ed. 1.0, ITU-T, 2015.
  21. ITU-T, "Security requirements and framework of ubiquitous networking", X.1314, ed. 1.0, ITU-T, 2014.
  22. ITU-T, "Overview of the Internet of things", Y.2060, ed. 1.0, ITU-T, 2012.
  23. ITU-T, "Framework of the web of things", Y.2063, ed. 1.0, ITU-T, 2012.
  24. ITU-T, "Common requirements of the Internet of things", Y.2066, ed. 1.0, ITU-T, 2014.
  25. ITU-T, "Common requirements and capabilities of a gateway for Internet of things applications", Y.2067, ed. 1.0, ITU-T, 2014.
  26. ITU-T, "Functional framework and capabilities of the Internet of things", Y.2068, ed. 1.0, ITU-T, 2015.
  27. ITU-T, "Capability framework for e-health monitoring services", Y.2075, ed. 1.0, ITU-T, 2015.
  28. ITU-T, "Semantics based requirements and framework of the Internet of things", Y.4111/Y.2076, ed. 1.0, ITU-T, 2016.
  29. ITU-T, "Requirements of the plug and play capability of the Internet of things", Y.4112/Y.2077, ed. 1.0, ITU-T, 2016.
  30. ITU-T, "Application support models of the Internet of Things", Y.4552/Y.2078, ed. 1.0, ITU-T, 2016.
  31. ITU-T, "Requirements of smartphone as sink node for IoT applications and services", Y.4553, ed. 1.0, ITU-T, 2016.
  32. ITU-T, "Common requirements and capabilities of device management in the Internet of things", Y.4702, ed. 1.0, ITU-T, 2016.
  33. N. Kushalnagar, G. Montenegro, C. Schumacher, "IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) : Overview, Assumption, Problem Statement, and Goals" RFC 4919, IETF, 2007.
  34. E. Kim, D. Kaspar, C. Gomez, C. Bormann "Problem Statement and Requirements for IPv6 over Low- Power Wireless Personal Area Network (6LoWPAN) Routing" RFC 6606, IETF, 2012
  35. C. Bormann, M. Ersue, A. Keranen, "Terminology for Constrained-Node Networks" RFC 7228, IETF, 2014
  36. Z. Shelby, K. Hartke, "The Constrained Application Protocol (CoAP)" RFC7252, IETF, 2014
  37. J. Schoenwaelder, A. Sehgal, T. Tsou, C. Zhou, "Definition of Managed Objects for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN)" RFC7388, IETF, 2014
  38. T. Watteyne, M. Palattella, L. Grieco, "Using IEEE 802.15.4e Time-Slotted Channel Hopping (TSCH) in the Internet of Things (IoT): Problem Statement", RFC7554, IETF, 2015.
  39. K. Hartke, "Observing Resources in the Constrained Application Protocol (CoAP)", RFC7641, IETF, 2015.
  40. J. Jimenez, J. Lopez-Vega, J. Maenpaa, G. Camarillo, "A Constrained Application protocol (CoAP) Usage for Resource Location And Discovery (RELOAD)", RFC7650, IETF, 2015.
  41. OneM2M, "Functional Architecture", TS-0001 ed. 2.10.0, OneM2M, 2016.
  42. OneM2M, "Requirements", TS-0002 ed. 2.7.1, OneM2M, 2016.
  43. OneM2M, "Security Solutions", TS-0003 ed. 2.4.1, OneM2M, 2016.
  44. OneM2M, " Service Layer Core Protocol Specification", TS-0004 ed. 2.7.1, OneM2M, 2016.
  45. OneM2M, "Management Enablement (OMA)", TS-0005 ed. 2.0.0, OneM2M, 2016
  46. OneM2M, "Service Components", TS-0007 ed. 2.0.0, OneM2M, 2016.
  47. OneM2M, "CoAP Protocol Binding", TS-0008 ed. 1.3.2, OneM2M, 2016.
  48. OneM2M, "HTTP Protocol Binding", TS-0009 ed. 2.6.1, OneM2M, 2016.
  49. OneM2M, "MQTT protocol Binding", TS-0010 ed. 2.4.1, OneM2M, 2016.
  50. OneM2M Partners Type 1, "Interoperability Testing", TS-0013 ed. 1.0.0, OneM2M, 2016
  51. OneM2M Partners Type 1, "LWM2M Interworking", TS-0014 ed. 2.0.0, OneM2M, 2016.
  52. OneM2M, "WebSocket Protocol Binding", TS-0020 ed. 2.0.0, OneM2M, 2016.
  53. R. Shirey,"Internet Security Glossary, Version 2", RFC 4949, IETF, 2007.
  54. 나윤종, 김영갑, "사물인터넷 보안 표준화 동향 분석", 2016년 정보처리학회 춘계학술발표대회 논문집, 제23권, 제1호, pp.307-310, 2016.
  55. I. Hwang, Y.-G. Kim, "Analysis of Security Standardization for the Internet of Things", In Proc. of 2017 International Conference on Platform Technology and Service, Busan, Korea, IEEE Press, Feb. 13 - 15, 2017