DOI QR코드

DOI QR Code

A Study on ICT Security Change and CPS Security System in the 4th Industry Age

4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구

  • 주헌식 (삼육대학교 컴퓨터.메카트로닉스공학부)
  • Received : 2017.11.22
  • Accepted : 2018.02.26
  • Published : 2018.02.28

Abstract

This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

본 연구에서 4차 산업 시대에서의 보안의 트랜드 변화와 보안위협, 4차 산업 시대의 보안 시스템 등 4차 산업 시대의 보안 시스템에 대해서 나타내었다. 4차 산업 시대는 ICT에서 IoT로 CPS보안으로 위협요소가 변화되며, 이에 따른 보안 패러다임 변화와 보안 시스템도 변화하여야 한다. 특히 CPS 보안을 해결하기 위해서는 환경적 보안과 관리적 보안이 더 중요하다. 4차 산업 시대 보안은 개별시스템에 대한 맞춤형 보안으로 변화하여야 제품 생산 설계에서 하드웨어와 소프트웨어가 융합된 보안 기술이 개발 초기부터 변화하여야 한다고 제안한다. 4차 산업의 보안 시스템은 네트워크와 같은 단일 시스템에서의 보안 시스템에서 개별시스템으로 다양한 기기들과 플랫폼들을 수용할 수 있는 보안 시스템으로 CPS 보안 시스템으로 설계 및 구현을 제안한다.

Keywords

References

  1. Jeong Heyun,"The Strategic Initiative INDUSTRIE 4.0 and IT-based ship production systems research trends", Society for Computational Design and Engineering, pp.333-342, 2014.
  2. Hea-Jo Kang, "A Study on Disaster Safety Management Policy Using the 4th Industrial Revolution and ICBMS", Journal of DCS, Vol. 18, No. 6, pp.1213-1216, 2017.
  3. Hyo-Nam Kim, "A Study on Obfuscation of the InGame Data for the Mobile Game Security", Proceedings of the Korean Society of Computer Information Conference, Vol. 25, No. 1, pp.179-180, 2017.
  4. Byung-Woon Kim, "The Forth Industrial Revolution", Industrial Internet of Things, Journal of Law & Economic Ragulation ,Vol. 9, No. 1, pp.215-232, 2016.
  5. Gu-Man Kang, Bum-Gu Lim, Joung-Han Lee, "Implementation of Palnt Object Model for the Application of Industry 4.0", THE INSTITUTE OF ELECTRONICS ENGINEERS OF KOREA, pp.1610-1612, 2014.
  6. Sang-Hoon Kim, Sun-Young Park, "Influencing Factors for Compliance Intention of Information Security Policy", The Journal of Society for e-Business Studies , Vol. 16, No. 4, pp.33-51, 2011. https://doi.org/10.7838/jsebs.2011.16.4.033
  7. Cheoi yeoung su, "Information Protection and Security", The Institute of Electronics Engineers of Korea - Computer and Information, Vol. 47, No. 6, pp.139-139, 2010
  8. Ho-Chul Park, Ki-Hyung Kim, Joo-Yoen Lee, Gi-Nam Wang, Kang-Seok Kim, Tae-Shik Shon, "Design & Implementation of CPPS (Cyber Physical Production System) for Smart Factory, KOREA INFORMATION SCIENCE SOCIETY, Vol. 12, pp.838-840, 2014.
  9. Donghwi Shin, Chaetae Im, HyunChul Jung, Dongho Won, "A study on automatic static analysis method for malware analysis", KOREA INFORMATION SCIENCE SOCIETY, pp.84-89, 2010.
  10. Jeong-Rae Cho, Hye-Suk Kim, Doo-Keol Chae, Suk-Ja Lim, "Smart CCTV Security Service in IoT(Internet of Things) Environment", Journal of Digital Contents Society, Vol. 18, No. 6, pp.1135-1142, 2017.
  11. Seon-hyeok Lee, Jin-sul Kim, Jae-hyung Park, "An Efficient Protection Scheme against Distributed DoS Attacks in VANET using Bloom Filter", Journal of Digital Contents Society, Vol. 18, No. 6, pp.1157-1163, 2017.
  12. Heon-Sik Joo, Jong-Wan Kim, "An Efficient Management Model of Security Policy in the Unified Threat Management System", Journal of the Korea Society of Computer and Information, Vol. 15, No. 9, pp.99-107, 2010. https://doi.org/10.9708/jksci.2010.15.9.099
  13. Hong-Je Lee, Hyeong-Seog Kho, Eun-Hee Roh, "Kyeong-Seok Han, A Study on the Factors of Experience and Habit on Information Security Behavior of New Services", Journal of Digital Contents Society, Vol. 19,No. 1, pp.93-102, 2018. https://doi.org/10.9728/DCS.2018.19.1.93
  14. Seon-Hui Bak, Jong-Ho Kim, Hyun-Bea You, "Implementation of Public data contents using Big data Visualization technology" Journal of Digital Contents Society, Vol. 18, No. 7, pp.1427-1434, 2017. https://doi.org/10.9728/DCS.2017.18.7.1427
  15. Yongsoon Eun, Kyung-Joon Park, Myounggyu Won, Taejoon Park, Sang Hyuk Son,"Recent Trends in Cyber-Physical Systems Research", Communications of the Korean Institute of Information Scientists and Engineers, Vol. 31, No. 12, pp.8-15, 2013
  16. Duck-Yong Kim, "A Study on Voice Phishing Countermeasures of the Police", Journal of Digital Contents Society, Vol. 19, No. 1, pp.193-198, 2018. https://doi.org/10.9728/DCS.2018.19.1.193
  17. Kwon-Taeg Choi, "Neural networks optimization for multi-dimensional digital signal processing in IoT", Journal of Digital Contents Society, Vol. 18, No. 6, pp.1157-1163, 2017.
  18. Min-Suk Chang, Hyoung-Joong Kim, "A Customer Segmentation Scheme Base on Big Data in Bank", Journal of Digital Contents Society, Vol. 19, No. 1, pp.86-92, 2018.
  19. Kwang-Young Kim, Seok-Hyoung Lee, Hye-Jin Lee, Jung-Hoon Park, Jae-Wook Seol, Jin-Young Kim, Heung-Seon Oh, Jung-Sun Yoon, Seo-Young Jeong, " A Study on Knowledge Open Platform for Science and Technology Information Service:With a Focus on Data, Technology Software and Utilization-Case", Journal of Digital Contents Society, Vol. 18, No. 6, pp.1183-1192, 2017.
  20. Dae-Jin Kim, "Implementation of Parking Management System using Cloud based License Plate Recognition Service", Journal of Digital Contents Society, Vol. 19, No. 1, pp.173-180, 2018. https://doi.org/10.9728/DCS.2018.19.1.173