DOI QR코드

DOI QR Code

DoS Attack Control Design of IoT System for 5G Era

  • Rim, Kwangcheol (Department of Mathematics, Chosun University) ;
  • Lim, Dongho (Department of Mathematics Education, Sehan University)
  • Received : 2018.04.02
  • Accepted : 2018.06.18
  • Published : 2018.06.30

Abstract

The Internet of Things (IoT) is a form of the emerging 4th industry in the 5G era. IoT is expected to develop naturally in our daily life in the 5G era in which high-speed communication will be completed. Along with the rise of IoT, concerns about security and malicious attacks are also increasing. This paper examines DoS attacks, which are one of the representative security threats of IoT and proposes a local detection and blocking system that are suitable for response to such attacks. First, systems of the LoRaWAN type, which are most actively researched in the IoT system field and DoS attacks that can occur in such systems were examined. Then, the inverse order tree algorithm using regional characteristics was designed as a cluster analysis form. Finally, a system capable of defending denial-of-service attacks in the 5G IoT system using local detection and blocking with the Euclidean distance was designed.

Keywords

References

  1. D. Y. Kim, J. S. Park, Y. H. Choi, and Y. C. Choi, "Device state and packet transmission control scheme of 5G networks for supporting uplink-oriented IoT services," in Proceedings of the 2016 Institute of Electronics and Information Engineers Fall Conference, Daegu, Korea, pp. 335-337, 2016.
  2. J. H. Lee, "A literature review on security for Internet of Things in Korea based on IoT S-P-N-D-Se ecosystem model," Journal of Security Engineering, vol. 12, no. 4, pp. 397-414, 2015. DOI: 10.14257/jse.2015.08.05.
  3. Y. A. Hur and K. H. Lee, "A study on countermeasures of convergence for big data and security threats to attack DRDoS in u-healthcare device," Journal of the Korea Convergence Society, vol. 6, no. 4, pp. 243-248, 2015. DOI: 10.15207/JKCS.6.4.243.
  4. S. H. Park and J. K. Park, "Security technology trend of IoTs," in Proceedings of the Korea Institute of Information & Telecommunication Facilities Engineering Summer Conference, pp. 169-171, 2016.
  5. H. S. Chang, H. J. Kim, and T. Shon, "Study of cyber security issues in industrial IoT," KIISE Review, vol. 25, no. 5, pp. 12-17, 2015.
  6. S. J. Na, J. W. Lee, and K. H. Kim, "A study of DoS attack scenario in LoRaWAN," in Proceedings of the Korea Institute of Information & Telecommunication Facilities Engineering Summer Conference, pp. 53-55, 2016.
  7. LoRa Alliance, "LoRaWAN Specification v1.0," 2015 [Internet], Available: https://lora-alliance.org/resource-hub/lorawantm-specificationv10.
  8. K. C. Rim and K. B. Lee, "An analysis of voter behavior in campaign scenes utilizing an inverse-order tree and a smartphone application," International Journal of Applied Engineering Research, vol. 11, no. 2, pp. 815-819, 2016.

Cited by

  1. Adaptable Online Game Server Design vol.18, pp.2, 2018, https://doi.org/10.6109/jicce.2020.18.2.82
  2. Hyperledger Blockchain Design for Sharing, Spreading, and Protecting National Cybersecurity Information vol.18, pp.2, 2018, https://doi.org/10.6109/jicce.2020.18.2.94