DOI QR코드

DOI QR Code

IoT Environment and Security Countermeasures in 4th Industrial Revolution

4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책

  • Hong, Sunghyuck (Baekseok University, Divison of ICT, Information Security Major)
  • 홍성혁 (백석대학교 ICT학부 정보보호전공)
  • Received : 2019.08.12
  • Accepted : 2019.11.20
  • Published : 2019.11.28

Abstract

The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

4차 산업혁명시대에 사물인터넷의 역할은 엔드단에서 데이터를 수집하여 빅데이터를 기술을 통하여 분석하여 미래나 행동을 분석하는 시대에 있다. 따라서 사물인터넷의 특성상 보안에 취약하여 경량화된 보안 프로토콜이 필요한 실정이다. 또한 사물인터넷의 보급은 우리 생활을 많이 변화시키고 있다. 전 세계 IT 기업들은 이미 사물인터넷 기반의 제품과 서비스에 주력하고 있으며 전자기기를 통한 통신 뿐 아니라 일반 사물과의 통신이 가능한 만물인터넷 시대로 가고 있다. 사람과 사람, 사람과 사물, 사물과 사물이 시간과 공간의 제약을 받지 않고 상호작용하면서 정보를 수집하고 분석해서 적용하고 있다. 생활은 점점 스마트해 지지만 이에 반해 개인정보 유출의 가능성은 더욱 커져서 이를 악용할 경우 사생활 침해를 넘어 생명을 위협하는 경우도 생길 것이다. 따라서 본 연구에서는 개인정보 보호를 위협하는 보안 위협과 이에 대응하는 방안을 제안하여 4차산업혁명시대에 걸맞는 안전한 사물인터넷 환경을 구축하는데 필요한 대응책을 제시하였다.

Keywords

References

  1. G. Kortuem & F. Kawsar. (2010). Market-based user innovation in the Internet of Things. 2010 Internet of Things (IOT). DOI:10.1109/iot.2010.5678434
  2. B. Haughian. (2018). IoT Industries. Design, Launch, and Scale IoT Services, 163-183. DOI:10.1007/978-1-4842-3712-0_8
  3. Y. S. Jeong. (2019). An Efficient Personal Information Collection Model Design Using In-Hospital IoT System. Journal of Convergence for Information Technology, 9(3), 140-145. https://doi.org/10.22156/CS4SMB.2019.9.3.140
  4. B. Haughian. (2018). The Current and Future Status of the IoT. Design, Launch, and Scale IoT Services, 193-202. DOI:10.1007/978-1-4842-3712-0_10
  5. Infinity Acute Care System Monitoring Solution. (2012). Biomedical Safety & Standards, 42(2), 9-10. DOI:10.1097/01.bmsas.0000411012.71323.29
  6. Y. S. Jeong. (2019). Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System. Journal of Convergence for Information Technology, 9(4), 1-7. https://doi.org/10.22156/CS4SMB.2019.9.4.001
  7. North American Economic Integration: Trial by Fire. (n.d.). North American Economic Integration. DOI:10.4337/9781840647693.00020
  8. M. Hirota, H. Mizuochi & S. Kakegawa. (2006). A Demonstrational Test of Pressurization Smoke Control System at A Large-scale Shopping Store. Fire Science and Technology, 25(3), 213-237. DOI:10.3210/fst.25.213
  9. Unintentional and Involuntary Personal Information Leakage on Facebook from User Interactions. (2016). KSII Transactions on Internet and Information Systems, 10(8). DOI:10.3837/tiis.2016.07.024
  10. Netherlands Antilles - Cybercrime, Data Protection, Information & Internet. (n.d.). Foreign Law Guide. DOI:10.1163/2213-2996_flg_com_141095
  11. H. M. Jung, K. M. Jeong & H. J. Cho. (2017). A Design for Security Functional Requirements of IoT Middleware System. Journal of the Korea Convergence Society, 8(11), 63-69. https://doi.org/10.15207/JKCS.2017.8.11.063
  12. J. S. Lee. (2018). A Study of protective measures of the source program for the development of the Internet of Things (IoT) : Protection of the program as well as plagiarism research. Journal of the Korea Convergence Society, 9(4), 31-45. https://doi.org/10.15207/JKCS.2018.9.4.031
  13. M. J. Lee. (2015). A Study on IoT Service for Game Development. Journal of Digital Convergence,13(2), 291-297. https://doi.org/10.14400/JDC.2015.13.2.291
  14. C. D. Lee. (2017). An Adaptive Traffic Interference Control System for Wireless Home IoT services. Journal of Digital Convergence, 15(4), 259-266 https://doi.org/10.14400/JDC.2017.15.4.259
  15. C. W. Park & J. W. Kim. (2016). An Empirical Research on Information Privacy Concern in the IoT Era. Journal of Digital Convergence, 14(2), 65-72. https://doi.org/10.14400/JDC.2016.14.2.65