DOI QR코드

DOI QR Code

Analyses of Security Issues and Vulnerability for Smart Home Network based on Internet of Things

사물인터넷 기반의 스마트 홈 네트워크에서의 취약점 및 보안 이슈 분석

  • Jung Tae Kim (Dept. of Electrical and Electronic Engineering, Mokwon Univ)
  • 김정태 (목원대학교 전기전자공학과)
  • Received : 2023.03.30
  • Accepted : 2023.05.08
  • Published : 2023.05.31

Abstract

The Internet of Things, which is the key factor of the 4th industrial revolution, are apt to apply to many systems. The existing security mechanism cannot be realized with limited resources such as low capacity of devices and sensors. In order to apply IoT system, a new structure and ultra-lightweight encryption is required. In this paper, we analyzed security issues that can operate in Internet-based smart home networks, and to solve the critical issues against these attacks, technologies for device protection between heterogeneous devices. Security requirements are required to protect from attacks. Therefore, we analyzed the demands and requirements for its application by analyzing the security architecture and features in smart home network.

제4차산업혁명의 기반이 되는 사물 인터넷이 많은 시스템에 응용되고 있으나, 사물인터넷과 연결되는 다양한 종류의 센서, 에지 노드, 등과 같은 하드웨어 구조에 적합한 저사양의 메모리, CPU 연산능력 및 경박단소한 센서노드 등으로 구성된다. 따라서, 기존의 보안 알고리즘으로 저용량의 노드에 사용할 수 없어, 새로운 제한된 하드웨어 구조 및 초경량의 암호 알고리즘이 요구되고 있다. 본 논문에서는 사물인터넷(IoT)에 연결된 스마트 홈 네트워크에서 야기될 수 있는 취약점 및 보안 문제점을 분석하고, 외부의 공격에 대한 다양한 종류의 보안 이슈 문제를 해결하기 위한 방법, 다양한 종류의 디바이스 보호를 위한 정합기술, 안전한 보안을 위한 IoT(Internet of Things)에서의 요구사항 및 응용 방법에 대해서 분석하였다.

Keywords

References

  1. Tommaso Pecorella, Laura Pierucci and Francesca Nizzi, "Network Sentiment" Framework to Improve Security and Privacy for Smart Home", Future Internet, 2018, Vol 10, No. 125; https://doi.org/10.3390/fi10120125
  2. Jung-Oh Park, "A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service", Journal of Convergence for Information Technology, Vol. 11, No. 7, pp. 21-30, 2021. https://doi.org/10.22156/CS4SMB.2021.11.07.021
  3. Niharika Panda and M. Supriya, "Efficient Data Transmission Using Trusted Third Party in Smart Home Environments", EURASIP Journal on Wireless Communications and Networking, 2022, N.118, https://doi.org/10.1186/s13638-022-02200-9.
  4. Won Min Kang, Seo Yeon Moon and Jong Hyuk Park, "An Enhanced Security Framework for Home Appliances in Smart Home" Human-centric Computing and Information Sciences, 2017, Vol.7: No.6 ,https://doi.org/10.1186/s13673-017-0087-4
  5. Saeid Pira, "The Social Issues of Smart Home: A Review of Four European cities' Experiences", European Journal of Futures Research, (2021) 9:3, https://doi.org/10.1186/s40309-021-00173-4.
  6. Mamun Abu-Tair, Soufiene Djahel, Philip Perry, Bryan Scotney, Unsub Zia, Jorge Martinez Carracedo and Ali Sajjad, "Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study", Sensors 2020, 20, 6131; https://doi.org/10.3390/s20216131.
  7. Zaied Shouran, Ahmad Ashari and Tri Kuntoro Priyambodo, "Internet of Things(IoT) of Smart Home: Privacy and Security", International Journal of Computer Applications (0975 - 8887) Vol. 182, No. 39, February 2019, DOI: 10.5120/ijca2019918450.
  8. Talal A. Abdullah, Waleed Ali, Sharaf Malebary and Adel Ali Ahmod, "A Review of Cyber Security Challenges, Attacks and Solution for Internet of Things Based Smart Home", International Journal of Computer Science and Network Security, Vol. 19, N.9, Sep 2019, pp. 139-146. http://paper.ijcsns.org/07_book/201909/20190917.pdf
  9. Romano Fantacci, Tommaso Pecorella, Roberto Viti and Camillo Carlini, Short Paper: Overcoming IoT Fragmentation Through Standard Gateway Architecture, 2014 IEEE World Forum on Internet of Things (WF-IoT), 2014, pp.181-182.
  10. Soo-Mok Jung, "Reversible Data Hiding Technique using Encryption Technique and Spatial Encryption Technique", The Journal of the Convergence on Culture Technology, Vol. 7, No. 1, pp. 632-639, February 28, 2021. https://doi.org/10.17703/JCCT.2021.7.1.632
  11. Oh, SoYun and Han, KwangHee, "Effect of Education about Blockchain Technology on Trust, Security, and Technology Acceptance Model of Virtual Assets", The Journal of the Convergence on Culture Technology, Volume 8 Issue 6 pp. 675-683, 2022. https://doi.org/10.17703/JCCT.2022.8.6.675
  12. Sung Wook Lee, "Secured Authentication Scheme and Charging & Discharging System Operation for Electric Vehicles", The Journal of the Convergence on Culture Technology, Vol. 7, No. 1, pp. 551-557, February 28, 2021 .https://doi.org/10.17703/JCCT.2021.7.1.551
  13. Nikos Komnins, Eleni Philippou and Antreas Pitsillides, "Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures", IEEE Transaction Survey & Tutorials, 2014, Vol. 16, No. 4, pp. 1933-1954. DOI: 10.1109/COMST.2014.2320093
  14. Abdullahi Arabo, "Cyber Security Challenges within the Connected Home Ecosystem Futures", Procedia Computer Science, 2015, pp. 227-232. https://doi.org/10.1016/j.procs.2015.09.201
  15. Jung Tae Kim, "Analyses of Security Mechanism for Sensor Network based on Internet of Things", 2015 Summer Conference of the Convergent Research Society among Humanities, Society, Science and Technology, 2015, pp. 40-44.
  16. Chibiao Liu and Jinming Qiu, "Study on a Secure Wireless Data Communication in Internet of Things Applications". Internal Journal of Computer Sciences and Network Security, 2015, Vol. 15, No. 2, pp. 18-23. http://paper.ijcsns.org/07_book/201502/20150204.pdf
  17. D. Kozlov, J. Veijalainen, and Y. Ali, "Security and Privacy Threats in IoT Architectures", In Proceedings of the 7th International Conference on Body Area Networks, 2012, pp. 100-102.