DOI QR코드

DOI QR Code

사물인터넷 환경하에서 보안 이슈 및 요구사항 분석

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things

  • 김정태 (목원대학교 전기전자공학과)
  • Jung Tae Kim (Dept. of Electrical and Electronic Engineering)
  • 투고 : 2023.06.25
  • 심사 : 2023.07.10
  • 발행 : 2023.07.31

초록

인터넷 기술이 발전함에 따라, 기존의 유선과 무선망의 결합은, 이기종 시스템의 융복합 기술을 가져왔다. 기존의 산업 기술은 주로 산업, 제조업, 자동화 등의 굴뚝산업 분야에서 컴퓨터 기술을 기반으로 한 정보기술로 집중되고 있다. 신기술이 기존의 기술과 융합되는 기술로 개발되고, 향상됨에 따라 많은 다양한 응용 시스템이 등장하게 되었다. 기존의 기술과 융합된 대표적인 응용분야는 사물인터넷 서비스 분야이다. 사물인터넷은 각각 기존에 존재하는 기술을 기반으로 초연결성의 네트워크을 연결하는 제4차 산업혁명의 기반 기술이 되고 있다. 그러나, 저용량의 메모리, 저전력 및 낮은 컴퓨팅과 같은 IoT의 제한된 자원으로 인해, IoT 장치는 보안에 취약하고, 다양한 종류의 보안 문제로 노출된다. 따라서, 본 논문에서는 IoT 서비스 환경하에서 요구되는 보안 문제점 및 해결 방법에 대해서 리뷰 및 분석하였다.

A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

키워드

참고문헌

  1. Hussain Shaikh, Jong-Ho Kim, "Factor Analysis of IoT Relative Advantages with TAM Model", Journal of Next-generation Convergence Technology Association, Vol. 6, No. 2, pp. 193-201, 2022. https://doi.org/10.33097/JNCTA.2022.06.02.193
  2. Ji-Yeon Lee, "A Study on Cloud Service Certification Approach from SaaS Security Perspective", Journal of Next-generation Convergence Technology Association, Vol. 6, No .10, pp. 1820-1830, 2022. https://doi.org/10.33097/JNCTA.2022.06.10.1820
  3. Fatma Alshohoumi, Mohammed Sarrab, Abdulla AlHamadani, and Dawood Al-Abri. "Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns", International Journal of Advanced Computer Science and Applications, Vol. 10, No. 7, pp. 232-251, 2019. DOI: 10.14569/IJACSA.2019.0100733.
  4. Young-Sae Kim and JeongNyeo Kim. "A Performance Analysis of Lightweight Cryptography in IoT Devices", The 28th Joint Conference on Communications and Information, pp. 327-328, 2018
  5. Caiming Liu, Yan Zhang and Huaqiang Zhang. "A Novel Approach to IoT Security Based on Immunology", Ninth International Conference on Computational Intelligence and Security, pp. 771-775, 2013.
  6. Kai Zhao and Lina Ge. "A Survey on the Internet of Things Security, Ninth International Conference on Computational Intelligence and Security", pp. 663-667, 2013.
  7. Hye-minNam and Chang-seop Park. "Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment", Journal of The Korea Institute of Information Security & Cryptology, Vol. 30, No., pp. 859-870, 2020. https://doi.org/10.13089/JKIISC.2020.30.5.859.
  8. Dong-hee Kang and Jae-DeokLim. "Network Security Protocol Performance Analysis in IoT Environment", Journal of The Korea Institute of Information Security & Cryptology, Vol. 32, No. 5, pp. 955-963, 2022. https://doi.org/10.13089/JKIISC.2022.32.5.955.
  9. Xiong Li, Zhou Xuan and Liu Wen. (2011) Research on the Architecture of Trusted Security System Based on the Internet of Things", 2011 Fourth Internal Conference on Intelligent Computation Technology ad Automation, 1172-1175.
  10. Mamun Abu-Tair, Soufiene Djahel, Philip Perry, Bryan Scotney, Unsub Zia, Jorge Martinez Carracedo and Ali Sajjad. "Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study", Sensors. Vol. 20, No. 21., pp. 6131, 2020. doi:10.3390/s20216131.
  11. A. Juels. P. Syverson. and D. Bailey, "High Power Proxies for Enhancing RFID Privacy and Utility, Center for High Assurance Computer Systems", CHACS, LNCS Vol. 3856, pp. 210-226, 2015. DOI:10.1007/11767831_14
  12. M. Rieback. B. Crispo. and A. Tanenbaum. RFID Guardian, "A Battery Powered Mobile Device for RFID Privacy Management", Australasian Conference on informaiton Security and Privacy (ACISP) LNCS 3574, 184-194, 2015.
  13. Moon-si Hoon, Min-woo Kim and Tae-kyung Kwon, "Technology Trend of Ultra-weight En cryption for IoT Communication Surroundings", Korean Institute of Communications and Infor mation Sciences. Information and Communications Magazine. Vol. 33, No. 3, pp. 80-86, 2016.
  14. Dongkoo Kim and Hyeal Lee. "Implementation of Hardware and Trend of Ultra Encryption Algorithm", IDEC WEBZIN,http://www.idec.or.kr/webzine/?news_id=20191102.2019.
  15. Seon-Keun Lee. "A Study on Lightweight Block Cryptographic Algorithm Applicable to IoT Environment", Journal of the Korea Academia-Industrial cooperation Society, Vol. 19, No. 3, pp. 1-7. 2018. https://doi.org/10.5762/KAIS.2018.19.3.1.
  16. Mohammad Abdur Razzaque, Marija Milojevic-Jevric, Andrei Palade and Siobhan Clarke. "Middleware for Internet of Things: A Survey:, IEEE Internet of Things Journal. Vol. 3, No. 1, pp. 70-95, 2016. DOI: 10.1109/JIOT.2015.2498900
  17. Antonio F. Skarmeta, Jose L. Hernandez Ramos and M. Victoria Moreno. "A Decentralized Approach for Security and Privacy Challenges in the Internet of Things", IEEE World Forum on Internet of Things, pp. 67-72, 2014.
  18. Seminar Materials, "IoT Security Authentication Criteria Test, Case Study Top7", KISA, 2020.9.18.
  19. Mouza Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly, "A New Lightweight Hybrid Cryptographic Algorithm for The Internet of Things", The 7th International Conference for Internet Technology and Secured Transaction, 87-92, 2012.