Browse > Article
http://dx.doi.org/10.5392/JKCA.2018.18.04.164

Technologies Analysis based on IoT Security Requirements and Secure Operating System  

Ko, Jae-Yong (충남대학교 컴퓨터공학과)
Lee, Sang-Gil (충남대학교 컴퓨터공학과)
Kim, Jin-Woo (충남대학교 컴퓨터공학과)
Lee, Cheol-Hoon (충남대학교 컴퓨터공학과)
Publication Information
Abstract
As the market for IoT devices grows, it is expected that the scale of malware attack will be considerable. Accordingly, the improvement of related legislation has been actively promoted, the recently strengthened Information and Communication Network Act was enforced. Because IoT related accidents can lead to not only financial damages but also human accidents, IoT device Security has been attracted a great deal of attention. In this paper, IoT devices provide essential security functions through legal and technical perspectives, and analyze related technologies. This can be used to a reference for the Start-up developer and IoT device designer.
Keywords
IoT; Secure Os; System Security; Security Requirements;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 www.kisa.or.kr/uploadfile/201412/201412301124130506.pdf
2 손승우, 박장혁, 문수미, "사물인터넷 사업자를 위 한 정보보안 법률의 개선 방안 연구," LAW REVIEW, 제57권, 제1호, pp.181-215, 2016(2).
3 이동혁, 박남제, "IoT 기기의 보안성 확보를 위한 제도적 개선방안," 정보보호학회논문지, 제27권, 제3호, pp.607-615, 2017(1).   DOI
4 http://www.kisa.or.kr/public/laws/lawsTrend_ List.jsp
5 http://www.dooit.co.kr/survey/report/index/182097
6 문해은, 곽성현, 장격익, 곽기용, 2016년 국내외 사이버 위협정보 심층분석 연구, KISA 연구 보고서, 2016.
7 https://iot.ieee.org/images/files/pdf/iot- developer- survey-2016-report-final.pdf
8 http://www.gartner.com/document/2625419?ref =QuickSearch&sthkw=G00259115
9 Hyungon Moon, Hojoon Lee, Ingoo Heo, Kihwan Kim, Yunheung Paek, and Byunghoon Kang, "Detecting and preventing kernel rootkit attacks with bus snooping," IEEE Transactions on Dependable and Secure Computing, Vol.14, No.2, pp.145-157, 2017(4).   DOI
10 Eugene Rodionov, Alexander Matrosov, and David Harley, "Bootkits: Past, Present and Future," VB Conference, 2014.
11 공희경, 구혜경, 조현웅, 강지성, IoT 디바이스 보안 인증 기반 연구, KISA 연구보고서, 2015.
12 http://www.tta.or.kr/data/ttas_view.jsp?totalSu =758&by=desc&order=publish_date&rn=1&pk_n um=TTAK.KO-12.0298&nowSu=295
13 https://www.kisa.or.kr/public/laws/laws3_ View.jsp?cPage=1&mode=view&p_No=259&b_N o=259&d_No=80&ST=&SV=
14 https://www.trustedcomputinggroup.org/wp- content/uploads/TCG_PCClientImplementation_ 1-21_1_00.pdf
15 https://www.trustedcomputinggroup.org/wp- content/uploads/TPM-Rev-2.0-Part-1-Architec ture-01.38.pdf
16 https://trustedcomputinggroup.org/tcg-software -stack-tss-specification/
17 K. Dietrich and J. Winter, "Secure boot revisited," In Young Computer Scientists, ICYCS 2008, The 9th International Conference for IEEE., pp.2360-2365, 2008(11).
18 R. Sailer, X. Zhang, T. Jaeger, and L. Van Doorn, "Design and Implementation of a TCG- based Integrity Measurement Architecture," USENIX Security Symposium, pp.223-238, 2004(8).
19 S. Glass, "Verified Boot in Chrome OS and how to make it work for you," Embedded Linux Conference Europe., 2013(10).
20 L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat "Practical domain and type enforcement for UNIX," Security and Privacy, Proceedings 1995 IEEE Symposium on IEEE, pp.66-77, 1995.
21 D. E. Bell and J. L. Leonard, "Secure computer systems: Mathematical foundations," No.MTR- 2547-VOL-1, MITRE CORP BEDFORD MA, 1973.
22 변창우, 박석, "비밀성와 무결성을 보장하는 역할기반 접근제어모델," 정보호호학회논문지, 제15권, 제3호, pp.13-29, 2005(6).
23 F. Mayer, K. Macmillan, and D. Caplan, SELinux by Example, Prentice Hall, 2006.
24 https://www.openssl.org/
25 Henk C. A. van Tilborg and Sushil Jajodia, Encyclopedia of Cryptography and Security, Springer US, 2011.
26 https://www.ecryptfs.org/
27 http://seed.kisa.or.kr