Browse > Article
http://dx.doi.org/10.9728/dcs.2016.17.6.499

A Study on Security Vulnerability Management in Electric Power Industry IoT  

Lee, Sang-Gi (Kyonggi University Computer Science)
Lee, Sei-Yoon (Korea University Law)
Kim, Jeong-Chul (Kookmin University Electrical Engineering & Computer Science)
Publication Information
Journal of Digital Contents Society / v.17, no.6, 2016 , pp. 499-507 More about this Journal
Abstract
The era of IoT, which figures exchanging data from the internet between things is coming. Recently, former electric power energy policy paradigm, namely Supply side paradigm, is changing, because electric power energy consumption is rapidly increasing. As new paradigm for this limit, convergence of existing electric power grid and ICT(Information and Communication Technology) will accelerate intellectualization of electric power device, its operation system. This change brought opened electric power grid. Consequently, attacks to the national electric power grid are increasing. On this paper, we will analyze security threats of existing IoT, discuss security weakness on electric power industry IoT and suggest needed security requirements, security technology.
Keywords
Electric Power Industry; Vulnerability; Security; Cyber Security; Threat;
Citations & Related Records
연도 인용수 순위
  • Reference
1 https://isms.islearning.kr/mik_lib/file_down.php?bf_idx=16
2 https://ics-cert.us-cert.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Sep2014-Feb2015.pdf
3 Jin-Young Kim and Sun-Myung Hwang, "Outlook and Challenges of Security System for the Activation of IoT", Korea Computer Congress, Korea Information Science Society, Jeju, 2015, pp. 1037-1039.
4 http://www.ahnlab.com/kr/site/securityinfo/secunews/secuNewsView.do?curPage=1&menu_dist=1&seq=21742
5 http://kashi.or.kr/board/index.html?action=view&board_id=pds2&seq=13032
6 http://datanet.co.kr/news/articleView.html?idxno=69944
7 http://www.washingtonpost.com/wp-dyn/content/article/2008/06/05/AR2008060501858.html
8 http://online.wsj.com/article/SB123914805204099085.html
9 J. Daemen, V. Rijmen, "AES proposal: Rijndael", NISTAES Proposal, 1998, pp. 1-45.
10 NIST, "FIPS PUB 46-3 Data Encryption Standard (DES)", Federal Information Processing Standards Publications, 1999, pp. 1-22.
11 NIST, "FIPS PUB 180-4 Secure Hash Standard", Federal Information Processing Standards Publications, 2012, pp. 1-39.
12 IETF, "RFC-1321 The MD5 Message-Digest Algorithm", Network Working Group, 1992, pp. 1-22.
13 G. Bertoni, J. Daemen, M. Peeters and G. Van Assche, "The Keccak reference", round 3 submission to NIST SHA-3, 2011, pp. 1-69.
14 R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, Vol.21, No. 2, 1978, pp. 120-126.   DOI
15 ITU-T, "Framework of Web of Things", Inernational Telecommunication Union, 2012, pp. 1-22.
16 J. Guo, T. Peyrin, and A. Poschmann, "The photon family of lightweight hash functions", in Crypto2011, Lncs, Vol. 6841, 2011, pp. 222-239.
17 A. Bogdanov, L. R. Knudsen, G. Le, C. Paar, A.Poschmann, M. J. B. Robshaw, Y. Seurin, and C.Vikkelsoe, "Present: An ultra-lightweight block cipher", In Proceedings of the International Conferenceon Cryptographic Hardware and Embedded Systems(CHES07), Vol. 4727, 2007, pp. 405-466.
18 C. Canniere, O. Dunkelman, M. Knezevic, Katan, and Ktantan, "A family of small and efficient hardware-oriented block ciphers", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 09), Vol. 5747, 2009, pp.272-288.
19 D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), Vol. 7055, 2011, pp. 19-31.
20 D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B.Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim,J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), Vol. 4269, 2006, pp. 46-59.
21 A. Bogdanov, M. Knezevic, G. Leander, D. Toz,K. Varici, I. Verbauwhede, and Spongent: "The design space of lightweight cryptographic hashing", http://sites.google.com/site/spongenthash, 2012.
22 Donghee Kim, Seokung Yoon, Yongpil Lee, "Security for the IoT Service", The Korean Institute of Communications and Information Sciences, Vol.30, No.8, 2013, pp.53-59.
23 http://www.zigbee.org
24 http://www.wi-fi.org