Browse > Article
http://dx.doi.org/10.5370/KIEE.2017.66.12.1879

Technology and Policy Post-Security Management Framework for IoT Electrical Safety Management  

Lee, Donghyeok (Elementary Education Research Institute, Dept. of Computer Education, Jeju National University)
Park, Namje (Dept. of Computer Education, Teachers College, Jeju National University)
Publication Information
The Transactions of The Korean Institute of Electrical Engineers / v.66, no.12, 2017 , pp. 1879-1888 More about this Journal
Abstract
The Internet of Things (IoT) environment has been gradually approaching reality, and although it provides great convenience, security threats are increasing accordingly. For the IoT environment to settle safely, careful consideration of information security is necessary. Although many security measures in the design and development stages of IoT products have been studied thus far, apart from them, the establishment of systems and countermeasures for post management after the launch of IoT products is also very important. In the present paper, a technical and policy post-security management framework is proposed to provide secure IoT environments. The proposed framework defines the concrete response procedures of individual entities such as users, manufacturers, and competent authorities in the case of the occurrence of security flaws after launching IoT products, and performs appropriate measures such as software updates and recalls based on an assessment of the risk of security flaws.
Keywords
Security Management Framework; Electrical Safety Management; IoT; Internet of Things; Security Management;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Sungmin Rue, "Survey on the Platform of IoT and Big Data", Korea Institute of Information Technology Magazine, Vol. 13, No. 2, pp. 19-25, Dec. 2015.   DOI
2 Jun Jong Am, Kim Nae Soo, Park Jeong Kil, Park Tae Jun, and Kang Ho Yong, "IoT device products and technology trends", The Journal of The Korean Institute of Communication Sciences, Vol. 31, No. 4, pp. 44-52, Mar. 2014.
3 Hyun Jung La, Chun Woo Park, and Soo Dong Kim, "A Framework for Effectively Managing Dynamism of IoT Devices", Journal of KISS : Software and Applications Vol. 41, No. 8, pp. 545-556, Aug. 2014.
4 Kang Nam Hee, "Standard Technology Trends for Internet Security of Things", The Journal of The Korean Institute of Communication Sciences, Vol. 31, No. 9, pp. 40-45, Aug. 2014.
5 Babar, Sachin, et al., "Proposed security model and threat taxonomy for the Internet of Things (IoT)", In International Conference on Network Security and Applications, pp. 420-429, Jul. 2010.
6 Zhou, Liang and Han-Chieh Chao, "Multimedia traffic security architecture for the internet of things", IEEE Network 25.3, 2011.
7 Kang Nam Hee, "Things Internet Convergence Services Security Requirements", The Journal of The Korean Institute of Communication Sciences, Vol. 32, No. 12, pp. 45-50, Nov. 2015.
8 Kim Dong Hee, Yun Seok Woong, and Lee Yong Pil, "Security for IoT services", The Journal of The Korean Institute of Communication Sciences, Vol. 30, No. 8, pp. 53-59, Jul. 2013.
9 Park N and Kang N, "Mutual authentication scheme in secure internet of things technology for comfortable lifestyle", Sensors, Vol. 16, No. 1, pp. 1-16, 2016.   DOI
10 Kim Seon-Tae, Lim Chae-Deok, Jung Hee-Bum, and Han Dong-Won, "Trend on Lightweight IoT Device Platforms", Korea Institute of Information Technology Magazine, Vol. 13, No. 2, pp. 1-8, Dec. 2015.
11 Nam-Uk Lee, Seung-Su Yang, Jae-Sung Shim, and Seok-Cheon Park, "Comparative Analysis of Low Power and Lightweight Encryption Algorithm for IoT Security", Proceedings of Korean Society For Internet Information Conference, Vol. 17, No. 2, pp. 249-250, Nov. 2016.
12 Donghyeok Lee, and Namje Park, "Geocasting- based synchronization of Almanac on the maritime cloud for distributed smart surveillance." The Journal of Supercomputing, Vol. 73, No. 3, Feb. 2016.
13 Donghyeok Lee, and Namje Park, "A Study on Metering Data De-identification Method for Smart Grid Privacy Protection", Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 6, Dec. 2016.
14 Park N and Bang H-C, "Mobile middleware platform for secure vessel traffic system in IoT service environment", Security Communication Network, Vol. 9, No. 6, pp. 500-512, 2016.   DOI
15 Lee D, Park N, "Electronic identity information hiding methods using a secret sharing scheme in multimediacentric internet of things environment", Personal and Ubiquitous Computing. DOI 101007/s00779-017-1017-1, 2017.
16 Park N, Hu H, Jin Q, et al., "Security and privacy mechanisms for sensor middleware and application in internet of things (IoT)", Int J Distrib Sens Netw, Article 2965438, 2016.