Browse > Article
http://dx.doi.org/10.14400/JDC.2019.17.11.195

IoT Environment and Security Countermeasures in 4th Industrial Revolution  

Hong, Sunghyuck (Baekseok University, Divison of ICT, Information Security Major)
Publication Information
Journal of Digital Convergence / v.17, no.11, 2019 , pp. 195-200 More about this Journal
Abstract
The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.
Keywords
IoT(Internet of Things); IoE(Internet of Everything); Big Data; Hacking; Personal information protect;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 G. Kortuem & F. Kawsar. (2010). Market-based user innovation in the Internet of Things. 2010 Internet of Things (IOT). DOI:10.1109/iot.2010.5678434
2 B. Haughian. (2018). IoT Industries. Design, Launch, and Scale IoT Services, 163-183. DOI:10.1007/978-1-4842-3712-0_8
3 Y. S. Jeong. (2019). An Efficient Personal Information Collection Model Design Using In-Hospital IoT System. Journal of Convergence for Information Technology, 9(3), 140-145.   DOI
4 B. Haughian. (2018). The Current and Future Status of the IoT. Design, Launch, and Scale IoT Services, 193-202. DOI:10.1007/978-1-4842-3712-0_10
5 Infinity Acute Care System Monitoring Solution. (2012). Biomedical Safety & Standards, 42(2), 9-10. DOI:10.1097/01.bmsas.0000411012.71323.29
6 Y. S. Jeong. (2019). Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System. Journal of Convergence for Information Technology, 9(4), 1-7.   DOI
7 North American Economic Integration: Trial by Fire. (n.d.). North American Economic Integration. DOI:10.4337/9781840647693.00020
8 M. Hirota, H. Mizuochi & S. Kakegawa. (2006). A Demonstrational Test of Pressurization Smoke Control System at A Large-scale Shopping Store. Fire Science and Technology, 25(3), 213-237. DOI:10.3210/fst.25.213   DOI
9 Unintentional and Involuntary Personal Information Leakage on Facebook from User Interactions. (2016). KSII Transactions on Internet and Information Systems, 10(8). DOI:10.3837/tiis.2016.07.024
10 Netherlands Antilles - Cybercrime, Data Protection, Information & Internet. (n.d.). Foreign Law Guide. DOI:10.1163/2213-2996_flg_com_141095
11 H. M. Jung, K. M. Jeong & H. J. Cho. (2017). A Design for Security Functional Requirements of IoT Middleware System. Journal of the Korea Convergence Society, 8(11), 63-69.   DOI
12 J. S. Lee. (2018). A Study of protective measures of the source program for the development of the Internet of Things (IoT) : Protection of the program as well as plagiarism research. Journal of the Korea Convergence Society, 9(4), 31-45.   DOI
13 M. J. Lee. (2015). A Study on IoT Service for Game Development. Journal of Digital Convergence,13(2), 291-297.   DOI
14 C. D. Lee. (2017). An Adaptive Traffic Interference Control System for Wireless Home IoT services. Journal of Digital Convergence, 15(4), 259-266   DOI
15 C. W. Park & J. W. Kim. (2016). An Empirical Research on Information Privacy Concern in the IoT Era. Journal of Digital Convergence, 14(2), 65-72.   DOI