Browse > Article
http://dx.doi.org/10.6109/jkiice.2020.24.6.802

Cybersecurity of The Defense Information System network connected IoT Sensors  

Han, Hyun-Jin (Department of Convergence Engineering, Hoseo Graduate School of Venture)
Park, Dea-Woo (Department of Convergence Engineering, Hoseo Graduate School of Venture at Hoseo University)
Abstract
The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.
Keywords
IoT(Internet of things); Defense Information System Network; IoT Network; Cybersecurity; Smart-Wing;
Citations & Related Records
연도 인용수 순위
  • Reference
1 U. S. Choi, The rulers of future after 4th Industrial Revolution, Business Books Press, 2019.
2 J. S. Kim, How to connect all things of Hyper-connect society, Wikimedia Press, 2019.
3 J. J. Lee, Hacker penetrates internal network through Defense Data Center [Internet]. Available: https://www.yna.co.kr/view/AKR20161207026700014.
4 S. L. Yu, K. M. Lee, Y. S. Yun, and J. M. Hong, "An Autonomous IoT Programming Paradigm Supporting Neuromorphic Models and Machine Learning Models," Journal of the Korean Institute of Information Scientists and Engineers, vol. 47, no. 3, pp. 310-318, Mar. 2020.
5 S. H. Kim, Intelligence Smart Wing construction phase 2[Internet]. Available: http://m.cndnews.co.rk/226712.
6 D. H. Lee and N. J. Park, "Institutional improvements for security of IoT Devices," Korea Institute of Information Security And Cryptology, vol. 27, no. 3, pp. 607-615, Jun. 2017.
7 D. H. Lee and N. J. Park, "IoT Secure Identification and Security management," Korea Institute of Communication Sciences, vol. 33, no. 12, pp. 28-34, Nov. 2016.
8 H. J. Han and T. W. Kwan, "A Method to Improve Location Estimation of Sensor Node," Korea Institute of Communication Sciences, vol 34, no. 12, pp. 1491-1497, Dec. 2009.
9 D. H. Lee, S. W. Yun, and Y. P. Lee, "Security for IoT Service," Korea Institute of Communication Sciences, vol. 30, no. 8, pp. 53-59, Jul. 2013.
10 vpn-Mentor, Can I VPN Hacking [Internet]. Available: https://ko.vpnmentor.com/blog/vpn.
11 K. Sheridan, New IoT Botnet Discovered 120K IP Cameras At Risk of Attack [Internet]. Available: https://www.darkrading.com/attacks-breach es/new-iot-botnet-discovered-120k-ip-cameras-at-risk-of-attack/d/d-id/1328839.