Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2018.8.6.149

A Study on the Improvement of Security Threat Analysis and Response Technology by IoT Layer  

Won, Jong-Hyuk (Dept. of Smart Convergence Consulting, Hansung University)
Hong, Jung-Wan (Dept. of Industrial Management Engineering, Hansung University)
You, Yen-Yoo (Faculty of Smart Management, Hansung University)
Publication Information
Journal of Convergence for Information Technology / v.8, no.6, 2018 , pp. 149-157 More about this Journal
Abstract
In this paper, we propose an attack detection technology using SDN Controller to study security threats in IoT environment. The research methodology has been developed by applying IoT security threat management technology to the IoT layer and analyzing the research trend of applied security technology. The study results show that the effectiveness of the detection method using the sampling method is studied by adding OpenFlow based SDN Controller to the network switch equipment of the existing IoT network. This method can detect the monitoring and attack of the whole network by interworking with IDS and IPS without affecting the performance of existing IoT devices. By applying such improved security threat countermeasure technology, we expect to be able to relieve anxiety of IoT security threat and increase service reliability.
Keywords
IoT security; IoT framework; IoT security technology; OpenFlow; SDN Controller; IDS;
Citations & Related Records
Times Cited By KSCI : 6  (Citation Analysis)
연도 인용수 순위
1 S. H. Hong & H. J. Shin. (2017). Analysis of the Vulnerability of the IoT by the Scenario. Journal of the Korea Convergence Society, 8(9), 1-7.   DOI
2 J. O. Park. (2016). A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment. Journal of Digital Convergence, 14(10), 295-302.   DOI
3 Maciej Kranz. (2017). The Core Objects of the Fourth Industrial Revolution The Future of the Internet IoT Innovation : First Books Publishing. ISBN 979-11-7022-121-0 03320 / 2017.7.24.001
4 Things Internet World Forum Architecture Committee 2015. http://iotforum.kr
5 Gartner. Top 10 Internet of Things Technologies for 2017 and 2018. https://www.gartner.com
6 R. Di Pietro, S. Guarino, N. Verde & J. Domingo-Ferrer. (2014). Security in wireless ad-hoc networks-a survey. Comput. Commun. 51, 1-20.   DOI
7 H. Gaur. (2013). Internet of things: thinking services.
8 D. Miorandi, S. Sicari, F. De Pellegrini & I. Chlamtac. (2012). Internet of things: vision, applications and research challenges. Ad Hoc networks, 10(7), 1497-1516.   DOI
9 R. Roman & J. Zhou. (2013). On the features and challenges of security and privacy in distributed internet of things. Comput. Networks, 57(10), 2266-2279.   DOI
10 R. H. Weber. (2013). internet of things-govemance quo vadis. Comput. Law Security Rev, 29(4), 341-347.   DOI
11 J. H. Kim, H. M. Jung & H. J. Cho. (2017). Design Plan of Secure IoT System based Common Criteria. Journal of the Korea Convergence Society, 8(10), 61-66.   DOI
12 K. S. Jeon. (2016). IoT Security. https://kisa.or.kr
13 J. O. Park. (2015). Verifying a Safe P2P Security Protocol in M2M Communication Environment. Journal of Digital Convergence, 13(5), 213-218.   DOI
14 J. N. Kim & H. H. Jin. (2017). Internet(Iot) Security Technology for Security Threats in Second Connection Environment. The Journal of The Korean Institute of Communication Sciences, 34(3), 57-64.
15 S. Li & L. Xu. (2017). Securing the Internet of Things : Acorn Publishing. ISBN 979-11-6175-039-2 / 2017.8.30.001
16 B. Russell & D. V. Duren. (2017). Things Security Guide for the Internet Age : Acorn Publishing. ISBN 979-11-6175-041-5 / 2017.8.30.001
17 S. S. Jang (2016). General Information Protection : Saengneung Publishing. ISBN 978-89-7050-848-1 93000 / 2016.10.31.001
18 S. H. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26.   DOI
19 J. S. Lee. (2018). A Study of protective measures of the source program for the development of the Internet of Things (IoT). Journal of the Korea Convergence Society, 9(4), 31-45.   DOI
20 H. Im, J. W. Kim, J. Na, T. J. Ha & C. Jung. (2016. 7). Intrusion detection method in network. Seoul : Metrocomnet Co., Ltd. ICT Research Institute
21 M. H. Kang (2016). Completion of IDS and security control : Wowbooks Publishing. ISBN 978-89-94405-14-8 13560 / 2016.3.8.00