Browse > Article
http://dx.doi.org/10.9717/kmms.2016.19.5.918

Threats Analysis and Mobile Key Recovery for Internet of Things  

Lee, Yunjung (Dept. of Computer Science and Statistics, Jeju National University)
Park, Yongjoon (Dept. of Computer Science and Statistics, Graduate School, Jeju National University)
Kim, Chul Soo (Dept. of Computer Science and Statistics, Jeju National University)
Lee, Bongkyu (Dept. of Computer Science and Statistics, Jeju National University)
Publication Information
Abstract
IoT should be considered security risk environments such as various platforms and services including smart devices that can be mounted on household electric appliances, healthcare, car, and heterogeneous networks that are connected to the Internet, cloud services and mobile Apps.. In this paper, we provide analysis of new security threats, caused by open-platform of IoT and sensors via the Internet. Also, we present the key recovery mechanism that is applied to IoT. It results to have compatibility with given research, reduces network overhead, and performs key recovery without depending on key escrow agencies or authorized party.
Keywords
IoT Security; Smart Devices; Sensor; Mobile Key Recovery;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020 (2012), http://www.gartner.com/newsroom/id/2636073. (accessed Mar., 2, 2016)
2 VPN Haus, The Internet of Vulnerable Things: Why Remote Access Security is Critical, 2014.
3 Y. Park and Y. Lee, "A Study on Countermeasure for Privacy in Mobile Office," Journal of Korea Multimedia Society, Vol. 18, No. 2, pp. 178-188, 2015.   DOI
4 Ministry of Sciencem, Information Security Load-Map for IoT, 2014.
5 Blackhat, https://www.blackhat.com/us-14/. (accessed Mar., 2, 2016)
6 Y. Park and Y. Lee, "A Study on Security Threats and Countermeasures for Internet of Things," Proceedings of the Summer KICS Conference, pp. 41-42, 2015.
7 6LoWPAN, http://www.ietf.org/wg/concluded/6lowpan.html/. (accessed Mar., 2, 2016)
8 K. Hartke, Observing Resources in CoAP, IETF Internet Draft, 2014.
9 Y. Lee and D. Kim, “Threats Analysis, Requirements and Considerations for Secure Internet of Things,” International Journal of Smart Home, Vol. 9, No. 12, pp. 191-198, 2015.   DOI
10 Y. Rhee, "Key Recovery for IETF Internet Protocol Based on TTP," The Journal of the Korea Contents Association, Vol. 6, No. 6, pp. 56-63, 2006.
11 Y. Rhee and T.Y. Kim, "Practical Solutions to Key Recovery Based on PKI in IP Security," Lecture Notes in Computer Science, Vol. 2434, pp. 44-52, 2002.
12 N. Moon, S. Yong, J. Oh, and T. Cho, “A Study on Privacy for the Services in Digital Convergence,” Journal of Korea Multimedia Society, Vol. 10, No. 4, pp. 24-32, 2006.
13 Y. Rhee, C.S. Kim, and B. Lee, “IPSec Key Recovery for IKEv2,” Journal of the Korea Academia-Industrial Cooperation Society, Vol. 11, No. 4, pp. 1260-1265, 2010.   DOI