Browse > Article
http://dx.doi.org/10.15207/JKCS.2015.6.4.139

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment  

Na, Onechul (Department of Security Convergence, Graduate School, Chung-Ang University)
Lee, Hyojik (Department of Security Convergence, Graduate School, Chung-Ang University)
Sung, Soyoung (Department of Security Convergence, Graduate School, Chung-Ang University)
Chang, Hangbae (Department of Industrial Security, College of Business and Economics, Chung-Ang University)
Publication Information
Journal of the Korea Convergence Society / v.6, no.4, 2015 , pp. 139-146 More about this Journal
Abstract
WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.
Keywords
Convergence Environment; Wireless sensor networks environment; Sensor node deployment strategy; Security status diagnosis; Energy Organization; Business characteristics;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 A. D'osta and A. M. Sayeed. Collaborative signal processing for distributed classification in sensor networks. In Proc. IPSN, Palo Alto, CA, 2003.
2 Adam Silberstein, Rebecca Braynard, Carla Ellis, Kamesh Munagala, and Jun Yang, 2006, A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks, Data Engineering, 2006. ICDE '06. Proceedings of the 22nd International Conference on, pp. 68, 2006.
3 C. Moallemi and B. Van Roy, Distributed optimization in adaptive networks. In Proc. NIPS, Vancouver, BC, Canada, 2003.
4 Da Veiga A, Eloff JHP., An information security governance framework, Information Systems Management, Vol. 24, No. 4, pp. 361-372, 2007.   DOI
5 Jonggu Kang, Jaewhan Lim, Hongjoo Lee, Hangbae Chang, A Study on Classification of Information Asset Considering Business Process Characteristics for Small IT Service Organization, The Journal of Society for e-business Studies, vol. 16, No.4, pp. 97-108., 2011.
6 Ken H. Guo, Security-Related Behavior in Using Information Systems in the Workplace: A Review and Synthesis, Computer&Security, Vol. 32, pp. 242-251, 2013.
7 Martins A, Eloff JHP., Information security culture, IFIP/SEC2002. In: Security in the information society, Boston: Kluwer Academic, pp. 203-214, 2002.
8 Michael Rabbat and Robert Nowak, Distributed Optimization in Sensor Networks, IPSN '04 Proceedings of the 3rd international symposium on Information processing in sensor networks, pp. 20-27, 2004.
9 Mohamed Younis, Kemal Akkaya, Strategies and techniques for node placement in wireless sensor networks: A survey, Ad Hoc Networks, Vol. 6, Issue 4, pp. 621-655, 2008.   DOI
10 Niki Trigoni, Yong Yao, Alan Demers, Johannes Gehrke, Rajmohan Rajaraman, Multi-query Optimization for Sensor Networks, Vol. 3560, pp. 307-321, 2005.
11 Robbins S, Odendaal A, Roodt G., Organizational Behaviour - Global and Southern African perspectives, Cape Town: Pearson Education South Africa, 2003
12 Robert Nowak and Urbashi Mitra, Boundary Estimation in Sensor Networks: Theory and Methods, Lecture notes in computer science, Vol. 2634, pp. 80-95, 2003
13 Ruighaver AB, Maynard SB, Chang S. Organisational security, culture: extending the end-user perspective. Computers and Security, No. 26, pp. 56-62, 2007.
14 Kyoung-nam Kim, Lee, Jae Moon, Sunghyuck Hong, MyounJae Lee, Convergent Secure Wireless Sensor Network Routing Algorithm, Journal of the Korea Convergence Society, Vol. 6, No. 1, pp. 65-70, 2015.   DOI
15 Myung-Seong, Yim, Development of Measures of Information Security Policy Effectiveness To Maximize the Convergence Security, Journal of the Korea Convergence Society, Vol. 5, No. 4, pp. 27-32, 2014.   DOI