Browse > Article
http://dx.doi.org/10.15207/JKCS.2017.8.11.063

A Design for Security Functional Requirements of IoT Middleware System  

Jung, Hyun Mi (Dept. of Supercomputer System Development, KISTI)
Jeong, Kimoon (Dept. of Supercomputer System Development, KISTI)
Cho, Han Jin (Dept. of Energy IT Engineering, Far East University)
Publication Information
Journal of the Korea Convergence Society / v.8, no.11, 2017 , pp. 63-69 More about this Journal
Abstract
The middleware in the IoT system is software that acts as a messenger to connect and exchange data between humans and objects, objects and objects. IoT middleware exists in various forms in all areas, including hardware, protocol, and communication of different kinds, which are different in form and purpose. However, IoT middleware exists in various forms across different areas, including hardware, protocol, and communication of different types and purposes. Therefore, even if the system is designed differently for each role, it is necessary to strengthen the security in common. In this paper, we analyze the structure of IoT middleware using Service Oriented Architecture(SOA) approach and design system security requirements based on it. It was defined: Target Of Evaluation(TOE) existing system development method and the object is evaluated by Common Criteria(CC) for verification based otherwise. The proposed middleware system will be correlated with the security problem definition and the security purpose, which will be the basis for implementing the security enhanced IoT system.
Keywords
IoT; Middleware; Security; IoT Middleware Vulnerability; IoT Middleware security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Architecture of IoT, http://www.lgcns.com/LGCNS.GHP.Main/Solution/IoTPlatform_En.
2 J. H. Kim, A Middleware Development Method for Internet of Things(IoT) Security, Master thesis of Far East University, 2017.
3 K.B. Kim and H.J. Cho,."A Study on the Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence,"Journal of the Korea Convergence Society, Vol. 8, No. 5, pp.29-3, 2017.   DOI
4 J. H. Kim, J. Y. Go, K. H. Lee, "A Scheme of Social Engineering Attacks and Counter measures Using Big Data based Conversion Voice Phishing", Journal of the Korea Convergence Society, Vol. 6, No. 1, pp.85-91, 2015.   DOI
5 S. K. Park, "Proposal of a mobility management scheme for sensor nodes in IoT(Internet of Things)", Journal of Convergence Society for SMB, Vol. 6, No. 4, pp. 59-64, Dec. 2017
6 Middleware, https://ko.wikipedia.org/wiki/middleware
7 Steven Cherry with Ralph Langner, "How Stuxnet is Rewriting the Cyberterrorism Playbook",IEEE Spectrum, October 2010, .
8 L. Atzori, A. lera, G. Moraito, "The Internet of Things: A survey", Computer Networks, vol 54, no. 15, pp. 2787-2805, Oct. 2010.   DOI
9 J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions", Future Generation Computer Systems, vol. 29, no. 7, pp. 1645-1660, Sept. 2013.   DOI
10 A. Whitmore, A. Agarwal, "The Internet of Things -A survey of topics and trends", Information Systems Frontiers, vol. 17, no. 2, pp. 261-274, Apr. 2015.   DOI
11 Mario Weber and Marija Boban,"Security Challenges within IoT Systems,"Information and Communication Technology, Electronics and Microelectronics (MIPRO) 2016, pp. 638-643, 2016
12 Edge_device, https://en.wikipedia.org/wiki/Edge_device
13 Common Criteria for Information Technology Security Evaluation, Part 3: Security Assurance Components; Version 3.1, Revision 2, CCMB-2007-09-003.
14 Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model; Version 3.1, Revision 1, CCMB-2006-09-001.
15 Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Components; Version 3.1, Revision 2, CCMB-2007-09-002.