Browse > Article
http://dx.doi.org/10.15207/JKCS.2017.8.9.001

Analysis of the Vulnerability of the IoT by the Scenario  

Hong, Sunghyuck (Div. of Information Communication, Baekseok University)
Sin, Hyeon-Jun (Division of Convergence & Media, Mokwon University)
Publication Information
Journal of the Korea Convergence Society / v.8, no.9, 2017 , pp. 1-7 More about this Journal
Abstract
As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.
Keywords
Internet-of-Thing (IoT); IoT Vulnerability; IoT Security; Network Security; Security Analysis;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 K. B. Kim, H. J. Cho, "Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence", Journal of the Korea Convergence Society, Vol. 8, No. 5, pp. 29-35, May 2017.   DOI
2 B. C. Kim, "A Internet of Things(IoT) based exploration robot design for remote control and monitoring", Journal of digital Convergence, Vol. 13, No. 1, pp. 185-190, 2015.   DOI
3 J. Pacheco, S. Satam, S. Hariri, C. Grijalva and H. Berkenbrock, "IoT Security Development Framework for building trustworthy Smart car services," 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, pp. 237-242, 2016.
4 B. Javed, M. W. Iqbal and H. Abbas, "Internet of things (IoT) design considerations for developers and manufacturers," 2017 IEEE International Conference on Communications Workshops (ICC Workshops), Paris, France, pp. 834-839, 2017.
5 J. Rivera, "Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020" retried from http://www.gartner.com/newsroom/id/2636073, July, 2017.
6 C. J. Chae, H. J. Cho, "Smart Fusion Agriculture based on Internet of Thing", Journal of the Korea Convergence Society, Vol. 7. No. 6, pp. 49-54, 2016.   DOI
7 J. H. Kim, J. Y. Go, K. H. Lee, "A Scheme of Social Engineering Attacks and Countermeasures Using Big Data based Conversion Voice Phishing", Korea Convergence Society, Vol. 6, No. 1, pp. 85-92, 2015.
8 B. Lee, W. S. Han. S. J. Kim, "Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things," Dec 2016.
9 M. J. Lee, "A Game Design for IoT environment", Journal of the Korea Convergence Society, Vol. 6, No. 4, 133-138, August 2015   DOI
10 M. K. Sik, H. W. Park, "Global Trends discussion on privacy in the IoT environment, Institute for Information & communications Technology Promotion," pp. 12-23, June 2015.
11 Y. S. Jeong, K. H. Han, S. H. Lee, "Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment", The Journal of Digital Convergence, Vol. 12, No. 7, pp. 279-284, 2014.   DOI
12 W. S. Bae, "Mutual authentication and Formal Verification in M2M Environment", The Journal of Digital Convergence, Vol. 12, No. 09, pp. 219-224, 2014.
13 P. D. Drobintsev, V. P. Kotlyarov, I. G. Chernorutsky, L. P. Kotlyarova and O. V. Aleksandrova, "Approach to adaptive control of technological manufacturing processes of IoT metalworking workshop," 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM), Saint Petersburg, Russia, pp. 174-176, 2017.
14 Ciokorea, "Revenge.Theft.Peep...Smart Home Network is the New 'World of Hacking'," http://www.ciokorea.com/news/24723, 2015. 04.
15 J. Pacheco, S. Satam, S. Hariri, C. Grijalva and H. Berkenbrock, "IoT Security Development Framework for building trustworthy Smart car services," 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Tucson, AZ, pp. 237-242. 2016.
16 Ministry of Science, ICT and Future Planning, "Internet of Things-Information Protection Roadmap," 2014.