Browse > Article
http://dx.doi.org/10.7236/JIIBC.2017.17.4.43

Analysis of Security Technology for Internet of things  

Lee, Ho-Tae (Dept. of Applied IT and Engineering, Pusan National University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.17, no.4, 2017 , pp. 43-48 More about this Journal
Abstract
Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.
Keywords
Security Technology; Internet of things; Network/Server Security; Platform/App; Sensor/Device;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Nam-Hui Kang, "Standards and Technology Trends for the Internet of Things security", The Journal of The Korean Institute of Communication Sciences, Vol. 31, No.9, pp. 40-45, Aug 2014.
2 Yu-Jae Won, "IoT (Internet of Things) information security technology development direction", The Journal of The Korean Institute of Communication Sciences Vol.32, No.1, pp. 24-27, Jan 2015.
3 Dong-Hui Kim, Seok-Ung Yun, Yong-Pil Lee, "Security for IoT Services" The Journal of The Korean Institute of Communication Sciences, Vol. 30, No. 8, pp. 53-59, Jul 2013.
4 Seoung-Chan Chol, Min-Woo Ryu, Nam Jin, Jae-Ho Kim, "Internet of Things platform and service trends", The Journal of Communications and Networks, Vol. 31, No. 4, pp. 20-27, Mar 2014.
5 Ministry of Science, ICT and Future Planning, "Internet of Things Information Security Ro admap", http://www.msip.go.kr/web/msipContents/contentsView.do?cateId=mssw11211&artId=1287656, Oct 2014.
6 Korea Internet & Security Agency, "Internet of Things (IoT) password authentication technology used in the environmental handbook", http://seed.kisa.or.kr/iwt/ko/guide/EgovGuideDetail.do?bbsId=BBSMSTR_000000000011&nttId=89&pageIndex=1&searchCnd=&searchWrd= Apr 2016.
7 Dong-Hui Sin, Jae-Yeol Joung, Seong-Hyeon Kang, "Internet of Things and Future Trends", The Journal of Internet Computing and Service Vol. 14, No. 2, pp. 32-46, Jun 2013.
8 Cheol-Sik Pyo,, "Internet of Things Technology Trends", The Journal Of Korean Institute of Electromagnetic Engineering and Science, Vol. 25, No. 4, pp. 49-58, Jul 2014.
9 Se-Hyeong Kim, "Internet of Things(IoT : Internet of Things)Technology," The Magazine of the IEEE, Vol. 43, No. 3, pp. 64-71, Mar 2016.
10 Gartner Inc. http://www.gartner.com
11 Bong-Im Jang, Chang-Su Kim, "A study on the security Technology for the Internet of Things", Journal of Security Engineering Vol. 11, No. 5, pp. 429-438, Oct 2014.   DOI
12 Cisco Systems Inc. http://www.cisco.com/
13 Seong-Ryeol Kim, "Security threats and Countermeasure Technology of the Internet of Things", Journal of Industrial science researches, Vol. 34, No. 2, pp. 137-142, Feb 2017.
14 Dong-Hyeok Lee, Nam-Je Park, "Proposal of Technology and Policy Post-Security Management Framework for Secure IoT Environment", Journal of Korean Institute of Information Technology, Vol. 15, No. 4, pp. 127-138, Apr 2017. DOI: https://doi.org/10.14801/jkiit.2017.15.4.127   DOI
15 Wan-Jin Chang, Yong-Tae Shin, "A Study on the Network and Security for the Internet of Things", Proceedings of KIIT Summer Conference, pp.19-21, Jun 2015.
16 Hyung-Jin Mun, Gwang-Houn Choi, Yooncheol Hwang, "Countermeasure to Underlying Security Threats in IoT communication", Journal of Convergence for Information Technology, Vol. 6, No. 2, pp.37-44, Jun 2016. DOI: https://doi.org/10.22156/cs4smb.2016.6.2.037   DOI
17 Yong-Hyeog Kang, "A Study on Security Requirements and Security Protocols for Internet of Things", Proceedings of Symposium of the Korean Institute of communications and Information, Vol. 2017, No. 1, pp. 1141-1142 Jan 2017.
18 Sick-Yong Jung, Jea-Sang Cha, "IoT device security check standards", The Journal of The Korean Institute of Communication Sciences, Vol. 34, No. 2, pp. 27-33, Jan 2017.
19 Jung-Nyeo Kim, Seung-Heon Jin, "Internet(IoT) Security Technology for Security Threats in Second Connection Environment", The Journal of The Korean Institute of Communication Sciences, Vol. 34, No. 3, pp. 57-64, Feb 2017.
20 Dong-Hui Kim, Seok-Ung Yun, Yong-Pil Lee, "Security for IoT Services" The Journal of The Korean Institute of Communication Sciences, Vol. 30, No. 8, pp. 53-59, Jul 2013.
21 Myong-Yeal Lee, Jae-Pyo Park, "Analysis and Study on Invasion Threat and Security Measures for Smart Home Services in IoT Environment", The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 16, No. 5, pp. 27-32, Oct 2016. DOI: https://doi.org/10.7236/jiibc.2016.16.5.27   DOI
22 Se-Hwan Park, Jong-Kyu Park, "IoT Industry& Security Technology Trends", The International Journal of Advanced Smart Convergence(IJASC), Vol. 5, No. 3, pp. 27-31, Sep 2016. DOI: https://doi.org/10.7236/ijasc.2016.5.3.27   DOI
23 Mi-Young Kang and Ji-Seung Nam, "A Study on Smart Network Utilizing the Data Localization for the Internet of Things," Journal of the Korea Academia-Industrial cooperation Society(JKAIS), Vol. 18, No. 6, pp. 336-342, Jun, 2017. DOI: https://doi.org/10.5762/KAIS.2017.18.6.336   DOI
24 Sunhwa A. Nam, Hyokyung Bahn. "Real-time Task Scheduling Methods to Incorporate Low-power Techniques of Processors and Memory in IoT Environments." The Journal of the Institute of Internet, Broadcasting and Communication(JIIBC), Vol, 17, No. 2, pp. 1-6, Apr 2017. DOI: https://doi.org/10.7236/jiibc.2017.17.2.1   DOI