Browse > Article

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration  

Noh, SiChoon (남서울대학교 컴퓨터학과)
Kim, Jeom goo (남서울대학교 컴퓨터학과)
Publication Information
Abstract
Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.
Keywords
Phase Sensing Device; IoT Network Security; Technology Framework; Configuration;
Citations & Related Records
연도 인용수 순위
  • Reference
1 KT M2M 사업추진 방향 http://plum.hufs.ac.kr/hsn2010/pdf/Session6-3.pdf
2 SKT 사물통신 서비스 소개 http://blog.daum.net/nia-m2m/74
3 M2M Activities in ETSI http://docbox.etsi.org/M2M/Open/Information/M2M_presentation.ppt
4 Connected World Conference http://www.tiaonline.org/news_events/documents/CWPresentation_TR50_Chair_Numerex_CTO_Jeff_Smith.pdf
5 Update of M2M Standard Work http://ftp.tiaonline.org/TR-50/TR-50_MAIN/Public/20100310_Denver_CO/TR50-20100310-005_Update%20of%20M2M%20Standard%20work%20v3%28Mitch%20Tseng%29.pdf
6 Overview of M2M http://sites.google.com/site/hridayankit/M2M_overview_paper.pdf
7 이경화, 이주현, 박민수, 김재호, 신용태, An Enhanced Trust Center Based Authentication in Zigbee Networks, ISA, 2009.6
8 손영동, 김인정, 신용태, Information Security Policy to Cope with National, ISP-09, 2009.7
9 이경화, 이주현, 박민수, 김재호, 신용태, EECHE_An Energy-Efficient Cluster Head Election Algorithm in Sensor Networks, APNOMS, 2009.9
10 이협건, 이경화, 신용태, Implementation and Performance Analysis of AES-128 CBC algorithm in WSNs, ICACT, 2010.2