Browse > Article
http://dx.doi.org/10.33778/kcsa.2021.21.1.009

A Study on IoT Devices Vulnerability and Security  

Yoo, Seung Jae (중부대학교 정보보호학과)
Publication Information
Abstract
Numerous IoT devices are connected to a wireless network environment to collect and transmit data without time and space limitations, but many security vulnerabilities are exposed in these process. But IoT security is not easy to create feasible security standards and device authentication due to differences in the approach or implementation of devices and networks. However, it is clear that the improvement and application of the standard framework for enhancing the security level of the device is the starting point to help the most successful security effect. In this study, we investigate the confidentiality, integrity, availability, and access control implementation plans for IoT devices (which are the basic goals of information security), and standardized security evaluation criteria for IoT devices, and study ways to improve them.
Keywords
IoT Security; IoT Certification; Security Evaluation Criteria;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Internet Security Threat Report, Vol.24, Feb.2019, Symantec
2 https://azure.microsoft.com/en-us/services/azure-defender-for-iot/
3 IoT Common Security Guide, IoT Security Alliance, KISA 2016
4 Han S-K, Kim M-J, A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation, Convergence Security Journal, Vol.18, No.1,pp.49~58, 2018.
5 https://aws.amazon.com/ko/iot-core/
6 http://www.ddaily.co.kr/m/m_article/?no=149257
7 https://www.ksecurity.or.kr/user/extra/kisis/356/iot/iotList/jsp/LayOutPage.do
8 https://www.norma.co.kr/iot
9 https://www.psacertified.org/certified-products/
10 Yu W-Y, 'An Analysis of Research Trends in IoT Security, Convergence Security Journal, Vol.18, No.1,pp.61~67, 2018.
11 https://www.cctvnews.co.kr/news/articleView.html?idxno=201439.
12 https://aws.amazon.com/ko/iot-device-management/
13 https://aws.amazon.com/ko/iot-device-defender/features/
14 https://www.cisco.com/c/ko_kr/solutions/internet-of-things/
15 Technical Report:IoT Security Certification Scheme Part-3, Evaluation Methodology v1.2, EURSMART
16 Internet of Things (IoT) security, Guide to testing and authentication standards, Dec. 2017, KISA
17 https://azure.microsoft.com/en-us/overview/iot/security/
18 https://www.pentasecurity.co.kr/download/#1590053129868-10d07cb4-1dc4
19 https://www.pentasecurity.co.kr/iot-security/
20 https://www.psacertified.org/blog/four-steps-to-device-security/
21 https://www.psacertified.org/getting-certified/device-manufacturer/