Browse > Article
http://dx.doi.org/10.11627/jkise.2017.40.3.116

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment  

Jeong, Kwang Seob (Korea Trade Network (KTNET))
Bae, Sukjoo (Hanyang University Dept. of Industrial Engineering)
Kim, Hyoungtae (Woosong University Dept. of Business Management)
Publication Information
Journal of Korean Society of Industrial and Systems Engineering / v.40, no.3, 2017 , pp. 116-122 More about this Journal
Abstract
Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.
Keywords
Industry 4.0; Internet of things; Authentication; Evaluation criteria;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Calisle Adams, Steve Lloyd, Understanding PKI : Concepts, standards and deployment considerations, Infobook, 2003, p. 70.
2 Cho, N.H., Woo, T.H., and Han, W.C., A Persent Views and Improvement policy of the Certification System in Korea, Journal of Society of Korea Industrial & Systems Engineering, 1999, Vol. 22, No. 51, pp. 211-220.
3 Choi, K.J., A Study of Certification System for Ubiquitous Environment, Investigation Report to KISA, KISA-WP-2008-0022.
4 Ko, H.W., A Study on State and Operation of Non-government Certification in Korea, Journal of Society of Korea Industrial & Systems Engineering, Conference Preceeding, May 2007.
5 New zealand Government, e-Government Guideline, chapter 3, 2005.
6 Yoon, M.-S., A Three-round Delphi Study on the Roles and Competency Modeling of Secretaries, [Master's thesis], Ewha Womans University, 2000.