• Title/Summary/Keyword: 플랫폼 보안

Search Result 670, Processing Time 0.032 seconds

A Study on Secure Interworking in Internet of Things (사물인터넷 보안 인터워킹에 관한 연구)

  • Oh, Se-Ra;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1283-1286
    • /
    • 2017
  • 사물인터넷(Internet of Things; IoT)이 발달하면서 FIWARE, oneM2M, AllJoyn 등의 많은 IoT 플랫폼이 개발되고 관련 표준들도 제정되고 있다. 이런 환경에서는 각 IoT 플랫폼의 통신 프로토콜, 보안정책 등이 상이하기 때문에 데이터가 연동되기 어렵고, 보안 인터워킹을 수행하는 것은 더욱 어려운 문제다. oneM2M과 FIWARE의 경우, Fi-Proxy 인터워킹 어댑터를 이용하여 상호간 인터워킹이 시연된 사례가 있지만 그 과정에서 보안이 고려되지는 않았다. oneM2M은 아직 보안 컴포넌트가 별도로 존재하지 않기 때문에, 본 논문에서는 oneM2M-FIWARE 보안 인터워킹 시나리오에 적용할 수 있는 OAuth 2.0 기반 oneM2M 보안 컴포넌트를 구현하고, FIWARE 보안 아키텍처를 분석 및 구현하여 시사점을 도출한다. 또한 본 논문은 oneM2M과 FIWARE 간의 보안 인터워킹 아키텍처를 제안하고, 이를 기반으로 향후 여러 도메인에 활용될 수 있는 구조를 가진 LED 예제를 개발한다.

A Study on the Security Threat Response in Smart Integrated Platforms (스마트 통합플랫폼 보안위협과 대응방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.129-134
    • /
    • 2022
  • A smart platform is defined as an evolved platform that realizes physical and virtual space into a hyper-connected environment by combining the existing platform and advanced IT technology. The hyper-connection that is the connection between information and information, infrastructure and infrastructure, infrastructure and information, or space and service, enables the realization and provision of high-quality services that significantly change the quality of life and environment of users. In addition, it is providing everyone with the effect of significantly improving the social safety net and personal health management level by implementing smart government and smart healthcare. A lot of information produced and consumed in these processes can act as a factor threatening the basic rights of the public and individuals by the informations themselves or through big data analysis. In particular, as the smart platform as a core function that forms the ecosystem of a smart city is naturally and continuously expanded, it faces a huge security burden in data processing and network operation. In this paper, platform components as core functions of smart city and appropriate security threats and countermeasures are studied.

A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform (모바일 플랫폼에서 MTM을 이용한 보안영역 제공 및 인증에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.293-302
    • /
    • 2011
  • The various information services can be delivered by smartphone through advanced high-speed mobile communication. A smartphone is a mobile device that offers more powerful computing capacity than feature phone. Therefore this device can provide such as web surfing, editing documents, playing video, and playing games. A lot of personal information stored on smartphone. Because it has High usability. Personal information Leaks if the smart phone is lost or stolen may become a big problem. In this paper we have analyzed existing method for providing secure storage and user authentication on mobile platform and derived security requirement. Therefore we propose the following scheme that satisfy security requirement. Proposed scheme providing secure storage with preventing authentication bypass, and availability from damaged data to access secure area.

Implementation of system security platform based on Cortex-M3 (Cortex-M3기반 System 보안 플랫폼 구현에 대한 연구)

  • Park, Jung-kil;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.317-320
    • /
    • 2016
  • In embedded system, if firmware code is opened by other company, must devise hardware copy prevention. That guard valuable product. Not used security IC, Suggested platform is source code open method that prevent core code and hardware copy. And that open firmware code for other company programmer. Suggest system security platform based on Corex-M3. that consist of IAP(In-application programing) and APP(Applicataion). IAP contain core code and security confirm code. APP is implement by other company developer using core function prototype.

  • PDF

실증 기반 딥러닝 영상분석 기술 제공을 위한 클라우드 기반 지능형 영상보안 플랫폼

  • Lim, Kyung-Soo;Kim, Geon-Woo
    • Review of KIISC
    • /
    • v.29 no.3
    • /
    • pp.37-43
    • /
    • 2019
  • 딥러닝을 비롯한 인공기능과 영상처리 분야의 접목은 기존 물리보안의 기술적 한계를 뛰어넘어 새로운 기회의 장을 마련하고 있다. 하지만 딥러닝 기반 영상분석 기술도 지능형 영상감시가 필요한 실제 현장에서는 다양한 환경의 제약사항으로 인해 성능이 저하될 가능성이 높다. 본 논문에서는 실제 CCTV 환경의 영상 데이터를 확보하여 신경망을 이용한 지속적인 학습을 통해 영상분석의 성능을 개선하는 클라우드 기반 지능형 영상보안 플랫폼을 소개한다. 클라우드 기반 지능형 영상보안 플랫폼은 지자체 통합관제센터에서 수집한 CCTV 영상을 학습 데이터로 활용하여, 현장에서 신뢰받을 수 있는 사람 검출, 사람/차량 재식별, 열악 차량번호판 탐지 등의 지능형 영상분석 서비스를 제공할 수 있다.

Analysis of Security Vulnerabilities with Application Permissions in Android Platform (안드로이드 플랫폼의 권한 관련 보안 취약성 분석)

  • Kim, Ikhwan;Kim, Taehyoun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1108-1111
    • /
    • 2010
  • 구글 안드로이드 플랫폼은 오픈소스 형태로 응용프로그램을 손쉽게 개발할 수 있는 환경을 제공하며 이러한 특징으로 인해 빠른 속도로 시장 점유율을 높이고 있다. 하지만 오픈 소스의 특징으로 인해 보안 취약점에 대한 우려가 증가하고 있다. 안드로이드 고유의 보안모델은 응용프로그램의 시스템자원에 대한 부적절한 접근을 제어하기 위한 권한을 중심으로 이루어진다. 본 연구에서는 안드로이드의 권한 기반 보안모델에 대한 취약성을 테스트 코드수행과 플랫폼 소스분석을 통해 알아보고 이에 대해 간단한 해결방안을 제시한다.

Analysis on Development Methodology of Modern Secure boot: Focusing on Platform Environment (현대의 보안부팅 개발 방식 분석: 플랫폼 환경을 중심으로)

  • Kim, Jin-Woo;Lee, Sang-Gil;Lee, Jeong-Guk;Lee, Sang-Han;Shin, Dong-Woo;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.15-26
    • /
    • 2020
  • Secure boot is security technology that verifies the integrity of the computer system in boot stage and controls the boot process accordingly. The computer system can establish a secure execution environment from the threat of various malwares by security boot and also supports the recovery when system in emergency case. Recently, Secure boot has been adopted by various modern computer manufacturers to protect users' information from hacker attacks and to prevent abuse of their products by malicious users. In this paper, we classify security boot developed by various companies and organizations by platform, and analyze the design and development purpose of each security boot and investigate the limitation of design. It can be used as a reference for system security designers in various information of security boot development method and security design of system.

A study on IoT platform for private electrical facilities management (수용가 전력설비 관리를 위한 사물인터넷 플랫폼 연구)

  • Jang, Kyung-Bae
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.2
    • /
    • pp.103-110
    • /
    • 2019
  • In this paper, we suggested how the Internet of Things (IoT) technology could be applied to an internet platform that is used for managing the customer's power grid efficiently. For an internet platform with efficient management, analysis is done by several sections; communication method, and its protocol, and also security element. From this analysis, with currently used sensors, we have presented a development method for the sensor to server data reliable communication solution and data management server with a security solution. Moreover, this paper suggests a communication module that could be used for a power grid management platform, protocol and security algorithm and also a way to build a server for managing those systems and modules.

A Study on the Optimized Balance Module of Security Policy to Enhance Stability in the Service-Based Information System (서비스 기반 정보시스템의 안정성 증대를 위한 보안정책 최적화 균형모듈에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1155-1160
    • /
    • 2018
  • Presently in 2018, the security market is requiring progressive development and innovation in the area of security on account of new changes and technologies. This means the rapid and prompt development of the service platforms and service-based information systems. Here, this study is going to examine the process of operating a number of services and obtaining security, not the criteria for selecting particular service in online environment where the various services exist. Within a series of flows to protect the manager's authority about the platforms operated by information systems, and to provide and destroy services, this author limits the entire service platforms of the optimized balance module into four categories maximum for the security of the area apt for illegal invasion and access, and the proper area. Also, about the area with limited security, this researcher again applies subordinate security policy and technology respectively. This author here will suggest a method to provide and to extend safety and security for the information system and also propose the process of applying it as well.

Implementation of Virtualization-based Domain Separation Security Platform for Smart Devices (안전한 스마트 단말을 위한 가상화 기반 도메인 분리 보안 플랫폼 구현)

  • Kim, Jeong Nyeo
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.116-123
    • /
    • 2016
  • Recently, important information related with smart work such as office and video conference are handled in smart device quite a lot compare with before. Also, execution environment of smart devices is getting developed as open software environment. It brought convenience to download and use any kind of application software. By that, security side of smart devices became vulnerable. This paper will discuss characteristics of smart device security technology based on virtualization that is a mobile device platform with isolated secure execution area based on TEE (Trusted Execution Environment). Also, this paper will suggest an implementation method about safe smart device security platform based on domain separation for application software which can be executed in smart devices.