• Title/Summary/Keyword: Internet of things Security

Search Result 665, Processing Time 0.031 seconds

An Implement TLS VPN for Internet of Things (IoT기기를 위한 TLS VPN 구현)

  • Park, J.P
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.191-192
    • /
    • 2015
  • 본 논문에서는 최근 급성장하는 사물인터넷(Internet of Things, IoT) 시장의 안전한 원격 네트워크 통신을 위한 가상사설망(Virtual Private Network, VPN) 구축을 TLS(Transport Layer Security, TLS 1.0 또는 SSL 3.0) 프로토콜을 사용하여 암호화 기술, 터널링 기술을 적용한 인증 기반의 안전한 통신망을 제공하는 목적에서 기술개발의 고도화를 추구한다.

  • PDF

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

The research on Diffie-Hellman-based IoT Sensor Node key management (Diffie-Hellman 기반 사물인터넷 센서노드 키 관리 연구)

  • Hong, Sunghyuck;Yu, Jina
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.9-14
    • /
    • 2017
  • Recently, the Internet of Things are developing in accordance with the technology of implementation in low-cost, small-size, low power consumption and smart sensor that can communicate using the internet. Especially, key management researches for secure information transmission based on the Internet of Things (IoT) are actively performing. But, Internet of Things(IoT) are uses sensor. Therefore low-power consumption and small-memory are restrictive condition. As a result, managing the key is difficult as a general security measure. However, The problem of secure key management is an essential challenge For the continuous development of the Internet of things. In this paper, we propose a key distribution and management technique in secure Internet of things. In the key generation and management stage, it satisfies the conditions and without physically constrained for IoT based communication.

Risk of Attack through an Open Wireless Network of IoT Devices (IoT 장치의 개방형 무선 네트워크를 통한 공격 위험)

  • Lee, Geonwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.10-14
    • /
    • 2019
  • The number of security incidents is increasing as the Internet of Things(IoT) is distributed widely. The security incidents of IoT can cause financial damages. Moreover, It can become direct threats to humans. In order to prevent these problems, the security installation for IoT devices is important. This paper describes the definition of IoT devices, security incident case, architecture, and the security threats that can occur when a device is connected to network without security installation.

  • PDF

Cybersecurity Framework for IIoT-Based Power System Connected to Microgrid

  • Jang, Ji Woong;Kwon, Sungmoon;Kim, SungJin;Seo, Jungtaek;Oh, Junhyoung;Lee, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2221-2235
    • /
    • 2020
  • Compared to the past infrastructure networks, the current smart grid network can improve productivity and management efficiency. However, as the Industrial Internet of Things (IIoT) and Internet-based standard communication protocol is used, external network contacts are created, which is accompanied by security vulnerabilities from various perspectives. Accordingly, it is necessary to develop an appropriate cybersecurity guideline that enables effective reactions to cybersecurity threats caused by the abuse of such defects. Unfortunately, it is not easy for each organization to develop an adequate cybersecurity guideline. Thus, the cybersecurity checklist proposed by a government organization is used. The checklist does not fully reflect the characteristics of each infrastructure network. In this study, we proposed a cybersecurity framework that reflects the characteristics of a microgrid network in the IIoT environment, and performed an analysis to validate the proposed framework.

Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment (자원제약적 임베디드 환경에서 종단간 보안을 지원하는 수정된 MQTT-SN)

  • Nam, Hye-min;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.859-870
    • /
    • 2020
  • The MQTT-SN (Message Queuing Telemetry Transport-Sensor Network) protocol is a message transmission protocol used in a sensor-based Internet of Things (IoT) environment. This MQTT-SN protocol is a publish-subscribe model with a broker in the middle of message transmission, and each IoT device sends and receives messages through an intermediary when delivering messages. However, the MQTT-SN protocol does not provide security-related functions such as message security, mutual authentication, access control, and broker security. Accordingly, various security problems have recently occurred, and a situation in which security is required has emerged. In this paper, we review the security requirements of MQTT-SN once again, and propose a modified protocol that improves security while satisfying the constraints in the environment where the resource of IoT to which this protocol is applied is limited. Unlike the existing protocol, the security field and authentication server have been added to satisfy the security requirements. In addition, the proposed protocol is actually implemented and tested, and the proposed protocol is evaluated for practical use in terms of energy consumption.

Automotive ECU Biometric Authentication Using Blockchain (블록체인을 이용한 자동차 ECU 생체인증 기법)

  • Hong, Ji-Hoon;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.1
    • /
    • pp.39-43
    • /
    • 2020
  • The Internet of Things plays a role as an important element technology of the 4th Industrial Revolution. This study is currently developing intelligent cars with IT technology, and is at a time when the development of intelligent cars is active and network data communication is possible. However, security solutions are needed as security is still at a weak stage, which can be threatened by intrusions into the network from outside. In this paper, in order to improve security of intelligent cars without causing security problems, we will apply blockchain technology, propose biometric authentication techniques using users' biometric information, and continue to study them in the future.

Defining the Scope of the Internet of Things with a Particular Focus on Its Role in Healthcare: A Review Paper

  • Abdulaziz Alomari;Ben Soh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.187-197
    • /
    • 2023
  • Today's world is experiencing rapid technological advancement like never before. The ever-changing technology space has overwhelmed citizens with a substantial load of information, which has made it difficult for them to keep up with the technology awareness. This review paper is written to provide information about the Internet of Things in a way that technical along with nontechnical individuals can understand the definition, historical evolution, components, and scope of IoT technology. Relevant literature published between January 2009 and February 2023 was included in this paper. The applications of the Internet of Things in healthcare have been a special focus of this paper as IoT has massive potential in this field and healthcare professionals often face significant issues in keeping their technology knowledge up to date. Moreover, some of the most common issues associated with IoT introduction in healthcare are also discussed in the paper along with some suitable recommendations. Although, IoT can significantly transform our lives and can introduce convenience and efficiency, particularly in the healthcare sector. However, its adoption in healthcare is still a major task due to various challenges presented by the health workforce. Thus, in-depth empirical research is suggested to assist the IoT technology transition.

Performance Evaluation of Advanced Container Security Device(ACSD) system based on IoT(Internet of Things) (IoT 기반 컨테이너 보안 장치 및 시스템 성능 평가)

  • Moon, Young-Sik;Choi, Sung-Pill;Lee, Eun-Kyu;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2183-2190
    • /
    • 2013
  • Container Security Device (ConTracer) which is suggested in this study is to monitor temperature, humidity, and impact inside of the container while the container is transported. ConTracer could also give information to users when a door of the container is opened over 2 inch within 1 second. Additionally, GPS/GLONASS based global position and status information about container are transmitted to a remote server using IoT (Internet of Things) based communication. In this research, we are looking into the development trend of global container security devices; and applying ConTracer to real freight transport from domestic to overseas using Global Roaming Service which is offered for domestic Mobile Communication Companies as well. As a result, we estimate the performance of ConTracer and verify it.

Secure Multicast using Proxy Re-Encryption in an IoT Environment

  • Kim, SuHyun;Hwang, YongWoon;Seo, JungTaek
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.946-959
    • /
    • 2018
  • Recently interest in Internet of Things(IoT) has attracted significant attention at national level. IoT can create new services as a technology to exchange data through connections among a huge number of objects around the user. Data communication between objects provides not only information collected in the surrounding environment but also various personalized information. IoT services which provide these various types of data are exposed to numerous security vulnerabilities. If data is maliciously collected and used by an attacker in an IoT environment that deals with various data, security threats are greater than those in existing network environments. Therefore, security of all data exchanged in the IoT environment is essential. However, lightweight terminal devices used in the IoT environment are not suitable for applying the existing encryption algorithm. In addition, IoT networks consisting of many sensors require group communication. Therefore, this paper proposes a secure multicast scheme using the proxy re-encryption method based on Vehicular ad-hoc networks(VANET) environment. The proposed method is suitable for a large-scale dynamic IoT network environment using unreliable servers.