• Title/Summary/Keyword: Internet of things Security

Search Result 665, Processing Time 0.03 seconds

A Study on the Strengthening of Smart Factory Security in OT (Operational Technology) Environment (OT(Operational Technology) 환경에서 스마트팩토리 보안 강화 방안에 관한 연구)

  • Young Ho Kim;Kwang-Kyu Seo
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.2
    • /
    • pp.123-128
    • /
    • 2024
  • Major countries are trying to expand the construction of smart factories by introducing ICT such as the Internet of Things, cloud, and big data into the manufacturing sector to secure national-level manufacturing competitiveness in the era of the 4th industrial revolution. In addition, Germany is pushing for Industry 4.0 to build a fully automatic production system through the Internet of Things, and China is pushing for the expansion of smart factories to enhance the country's industrial competitiveness through Made in China 2025, Japan's intelligent manufacturing system, and the Korean government's manufacturing innovation 3.0. In this study, considering the increasing security connectivity of smart factories, we would like to identify security threats in the external connection part of smart factories and suggest security enhancement measures based on domestic and international standard security models to respond to the identified security threats. Eventually the proposed method can be applied by accurately identifying the smart factory security status, diagnosing vulnerabilities, establishing appropriate improvement plans, and expanding security strategies to respond to security threats.

  • PDF

Utilisation of IoT Systems as Entropy Source for Random Number Generation

  • Oguzhan ARSLAN;Ismail KIRBAS
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.77-86
    • /
    • 2024
  • Using random numbers to represent uncertainty and unpredictability is essential in many industries. This is crucial in disciplines like computer science, cryptography, and statistics where the use of randomness helps to guarantee the security and dependability of systems and procedures. In computer science, random number generation is used to generate passwords, keys, and other security tokens as well as to add randomness to algorithms and simulations. According to recent research, the hardware random number generators used in billions of Internet of Things devices do not produce enough entropy. This article describes how raw data gathered by IoT system sensors can be used to generate random numbers for cryptography systems and also examines the results of these random numbers. The results obtained have been validated by successfully passing the FIPS 140-1 and NIST 800-22 test suites.

Analyses of Technology Trend and marketability in Internet of Things (사물인터넷 통신의 시장성 및 기술 동향 분석)

  • Jang, Chang-Whan;Jo, Sung-Ho;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.882-883
    • /
    • 2016
  • The idea of Internet of Things (IoT) and the challenges is developed and growing rapidly. The general layered architecture of IoT along with its constituent elements is analyzed and described. Further, the paper provides for a secure construction of the IoT architecture, by tackling security issues at each layer of the architecture. We survey an introduction to industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards security framework for Industrial IoT systems.

  • PDF

Tourism Information Reservation System considering the Security and Efficiency (보안 및 효율성을 고려한 관광 예약 정보 시스템)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.67-72
    • /
    • 2015
  • As new Information technology such as IoT develops rapidly, a lot of changes are occurred in our lives. The Internet of Things is the network of physical objects or things embedded with electronics, software, sensors and connectivity to enable it to achieve greater value and service by exchanging data with the manufacturer, operator and/or other connected devices. This change is also applied to tourism industry. These days many people make a tour reservation using the internet. But it is required to consider the efficiency and security of tour reservation system. In this paper, we suggest a tour reservation system. First, we describe the computer reservation system, hotel reservation system and reservation system. Second, we perform the modeling of general reservation system and suggested reservation system. Third, performance evaluation is carried out with respect to efficiency and security. The results show that the suggested reservation system has a better performance than a general reservation system. At last we described the results and future works.

Analyses of Security and Privacy Challenges in Industrial Based on Internet of Things (사물 인터넷망에 기반한 산업 시설의 보안 요구 사항 해석)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.598-599
    • /
    • 2016
  • Today, embedded, mobile, and cyber-physical systems are ubiquitous and used in many applications, from industrial control systems, modern vehicles, to critical infrastructure. Current trends and initiatives, such as "Industry 4.0" and Internet of Things (IoT), promise innovative business models and novel user experiences through strong connectivity and effective use of next generation of embedded devices. We survey an introduction to Industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards a holistic security framework for Industrial IoT systems in this paper.

  • PDF

A Study on Secure Interworking in Internet of Things (사물인터넷 보안 인터워킹에 관한 연구)

  • Oh, Se-Ra;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1283-1286
    • /
    • 2017
  • 사물인터넷(Internet of Things; IoT)이 발달하면서 FIWARE, oneM2M, AllJoyn 등의 많은 IoT 플랫폼이 개발되고 관련 표준들도 제정되고 있다. 이런 환경에서는 각 IoT 플랫폼의 통신 프로토콜, 보안정책 등이 상이하기 때문에 데이터가 연동되기 어렵고, 보안 인터워킹을 수행하는 것은 더욱 어려운 문제다. oneM2M과 FIWARE의 경우, Fi-Proxy 인터워킹 어댑터를 이용하여 상호간 인터워킹이 시연된 사례가 있지만 그 과정에서 보안이 고려되지는 않았다. oneM2M은 아직 보안 컴포넌트가 별도로 존재하지 않기 때문에, 본 논문에서는 oneM2M-FIWARE 보안 인터워킹 시나리오에 적용할 수 있는 OAuth 2.0 기반 oneM2M 보안 컴포넌트를 구현하고, FIWARE 보안 아키텍처를 분석 및 구현하여 시사점을 도출한다. 또한 본 논문은 oneM2M과 FIWARE 간의 보안 인터워킹 아키텍처를 제안하고, 이를 기반으로 향후 여러 도메인에 활용될 수 있는 구조를 가진 LED 예제를 개발한다.

A Double-blockchain Architecture for Secure Storage and Transaction on the Internet of Things Networks (IoT 네트워크에서 스토리지와 트랜잭션 보호를 위한 이중 블록체인 구조)

  • Park, jongsoon;Park, chankil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.43-52
    • /
    • 2021
  • IoT applications are quickly spread in many fields. Blockchain methods(BC), defined as a distributed sharing mechanism, offer excellent support for IoT evolution. The BC provides a secure way for communication between IoT devices. However, the IoT environments are threatened by hacker attacks and malicious intrusions. The IoT applications security are faced with three challenges: intrusions and attacks detection, secure communication, and compressed storage information. This paper proposed a system based on double-blockchain to improve the communication transactions' safety and enhance the information compression method for the stored data. Information security is enhanced by using an Ellipse Curve Cryptography(ECC) considered in a double-blockchain case. The data compression is ensured by the Compressed Sensing(CS) method. The conducted experimentation reveals that the proposed method is more accurate in security and storage performance than previous related works.

Secure IEEE 802.15.4 Join Protocol for 6LoWPAN (6LowPAN 환경에서의 안전한 IEEE 802.15.4 가입 프로토콜)

  • Ahn, Seung-Hyun;Park, Chang-Seop;Yeon, Han-Beol
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.103-110
    • /
    • 2015
  • The security of the data exchanged between sensor nodes in IoT (Internet of Things) environment becomes increasing. In the conventional IEEE 802.15.4, the key for secure communication between the sensor node and the sensor node and the PAN Coordinator or the sensor node is assumed to be pre-shared in advance. Especially, there is another problem in that sensor node authentication is not considered during the association process. In this paper, we propose a security scheme that solves the problems of previously proposed protocols with the pre-shared key for all devices.

System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats

  • Choi, Seul-Ki;Yang, Chung-Huang;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.906-918
    • /
    • 2018
  • The advent of the Internet of Things (IoT) technology, which brings many benefits to our lives, has resulted in numerous IoT devices in many parts of our living environment. However, to adapt to the rapid changes in the IoT market, numerous IoT devices were widely deployed without implementing security by design at the time of development. As a result, malicious attackers have targeted IoT devices, and IoT devices lacking security features have been compromised by attackers, resulting in many security incidents. In particular, an attacker can take control of an IoT device, such as Mirai Botnet, that has insufficient security features. The IoT device can be used to paralyze numerous websites by performing a DDoS attack against a DNS service provider. Therefore, this study proposes a scheme to minimize security vulnerabilities and threats in IoT devices to improve the security of the IoT service environment.

A Priority Analysis on Mobile Telecom Internet of Things Using the AHP (analytic hierarchy process) (계층분석기법(AHP)을 이용한 이동통신 사물인터넷 서비스 우선순위 분석)

  • Nam, Soo-Tai;Jin, Chan-Yong;Kim, Do-Goan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1191-1196
    • /
    • 2017
  • Lately, the three mobile telecom companies in Korea are competing for the launch of Internet of Things services for using home. Typical launched services are in the smart home related fields. However, Internet of Things as mobile telecom based are at an early stage, expected that various services will be started continuously. At this point, we have been planning to analyze the preference of Internet of Things for objects based on the services already launched. In order to apply the analytic hierarchy method, the first stage factors were designed as Safety, Security, Health care, Intelligence and Home appliances. In addition, the second stage factors were organized into 18 detailed services presented in the conceptual model. As a result, Health care (23.2%) was the most preferred priority. These results can be interpreted as the result of interest in health by improving income. We presented the theoretical and practical implications of these results.