• Title/Summary/Keyword: IoT 기기

Search Result 581, Processing Time 0.027 seconds

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

A Design of Lightweight Blockchain for Smart Dust IoT Environment (스마트 더스트 IoT 환경의 블록체인을 위한 물리적/논리적 네트워크 통합 설계)

  • Park, Joonsuu;Park, KeeHyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.78-81
    • /
    • 2021
  • 스마트 더스트 IoT 환경은 먼지처럼 작은 크기, 대량 살포, 낮은 연산 능력을 특징으로 가지는 기기들이 서로 통신하는 IoT 시스템 중 하나이다. 이러한 스마트 더스트 IoT 환경은 상기의 특성으로 인해 데이터 위·변조와 같은 데이터 신뢰성을 위해 일반적인(순수한) 블록체인을 사용하기 어렵다. 따라서 본 연구팀은 이전 연구를 통해 스마트 더스트 IoT 환경에 적합한 경량화된 블록체인을 연구·개발했다. 하지만 이전 연구는 스마트 더스트 IoT 환경의 동적인 물리적 연결을 배제한 체 스마트 더스트 IoT 의 기기적 특성만이 고려되었다. 본 논문에서는 스마트 더스트 IoT 환경의 동적인 물리적 연결을 고려하여 스마트 더스트 IoT 환경에의 물리적 네트워크와 논리적 네트워크를 통합하는 설계를 제안한다.

A Study of Design for Additive Manufacturing Method for Part Consolidation to Redesign IoT Device (IoT 기기 재설계를 위한 적층제조를 활용한 부품병합 설계 방법에 대한 연구)

  • Kim, Samyeon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.55-59
    • /
    • 2022
  • Recently, IoT technology has great attention and plays a key role in 4th industrial revolution in order to design customized products and services. Additive Manufacturing (AM) is applied to fabricate IoT sensor directly or IoT sensor embedded structure. Also, design methods for AM are developing to consolidate various parts of IoT devices. Part consolidation leads to assembly time and cost reduction, reliability improvement, and lightweight. Therefore, a design method was proposed to guide designers to consolidate parts. The design method helps designers to define product architecture that consists of functions and function-part relations. The product architecture is converted to a network graph and then Girvan Newman algorithm is applied to cluster the graph network. Parts in clusters are candidates for part consolidation. To demonstrate the usefulness of the proposed design method, a case study was performed with e-bike fabricated by additive manufacturing.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

Computational Analysis and Measurement for SDR-based Spectrum Sensing System Design on Single Board Computer (소프트웨어 정의 라디오 기반 스펙트럼 센싱 시스템 설계를 위한 단일 보드 컴퓨터 내 연산 분석 및 측정 연구)

  • Kim, Joon Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1650-1658
    • /
    • 2019
  • In recent years, IoT device and platform become widely popular and the computing performance and capabilities of IoT devices are also getting improved. However, the size and computing resources of IoT devices, especially small single board computer, are limited in a way that the design and implementation of the system should be carefully considered to operate on the devices. Recently, SDR technologies are adapting in IoT devices and can perform various radio systems. Thorough analysis and investigation of computer performances on small single board computer are necessary for its usage. In this paper, we present the results of computing resources measurement and analysis on small single-board computers. At first, we consider to design SDR based spectrum sensing for single board computer, investigate various key factors and propose a design procedure that can affect performance of the system with experiments.

IoT 환경에서의 취약점 악용 공격 대응을 위한 익스플로잇 수집 및 분석

  • Oh, Sungtaek;Go, Woong
    • Review of KIISC
    • /
    • v.31 no.6
    • /
    • pp.41-46
    • /
    • 2021
  • 홈, 산업 환경, 운송 네트워크 및 기타 장소의 사물 인터넷 장치가 계속 확산됨에 따라 악의적인 IoT 네트워크 공격자의 공격 표면도 증가하고 있다. 2021년 4월 IBM에 따르면 네트워크 공격 지표 중 전체 IoT 공격이 매년 500% 증가하고 있다. X-Force 연구에 따르면 이 급증은 주로 미라이 봇넷과 코드를 공유하는 비교적 새로운 봇넷인 Mozi 봇넷 활동에 의해 발생한다. 2020년에 이 악성코드는 한 해 동안 탐지된 총 IoT 공격의 89%를 차지했다. 2020년 3월 팔로알토 네트웍스의 Unit 42 IoT Threat Report에 따르면 IoT 임베디드 기기 대상 위협은 익스플로잇 감염, 멀웨어, 사용자 정보 탈취로 나뉜다. 그 중 IoT 임베디드 기기의 주요 익스플로잇은 네트워크 스캔, RCE, Command injection, Buffer Overflow 등으로 관찰된다. 본 논문에서는 이러한 IoT 환경에서의 취약점 악용 공격 대응 및 탐지 정책 생성을 위해 IoT 취약점을 악용한 익스플로잇을 분석 연구하였다.

A Research on the improvement of domestic IoT security certification system (국내 IoT 보안인증 제도 개선 연구)

  • Lee, Yongpil;Suh, YungJin;Lee, SangGeol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.79-92
    • /
    • 2021
  • In a society where ICT technology is converged, the use of various network-connected devices such as IoT is spreading. Network-connected devices are inevitably exposed to the threat of hacking such as information leakage, and countermeasures need to be prepared to respond. Security certification system for IoT devices has been introduced to promote security of IoT products, and for this purpose, legalization and standardization of certification standards and methods are in progress. In line with this, in Korea, as the Information and Communication Network Act was revised in 2020, ICT convergence devices connected to the network were newly defined as "information and communication network connected devices," and the basis for the security certification system is being established. We summarized related domestic and foreign trends and suggest specific considerations for implementing the security certification system for IoT devices in South Korea.

CNN-based benign/malware classification for security enhancement for IoT device (IoT기기의 보안강화를 위한 CNN기반 정상/악성코드 분류)

  • Suyeong Kim;Seoyoung Heo;Byung-Hyun Lee;Miran Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.796-798
    • /
    • 2023
  • IoT 기기 사용량의 증가로 인해 해킹 사례도 함께 증가하며 보안의 중요성이 커지고 있다. 본 논문은 IoT 보안 취약점을 해결하기 위해 정상/악성코드의 데이터셋을 Grayscale로 변환하여 악성코드/정상코드로 분류하는 알고리즘을 개발해 IoT 기기에서 성능을 검증한다. 분류에 이용되는 딥러닝 알고리즘은 CNN(Convolutional Neural Network)으로 99.60%의 평균 정확도를 나타내며 IoT 기기(라즈베리파이)에서도 잘 작동됨을 확인할 수 있다.

IoT 통신 환경을 위한 경량 암호 기술 동향

  • Mun, Si-Hun;Kim, Min-U;Gwon, Tae-Gyeong
    • Information and Communications Magazine
    • /
    • v.33 no.3
    • /
    • pp.80-86
    • /
    • 2016
  • IoT 통신 환경이 구축되면서 고사양 기기뿐만 아니라 저사양 기기를 사용하는 통신도 함께 증가하고 있다. 안전한 통신을 위해서는 메시지 암호화와 인증을 함께 제공하는 블록 암호 기술이 요구된다. 하지만, 기존 블록 암호 기술을 통신, 계산 기능이 제약된 저사양 기기에 그대로 사용하기에는 어려움이 따른다. 따라서 다양한 경량 암호 기술이 등장하게 되었다. 본 논문에서는 경량 암호 기술의 동향에 대해서 살펴보고 직접 IoT 실험 기기인 8비트 아두이노, 16비트 티모트, 32비트 라즈베리 파이2를 이용하여 구현 실험한 성능 측정 결과에 대해서 논한다.

Implementing Blockchain Based Secure IoT Device Management System (블록체인 기반 안전한 사물인터넷 장치 관리 시스템 구현)

  • Kim, Mihui;Kim, Youngmin
    • Journal of IKEEE
    • /
    • v.23 no.4
    • /
    • pp.1343-1352
    • /
    • 2019
  • To manage the Internet of Things(IoT) Network, which consists of a large number of various devices, a secure and automatic method of strengthening the IoT network is being proposed. Blockchain has a 'smart contract' element of autonomous execution method, which is emerging as a way to not only exchange data quickly without mediators but also securely and automatically manage processes between IoT devices. In this paper, we implement a prototype of the entire IoT device management system based on the EOSIO with DPoS(Distributed Proof of Stake)-based blockchain structure, proposed as a prior study, including the user application DApp(Decentralized Application) and the actual IoT devices (Raspberry Pi-based device, and smart lamp) that interact with the blockchain platform. We analyze the benefits of the system and measure the time overhead to show the feasibility of the system.