• Title/Summary/Keyword: IoT 보안기술

Search Result 419, Processing Time 0.028 seconds

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment (IoT환경에서 무아레 현상을 이용한 사용자 얼굴 인증 기법)

  • Cho, Ik-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.171-176
    • /
    • 2019
  • In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply $moir{\acute{e}}$ technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow $moir{\acute{e}}$ as a $moir{\acute{e}}$ phenomenon method, and the projection $moir{\acute{e}}$. When comparing the existing IoT products and IoT products applied with $moir{\acute{e}}$ technology, IoT products applied with $moir{\acute{e}}$ technology are safer in terms of security.

ECQV Certificate Based Security Mechanism for End-to-End Security in IoT (IoT 종단간 보안을 위한 ECQV 인증서 기반의 보안 메커니즘)

  • Yeon, Han-Beol;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.53-61
    • /
    • 2017
  • IoT technology is evolving and related services and technologies are spreading throughout the life. These IoT technologies make life easier for users, but they also have big threats like double-edged swords. Therefore, the importance of security is emerging and related researches are actively proceeding. Existing researches have focused on reducing the computational load on the constrained devices, performing the DTLS for the end-to-end security from a network architecture perspective. In this paper, we propose a DTLS protocol that uses ECQV certificate instead of existing X.509 certificate to reduce the load of DTLS protocol from the network perspective. In addition, the proposed scheme is implemented and compared with PSK and RPK modes.

사물 인터넷을 위한 블록체인 기술 동향

  • Hong, Eungi;Lee, Soojin;Seo, Seung-Hyun
    • Review of KIISC
    • /
    • v.28 no.3
    • /
    • pp.38-46
    • /
    • 2018
  • 블록체인 기술은 분산형 네트워크를 통해 정보 등을 관리하고 저장함으로써 정보의 투명성 및 신뢰성을 제공해줄 수 있는 분산 컴퓨팅 기반의 데이터 위변조 방지 기술이다. 특히 수천만개 사물 기기들이 서로 통신을 하여 서비스를 제공하는 사물인터넷(IoT) 서비스 환경에서 블록체인 기술은 중앙 집중 방식의 관리 구조를 탈피하고 보안성을 향상시킬 수 있는 인프라 기술로 주목 받고 있다. IoT 서비스에 데이터 무결성 및 디바이스 제어 등의 보안서비스를 제공하고, 분산화된 방식으로 서비스의 확장성을 높이고자 최근 글로벌 기업들은 IoT 블록체인 개발을 위한 컨소시엄을 구성하여, IoT 서비스에 활용할 수 있는 블록체인 기반 기술들을 연구하고 있다. 본 논문에서는 블록체인을 기반으로 한 IoT 연구 프로젝트들의 연구기술 동향을 분석하고, IoT 서비스에 블록체인을 적용한 사례와 응용 기술 등을 소개한다. 또한 IoT 응용 서비스에 효과적으로 적용하기 위해 기존 블록체인 기법들의 확장성 및 오버헤드 등의 문제를 개선한 Tangle 기술에 대해서 자세히 소개하고, IoT에 블록체인을 적용하기 위한 고려사항들을 논의한다.

A Design of Technology Element-based Evaluation Model and its Application on Checklist for the IoT Device Security Evaluation (사물인터넷 기기 보안평가를 위한 기술요소 기반의 모델 설계 및 체크리스트 적용)

  • Han, Seul Ki;Kim, Myuhng Joo
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • As the demand for Internet of Things(IoT) increases, the need for the security of IoT devices is increasing steadily. It is difficult to apply the conventional security theory to IoT devices because IoT devices are subject to be constrained by some factors such as hardware, processor, and energy. Nowadays we have several security guidelines and related documents on IoT device. Most of them, however, do not consider the characteristics of specific IoT devices. Since they describes the security issues comprehensively, it is not easy to explain the specific security level reflecting each characteristics of IoT devices. In addition, most existing guidelines and related documents are described in view of developers and service proposers, and thus ordinary users are not able to assess whether a specific IoT device can protect their information securely or not. We propose an security evaluation model, based on the existing guidelines and related documents, for more specific IoT devices and prove that this approach is more convenient to ordinary users by creating checklists for the smart watch.

  • PDF

Privacy Protection Technologies on IoT Environments: Case Study of Networked Cameras (사물인터넷(IoT) 환경에서 프라이버시 보호 기술: 네트워크 카메라 사례 연구)

  • Kim, Mihui
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.9
    • /
    • pp.329-338
    • /
    • 2016
  • Internet of Things (IoTs) technology makes every things in physical world being digitalized and communicated with each other. The technology is emerging as a new paradigm and is expected to provide a convenient and effective life. However, for the successful realization of the IoT technologies, IoT security issues are an important prerequisite, and particularly the privacy protection is expected to become more important in view of object communication directively related with human. In this paper we describe for the security and privacy threats in IoT environment and introduce the shodan (a legitimate search engine that finds backdoor routers, switches, webcams, IoT devices connected to the Internet etc.) that can expose the security and privacy problems. Lastly, we compare the privacy threats through real-world case study of network cameras currently in use and finally derive the countermeasures for the threats.

A Study on Blockchain Networking for Internet of Things (사물인터넷을 위한 블록체인 네트워킹에 대한 연구)

  • Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.201-210
    • /
    • 2018
  • High expectations are posed on the blockchain-based internet of things (IoT), in which IoT and blockchain technology is combined to obtain trust in the Internet, where trust appears impossible to obtain. However, applications of current blockchain-based IoT technology to real-world scenarios appears to be significantly more difficult owing to limitations regarding scalability and security. In this paper, the difficulties to implement blockchain networking technologies for IoT and digital businesses are investigated and practical solutions such as sharding, off-chain, de-idetification and P2P crypto-currency exchange are explored. In further work, a blockchain platform for IoTs which provides scalability and security will be implemented according to this research results, and compared with conventional blockchain platforms.

Extract of evidence on the IoT Device (IoT 단말기에서 증거추출 포렌식 연구)

  • Song, Jin-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.343-345
    • /
    • 2017
  • With the development of IoT technology, terminals connected with IoT are being used. However, security incidents are occurring as IoT is applied to society as a whole. IoT security incidents can be linked to personal risk and social disruption. In this study, we extract the evidence of security breach in IoT device. Analyze IoT security breach environment and extract Hashing function to secure original integrity and integrity. Then, the Forensic evidence is extracted from the IoT security device to verify the integrity of the original and Forensic reports should be written and studied to be used as legal evidence.

  • PDF

M-IoT 적용 기기에 대한 보안성 검증기준 개발

  • 조일희;장형진;김부영;심우성
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.137-139
    • /
    • 2023
  • 선박에 사물인터넷 기술을 적용하여 선박의 현재 상태를 모니터링 할 수 있는 각종 M-IoT 기기(혠, 속도, 타각, 기울기 등)를 설치하고 중앙에서 관리할 수 있는 M-IoT S/W 플랫폼 적용 시 고려해야 하는 보안성 검증 기준을 개발하였다.

  • PDF

IoT(Internet of Things) 정보보호 기술 개발 방향

  • Won, Yu-Jae
    • Information and Communications Magazine
    • /
    • v.32 no.1
    • /
    • pp.24-27
    • /
    • 2014
  • 기존의 사이버 환경의 보안 기술은 단순히 데이터, 네트워크, 시스템을 보호함으로써 인간의 자산을 보호하는 차원의 기술이었다면, IoT 환경에서 보안 기술은 궁극적으로 사물들로부터 사람을 보호하는 기술로 패러다임의 변화가 예상된다. 따라서 본고에서는 미래의 새로운 성장동력으로 부상하고 있는 사물인터넷(IoT) 서비스 활성화를 지원하는 동시에 인간의 자산과 생명을 보호하기 위하여 정부차원에서 수립한 정보보호 기술 개발 계획을 정리한다. IoT 정보보호 기술은 디바이스, 네트워크, 서비스/플랫폼의 3개 계층으로 나누어 9개 원천기술로 분류하였다