• Title/Summary/Keyword: IoT Key management

Search Result 94, Processing Time 0.022 seconds

The Key Factors of Big Data Utilization for Improvement of Management Quality of Companies in terms of Technology, Organization and Environment (기술, 조직, 환경 관점에서 기업의 경영품질 향상을 위한 빅데이터 활용의 핵심요인에 관한 연구)

  • Shin, Soo Haeng;Lee, Sang Joon
    • Journal of Information Technology Services
    • /
    • v.18 no.1
    • /
    • pp.91-112
    • /
    • 2019
  • The IoT environment has led to explosive growth of existing enterprise data, and how to utilize such big data is becoming an important issue in the management field. In this paper, major factors affecting the decisions of companies to utilize big data have been studied. And also, the effect of big data utilization on the management quality is studied empirically. During this process, we have studied the difference according to the award of Korean national quality award. As a result of the study, we confirmed that the five factors such as cost from technology, organization and environment perspective, compatibility, company size, chief officer support, and competitor pressure are key factors influencing big data utilization. Also, it was confirmed that the use of big data for management activities has an important influence on the six management quality factors based on MBNQA, and that the management quality level of Korean national quality award companies is relatively high. This paper provides practical implications for companies' use of big data because it demonstrates for the first time that big data utilization has an impact on management quality improvement.

Research on SecureOS Module Based on File System for Data Protection (데이터 보호를 위한 파일시스템 기반의 SecureOS Module에 관한 연구)

  • Yonggu JANG;Inchul KIM;Jisong RYU
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.4
    • /
    • pp.67-79
    • /
    • 2023
  • Service environments through laptops, smart devices, and various IoT devices are developing very rapidly. Recent security measures in these Internet environments mainly consist of network application level solutions such as firewall(Intrusion Prevention Systems) and IDS (intrusion detection system). In addition, various security data have recently been used on-site, and issues regarding the management and destruction of such security data have been raised. Products such as DRM(Digital Rights Management) and DLP(Data Loss Prevention) are being used to manage these security data. However despite these security measures, data security measures taken out to be used in the field are operated to the extent that the data is encrypted, delivered, and stored in many environments, and measures for encryption key management or data destruction are insufficient. Based on these issues we aim to propose a SecureOS Module, an OS-based security module. With this module users can manage and operate security data through a consistent interface, addressing the problems mentioned above.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Security Analysis of Blockchain Systems: Case Study of Cryptocurrencies (블록체인 시스템의 보안성 분석: 암호 화폐에서의 사례 연구)

  • Lee, Sungbum;Lee, Boohyung;Myung, Sein;Lee, Jong-Hyouk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.5-14
    • /
    • 2018
  • With the advance of the 4th industrial revolution, Internet of Things (IoT) technology is actively being studied. In the era of the IoT, a decentralized operation is required to reduce load on servers and enable autonomous IoT data communication rather than focusing on centralized operation of being server client structures. This paper analyzes the security of a blockchain, a new form of distributed database platform that supports integrity and permanence of data. To achieve this, we divide the blockchain's major operations into a consensus process, network communication process, and key management process, and then describe possible attacks and countermeasures in each process. We also describe the attack occurred in typical cryptocurrency platforms such as Bitcoin and Ethereum.

A BSC Framework for the Evaluation of RFID/USN based Logistics/Distribution Systems (RFID/USN기반 물류/유통 시스템의 평가를 위한 BSC 프레임워크)

  • Park, Jeong-Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.16 no.4
    • /
    • pp.343-349
    • /
    • 2014
  • Many systems using RFID/USN were and are being developed. Some systems are used in practice and some are not. Generally, the main reasons not being used are: The prices of chips are too high considering the effects. The application domain is not appropriate for RFID/USN. So, various skills for higher sensing precision have been introduced like using multiple sensors and avoiding metals which deter sensings seriously. Now, it is time to evaluate systems which were developed using RFID/USN technology. However, no systematic approach has been made for the evaluation. In this paper, a framework using BSC is introduced for the evaluation of systems using RFID/USN. In this framework, some Critical Success Factors(CSF) are derived and some Key Performance Indices(KPI) are developed for each CSF.

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment (스마트 홈 환경에서 디바이스 상호 인증 및 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.661-667
    • /
    • 2018
  • Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.

Development of the RAS-RMS Protocol optimized to PSTN environment and Implementation of its differentiated process (PSTN 환경에 최적화된 RAS-RMS 연동 프로토콜 개발 및 차별화된 처리과정 구축)

  • Chang, Sung-Keun;Lee, Jung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8357-8362
    • /
    • 2015
  • The emergency call device has been installed and operated for the elevator passenger safety, but the call can not be connected or delay to the operator in an emergency. The application of the Internet of Things(IoT) technology is required for the systematic management and reliability of the emergency call device installed in the elevator. To meet these requirements it is necessary to apply the RMS(Remote Management System). Emergency call device periodically reports the operating status information and the emergency call history information of the emergency call device to the RMS in the PSTN(Public Switched Telephone Network) environment, and transmits the call request information in an emergency. RAS(Remote Access Server) plays a role of converting the PSTN signals to TCP / IP. RMS reports a significant outbreak call and abnormal operating conditions to administrators. In this study, we developed optimized protocol to PSTN environment that is required by RMS and implemented its differentiated process. And a RAS-RMS Protocol was added to the Application Layer. Development protocol consisting of simple structure as compared to CoAP, MQTT or HTTP can work properly in low-spec CPU and transmit elevator emergency key information easily.

Smart Factory as a Set of Essential Technologies of 4th Industrial Revolution (4차 산업혁명 요소기술 집합체로써의 스마트팩토리)

  • Seo, Dayoon;Bae, Sung Min
    • Journal of Institute of Convergence Technology
    • /
    • v.7 no.2
    • /
    • pp.21-23
    • /
    • 2017
  • Smart Factories could be regarded as a result of the integration of various key technologies of the fourth industrial revolutions. In smart factory, the IoT (Internet of things) is applied to capture the data generated by the production facility, store and analyze data generated in real time using Big Data technology. In addition, 3D printers are used to print expensive and complex parts, industrial robots supply materials and parts to the production site, store finished products in warehouses. In this paper, we introduced the definition of smart factory and change of job market. Also, we summarize several national policies to support enhancing transformation process of smart factory.

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.

Cryptft+ : Python/Pyqt based File Encryption & Decryption System Using AES and HASH Algorithm (Crypft+ : Python/PyQt 기반 AES와 HASH 알고리즘을 이용한 파일 암복호화 시스템)

  • Shin, Dongho;Bae, Woori;Shin, Hyeonggyu;Nam, Seungjin;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.43-51
    • /
    • 2016
  • In this paper, we have developed Crypft+ as an enhanced file encryption/decryption system to improve the security of IoT system or individual document file management process. The Crypft+ system was developed as a core security module using Python, and designed and implemented a user interface using PyQt. We also implemented encryption and decryption function of important files stored in the computer system using AES based symmetric key encryption algorithm and SHA-512 based hash algorithm. In addition, Cx-Freezes module is used to convert the program as an exe-based executable code. Additionally, the manual for understanding the Cryptft+ SW is included in the internal program so that it can be downloaded directly.