• Title/Summary/Keyword: IoT Security

Search Result 917, Processing Time 0.027 seconds

A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service (블루투스 v4.1 비콘 기반 쿠폰 융합서비스에서의 보안위협 연구)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2015
  • As the new technologies like IoT and Fintech appear which have not existed before, security threat ranges in existing system are increasing. Especially, IoT has increasing ranges to cause malicious behaviors in specific systems because related IT infrastructure ranges are increasing. Fintech also requires the innovation of traditional security system because it has new structure which didn't exist in the past. As IoT and Fintech technologies are commercialized and related markets are developing in the future, structural security threats could be connected to actual attacks and secondary attacks by the attackers' imbedding of back door in IoT internet devices through remote access. Customer's device cannot be compulsively controlled for security in new system where these various security threats exist. Therefore, these services should minimize the collected information, and now is the time to politically control the utilizing methods of the collected information. In this thesis, security threats are to be suggested which could occur in newly appearing mobile services like IoT and Fintech.

Analyses of Trend of Threat of Security in Internet of Things (사물 인터넷망에서의 보안 위협 기술 동향 분석)

  • Shin, Yoon-gu;Jung, Sungha;Do, Tahoon;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

A Quality Evaluation Model for IoT Services (IoT 서비스를 위한 품질 평가 모델)

  • Kim, Mi;Lee, Nam Yong;Park, Jin Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.9
    • /
    • pp.269-274
    • /
    • 2016
  • In this paper We focuses on suggestion to quality model for IoT infrastructure services for Internet of Things. Quality model is suggested on security set out in ISO25000 quality factors and assessment of the existing traditional software application of ISO 9126 quality model. We validated that the proposed model can be realized it was applied to evaluate the 4 elements and related security in Metrics.

Smart IoT Hardware Control System using Secure Mobile Messenger (모바일 메신저를 이용한 스마트 IoT 하드웨어 제어 시스템)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Lee, Hae-Yeoun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2232-2239
    • /
    • 2016
  • IoT industry has been highlighted in the domestic and foreign country. Since most IoT systems operate separate servers in Internet to control IoT hardwares, there exists the possibility of security problems. Also, IoT systems in markets use their own hardware controllers and devices. As a result, there are many limitations in adding new sensors or devices and using applications to access hardware controllers. To solve these problems, we have developed a novel IoT hardware control system based on a mobile messenger. For the security, we have adopted a secure mobile messenger, Telegram, which has its own security protection. Also, it can improve the easy of the usage without any installation of specific applications. For the enhancement of the system accessibility, the proposed IoT system supports various network protocols. As a result, there are many possibility to include various functions in the system. Finally, our IoT system can analyze the collected information from sensors to provide useful information to the users. Through the experiment, we show that the proposed IoT system can perform well.

A Study on Blockchain Networking for Internet of Things (사물인터넷을 위한 블록체인 네트워킹에 대한 연구)

  • Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.201-210
    • /
    • 2018
  • High expectations are posed on the blockchain-based internet of things (IoT), in which IoT and blockchain technology is combined to obtain trust in the Internet, where trust appears impossible to obtain. However, applications of current blockchain-based IoT technology to real-world scenarios appears to be significantly more difficult owing to limitations regarding scalability and security. In this paper, the difficulties to implement blockchain networking technologies for IoT and digital businesses are investigated and practical solutions such as sharding, off-chain, de-idetification and P2P crypto-currency exchange are explored. In further work, a blockchain platform for IoTs which provides scalability and security will be implemented according to this research results, and compared with conventional blockchain platforms.

ECQV Certificate Based Security Mechanism for End-to-End Security in IoT (IoT 종단간 보안을 위한 ECQV 인증서 기반의 보안 메커니즘)

  • Yeon, Han-Beol;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.53-61
    • /
    • 2017
  • IoT technology is evolving and related services and technologies are spreading throughout the life. These IoT technologies make life easier for users, but they also have big threats like double-edged swords. Therefore, the importance of security is emerging and related researches are actively proceeding. Existing researches have focused on reducing the computational load on the constrained devices, performing the DTLS for the end-to-end security from a network architecture perspective. In this paper, we propose a DTLS protocol that uses ECQV certificate instead of existing X.509 certificate to reduce the load of DTLS protocol from the network perspective. In addition, the proposed scheme is implemented and compared with PSK and RPK modes.

Medical Information Security and Standard Technology On IoT Environment (IoT 환경의 의료 정보보호와 표준 기술)

  • Woo, Sung-hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2683-2688
    • /
    • 2015
  • Internet of Things(IoT) using a variety of technologies in combination provides a convenient, elevated range of services to users. IoT has been noted in combining the fields of medical service in particular. However, with the advent and growing of IoT, the more medical services are evolving, security problems caused by leakage of personal health information will become more serious. U-Health and medical devices, which deal mainly the personal health information, is required to a high level of privacy and security of health information. Therefore, the introduction of the IoT in the healthcare industry requires the medical information security as a prerequisite. This study analyzes security status and trend of IoT, personal medical information leakage cases, the health information protection measures in accordance with the life cycle of medical information, and the standardized protection technologies.

Intrusion Detection on IoT Services using Event Network Correlation (이벤트 네트워크 상관분석을 이용한 IoT 서비스에서의 침입탐지)

  • Park, Boseok;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.1
    • /
    • pp.24-30
    • /
    • 2020
  • As the number of internet-connected appliances and the variety of IoT services are rapidly increasing, it is hard to protect IT assets with traditional network security techniques. Most traditional network log analysis systems use rule based mechanisms to reduce the raw logs. But using predefined rules can't detect new attack patterns. So, there is a need for a mechanism to reduce congested raw logs and detect new attack patterns. This paper suggests enterprise security management for IoT services using graph and network measures. We model an event network based on a graph of interconnected logs between network devices and IoT gateways. And we suggest a network clustering algorithm that estimates the attack probability of log clusters and detects new attack patterns.

A Study on Light Weight Authentication Method of Distributed Cluster-based IoT Devices (분산 클러스터 기반 IoT 디바이스 경량 인증 방법에 대한 연구)

  • Kim, Sung-hwan;Kim, Young-gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.103-109
    • /
    • 2019
  • Due to the development of ICT technology, the IoT environment for connecting objects in the vicinity to networks and utilizing information about objects in various fields is getting attention, and security threats are also increasing. In order to solve the increasing security problem in IoT environment, we are studying methods that use certificate, encryption, hash calculation and block chain in the private sector. However, the security authentication method which overcomes the performance gap between devices and has compatibility with various devices It has not been proposed yet. In this paper, we propose an authentication method that can achieve wide compatibility by minimizing the influence of IoT device environment.

End-to-end MQTT security protocol using elliptic curve cryptography algorithm (타원곡선암호 알고리즘을 이용한 종단간 MQTT 보안 프로토콜)

  • Min, Jung-Hwan;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.1-8
    • /
    • 2019
  • Internet of Things (IoT) is proliferating to provide more intelligent services by interconnecting various Internet devices, and TCP based MQTT is being used as a standard communication protocol of the IoT. Although it is recommended to use TLS/SSL security protocol for TCP with MQTT-based IoT devices, encryption and decryption performance degenerates when applied to low-specification / low-capacity IoT devices. In this paper, we propose an end-to-end message security protocol using elliptic curve cryptosystem, a lightweight encryption algorithm, which improves performance on both sides of the client and server, based on the simulation of TLS/SSL and the proposed protocol.