• Title/Summary/Keyword: IoT Security

Search Result 877, Processing Time 0.032 seconds

A Study on the Remote Authentication Method between IoT Devices using a Trusted Security Module (신뢰 보안 모듈을 이용한 IoT 기기 간 원격 인증 방법에 관한 연구)

  • Han, Jin-Hee;Jeon, YongSung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.587-590
    • /
    • 2015
  • IoT 환경에서 서로 다른 사양을 갖는 기기 간 통신에서의 보안 취약성, 사용자의 프라이버시 데이터 유출, 인가 받지 않은 기기나 사용자로 인한 기기 위 변조, 기기 오작동 등의 보안 위협 발생 가능성이 증가할 것이라는 예측과 더불어 다양한 보안 위협에 대응할 수 있는 보안 기술에 대한 관심이 높아지고 있다. 본 논문에서는 신뢰 보안 모듈과 클라우드 서버를 이용한 기기 간 원격 인증 및 기기 관리 방법에 대해 기술한다. 수 많은 기기가 인터넷으로 연결되어 운용되는 IoT 환경에서 신뢰 보안 모듈을 활용한 IoT 기기 간 원격 인증, 기기 보안 업데이트 및 안전한 기기 관리 기능 등을 통해 보다 안전하고 신뢰할 수 있는 IoT 서비스 제공이 가능해짙 수 있을 것이다.

Smart Centralized Remote Security Service Provisioning Framework for Open ICT Environment (개방형 ICT 환경을 위한 집중식 원격 보안 서비스 프로비저닝 프레임워크 구성 방안)

  • Park, Namje
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.2
    • /
    • pp.81-88
    • /
    • 2016
  • Machine-to-Machine (M2M) communication provides each component (machine) with access to Internet, evolving into the IoT technology. IoT is a trend where numbers of devices provide the communication service, using the Internet protocol. As spreading the concept of IoT(Internet of Things), various objects become home information sources. According to the wide spread of various devices, it is difficult to access data on the devices with unified manners. Under this environment, security is a critical element to create various types of application and service. In this paper propose the inter-device authentication and Centralized Remote Security Provisioning framework in Open M2M environment. The results of previous studies in this task is carried out by protecting it with the latest information on M2M / IoT and designed to provide the ultimate goal of future M2M / IoT optimized platform that can be integrated M2M / IoT service security and security model presents the information.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

A Comprehensive Analyses of Intrusion Detection System for IoT Environment

  • Sicato, Jose Costa Sapalo;Singh, Sushil Kumar;Rathore, Shailendra;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.975-990
    • /
    • 2020
  • Nowadays, the Internet of Things (IoT) network, is increasingly becoming a ubiquitous connectivity between different advanced applications such as smart cities, smart homes, smart grids, and many others. The emerging network of smart devices and objects enables people to make smart decisions through machine to machine (M2M) communication. Most real-world security and IoT-related challenges are vulnerable to various attacks that pose numerous security and privacy challenges. Therefore, IoT offers efficient and effective solutions. intrusion detection system (IDS) is a solution to address security and privacy challenges with detecting different IoT attacks. To develop an attack detection and a stable network, this paper's main objective is to provide a comprehensive overview of existing intrusion detections system for IoT environment, cyber-security threats challenges, and transparent problems and concerns are analyzed and discussed. In this paper, we propose software-defined IDS based distributed cloud architecture, that provides a secure IoT environment. Experimental evaluation of proposed architecture shows that it has better detection and accuracy than traditional methods.

A Study on Interoperability of Heterogeneous IoT Platform Device Identification (이종 IoT 플랫폼 디바이스 식별체계 상호연동에 대한 연구)

  • Koo, Ja-Hoon;Kim, Young-Gab
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1279-1282
    • /
    • 2017
  • 현재 사물인터넷(Internet of Things; IoT) 기술을 이용한 스마트홈 환경을 구축하기 위해서는 같은 식별체계를 사용하는 플랫폼 디바이스를 사용해야 한다. 그러나 주요 IoT 플랫폼들은 각각 다른 식별체계를 사용하고 있기 때문에 이종 플랫폼 간 디바이스 식별이 어려운 상황이다. 이종 플랫폼 간 디바이스 식별체계 상호연동에 대한 연구는 진행 중이며 아직까지 해결책은 제시되지 않았다. 따라서 본 논문에서는 주요 IoT 플랫폼인 oneM2M, GS1 Oliot, IBM Watson IoT, OCF IoTivity의 디바이스 식별체계를 분석하고 비교하여 서로 다른 플랫폼 간 디바이스 식별체계에 대한 번역기 또는 해석기의 필요성과 개념모델을 제시한다.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.

An Analysis of Research Trends in IoT Privacy (IoT 기기의 개인정보보호에 대한 국내외 연구 동향 분석)

  • Seo, Jeong-Eun;Oh, Jun-Hyoung;Lee, Kyung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.268-271
    • /
    • 2018
  • 199년 MIT에 근무하던 캐빈 애시톤(Kevin Ashton)이 처음 언급했던 Internet of Things(이하 IoT)라는 말은 20년도 채 지나지 않은 2018년 현재, 대부분의 소비재 시장에 접목하여 사용하는 기술 중 하나가 되었다. IoT 기술의 발전과 함께 IoT 보안 시장이 성장하고 있고, IoT 보안관련 연구 또한 증가하는 추세이다. 그러나 국내외를 막론하고 개인정보 유출 사건으로 인해 개인정보보호에 대한 인식과 필요성이 커졌음에도 불구하고, IoT 기기의 개인정보보호에 대한 연구는 미흡한 상황이다. 이에 본 논문은 현재까지 게재된 논문들을 바탕으로 국내외 IoT 기기의 개인정보에 관한 연구 동향을 분석한다.

An IoT Information Security Model for Securing Bigdata Information for IoT Users (IoT 사용자의 빅데이터 정보를 안전하게 보호하기 위한 IoT 정보 보안 모델)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.8-14
    • /
    • 2019
  • Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.

A study on the direction of security control of IoT environment (사물인터넷 환경에서의 보안 관제 방향에 관한 연구)

  • Koh, Keunho;Lee, Sungryoul;Ahn, Seongjin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.53-59
    • /
    • 2015
  • With radical development of information and communication Technology, Internet of Things(IoT) era - all the th ings around us are connected through internet so that it enables objects to exchange data with connected devices a nd is expected to offer new advanced services that goes beyond the value where each existing objects could have o ffered respectively - has come. Concerns regarding security threat are being raised in adopting IoT as the number of internet-connected appliances are rapidly increasing. So, we need to consider how to protect and control countles s objects. This paper covers the role and procedures of existing security control. Futhermore, it provides information about the direction of security control when it comes to IoT.

Cybersecurity Audit of 5G Communication-based IoT, AI, and Cloud Applied Information Systems (5G 통신기반 IoT, AI, Cloud 적용 정보시스템의 사이버 보안 감리 연구)

  • Im, Hyeong-Do;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.428-434
    • /
    • 2020
  • Recently, due to the development of ICT technology, changes to the convergence service platform of information systems are accelerating. Convergence services expanded to cyber systems with 5G communication, IoT, AI, and cloud are being reflected in the real world. However, the field of cybersecurity audit for responding to cyber attacks and security threats and strengthening security technology is insufficient. In this paper, we analyze the international standard analysis of information security management system, security audit analysis and security of related systems according to the expansion of 5G communication, IoT, AI, Cloud based information system security. In addition, we design and study cybersecurity audit checklists and contents for expanding security according to cyber attack and security threat of information system. This study will be used as the basic data for audit methods and audit contents for coping with cyber attacks and security threats by expanding convergence services of 5G, IoT, AI, and Cloud based systems.