• 제목/요약/키워드: Secure IoT

검색결과 251건 처리시간 0.021초

반도체 산업의 성과 분석을 통한 메모리 산업의 미래 전략 도출 (A Foresight Study on Strategy of Semiconductor Memory Industry by Performance Analysis of Semiconductor Industry)

  • 정의영
    • 디지털산업정보학회논문지
    • /
    • 제11권4호
    • /
    • pp.1-12
    • /
    • 2015
  • This research analyzes the current state of the semiconductor industry delivering the prediction for the future development of the semiconductor industry along with some semiconductor memory's responsive strategies. In the 2014, top 10 semiconductor companies were targeted and studied its growth based on its profitability and growth indications in perspective during three years. The system semiconductor industry with the increase in Hyper-scale customers, proactive actions in the technology consortium, is polarizing caused by increased R&D expense to ensure process scaling limits and high performance, and some results have shown: PC and Mobile slowdown and growth recession phenomenon due to IoT's unclear direction. The leading company is to secure new growth engines through 'Acquiring'. While as the subordinated companies following this consecutive survival through the 'Acquired', the future of system semiconductor industry is to strengthen the market dominance and its techniques by concentrating on the reorganization of the market by few large companies. Accordingly, the semiconductor memory industry is expected to reach the limit of its expansion to domain of system semiconductor, and it is highly suggesting the need of the 'Memory Life Extension' growth strategy.

초경량 블록 암호 CHAM에 대한 CPA 공격과 대응기법 제안 (Suggestion of CPA Attack and Countermeasure for Super-Light Block Cryptographic CHAM)

  • 김현준;김경호;권혁동;서화정
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제9권5호
    • /
    • pp.107-112
    • /
    • 2020
  • 초 경량암호 CHAM은 자원이 제한된 장치 상에서 효율성이 뛰어난 덧셈, 회전연산, 그리고 XOR 연산으로 이루어진 알고리즘이다. CHAM은 특히 사물인터넷 플랫폼에서 높은 연산 성능을 보인다. 하지만 사물 인터넷 상에서 사용되는 경량 블록 암호화 알고리즘은 부채널 분석에 취약할 수 있다. 본 논문에서는 CHAM에 대한 1차 전력 분석 공격을 시도하여 부채널 공격에 대한 취약성을 증명한다. 이와 더불어 해당 공격을 안전하게 방어할 수 있도록 마스킹 기법을 적용하여 안전한 알고리즘을 제안하고 구현 하였다. 해당 구현은 8-비트 AVR 프로세서의 명령어셋을 활용하여 효율적이며 안전한 CHAM 블록암호를 구현하였다.

A Review of Concepts, Advantages and Pitfalls of Healthcare Applications in Blockchain Technology

  • Al-asmari, Aisha M.;Aloufi, Rahaf I.;Alotaibi, Youseef
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.199-210
    • /
    • 2021
  • Recently, research in blockchain technology has grown in popularity. Most of these researches have pointed out designing and improving conceptual structures to create digital systems that are more secure, accessible, and effective. Although blockchain offers a wide range of advantages, it also has some pitfalls. This research aims to present an understanding of the properties of blockchain, the advantages, pitfalls, and applications based on blockchain technology. To achieve the goal of understanding blockchain technology concepts, a systematic literature review approach was introduced. 93 papers were chosen and reviewed in total. Therefore, this research provides a summary of recent studies that have been published in the field of blockchain. Moreover, we have created concept maps and tables that aid in a deep understanding of blockchain technology concepts and exhibit some of the blockchain applications. In blockchain-based applications, we focused on two areas, namely the Internet of Things (IoT) and healthcare.

BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법 (Countermeasure against MITM attack Integrity Violation in a BLE Network)

  • 한혜경;이병문
    • 한국멀티미디어학회논문지
    • /
    • 제25권2호
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.

A Simulation Framework for Wireless Compressed Data Broadcast

  • Seokjin Im
    • International Journal of Advanced Culture Technology
    • /
    • 제11권2호
    • /
    • pp.315-322
    • /
    • 2023
  • Intelligent IoT environments that accommodate a very large number of clients require technologies that provide secure information service regardless of the number of clients. Wireless data broadcast is an information service technique that ensures scalability to deliver data to all clients simultaneously regardless of the number of clients. In wireless data broadcasting, clients access the wireless channel linearly to explore the data, so the access time of clients is greatly affected by the broadcast cycle. Data compression-based data broadcasting can reduce the broadcast cycle and thus reduce client access time. Therefore, a simulation framework that can evaluate the performance of data broadcasting by applying different data compression algorithms is essential and important. In this paper, we propose a simulation framework to evaluate the performance of data broadcasting that can adopt data compression. We design the framework that enables to apply different data compression algorithms according to the data characteristics. In addition to evaluating the performance according to the data, the proposed framework can also evaluate the performance according to the data scheduling technique and the kind of queries the client wants to process. We implement the proposed framework and evaluate the performance of data broadcasting using the framework applying data compression algorithms to demonstrate the performances of data compression broadcasting.

MECHA: 다중 스레드 및 효율적인 암호화 하드웨어 액세스 (MECHA: Multithreaded and Efficient Cryptographic Hardware Access)

  • 프라타마 데리;락스모노 아구스 마하르디카 아리 ;이크발 무함마드 ;김호원
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 춘계학술발표대회
    • /
    • pp.339-341
    • /
    • 2023
  • This paper presents a multithread and efficient cryptographic hardware access (MECHA) for efficient and fast cryptographic operations that eliminates the need for context switching. Utilizing a UNIX domain socket, MECHA manages multiple requests from multiple applications simultaneously, resulting in faster processing and improved efficiency. We comprise several key components, including the Server thread, Client thread, Transceiver thread, and a pair of Sender and Receiver queues. MECHA design is portable and can be used with any communication protocol, with experimental results demonstrating a 83% increase in the speed of concurrent cryptographic requests compared to conventional interface design. MECHA architecture has significant potential in the field of secure communication applications ranging from cloud computing to the IoT, offering a faster and more efficient solution for managing multiple cryptographic operation requests concurrently.

스마트 웨어하우스 공급망 관리를 위한 블록체인과 Digital Twin의 통합 (Integrating Blockchain and Digital Twin for Smart Warehouse Supply Chain Management)

  • 커 라타낙;무함마드 피다우스;이경현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 춘계학술발표대회
    • /
    • pp.273-276
    • /
    • 2023
  • This paper presents the integration of Digital twin and Blockchain-based Supply Chain Management (DB-SCM) in a smart warehouse to create a more efficient, secure, and transparent facility. The process involves creating a digital twin of the warehouse using sensors and IoT devices and then integrating it with a blockchain-based supply chain management system to connect all stakeholders. All data are collected and tracked in real-time as goods move through the warehouse, and smart contracts are automatically executed to ensure accountability for all parties involved. The study also highlights the critical role of effective supply chain management in modern business operations and the significance of smart warehouses, which leverage advanced technologies such as robotics, AI, and data analytics to optimize warehouse operations. Later, we discuss the importance of digital twins, which allow for creating a virtual representation of a physical object or system, and their potential to revolutionize a wide range of industries. Therefore, DB-SCM offers numerous benefits, including enhanced efficiency, improved customer satisfaction, and increased sustainability, and provides a valuable case study for organizations seeking to optimize their supply chain operations.

OT(Operational Technology) 환경에서 스마트팩토리 보안 강화 방안에 관한 연구 (A Study on the Strengthening of Smart Factory Security in OT (Operational Technology) Environment)

  • 김영호;서광규
    • 반도체디스플레이기술학회지
    • /
    • 제23권2호
    • /
    • pp.123-128
    • /
    • 2024
  • Major countries are trying to expand the construction of smart factories by introducing ICT such as the Internet of Things, cloud, and big data into the manufacturing sector to secure national-level manufacturing competitiveness in the era of the 4th industrial revolution. In addition, Germany is pushing for Industry 4.0 to build a fully automatic production system through the Internet of Things, and China is pushing for the expansion of smart factories to enhance the country's industrial competitiveness through Made in China 2025, Japan's intelligent manufacturing system, and the Korean government's manufacturing innovation 3.0. In this study, considering the increasing security connectivity of smart factories, we would like to identify security threats in the external connection part of smart factories and suggest security enhancement measures based on domestic and international standard security models to respond to the identified security threats. Eventually the proposed method can be applied by accurately identifying the smart factory security status, diagnosing vulnerabilities, establishing appropriate improvement plans, and expanding security strategies to respond to security threats.

  • PDF

안전한 WEB of Things 응용을 위한 개체 인증 기술 (Entity Authentication Scheme for Secure WEB of Things Applications)

  • 박지예;강남희
    • 한국통신학회논문지
    • /
    • 제38B권5호
    • /
    • pp.394-400
    • /
    • 2013
  • WoT(Web of Things)는 웹 표준화 기술을 이용하여 사물간 지능화 통신을 실체화하기 위해 제안된 기술이다. WoT 환경은 LLN(Low-power, Lossy Network)과 자원이 제한적인 센서 장치 등을 포함하고 있으므로 기존 인터넷 환경에 적용했던 보안 기술들을 그대로 적용하기는 어렵다. 최근 IETF 표준화 그룹에서는 WoT 환경에서 보안 서비스를 제공하기 위해 DTLS 프로토콜을 이용한 방안이 제시되었다. 하지만 DTLS 프로토콜은 사전 설정(핸드 쉐이킹) 과정의 복잡성과 전송되는 메시지양이 많아 WoT 환경에서 종단간 보안 서비스를 제공하기에는 무리가 있다. 본 논문에서는 이를 개선하기 위해 WoT 환경을 DTLS 적용 가능 구간과 경량화 보안 기술이 적용될 구간으로 나누고, 경량화 구간을 위한 상호 인증 및 세션키 분배 시스템을 제안한다. 제안하는 시스템은 사용자의 관리가 용이한 스마트기기를 모바일 게이트웨이 및 WoT 프락시로 사용한다. 제안기술은 ISO 9798 표준화 기술을 수정하여 메시지 전송량을 줄이고 암호 프리미티브 계산량을 감소시키도록 했다. 또한 제안 기술은 재전송 공격, 스푸핑 공격, 선택 평문/암호문 공격, 및 DoS 공격 등에 대응 할 수 있다.

농업분야에 적용이 가능한 산업용 ICT 융합 개인보호 및 편이장비 특허동향 분석 (Analysis of Patent Trends in Industrial Information and Communication Technology Convergence: Personal Protection and Convenience Equipment Applicable to Agriculture)

  • 김인수;김경수;채혜선;김효철;김경란
    • 한국지역사회생활과학회지
    • /
    • 제28권3호
    • /
    • pp.377-390
    • /
    • 2017
  • This study identified technological trends through an analysis of patents for the industrialization of personal protection and convenience equipment using information and communication technology (ICT) as a part of efforts to prevent farm work-related disasters. The analysis was conducted on patents registered and published between January 1974 and May 2016 by the world's five largest intellectual property offices, including the KIPO, USPTO, JPO, EPO, and SIPO. The results of the analysis indicate that the US (36.8%) and South Korea (30.9%) led technological research and development (R&D) with frequent patent applications. An analysis of the technological market revealed that these countries are in the growth and maturity stages, in which the number of patents and number of patent applicants grow rapidly. In terms of the technological market shares of major countries, the US recorded the highest market shares in the field of sensing systems for workers' dangerous conditions and convenience protection equipment based on the internet of things (IoT) convergence. South Korea marked the highest share of 41.8% in the field of sensing devices for dangerous conditions in the working environment. An analysis of the trend of patent applications by specific technologies disclosed the following results: sensing systems for workers' dangerous conditions accounted for the highest share (49.2%), followed by IoT convergence-based convenience protection equipment (26.3%) and sensing devices for dangerous conditions in the working environment (24.6%). Based on this study, ICT-based personal protection and convenience equipment technologies are expected to be actively developed in the future. It will be necessary to secure national competitiveness through R&D investments and commercialization in personal protection and convenience equipment appropriate for farm work as well as through the acquisition of patent technologies and intellectual property rights.