• Title/Summary/Keyword: Security of IoT

Search Result 927, Processing Time 0.029 seconds

A Study on Improvement of Inspection Items for Activation of the Information Security Pre-inspection (정보보호 사전점검 활성화를 위한 점검항목 개선 연구)

  • Choi, Ju Young;Kim, JinHyung;Park, Jung-Sub;Park, Choon Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.933-940
    • /
    • 2015
  • IT environments such as IoT, SNS, BigData, Cloud computing are changing rapidly. These technologies add new technologies to some of existing technologies and increase the complexity of Information System. Accordingly, they require enhancing the security function for new IT services. Information Security Pre-inspection aims to assure stability and reliability for user and supplier of new IT services by proposing development stage which considers security from design phase. Existing 'Information Security Pre-inspection' (22 domains, 74 control items, 129 detail items) consist of 6 stage (Requirements Definition, Design, Training, Implementation, Test, Sustain). Pilot tests were executed for one of IT development companies to verify its effectiveness. Consequently, for some inspection items, some improvement requirements and reconstitution needs appeared. This paper conducts a study on activation of 'Information Security Pre-inspection' which aims to construct prevention system for new information system. As a result, an improved 'Information Security Pre-inspection' is suggested. This has 16 domains, 54 inspection items, 76 detail items which include some improvement requirements and reconstitution needs.

A Secure Decentralized Storage Scheme of Private Information in Blockchain Environments

  • Han, Seungjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.111-116
    • /
    • 2018
  • Recently, IoT and Big Data dealing with voluminous and complex sensitive information is one of the key issues in the era of the 4th industrial revolution. There have been a lot of studies to store the collected and processed sensitive information safely in storage data. Especially biometric information, if it is leaked and becomes identity theft, is hard to be corrected and results in serious event. To fix the problem, methods such as FIDO or KFTC have been proposed. In this paper, we propose a modified method of TTAK.KO-12.0098 according to the environment of this paper and propose a method of safely storing the generated disposable template in a block chain. We show that our method is better by comparing the existing method and the security analysis.

Research Trend on Blockchain-based IoT Using Keyword Frequency and Centrality Analysis : Focusing on the United States, United Kingdom, Korea (키워드 빈도와 중심성 분석을 활용한 블록체인 기반 사물인터넷 연구 동향 : 미국·영국·한국을 중심으로)

  • Lee Taekkyeun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.1-15
    • /
    • 2024
  • This study aims to analyze research trends in blockchain-based Internet of Things focusing on the US, UK, and Korea. In Elsevier's Scopus, we collected 2,174 papers about blockchain-based Internet of Things published in from 2018 to 2023. Keyword frequency and centrality analysis were conducted on the abstracts of the collected papers. Through the obtained keyword frequencies, we tried to identify keywords with high frequency of occurrence and through centrality analysis, we tried to identify central research keywords for each country. As a result of the centrality analysis, research on blockchain, smart contracts, Internet of Things, security and personal information protection was conducted as the most central research in each country. The implication for Korea is that cybersecurity, authentication research appears to have been conducted with a lower centrality compared to the United States and the United Kingdom. Thus, it seems that intensive research related to cybersecurity and authentication is needed.

A Hardware Implementation of Ultra-Lightweight Block Cipher PRESENT Supporting Four Modes of Operation (4가지 운영모드를 지원하는 초경량 블록암호 PRESENT의 하드웨어 구현)

  • Kim, Ki-Bbeum;Cho, Wook-Lae;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.151-153
    • /
    • 2016
  • 80/128-비트 마스터키 길이와 ECB, CBC, OFB, CTR의 4가지 운영모드를 지원하는 PRESENT 경량 블록암호 프로세서를 설계하고, Virtex5 FPGA에 구현하여 정상 동작함을 확인하였다. PRESENT 크립토 프로세서를 $0.18{\mu}m$ 공정의 CMOS 셀 라이브러리로 합성한 결과 8,237 GE로 구현되었으며, 최대 434 MHz 클록으로 동작하여 868 Mbps의 성능을 갖는 것으로 예측되었다.

  • PDF

Role Based Smart Contract For Data sharing

  • Joachim, Kweka Bruno;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.235-237
    • /
    • 2018
  • The Internet has allowed many things to move fast, including sharing of data, files and others within a second. Many domains use applications range from IoT, smart cities, healthcare, and organizations to share the data when necessary. However, there are some challenges faced by existing systems that works on centralized nature. Such challenges are data breach, trustiness issue, unauthorized access and data fraud. Therefore in this work, we focus on using a smart contract which is used by blockchain platform and works on decentralized form. Furthermore, in this work our contract provides an access to the file uploaded onto the decentralized storage such as IPFS. By leveraging smart contract-role based which consist of a contract owner who can manage the users when access the certain resources such as a file and as well as use of decentralized storage to avoid single point of failure and censorship over secure communication channel. We checked the gas cost of the smart contract since most of contracts tends to be a high cost.

Security Management System to Block Abnormal Symptoms Using IoT Sensors and Artificial Intelligence (사물인터넷 센서와 인공지능을 이용한 이상 징후 차단 보안관리 시스템)

  • Kang, Yun-Mo;Kang, Yun-Ho;Shin, Jae-Seong;Yoo, Seung-Hyeong;Yoo, Sang-Oh
    • Annual Conference of KIPS
    • /
    • 2020.11a
    • /
    • pp.897-900
    • /
    • 2020
  • 본 논문은 사물인터넷과 인공지능을 융합하여 영상 데이터양을 감소시켜 실시간 모니터링의 어려움을 해소하고, 불법 침입 및 이상징후 차단, 화재 징후를 효율적으로 포착하고 관리하여 범죄 차단 및 이상징후 차단을 목적으로 설계한 시스템을 소개하고 있다.

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.892-905
    • /
    • 2018
  • In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.

Efficient Scheduling Algorithm for drone power charging

  • Tajrian, Mehedi;Kim, Jai-Hoon
    • Annual Conference of KIPS
    • /
    • 2019.05a
    • /
    • pp.60-61
    • /
    • 2019
  • Drones are opening new horizon as a major Internet-of-Things (IoT) player which is a network of objects. Drone needs to charge itself during providing services from the charging stations. If there are lots of drones and one charging station, then it is a critical situation to decide which drone should get charged first and make order of priorities for drones to get charged sequentially. In this paper, we propose an efficient scheduling algorithm for drone power charging (ESADPC), in which charging station would have a scheduler to decide which drone can get charged earlier among many other drones. Simulation results have showed that our algorithm reduces the deadline miss ration and turnaround time.

A Study on the Application of Industry 5.0 Technologies in Residential Welfare

  • Sun-Ju KIM
    • The Journal of Economics, Marketing and Management
    • /
    • v.12 no.5
    • /
    • pp.9-20
    • /
    • 2024
  • Purpose: This study aims to analyze the application of Industry 5.0 technologies to improve residential welfare, focusing on vulnerable groups such as the elderly and one-person households. Research design, data, and methodology: Through a literature review and SWOT analysis, it examines both the strengths and challenges of these technologies, which include AI, IoT, energy management solutions, and personalized systems. Results: The application of Industry 5.0 technologies in residential welfare offers opportunities for enhanced personalization, energy efficiency, and security, especially for vulnerable groups like the elderly and one-person households. However, challenges such as high costs, data privacy, infrastructure limitations, and technological inequality must be addressed to ensure equitable access and widespread adoption. Conclusions: The research identifies key areas for improvement, including data privacy, infrastructure limitations, and the need for equitable access to advanced housing solutions. By addressing these areas, the adoption of Industry 5.0 technologies can help create a more resilient, inclusive, and efficient residential welfare system for future generations.

Updated SSDP Scheme for DDoS Attack Defense

  • Huang, Haiou;Hu, Liang;Chu, Jianfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4599-4617
    • /
    • 2018
  • Abusing the Simple Server Discovery Protocol (SSDP) can induce an SSDP attack (including SSDP DoS, DDoS, DRDoS) posing a significant threat to UPnP devices. Rapid and extensive developments in computer technology, especially in regards to IoT, have made Upnp devices an indispensable part of our daily lives - but also render them susceptible to a variety of SSDP attacks without suitable countermeasures. This paper proposes the Two-dimensional table scheme, which provides high security at a reasonable computational cost. The feasibility and effectiveness of the proposed scheme are also validated by comparison against four other schemes (Stateless connections, Failing-together, Cookie, and Client puzzle).