• Title/Summary/Keyword: Security of IoT

Search Result 927, Processing Time 0.032 seconds

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

A Study on the Throughput Enhancement in Software Implementation of Ultra Light-Weight Cryptography PRESENT (초경량 암호 PRESENT의 소프트웨어 구현 시 처리량 향상에 대한 연구)

  • Park, Won-kyu;Cebrian, Guillermo Pallares;Kim, Sung-joon;Lee, Kang-hyun;Lim, Dae-woon;Yu, Ki-soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.316-322
    • /
    • 2017
  • This paper suggests an efficient software implementation of lightweight encryption algorithm PRESENT which supports for secret key lengths of 80-bits. Each round of PRESENT is composed of the round key addition, substitution, and permutation and is repeated 31 times. Bo Zhu suggested combined substitution and permutation for efficient operation so that encryption throughput has been increased 2.6 times than processing substitution and permutation at separate times. The scheme that suggested in this paper improved the scheme of Bo Zhu to reduce the number of operation for the round key addition, substitution, and permutation. The scheme that suggested in this paper has increased encryption throughput up to 1.6 times than the scheme of Bo Zhu but memory usage has been increased.

Privacy-preserving Customized Order Service Protocol based on Smart Contract in Smart Factory (프라이버시를 제공하는 스마트 컨트랙트 기반의 스마트 팩토리 주문제작 프로토콜)

  • Lee, YongJoo;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.215-222
    • /
    • 2019
  • Advances in technologies about 3D (three-dimensional) printing and smart factory related issues will have the effect of reducing the cost of building a smart factory and making various types of service available. Manufacturers and service providers of small assets work with outside experts to provide small amounts of customized ordering services. If customers have to disclose their private information to subscribe to a new service, they may be reluctant to use it and the availability of developed technology may cause slow progress. We propose a new protocol for customized order service for smart factory. The proposed approach is designed to meet requirements of security and based on smart contract in IoT convergence network. We analyzed the requirements of the proposed approach which provided anonymity, privacy, fairness, and non-repudiation. We compared it with closely related studies to show originality and differences.

Fusion of Blockchain-IoT network to improve supply chain traceability using Ethermint Smart chain: A Review

  • George, Geethu Mary;Jayashree, LS
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3694-3722
    • /
    • 2022
  • In today's globalized world, there is no transparency in exchanging data and information between producers and consumers. However, these tasks experience many challenges, such as administrative barriers, confidential data leakage, and extensive time delays. To overcome these challenges, we propose a decentralized, secured, and verified smart chain framework using Ethereum Smart Contract which employs Inter Planetary File Systems (IPFS) and MongoDB as storage systems to automate the process and exchange information into blocks using the Tendermint algorithm. The proposed work promotes complete traceability of the product, ensures data integrity and transparency in addition to providing security to their personal information using the Lelantos mode of shipping. The Tendermint algorithm helps to speed up the process of validating and authenticating the transaction quickly. More so in this time of pandemic, it is easier to meet the needs of customers through the Ethermint Smart Chain, which increases customer satisfaction, thus boosting their confidence. Moreover, Smart contracts help to exploit more international transaction services and provide an instant block time finality of around 5 sec using Ethermint. The paper concludes with a description of product storage and distribution adopting the Ethermint technique. The proposed system was executed based on the Ethereum-Tendermint Smart chain. Experiments were conducted on variable block sizes and the number of transactions. The experimental results indicate that the proposed system seems to perform better than existing blockchain-based systems. Two configuration files were used, the first one was to describe the storage part, including its topology. The second one was a modified file to include the test rounds that Caliper should execute, including the running time and the workload content. Our findings indicate this is a promising technology for food supply chain storage and distribution.

Application of blockchain in the food industry (식품 산업에서의 블록체인의 응용)

  • Kim, Sangoh
    • Food Science and Industry
    • /
    • v.54 no.3
    • /
    • pp.132-144
    • /
    • 2021
  • Along with the rise in the value of cryptocurrency, the interest of the blockchain is very high. However, most people do not understand cryptocurrency and blockchain very well. In addition, due to this lack of understanding of the technology, ideas about how blockchain technology can be applied in the food industry may not come up. Therefore, this content describes the advantages of blockchain technology in terms of security, starting with the understanding and operation method of cryptocurrency and blockchain technology, and briefly describes the development of a blockchain system. And simple examples of how this blockchain technology can be applied to other industries are summarized, and examples used in the food industry are summarized. Finally, it was insisted that using such a blockchain technology can provide safe food to consumers.

Mid to Long Term R&D Direction of UAV for Disaster & Public Safety (재난치안용 무인기 중장기 연구개발 방향)

  • Kim, Joune Ho
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.5
    • /
    • pp.83-90
    • /
    • 2020
  • Disasters are causing significant damage to the lives and property of our society and are recognized as social problems that need to be solved nationally and globally. The 4th industrial revolution technologies affecting society as a whole such as the Internet of Things(IoT), Artificial Intelligence(AI), Drones(Unmanned Aerial Vehicles), and Big Data are continuously absorbed into the disaster and safety industries as scientific and technological tools for solving social problems. Very soon, twenty-nine domestic UAV-related organizations/companies will complete the construction of a multicopter type small UAV integrated system ('17~'20) that can be operated at disaster and security sites. The current work considers and proposes the mid-to-long term R&D direction of disaster UAV as a strategic asset of the national disaster response system. First, the trends of disaster and safety industry and policy are analyzed. Subsequently, the development status and future plans of small UAV, securing shortage technology, and strengthening competitiveness are analyzed. Finally, step-by-step R&D direction of disaster UAV in terms of development strategy, specialized mission, platform, communication, and control and operation is proposed.

Data Transmission Method using Broadcasting in Bluetooth Low Energy Environment (저전력 블루투스 환경에서 브로드캐스팅을 이용한 데이터전송 방법)

  • Jang, Rae-Young;Lee, Jae-Ung;Jung, Sung-Jae;Soh, Woo-Young
    • Journal of Digital Contents Society
    • /
    • v.19 no.5
    • /
    • pp.963-969
    • /
    • 2018
  • Wi-Fi and Bluetooth technologies are perhaps the most prominent examples of wireless communication technologies used in the Internet of Things (IoT) environment. Compared to widely used Wi-Fi, Bluetooth technology has some flaws including 1:1 connection (one-way) between Master and Slave, slow transmission, and limited connection range; Bluetooth is mainly used for connecting audio devices. Since the release of Bluetooth Low Energy (BLE), some of the flaws of Bluetooth technology have been improved but it still failed to become a competitive alternative of Wi-Fi. This paper presents a method of data transmission through broadcasting in BLE and demonstrates its performance, one-to-many data transfer result. The Connection-Free Data Transmission proposed in this paper will hopefully be utilized in special circumstances requiring 1:N data transmission or disaster security network.

A Study on the IoT-based Blockchain Education Model (사물인터넷 기반 블록체인 교육모델에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.4
    • /
    • pp.77-83
    • /
    • 2021
  • In the 4th industrial revolution, research on various new technologies is being actively conducted. Among the new technologies of the 4th industrial revolution, interest in blockchain is very high. A lot of research on this kind of block chain is being actively conducted, centered on graduate schools. It is not easy for a university to operate a dedicated blockchain curriculum centered on undergraduate students. In such a situation, a variety of new blockchain ecosystems have been created to revitalize the blockchain-related industry, and many developments are being made with a lot of interest and effort. In this research, we intend to propose a university curriculum model for blockchain, which is important in the 4th industrial revolution. Regarding the blockchain education model, we propose a related blockchain education model focusing on the contents of operating an industry-oriented education course through the human resource nurturing process, and various blockchain education will be activated to achieve the blockchain industry development.