JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Study on the Security Technology of Real-time Biometric Data in IoT Environment
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Study on the Security Technology of Real-time Biometric Data in IoT Environment
Shin, Yoon-Hwan;
  PDF(new window)
 Abstract
In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.
 Keywords
IoT;Biological Data;Security;Ubiquitous Computing;
 Language
Korean
 Cited by
 References
1.
Bong-Im Jang, Chang-Su Kim, "A Study on the Security Technology for the Internet of Things", Journal of Security Engineering, Vol.11, No.5, pp.429-438, August 2014. crossref(new window)

2.
ITU-T Y.2060, Overview of the Internet of Things, 2012.

3.
Hye-Nam Kim, Yong Pa가, "Design of Context- Aware Middleware in Ubiquitous Computing Environment", Korea society of computer and information Vol.10, No.5, pp.115-122, November 2005.

4.
Lee, Ki-Young ; Kim, Dong-Oh, "Design of a Location Management System in the Ubiquitous Computing Environments", Journal of the Korea society of computer and information, Vol.12, No.6, pp.115-121, December 2007.

5.
http://www.bosa.co.kr/umap/sub.asp?news_pk=598466

6.
Yoon Hwan Shin, "Pattern Analysis of Biometric Data for the Needle Points Selection in Big Data Environments", PhD thesis, Chungbuk National University, August 2014.

7.
A. Wrigh(2009), Cyter security for the power grid: cyber security issues & Securing control system, ACM CCS, Nov.9-13; Chicago, IL, USA.

8.
Donghee Kim, Seokung Yoon, Yongpil Lee, "Security for the IoT Service", The Korean Institute of Communication and Information Sciences, Vol.30, No.8, pp.53-59, August 2013.

9.
Hae-soon Ahn, Eun-jun Yoon, Ki-dong Bu, In-gil Nam, "Secure and Efficient DB Security and Authentication Scheme for RFID System", journal of korean institute of communications and information sciences, Vol.36, No.4, pp.197-206, April 2011. crossref(new window)

10.
Howon Kim, "Security issues in the IoT Serives", Communications of the Korean Insitute of Information Scientists and Engineers, Vol.32, No.6, pp.37-41, June 2014.

11.
Jong-yeop Sung, Sang-duck Lee, Chang-ju Ryu, Seung-jo Han, "Mutual Authentication Protocol using One Time Password for Mobile RFID System", Journal of the Korea Institute of Information and Communication Engineering, Vol.18, No.7, pp.1634-1642, July 2014. crossref(new window)

12.
Bong-Hwan Kim, Jung-Mi Lim, Chang-Seop Park, "Analysis of ZigBee Security Mechanism", Journal of Security Engineering, Vol.9, No.5, pp.417-430, October 2012.