JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Threats Analysis and Mobile Key Recovery for Internet of Things
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Threats Analysis and Mobile Key Recovery for Internet of Things
Lee, Yunjung; Park, Yongjoon; Kim, Chul Soo; Lee, Bongkyu;
  PDF(new window)
 Abstract
IoT should be considered security risk environments such as various platforms and services including smart devices that can be mounted on household electric appliances, healthcare, car, and heterogeneous networks that are connected to the Internet, cloud services and mobile Apps.. In this paper, we provide analysis of new security threats, caused by open-platform of IoT and sensors via the Internet. Also, we present the key recovery mechanism that is applied to IoT. It results to have compatibility with given research, reduces network overhead, and performs key recovery without depending on key escrow agencies or authorized party.
 Keywords
IoT Security;Smart Devices;Sensor;Mobile Key Recovery;
 Language
Korean
 Cited by
 References
1.
Gartner Says the Internet of Things Installed Base Will Grow to 26 Billion Units By 2020 (2012), http://www.gartner.com/newsroom/id/2636073. (accessed Mar., 2, 2016)

2.
VPN Haus, The Internet of Vulnerable Things: Why Remote Access Security is Critical, 2014.

3.
Y. Park and Y. Lee, "A Study on Countermeasure for Privacy in Mobile Office," Journal of Korea Multimedia Society, Vol. 18, No. 2, pp. 178-188, 2015. crossref(new window)

4.
Ministry of Sciencem, Information Security Load-Map for IoT, 2014.

5.
Blackhat, https://www.blackhat.com/us-14/. (accessed Mar., 2, 2016)

6.
Y. Park and Y. Lee, "A Study on Security Threats and Countermeasures for Internet of Things," Proceedings of the Summer KICS Conference, pp. 41-42, 2015.

7.
6LoWPAN, http://www.ietf.org/wg/concluded/6lowpan.html/. (accessed Mar., 2, 2016)

8.
K. Hartke, Observing Resources in CoAP, IETF Internet Draft, 2014.

9.
Y. Lee and D. Kim, “Threats Analysis, Requirements and Considerations for Secure Internet of Things,” International Journal of Smart Home, Vol. 9, No. 12, pp. 191-198, 2015. crossref(new window)

10.
Y. Rhee, "Key Recovery for IETF Internet Protocol Based on TTP," The Journal of the Korea Contents Association, Vol. 6, No. 6, pp. 56-63, 2006.

11.
Y. Rhee and T.Y. Kim, "Practical Solutions to Key Recovery Based on PKI in IP Security," Lecture Notes in Computer Science, Vol. 2434, pp. 44-52, 2002.

12.
Y. Rhee, C.S. Kim, and B. Lee, “IPSec Key Recovery for IKEv2,” Journal of the Korea Academia-Industrial Cooperation Society, Vol. 11, No. 4, pp. 1260-1265, 2010. crossref(new window)

13.
N. Moon, S. Yong, J. Oh, and T. Cho, “A Study on Privacy for the Services in Digital Convergence,” Journal of Korea Multimedia Society, Vol. 10, No. 4, pp. 24-32, 2006.