DOI QR코드

DOI QR Code

Technology and Policy Post-Security Management Framework for IoT Electrical Safety Management

IoT 제품의 안전 관리를 위한 기술 및 정책적 사후 보안관리 프레임워크

  • Lee, Donghyeok (Elementary Education Research Institute, Dept. of Computer Education, Jeju National University) ;
  • Park, Namje (Dept. of Computer Education, Teachers College, Jeju National University)
  • Received : 2017.09.29
  • Accepted : 2017.11.14
  • Published : 2017.12.01

Abstract

The Internet of Things (IoT) environment has been gradually approaching reality, and although it provides great convenience, security threats are increasing accordingly. For the IoT environment to settle safely, careful consideration of information security is necessary. Although many security measures in the design and development stages of IoT products have been studied thus far, apart from them, the establishment of systems and countermeasures for post management after the launch of IoT products is also very important. In the present paper, a technical and policy post-security management framework is proposed to provide secure IoT environments. The proposed framework defines the concrete response procedures of individual entities such as users, manufacturers, and competent authorities in the case of the occurrence of security flaws after launching IoT products, and performs appropriate measures such as software updates and recalls based on an assessment of the risk of security flaws.

Keywords

References

  1. Sungmin Rue, "Survey on the Platform of IoT and Big Data", Korea Institute of Information Technology Magazine, Vol. 13, No. 2, pp. 19-25, Dec. 2015. https://doi.org/10.14801/jkiit.2015.13.5.19
  2. Jun Jong Am, Kim Nae Soo, Park Jeong Kil, Park Tae Jun, and Kang Ho Yong, "IoT device products and technology trends", The Journal of The Korean Institute of Communication Sciences, Vol. 31, No. 4, pp. 44-52, Mar. 2014.
  3. Hyun Jung La, Chun Woo Park, and Soo Dong Kim, "A Framework for Effectively Managing Dynamism of IoT Devices", Journal of KISS : Software and Applications Vol. 41, No. 8, pp. 545-556, Aug. 2014.
  4. Kang Nam Hee, "Standard Technology Trends for Internet Security of Things", The Journal of The Korean Institute of Communication Sciences, Vol. 31, No. 9, pp. 40-45, Aug. 2014.
  5. Babar, Sachin, et al., "Proposed security model and threat taxonomy for the Internet of Things (IoT)", In International Conference on Network Security and Applications, pp. 420-429, Jul. 2010.
  6. Zhou, Liang and Han-Chieh Chao, "Multimedia traffic security architecture for the internet of things", IEEE Network 25.3, 2011.
  7. Kang Nam Hee, "Things Internet Convergence Services Security Requirements", The Journal of The Korean Institute of Communication Sciences, Vol. 32, No. 12, pp. 45-50, Nov. 2015.
  8. Kim Dong Hee, Yun Seok Woong, and Lee Yong Pil, "Security for IoT services", The Journal of The Korean Institute of Communication Sciences, Vol. 30, No. 8, pp. 53-59, Jul. 2013.
  9. Park N and Kang N, "Mutual authentication scheme in secure internet of things technology for comfortable lifestyle", Sensors, Vol. 16, No. 1, pp. 1-16, 2016. https://doi.org/10.1109/JSEN.2016.2616227
  10. Kim Seon-Tae, Lim Chae-Deok, Jung Hee-Bum, and Han Dong-Won, "Trend on Lightweight IoT Device Platforms", Korea Institute of Information Technology Magazine, Vol. 13, No. 2, pp. 1-8, Dec. 2015.
  11. Nam-Uk Lee, Seung-Su Yang, Jae-Sung Shim, and Seok-Cheon Park, "Comparative Analysis of Low Power and Lightweight Encryption Algorithm for IoT Security", Proceedings of Korean Society For Internet Information Conference, Vol. 17, No. 2, pp. 249-250, Nov. 2016.
  12. Donghyeok Lee, and Namje Park, "Geocasting- based synchronization of Almanac on the maritime cloud for distributed smart surveillance." The Journal of Supercomputing, Vol. 73, No. 3, Feb. 2016.
  13. Donghyeok Lee, and Namje Park, "A Study on Metering Data De-identification Method for Smart Grid Privacy Protection", Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 6, Dec. 2016.
  14. Lee D, Park N, "Electronic identity information hiding methods using a secret sharing scheme in multimediacentric internet of things environment", Personal and Ubiquitous Computing. DOI 101007/s00779-017-1017-1, 2017.
  15. Park N, Hu H, Jin Q, et al., "Security and privacy mechanisms for sensor middleware and application in internet of things (IoT)", Int J Distrib Sens Netw, Article 2965438, 2016.
  16. Park N and Bang H-C, "Mobile middleware platform for secure vessel traffic system in IoT service environment", Security Communication Network, Vol. 9, No. 6, pp. 500-512, 2016. https://doi.org/10.1002/sec.1108