DOI QR코드

DOI QR Code

Cybersecurity of The Defense Information System network connected IoT Sensors

IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구

  • Han, Hyun-Jin (Department of Convergence Engineering, Hoseo Graduate School of Venture) ;
  • Park, Dea-Woo (Department of Convergence Engineering, Hoseo Graduate School of Venture at Hoseo University)
  • Received : 2020.05.27
  • Accepted : 2020.06.02
  • Published : 2020.06.30

Abstract

The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

IoT(Internet of Things)는 센서 기술의 발전과 고속의 통신 인프라를 바탕으로 네트워크에 연결되는 단말의 수가 사람의 수보다 더 많아지고 있고 그 증가도 매우 빠르다. 기존 유선부터 무선네트워크까지 연결되는 IoT의 수가 증가하면서 동시에 사이버 위협도 증가하고 있다. 국방분야도 작전, 군수, 기지방어, 정보화 등 다양한 분야에서 IoT의 필요성은 증가하고 있다. PC/서버의 정보보호체계와는 다르게 정보보호가 취약한 IoT Sensor가 네트워크에 증가함에 따라 사이버 위협도 증가하고 있어 국방정보통신망(이하 국방망)을 보호하기 위한 플랫폼 연구가 필요하다. 본 연구에서는 유·무선 IoT를 국방망에 연결하는 사례를 알아보고 국방망과 접점을 최소화한 보안성이 강화된 IoT 통합 독립 네트워크의 효율적인 연동 설계 방안을 제시하였다.

Keywords

References

  1. U. S. Choi, The rulers of future after 4th Industrial Revolution, Business Books Press, 2019.
  2. J. S. Kim, How to connect all things of Hyper-connect society, Wikimedia Press, 2019.
  3. J. J. Lee, Hacker penetrates internal network through Defense Data Center [Internet]. Available: https://www.yna.co.kr/view/AKR20161207026700014.
  4. S. L. Yu, K. M. Lee, Y. S. Yun, and J. M. Hong, "An Autonomous IoT Programming Paradigm Supporting Neuromorphic Models and Machine Learning Models," Journal of the Korean Institute of Information Scientists and Engineers, vol. 47, no. 3, pp. 310-318, Mar. 2020.
  5. S. H. Kim, Intelligence Smart Wing construction phase 2[Internet]. Available: http://m.cndnews.co.rk/226712.
  6. K. Sheridan, New IoT Botnet Discovered 120K IP Cameras At Risk of Attack [Internet]. Available: https://www.darkrading.com/attacks-breach es/new-iot-botnet-discovered-120k-ip-cameras-at-risk-of-attack/d/d-id/1328839.
  7. D. H. Lee and N. J. Park, "Institutional improvements for security of IoT Devices," Korea Institute of Information Security And Cryptology, vol. 27, no. 3, pp. 607-615, Jun. 2017.
  8. D. H. Lee and N. J. Park, "IoT Secure Identification and Security management," Korea Institute of Communication Sciences, vol. 33, no. 12, pp. 28-34, Nov. 2016.
  9. H. J. Han and T. W. Kwan, "A Method to Improve Location Estimation of Sensor Node," Korea Institute of Communication Sciences, vol 34, no. 12, pp. 1491-1497, Dec. 2009.
  10. D. H. Lee, S. W. Yun, and Y. P. Lee, "Security for IoT Service," Korea Institute of Communication Sciences, vol. 30, no. 8, pp. 53-59, Jul. 2013.
  11. vpn-Mentor, Can I VPN Hacking [Internet]. Available: https://ko.vpnmentor.com/blog/vpn.