Fig. 1. IoT Environment Security Threats by Hierarchy [12]
Fig. 2. SDN Controller Architecture
Fig. 3. SDN Controller Process Flow Diagram [12]
Fig. 4. SDN Controller utilization technology flow chart [20,21]
Fig. 5. Measurement of defect rate by sampling application ratio change using SDN controller
Table 1. Internet of Things Technical stack [3,4]
Table 2. IoT Top Ten Technologies [4]
Table 3. Security Requirements by IoT Tier [14]
Table 4. IoT security technology research trend [17]
References
- S. H. Hong & H. J. Shin. (2017). Analysis of the Vulnerability of the IoT by the Scenario. Journal of the Korea Convergence Society, 8(9), 1-7. https://doi.org/10.15207/JKCS.2017.8.9.001
- J. O. Park. (2016). A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment. Journal of Digital Convergence, 14(10), 295-302. https://doi.org/10.14400/JDC.2016.14.10.295
- Maciej Kranz. (2017). The Core Objects of the Fourth Industrial Revolution The Future of the Internet IoT Innovation : First Books Publishing. ISBN 979-11-7022-121-0 03320 / 2017.7.24.001
- Things Internet World Forum Architecture Committee 2015. http://iotforum.kr
- Gartner. Top 10 Internet of Things Technologies for 2017 and 2018. https://www.gartner.com
- R. Di Pietro, S. Guarino, N. Verde & J. Domingo-Ferrer. (2014). Security in wireless ad-hoc networks-a survey. Comput. Commun. 51, 1-20. https://doi.org/10.1016/j.comcom.2014.06.003
- H. Gaur. (2013). Internet of things: thinking services.
- D. Miorandi, S. Sicari, F. De Pellegrini & I. Chlamtac. (2012). Internet of things: vision, applications and research challenges. Ad Hoc networks, 10(7), 1497-1516. https://doi.org/10.1016/j.adhoc.2012.02.016
- R. Roman & J. Zhou. (2013). On the features and challenges of security and privacy in distributed internet of things. Comput. Networks, 57(10), 2266-2279. https://doi.org/10.1016/j.comnet.2012.12.018
- R. H. Weber. (2013). internet of things-govemance quo vadis. Comput. Law Security Rev, 29(4), 341-347. https://doi.org/10.1016/j.clsr.2013.05.010
- J. H. Kim, H. M. Jung & H. J. Cho. (2017). Design Plan of Secure IoT System based Common Criteria. Journal of the Korea Convergence Society, 8(10), 61-66. https://doi.org/10.15207/JKCS.2017.8.1.061
- K. S. Jeon. (2016). IoT Security. https://kisa.or.kr
- J. O. Park. (2015). Verifying a Safe P2P Security Protocol in M2M Communication Environment. Journal of Digital Convergence, 13(5), 213-218. https://doi.org/10.14400/JDC.2015.13.5.213
- S. Li & L. Xu. (2017). Securing the Internet of Things : Acorn Publishing. ISBN 979-11-6175-039-2 / 2017.8.30.001
- B. Russell & D. V. Duren. (2017). Things Security Guide for the Internet Age : Acorn Publishing. ISBN 979-11-6175-041-5 / 2017.8.30.001
- S. S. Jang (2016). General Information Protection : Saengneung Publishing. ISBN 978-89-7050-848-1 93000 / 2016.10.31.001
- J. N. Kim & H. H. Jin. (2017). Internet(Iot) Security Technology for Security Threats in Second Connection Environment. The Journal of The Korean Institute of Communication Sciences, 34(3), 57-64.
- S. H. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. https://doi.org/10.15207/JKCS.2017.8.2.021
- J. S. Lee. (2018). A Study of protective measures of the source program for the development of the Internet of Things (IoT). Journal of the Korea Convergence Society, 9(4), 31-45. https://doi.org/10.15207/JKCS.2018.9.4.031
- H. Im, J. W. Kim, J. Na, T. J. Ha & C. Jung. (2016. 7). Intrusion detection method in network. Seoul : Metrocomnet Co., Ltd. ICT Research Institute
- M. H. Kang (2016). Completion of IDS and security control : Wowbooks Publishing. ISBN 978-89-94405-14-8 13560 / 2016.3.8.00