DOI QR코드

DOI QR Code

Cyber Terror Threat Elimination Method Study for Safe Smart World

안전한 스마트월드를 위한 사이버 테러위협 제거 방안 연구

  • 한충희 (전력거래소 안전보안실/정보보안팀) ;
  • 한창희 (육군사관학교 교수부/AI연구센터)
  • Received : 2021.02.01
  • Accepted : 2021.03.29
  • Published : 2021.03.31

Abstract

Recently, large-scale research and efforts aimed at the smart world such as smart city, smart home, smart transportation, and smart care are continuing. As these smart worlds become more common, the expansion of connectivity with the Internet and the threat of cyber terrorism will be inevitable. Increasing the threat of cyber terrorism is increasing the likelihood of a massive disaster and safety accident. Therefore, in this paper, we examine smart worlds that are expanded in various forms and derive the security threat factors that smart worlds have. In addition, it is proposed to block the threat of terrorism from abroad if access from abroad is not required when constructing a smart world. Through this, we intend to present a method to eliminate cyber terror threats for the establishment and operation of a safe smart world.

최근 스마트 시티, 스마트 홈, 스마트 교통, 스마트 케어 등 스마트 월드를 지향하는 대규모의 연구와 노력이 계속되고 있다. 이러한 스마트 월드가 보편화 될수록 인터넷과의 연결성 확대와 사이버 테러위협의 확대는 필연적일 것이다. 이러한 사이버 테러위협의 확대는 엄청난 재난안전사고로 연결될 가능성을 점점 높이고 있다. 이에 본 논문에서는 다양한 형태로 확대되는 스마트 월드에 대해 살펴보고 스마트 월드들이 가지고 있는 보안 위협 요인을 도출한다. 또한, 스마트 월드의 구축시 해외로부터의 접근이 필요하지 않는다면 해외로부터의 테러위협을 봉쇄하는 방안을 제안한다. 이를 통해 안전한 스마트월드의 구축과 운영을 위한 사이버 테러위협 제거방안을 제시하고자 한다.

Keywords

References

  1. Guangjie Han, Haofei Guan, Zeren Zhou, Zhifan Li, "CTRA: A complex terrain region-avoidance charging algorithm in Smart World", Journal of Network and Computer Applications, volume 151, pp. 1 ~ 10, Feb. 2020.
  2. J. Ma, L.T. Yang, B.O. Apduhan, R. Huang, L. Barolli, M. Takizawa, "Towards a smart world and ubiquitous intelligence: A walkthrough from smart things to smart hyperspaces and UbicKids", International Journal of Pervasive Computing and Communications 1(1) pp. 53 ~ 68, 2005. https://doi.org/10.1108/17427370580000113
  3. Marcelo Masera, ettore F. BoMpard, "Smart (Electricity) Grids for Smart Cities: Assessing Roles and Societal Impacts Information Security", IEEE, vol. 106, No. 4, April. 2018.
  4. Won Jong-Hyuk, "Effects of Perceived Values and Perceived Risks on Public IoT Services Use Recognition and Use Intention", Doctor's Thesis, Department of Educational Administration of Graduate School of Hansung University, pp. 1~187, Dec. 2018.
  5. Jin Sang-Ki, "Life Satisfaction Depending on Digital Utilization Divide within People with Disabilities", The journal of Informatization Policy Vol. 26, No.3, pp.069-089, Sep. 2019.
  6. Lee Kyungwhan, "An Implementation of Cyber Security Governance System for IOT Enabled Smart City", Journal of Korean Institute Of Industrial Engineers, pp. 4381-4405, Apr. 2019.
  7. Act on the promotion of smart city development and industry, Act No 16388(Oct. 24, 2019), Ministry of Land, Infrastructure and Transport.
  8. Park GwanSu, "A Study on the Direction of Cyber infringement Response in Smart Home Environment", Master's Thesis, Department of Information Technology Graduate School of Aju University, pp. 1-19, Feb. 2019.
  9. KM. Tsui (2012), "Demand Response Optimization for Smart Home Scheduling Under Real-Time Pricing", IEEE Transactions on Smart Grid 2012.
  10. Yu Woo Young, "A Study on Access Control Policy Management between IoT Devices for Smart Home Security", Doctor's Thesis, Department of Security Convergence Graduate School of Chung-Ang University, pp. 1-115, Aug. 2018.
  11. KISA, Jeong Imyoung, "Analysis of Smart Transportation Security Vulnerability and Development for its Countermeasures", Korea Internet Security Agency, pp. 1~278, Nov. 2017.
  12. NIFDSE, "Smart Healthcare Medical Device Technology & Standard Strategy Report", National Institute of Food and Drug Safety Evaluation, pp. 1~84, Aug. 2018.
  13. IoT Security Alliance, "Cyber Security Guide for Smart Medical Service", Korea Internet Security Agency, pp. 1~27, May. 2018.
  14. Lee HooGee, 'A Study on Estimation of Malicious IP Storage Cycle in Security Monitoring Base', Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology Vol.7, No.7, pp. 953-962, July, 2017. https://doi.org/10.14257/ajmahs.2017.07.82
  15. Shin Kyoungsoo, 'A study on cyber threats from North Korea and counterstrategies', ChoongNam National Univ. Doctor's Thesis, pp. 103-239, Feb, 2018.
  16. Choi HaeGwon, 'Study on trend of DDoS threats and prevention for the Network Service Security Risk', JeonBuk Univ Master's Thesis, Feb, 2008.
  17. Han Choong-Hee, "Enhanced Security Control model for critical infrastructures with the blocking prioritization process to cyber threats in power system", International Journal of Critical Infrastructure Protection, Volume 26, 100312, Sept. 2019. (https://doi.org/10.1016/j.ijcip.2019.100312)