• Title/Summary/Keyword: 스마트워크 보안 등

Search Result 165, Processing Time 0.021 seconds

Blockchain based SDN multicontroller framework for Secure Sat_IoT networks (안전한 위성-IoT 네트워크를 위한 블록체인 기반 SDN 분산 컨트롤러 구현)

  • June Beom Park;Jong Sou Park
    • The Journal of Bigdata
    • /
    • v.8 no.2
    • /
    • pp.141-148
    • /
    • 2023
  • Recent advancements in the integration of satellite technology and the Internet of Things (IoT) have led to the development of a sophisticated network ecosystem, capable of generating and utilizing vast amounts of big data across various sectors. However, this integrated network faces significant security challenges, primarily due to constraints like limited latency, low power requirements, and the incorporation of diverse heterogeneous devices. Addressing these security concerns, this paper explores the construction of a satellite-IoT network through the application of Software Defined Networking (SDN). While SDN offers numerous benefits, it also inherits certain inherent security vulnerabilities. To mitigate these issues, we propose a novel approach that incorporates blockchain technology within the SDN framework. This blockchain-based SDN environment enhances security through a distributed controller system, which also facilitates the authentication of IoT terminals and nodes. Our paper details the implementation plan for this system and discusses its validation through a series of tests. Looking forward, we aim to expand our research to include the convergence of artificial intelligence with satellite-IoT devices, exploring new avenues for leveraging the potential of big data in this context.

Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology (보안성이 향상된 퍼지추출 기술 기반 사용자 인증 및 키 동의 스킴)

  • Choi, Younsung;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2016
  • Information and network technology become the rapid development, so various online services supplied by multimedia systems are provided through the Internet. Because of intrinsic open characteristic on Internet, network systems need to provide the data protection and the secure authentication. So various researchers including Das, An, and Li&Hwang proposed the biometric-based user authentication scheme but they has some security weakness. To solve their problem, Li et al. proposed new scheme using fuzzy extraction, but it is weak on off-line password attack, authentication without biometrics, denial-of-service and insider attack. So, we proposed security enhanced user authentication scheme with key agreement to address the security problem of authentication schemes.

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

Review on the Terror Network in Smart Media Era (스마트미디어 시대의 테러네트워크에 관한 고찰)

  • Lim, You Seok;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.85-93
    • /
    • 2013
  • Today, the structure of terrorist organizations in the form of a variety of network complexity are evolving. However, terrorist organization not combining randomly generated network but preferential attachment a network. So, it's research should be preceded a better understanding about the characteristics and type of terror network for a effective counter-terrorism policy of law enforcement. In addition, the appropriate response strategy have to technique establish in an era of smart media. In particular, homegrown terrorist attacks on unspecified people without boundaries of countries and regions unlike the traditional terrorism. Also, homegrown terrorism are violence and criminal activity by new various of religion, politics, philosophy. Besides the extreme members of homegrown terror networks went grow up through the evolutionary process in the age of smart media. Law enforcement agencies must identify the terrorist network at the national level. Therefore, terror networks evolving in the online space, forming a radical homegrown terror organizations have access to the network. Intelligence community track terrorist networks and to block the negative aspects of the smart media outlets should be considered.

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

Effect of Smart Life on Politics, Society, Culture, and Economy (스마트라이프가 정치.사회.문화.경제에 미치는 영향)

  • Kim, Man-Ki
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.91-102
    • /
    • 2011
  • Smart work is deeply embedded in our contemporary lives. This is called Smart Life. The expansion of communication, caused by smart life is utilized for the political purposes of politicians, political candidates, and political policies. Chiefly, smart life includes improvement in awareness, personal relations, and policy advocacy. Socially, smart life leads the proliferation of issues and civil movement. In particular, smart life has a significant effect on culture. In the case of K-POP, it is disseminated going beyond space time. It enhances economic value added by joining and sharing at the same time. Smart life has numerous advantages such as improving the quality of life, but it might cause inconvenience depending on users because there are differences in acceptance according to generations. Due to the heavy weight on the device, there are some side-effects such as lacking in human thinking, disclosure in private life, lacking in basic securities, increase in information addicts who are anxious when they do not get on the Internet or SNS, and interference with work. However, this inconvenience can change into convenience when users are accustomed to it. Like this, smart life influences politics, economy, society, and culture a lot. Working environment of smart life is a new paradigm, which can generate high performance through working in an exciting and bright atmosphere with easy economy and putting value on results.

ICT기반 스마트에너지 인프라 플랫폼 연구

  • An, Yun-Yeong;Park, Chang-Min
    • Information and Communications Magazine
    • /
    • v.30 no.7
    • /
    • pp.58-62
    • /
    • 2013
  • 최근에 ICT 기반의 융합 서비스 분야로 인구 밀집지역인 메가 시티에서의 교통, 전력, 상/하수도, u-헬스, 안전/보안등의 문제들을 근본적으로 해결하기 위하여 ICT기반 개방형 플랫폼을 이용한 서비스 인프라 구축 및 개선을 위한 연구들이 많이 진행되고 있다. 이러한 ICT 기반의 융합 인프라 구축 서비스들은 M2M(Machine to Machine)과 D2D(Device to Device)를 기본 연결 수단으로 사용하고 있으며, 이들을 기반으로 서비스 정보 전달 및 제어 정보를 실시간으로 처리하기 위한 IP 기반의 플랫폼이 지원되어야만 융합 서비스가 지속적으로 제공 가능할 것이다. 이들 융합서비스 중에서 전력과 관련하여 한국의 스마트그리드 사업은 기후 변화 대응을 위하여CO2 배출을 줄이고, 에너지 효율을 향상하여 새로운 비즈니스 모델을 만들어 일자리와 신산업을 창출하기 위한 국가 프로젝트로 진행되었다. 그러나, 현재의 전력관련 국내 상황을 살펴보면 여름철과 겨울철에 반복적인 전력 수급 불안으로 인해 피크 전력에 대한 예비력이 부족하여 국가적인 재난인 블랙 아웃의 위기를 걱정하고 있는 실정이다. 본고에서는 한국의 스마트그리드 제주실증단지 사업과 관련하여 현황 및 개선 사항들을 알아보고, 향후 거점지구와 국가 단위의 서비스 확장을 위하여ICT 기반의 개방형 인프라 플랫폼 기술의 중요성을 강조하고자 한다. 이러한 M2M과 D2D를 기반으로 하는 융합 서비스의 성공적인 수행은ICT 기반의 개방형 플랫폼의 우선적인 개발이 필요하며, 플랫폼 기반의 디바이스 보급과 네트워크의 구축이 진행되어야 지속 가능한 융합 서비스를 제공할 수 있을 것이다.