• Title/Summary/Keyword: IoT 결함

Search Result 645, Processing Time 0.026 seconds

A Study on Security Requirments Analysis through Security Threat Modeling of Home IoT Appliance (Home IoT 가전의 보안위협모델링을 통한 보안요구사항 분석에 관한 연구)

  • Yun, Suk-Jin;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • Today many companies are offering IoT-enabled products and place emphasis on security from the planning stage to protect their products and user information from external threats. The present security levels, however, remain low because the time and resources invested in developing security requirements for each device are far from enough to meet the needs of a wide range of IoT products. Nevertheless, vulnerabilities of IoT devices have been reported continuously, which calls for more detailed security requirements for home IoT devices. In this context, this research identified threats of home IoT systems by using Microsoft Threat Modeling Tool. It then suggested measures to enhance the security of home IoT devices by developing security assessment items through comparative analysis of the identified threats, domestic and global vulnerability assessment standards and related research. It also verified the effectiveness of the developed security requirements by testing them against the existing ones, and the results revealed the security requirements developed in this research proved to be more effective in identifying vulnerabilities.

Design and Satisfaction Analysis of Embedded IoT Course (임베디드 IoT 과목 설계 및 만족도 분석)

  • Hong, Jun-Ki;Paik, Jong Ho;Kang, Mingoo;Hong, Sung-Chan
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.19-26
    • /
    • 2019
  • Recently, the importance of the internet of things (IoT) education has been emphasized due to the progress of research on IoT technology. Therefore, universities require an efficient IoT course. In this paper, we propose an undergraduate IoT course using the Bluetooth function of smartphone and Arduino kit. The proposed embedded IoT class uses the Bluetooth capabilities of the smartphone to connect Arduino and activate various sensors to encourage students to become interested in the class. According to students' midterm and final exam scores, students programming skills have been improved since students' projects were in progress during the course. Further, according to students' survey, the proposed IoT class is very effective in understanding the embedded IoT and 75% of the students satisfied with the proposed course.

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

Wide Range loT Technology and Standardization based on LPWA (LPWA기반 광역 IoT기술 및 표준화)

  • Kim, S.Y.;Park, S.K.;Choi, H.D.
    • Electronics and Telecommunications Trends
    • /
    • v.31 no.2
    • /
    • pp.95-106
    • /
    • 2016
  • 사물인터넷(Internet of Things: IoT)이란 모든 사물이 인터넷에 연결되어 상호 간에 직접 통신하는, 향후 정보통신의 미래 인프라 및 서비스이다. 이것이 필요한 이유는 초연결 사회에 기반을 둔 삶의 질 향상과 생산성 향상에 있으며, 최종적으로는 국가 자체의 인프라, 더 나아가서는 인류를 위한 중추 신경계를 이루기 때문에 무엇보다 중요하다. IoT는 셀룰러 이동통신 기반의 IoT와 비셀룰러기반의 IoT로 대분되어 오다가 두 분야의 융합이 이루어지고 있다. 그러나 IoT는 현재 거품 최고조기에 있으며, 아직까지 주목할 만한 큰 수익모델이 없는 상태이다. 그 이유는 사물인터넷 서비스 활성화에 가장 걸림돌이 되어온 보안문제, 배터리수명, 통신거리, IoT 디바이스를 포함한 솔루션 가격 그리고 월정료 문제가 여전히 존재하기 때문이다. 최근 이들 문제 해결을 목적으로, 대량의 IoT 디바이스를 필요로 하는 새로운 사물인터넷 커넥티비티에 대한 재정의, 표준화 및 솔루션 개발이 핫이슈이다. 본고에서는 셀룰라 및 비셀룰라 IoT기반의 Low Power Wide Area(LPWA), 즉 저전력 광역 IoT에 대한 시장, 기술 및 솔루션 비교 그리고 표준화 동향을 다룬다. 또한, 비셀룰라기반 즉 비면허대역과 프리밴드 활용을 통한 기술적 및 정책적 대응전략을 살펴본다.

  • PDF

A Study of Data Communication Between the Web and the IoT Platform in WoT (WoT 환경에서 웹과 IoT 플랫폼 사이의 데이터 통신 연구)

  • Phyo, Gyung-soo;Park, Jin-tae;Moon, Il-young
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.4
    • /
    • pp.374-379
    • /
    • 2016
  • Recently, IoT(Internet of Things) to connect the objects and people has attracted attention. And it is rapidly developing. IoT is to develop, experts are predicting that the device is connected to the Internet to break through around 100 billion within 10 years. However, the current IoT companies are having a difficult state to the other each other IoT platform for interaction between data silos effects. These silos effects will limit the IoT grow to a larger market. Thus, the IoT service supplier shall develop an open platform for interaction IoT data between each IoT platform. These web technologies for current open IoT platform has emerged. If developers are using familiar, easy-to-learn Web technologies, developers can take advantage of a variety of services for the collected data, and found the IoT devices can be bypassed if there is a problem on the network. In this paper, we investigate the data communications technology that can be used in WoT environment to overcome these silos effects. As a result, the polling method that can simply send the IoT information the fastest.

A Study on improving manufacturing environment using IoT technology in small business environment (중소기업 환경에서 IoT 기술을 이용한 제조 환경 개선에 관한 분석 연구)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.83-90
    • /
    • 2017
  • To launch the product recently attached to IoT consumer electronics, smart phones and healthcare products around the large companies is a trend that is growing interest in the IoT. However, the country's small business environment is what the environmental improvement process that is easily accessible to the small business environment because the IoT technologies are difficult to apply the IoT technologies than any other country environment than desperate situation. In this paper, we propose a service operating model to improve production efficiency when the fusion manufacturing process is currently operating in the country SMEs and IoT technology. Proposed model using the manufacturing product information and sensor / dabayiseu information in the entire manufacturing process has as its object to utilize the IoT technology. Performance evaluation, the proposed model is more efficient than the previous model and 23.1% of the manufacturing process. In addition, it is increasing the manufacturing process was reduced by 17.3%, the average processing time as compared to the previous model. Finally, the personnel cost to be used in the manufacturing process was found to be an average decrease of 19.8% than previous model.

Network Security Protocol Performance Analysis in IoT Environment (IoT 환경에서의 네트워크 보안 프로토콜 성능 분석)

  • Kang, Dong-hee;Lim, Jae-Deok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.955-963
    • /
    • 2022
  • The Internet of Things (IoT), combined with various technologies, is rapidly becoming an integral part of our daily life. While it is rapidly taking root in society, security considerations are relatively insufficient, making it a major target for cyber attacks. Since all devices in the IoT environment are connected to the Internet and are closely used in daily life, the damage caused by cyber attacks is also serious. Therefore, encryption communication using a network security protocol must be considered for a service in a more secure IoT environment. A representative network security protocol includes TLS (Transport Layer Protocol) defined by the IETF. This paper analyzes the performance measurement results for TLS version 1.2 and version 1.3 in an IoT device open platform environment to predict the load of TLS, a representative network security protocol, in IoT devices with limited resource characteristics. In addition, by analyzing the performance of each major cryptographic algorithm in version 1.3, we intend to present a standard for setting appropriate network security protocol properties according to IoT device specifications.

A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure (IoT 인프라 공격 확산 방지 기술 성능 검증을 위한 악성코드 고속 확산 기법 연구)

  • Hwang, Song-yi;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.617-635
    • /
    • 2021
  • Internet of Things (IoT) devices connected to the network without appropriate security solutions have become a serious security threat to ICT infrastructure. Moreover, due to the nature of IoT devices, it is difficult to apply currently existing security solutions. As a result, IoT devices have easily become targets for cyber attackers, and malware attacks on IoT devices are actually increasing every year. Even though several security solutions are being developed to protect IoT infrastructure, there is a great risk to apply unverified security solutions to real-world environments. Therefore, verification tools to verify the functionality and performance of the developed security solutions are also needed. Furthermore, just as security threats vary, there are several security solution s that defend against them, requiring suitable verification tools based on the characteristics of each security solution. In this paper, we propose an high-speed malware propagation tool that spreads malware at high speed in the IoT infrastructure. Also, we can verify the functionality of the security solution that detect and quickly block attacks spreading in IoT infrastructure by using the high-speed malware propagation tool.

Trustworthy Service Selection using QoS Prediction in SOA-based IoT Environments (SOA기반 IoT환경에서 QoS 예측을 통한 신뢰할 수 있는 서비스 선택)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.123-131
    • /
    • 2019
  • The Internet of Things (IoT) environment must be able to meet the needs of users by providing access to various services that can be used to develop diverse user applications. However, QoS issues arise due to the characteristics of the IoT environment, such as numerous heterogeneous devices and potential resource constraints. In this paper, we propose a QoS prediction method that reflects trust between users in SOA based IoT. In order to increase the accuracy of QoS prediction, we analyze the trust and distrust relations between users and identify similarities among users and predict QoS based on them. The centrality is calculated to enhance trust relationships. Experimental results show that QoS prediction can be improved.

Development of Metrics to Measure Reusability of Services of IoT Software

  • Cho, Eun-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.151-158
    • /
    • 2021
  • Internet of Things (IoT) technology, which provides services by connecting various objects in the real world and objects in the virtual world based on the Internet, is emerging as a technology that enables a hyper-connected society in the era of the 4th industrial revolution. Since IoT technology is a convergence technology that encompasses devices, networks, platforms, and services, various studies are being conducted. Among these studies, studies on measures that can measure service quality provided by IoT software are still insufficient. IoT software has hardware parts of the Internet of Things, technologies based on them, features of embedded software, and network features. These features are used as elements defining IoT software quality measurement metrics. However, these features are considered in the metrics related to IoT software quality measurement so far. Therefore, this paper presents a metric for reusability measurement among various quality factors of IoT software in consideration of these factors. In particular, since IoT software is used through IoT devices, services in IoT software must be designed to be changed, replaced, or expanded, and metrics that can measure this are very necessary. In this paper, we propose three metrics: changeability, replaceability, and scalability that can measure and evaluate the reusability of IoT software services were presented, and the metrics presented through case studies were verified. It is expected that the service quality verification of IoT software will be carried out through the metrics presented in this paper, thereby contributing to the improvement of users' service satisfaction.