• Title/Summary/Keyword: Secure IoT

Search Result 254, Processing Time 0.033 seconds

Assessment of Collaborative Source-Side DDoS Attack Detection using Statistical Weight (통계적 가중치를 이용한 협력형 소스측 DDoS 공격 탐지 기법 성능 평가)

  • Yeom, Sungwoong;Kim, Kyungbaek
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.10-17
    • /
    • 2020
  • As the threat of Distributed Denial-of-Service attacks that exploit weakly secure IoT devices has spread, research on source-side Denial-of-Service attack detection is being activated to quickly detect the attack and the location of attacker. In addition, a collaborative source-side attack detection technique that shares detection results of source-side networks located at individual sites is also being activated to overcome regional limitations of source-side detection. In this paper, we evaluate the performance of a collaborative source-side DDoS attack detection using statistical weights. The statistical weight is calculated based on the detection rate and false positive rate corresponding to the time zone of the individual source-side network. By calculating weighted sum of the source-side DoS attack detection results from various sites, the proposed method determines whether a DDoS attack happens. As a result of the experiment based on actual DNS request to traffic, it was confirmed that the proposed technique reduces false positive rate 2% while maintaining a high attack detection rate.

Lightweight AES-based Whitebox Cryptography for Secure Internet of Things (안전한 사물인터넷을 위한 AES 기반 경량 화이트박스 암호 기법)

  • Lee, Jin-Min;Kim, So-Yeon;Lee, Il-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1382-1391
    • /
    • 2022
  • White-box cryptography can respond to white-box attacks that can access and modify memory by safely hiding keys in the lookup table. However, because the size of lookup tables is large and the speed of encryption is slow, it is difficult to apply them to devices that require real-time while having limited resources, such as IoT(Internet of Things) devices. In this work, we propose a scheme for collecting short-length plaintexts and processing them at once, utilizing the characteristics that white-box ciphers process encryption on a lookup table size basis. As a result of comparing the proposed method, assuming that the table sizes of the Chow and XiaoLai schemes were 720KB(Kilobytes) and 18,000KB, respectively, memory usage reduced by about 29.9% and 1.24% on average in the Chow and XiaoLai schemes. The latency was decreased by about 3.36% and about 2.6% on average in the Chow and XiaoLai schemes, respectively, at a Traffic Load Rate of 15 Mbps(Mega bit per second) or higher.

A Fundamental Study on Structure Health Monitoring System Based on Energy Harvesting of Harbour Structure (자가발전기반 항만 구조물 건전성 모니터링 시스템에 대한 기초연구)

  • Jong-Hwa Yi;Seung-Hyeon Lee;Young-seok Kim;Chul Park
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.4
    • /
    • pp.847-860
    • /
    • 2022
  • Purpose: The purpose of this paper is to present a basic study on the development of a self-generation infrastructure for monitoring the health of harbour structures. Method: By developing a self-generation system and fiber optic sensors for seawater, the study provides basic research data on port structure health monitoring. Result: Through sunlight simulation analysis, 4-5 hours of sunlight can be secure in the domestic environment. Through this, the optical splitter (Introgate) that collects the raw data from the FBG sensor applicable to seawater, the MCU that calculates it, the IoT module with wireless communication functionality, the monitoring server and the supply system are set up. Conclusion: Monitoring port structures directly with fiber optic probes (FBG) and the possibility of using selfpowered systems were confirmed.

ITU-R Study on Frequency Sharing for Mobile Satellite Services (ITU-R의 이동위성업무 주파수 공유 연구 현황)

  • B.J. Ku;D.S. Oh
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.1
    • /
    • pp.55-64
    • /
    • 2023
  • Recently, preparations for 6G have led to the increasing interest in integrated or hybrid communication networks considering low-orbit satellite communication networks with terrestrial mobile communication networks. In addition, the demand for frequency allocation for new mobile services from low-orbit small satellites to provide global internet of things (IoT) services is increasing. The operation of such satellites and terrestrial mobile communication networks may inevitably cause interference in adjacent bands and the same band frequency between satellites and terrestrial systems. Focusing on the results of the recent ITU-R WP4C meeting, this study introduces the current status of frequency sharing and interference issues between satellites and terrestrial systems, and frequency allocation issues for new mobile satellite operations. Coexistence and compatibility studies with terrestrial IMT in L band and 2.6 GHz band, operated by Inmassat and India, respectively, and a new frequency allocation study (WRC-23 AI 1.18) are carried out to reflect satellite IoT demand. For the L band, technical requirements have been developed for emission from IMT devices at 1,492 MHz to 1,518 MHz to bands above 1,518 MHz. Related studies in the 2 GHz and 2.6 GHz bands are not discussed due to lack of contributions at the recent meeting. In particular, concerning the WRC-23 agenda 1.18 study on the new frequency allocation method of narrowband mobile satellite work in the Region 1 candidate band 2,010 MHz to 2,025 MHz, Region 2 candidate bands 1,695 MHz to 1,710 MHz, 3,300 MHz to 3,315 MHz, and 3,385 MHz to 3,400 MHz, ITU-R results show no new frequency allocation to narrow mobile satellite services. Given the expected various collaborations between satellites and the terrestrial component are in the future, interference issues between terrestrial IMT and mobile satellite services are similarly expected to continuously increase. Therefore, participation in related studies at ITU-R WP4C and active response to protect terrestrial IMT are necessary to protect domestic radio resources and secure additional frequencies reflecting satellite service use plans.

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

A Study on Drone Nozzle Design for Greenhouse Shading (온실차광을 위한 드론 전용노즐 설계에 관한 연구)

  • Ungjin Oh;Jin-Taek Lim
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.4
    • /
    • pp.249-254
    • /
    • 2023
  • Recently, the distribution of drones is being activated by saving farmers' working time and protecting them from harmful human bodies from pesticides due to the mission of spraying pesticides using drones. It is possible to compensate for various shortcomings derived from the existing pesticide spraying method, wide-area control and helicopter control. Recently, the smart farm expansion policy has actively used it to generate profits for farmers by increasing harvests by monitoring growth information of various crops based on IoT in real time and collecting big data on key variables, and related drone industry technologies are also being developed. In this study, drones were applied to the work of shading greenhouses to secure diversity in agricultural application fields, and basic research on the greenhouse environment was conducted to materialize the technology related to shading. In order to provide high-quality light in consideration of the internal and external environment of the green house, basic research was conducted to enable light-shielding missions using drones through nozzle design for uniform spraying of nozzles of drones, light-transmitting rate analysis of green houses, and light-shielding agent application experiments.

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.

A Study on Application Design Scenarios for the Gas Safety Field Workers -focused on the pipe work- (가스 작업 안전 앱 시나리오 설계에 대한 연구 -배관 작업을 중심으로-)

  • Lee, Jooah;Kim, Mi-Hye;Kang, Bong Hee
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.273-281
    • /
    • 2016
  • The issue about the safety management of gas related work has been studied toward a direction to utilize IoT system recently. For this purpose, the matters of user's demand has been deduced through the literature survey, field survey, and professional consultation, by studying the characteristics of worker, work, and work site. In summary, these are the demands for mobile App, 1)a clear arrangement of contents, 2)a design with high readability, 3)a design with low death, 4) securing of user's accessibility, 5)an effective information transmission plan in the work section where it is impossible to operate the mobile device, 6)an activation of alarm function at the section of high working error, 7)a fast two-way transmission and receipt of safety inspection matter needed at work, 8)a selection of images and contents that can guide the situation to the worker in case of accident, 9)an alarm function for the degree of danger in an area of worker's location. Based on these, a basic design of safety application for gas related work has been proposed, that can secure the user accessibility.

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment (스마트 홈 환경에서 디바이스 상호 인증 및 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.661-667
    • /
    • 2018
  • Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.

Design of Smart Digital Door Lock System Using Heterogeneous Communication (이종 통신을 이용한 스마트 디지털 도어락 시스템 설계)

  • Han, Yong-Sik;Cho, Hyun-Chul;Park, Jin-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.45-52
    • /
    • 2018
  • In this paper, we propose smart digital door lock system using heterogeneous communication. This system has efficient function using RF communication and Internet communication, and realizes access and real image of the passengers by combining camera control technology to secure original competitiveness with existing products. It uses the Internet of things and receive images to and from your smart-phone. And senses human behavior. In the simulated results, the image transmission rate of 90 % or more and the time required to transmit 10,000 images have an average transmission speed of 3 seconds. It is expected to secure competitiveness to increase the security of door lock in the future by enabling minimum security and fire monitoring service in real time.