• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö > Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Current Result Document : 64 / 584 ÀÌÀü°Ç ÀÌÀü°Ç   ´ÙÀ½°Ç ´ÙÀ½°Ç

ÇѱÛÁ¦¸ñ(Korean Title) IoT ¿ÀÇ Ç÷§Æû ¾ÏÈ£±â¼ú ÇöȲ ¹× º¸¾È ¿ä±¸»çÇ× ºÐ¼®
¿µ¹®Á¦¸ñ(English Title) Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements
ÀúÀÚ(Author) ÃÖÁ¤ÀΠ  ¿ÀÀ±¼®   ±èµµ¿ø   ÃÖÀº¿µ   ¼­½ÂÇö   Choi Jung-In   Oh Yoon-Seok   Kim Do-won   Choi Eun Young   Seo Seung-Hyun  
¿ø¹®¼ö·Ïó(Citation) VOL 07 NO. 07 PP. 0183 ~ 0194 (2018. 07)
Çѱ۳»¿ë
(Korean Abstract)
IoT ±â¼úÀÇ ±Þ°ÝÇÑ ¹ßÀüÀ¸·Î ½º¸¶Æ®È¨À̳ª ½º¸¶Æ® ½ÃƼ¿Í °°Àº ´Ù¾çÇÑ Æí¸®ÇÑ ¼­ºñ½ºµéÀÌ ½ÇÇöµÇ¾ú´Ù. ±×·¯³ª ¹«ÀΠȯ°æ¿¡¼­ÀÇ IoT ±â±â´Â µµÃ» ¹× µ¥ÀÌÅÍ À§Á¶, ¹«´Ü ¾×¼¼½º·Î ÀÎÇÑ Á¤º¸ ´©Ãâ µî ´Ù¾çÇÑ º¸¾È À§Çù¿¡ ³ëÃâµÇ¾î ÀÖ´Ù. ¾ÈÀüÇÑ IoT ȯ°æÀ» ±¸ÃàÇÏ·Á¸é IoT ±â±â¿¡ ÀûÀýÇÑ ¾Ïȣȭ ±â¼úÀ» »ç¿ëÇØ¾ß ÇÑ´Ù. ±×·¯³ª IoT ±â±âÀÇ Á¦ÇÑµÈ ÀÚ¿øÀ¸·Î ÀÎÇØ ±âÁ¸ IT ȯ°æ¿¡ Àû¿ëµÈ ¾Ïȣȭ ±â¼úÀ» ±×´ë·Î Àû¿ëÇϴ°ÍÀº ºÒ°¡´ÉÇÏ´Ù. º» ³í¹®¿¡¼­´Â ¼º´É¿¡ µû¶ó IoT µð¹ÙÀ̽ºÀÇ ºÐ·ù¸¦ Á¶»çÇÏ°í IoT µð¹ÙÀ̽ºÀÇ º¸¾È ¿ä±¸ »çÇ×À» ºÐ¼®ÇÑ´Ù. ¶ÇÇÑ AllJoyn, oneM2M, IoTivity¿Í °°Àº IoT °³¹æÇü Ç¥ÁØ Ç÷§ÆûÀÇ ÇöÀç ¾Ïȣȭ ±â¼úÀÇ »ç¿ë ÇöȲÀ» Á¶»çÇÏ°í ºÐ¼®ÇÑ´Ù. ¾Ïȣȭ ±â¼ú »ç¿ë ÇöȲ¿¡ ´ëÇÑ ¿¬±¸¸¦ ±â¹ÝÀ¸·Î °¢ Ç÷§ÆûÀÌ º¸¾È ¿ä±¸»çÇ×À» ¸¸Á·ÇÏ´ÂÁö È®ÀÎÇÑ´Ù. °¢ IoT °³¹æÇü Ç÷§ÆûÀº ±â¹Ð¼º, ¹«°á¼º, ÀÎÁõ ¹× ÀÎÁõ°ú °°Àº º¸¾È¼­ºñ½º¸¦ Áö¿øÇϱâÀ§ÇÑ ¾Ïȣȭ ±â¼úÀ» Á¦°øÇÑ´Ù. ÇÏÁö¸¸ Ç÷¾Ð ¸ð´ÏÅ͸µ ¼¾¼­¿Í °°Àº ÀÚ¿øÀÌ Á¦ÇÑµÈ IoT ÀåÄ¡´Â ±âÁ¸ÀÇ ¾Ïȣȭ ±â¹ýÀ» Àû¿ëÇϱⰡ ¾î·Æ´Ù. µû¶ó¼­ ¹«ÀΠȯ°æ¿¡¼­ Àü·Â Á¦ÇÑ ¹× ÀÚ¿ø Á¦¾àÀ» ¹Þ´Â IoT ÀåÄ¡¿¡ ´ëÇÑ ¾Ïȣȭ ±â¼úÀ» ¿¬±¸ ÇÒ ÇÊ¿ä°¡ ÀÖ´Ù.
¿µ¹®³»¿ë
(English Abstract)
With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.
Å°¿öµå(Keyword) IoT ±â±â µî±Þ   IoT º¸¾È ¿ä±¸»çÇ×   IoT Ç÷§Æû   ¾ÏÈ£±â¼ú   IoT Device Class   IoT Security Requirements   IoT Platform   Cryptography  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå