Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ
ÇѱÛÁ¦¸ñ(Korean Title) |
IoT ¿ÀÇ Ç÷§Æû ¾ÏÈ£±â¼ú ÇöȲ ¹× º¸¾È ¿ä±¸»çÇ× ºÐ¼® |
¿µ¹®Á¦¸ñ(English Title) |
Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements |
ÀúÀÚ(Author) |
ÃÖÁ¤ÀÎ
¿ÀÀ±¼®
±èµµ¿ø
ÃÖÀº¿µ
¼½ÂÇö
Choi Jung-In
Oh Yoon-Seok
Kim Do-won
Choi Eun Young
Seo Seung-Hyun
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 07 NO. 07 PP. 0183 ~ 0194 (2018. 07) |
Çѱ۳»¿ë (Korean Abstract) |
IoT ±â¼úÀÇ ±Þ°ÝÇÑ ¹ßÀüÀ¸·Î ½º¸¶Æ®È¨À̳ª ½º¸¶Æ® ½ÃƼ¿Í °°Àº ´Ù¾çÇÑ Æí¸®ÇÑ ¼ºñ½ºµéÀÌ ½ÇÇöµÇ¾ú´Ù. ±×·¯³ª ¹«ÀΠȯ°æ¿¡¼ÀÇ IoT ±â±â´Â µµÃ» ¹× µ¥ÀÌÅÍ À§Á¶, ¹«´Ü ¾×¼¼½º·Î ÀÎÇÑ Á¤º¸ ´©Ãâ µî ´Ù¾çÇÑ º¸¾È À§Çù¿¡ ³ëÃâµÇ¾î ÀÖ´Ù. ¾ÈÀüÇÑ IoT ȯ°æÀ» ±¸ÃàÇÏ·Á¸é IoT ±â±â¿¡ ÀûÀýÇÑ ¾ÏÈ£È ±â¼úÀ» »ç¿ëÇØ¾ß ÇÑ´Ù. ±×·¯³ª IoT ±â±âÀÇ Á¦ÇÑµÈ ÀÚ¿øÀ¸·Î ÀÎÇØ ±âÁ¸ IT ȯ°æ¿¡ Àû¿ëµÈ ¾ÏÈ£È ±â¼úÀ» ±×´ë·Î Àû¿ëÇϴ°ÍÀº ºÒ°¡´ÉÇÏ´Ù. º» ³í¹®¿¡¼´Â ¼º´É¿¡ µû¶ó IoT µð¹ÙÀ̽ºÀÇ ºÐ·ù¸¦ Á¶»çÇÏ°í IoT µð¹ÙÀ̽ºÀÇ º¸¾È ¿ä±¸ »çÇ×À» ºÐ¼®ÇÑ´Ù. ¶ÇÇÑ AllJoyn, oneM2M, IoTivity¿Í °°Àº IoT °³¹æÇü Ç¥ÁØ Ç÷§ÆûÀÇ ÇöÀç ¾ÏÈ£È ±â¼úÀÇ »ç¿ë ÇöȲÀ» Á¶»çÇÏ°í ºÐ¼®ÇÑ´Ù. ¾ÏÈ£È ±â¼ú »ç¿ë ÇöȲ¿¡ ´ëÇÑ ¿¬±¸¸¦ ±â¹ÝÀ¸·Î °¢ Ç÷§ÆûÀÌ º¸¾È ¿ä±¸»çÇ×À» ¸¸Á·ÇÏ´ÂÁö È®ÀÎÇÑ´Ù. °¢ IoT °³¹æÇü Ç÷§ÆûÀº ±â¹Ð¼º, ¹«°á¼º, ÀÎÁõ ¹× ÀÎÁõ°ú °°Àº º¸¾È¼ºñ½º¸¦ Áö¿øÇϱâÀ§ÇÑ ¾ÏÈ£È ±â¼úÀ» Á¦°øÇÑ´Ù. ÇÏÁö¸¸ Ç÷¾Ð ¸ð´ÏÅ͸µ ¼¾¼¿Í °°Àº ÀÚ¿øÀÌ Á¦ÇÑµÈ IoT ÀåÄ¡´Â ±âÁ¸ÀÇ ¾ÏÈ£È ±â¹ýÀ» Àû¿ëÇϱⰡ ¾î·Æ´Ù. µû¶ó¼ ¹«ÀΠȯ°æ¿¡¼ Àü·Â Á¦ÇÑ ¹× ÀÚ¿ø Á¦¾àÀ» ¹Þ´Â IoT ÀåÄ¡¿¡ ´ëÇÑ ¾ÏÈ£È ±â¼úÀ» ¿¬±¸ ÇÒ ÇÊ¿ä°¡ ÀÖ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.
|
Å°¿öµå(Keyword) |
IoT ±â±â µî±Þ
IoT º¸¾È ¿ä±¸»çÇ×
IoT Ç÷§Æû
¾ÏÈ£±â¼ú
IoT Device Class
IoT Security Requirements
IoT Platform
Cryptography
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|