2017³â Ãá°èÇмú´ëȸ
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
»ç¹°ÀÎÅÍ³Ý ±â¹ÝÀÇ ½Ã½ºÅÛÀ» À§ÇÑ º¸¾È Ãë¾à¼º ¹× °í·Á»çÇ× ºÐ¼® |
¿µ¹®Á¦¸ñ(English Title) |
Analyses of Security Consideration and Vulnerability based on Internet of Things |
ÀúÀÚ(Author) |
Àåâȯ
Á¶¼ºÈ£
ÀÌÁøÇù
±èÁ¤ÅÂ
Chang-hwan Jang
Sung-ho Jo
Jin-hyup Lee
Jung-Tae Kim
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 21 NO. 01 PP. 0491 ~ 0494 (2017. 06) |
Çѱ۳»¿ë (Korean Abstract) |
»ç¹°ÀÎÅͳÝ(IoT: Internet of Things)À̶õ °³³äÀÌ µµÀÔµÈ ÀÌ·¡·Î ¸¹Àº ICT °ü·Ã °´ë±¹µéÀÌ IoT ±â¼úÀ» Áö¿øÇÏ°í ÀÖÀ¸¸ç, 2014³â 5¿ù Á¤º¸Åë½ÅÀü·«À§¿øȸ¿¡¼´Â ¡®»ç¹° ÀÎÅÍ³Ý ±âº»°èȹ¡¯À» È®Á¤, ¹ßÇ¥ÇÏ¿´´Ù [1]. ¶ÇÇÑ ¿ÃÇØ 2¿ù 24ÀÏ¿¡ KISA(Çѱ¹ÀÎÅͳÝÁøÈï¿ø)¿¡¼´Â IoT, ICT °ü·Ã±â¾÷À» Áö¿øÇϴ â¾÷¡¤º¥Ã³ Áö¿ø¡¯K-Global ÇÁ·ÎÁ§Æ®¡¯¸¦ °ø°íÇÏ´Â µî IoT ºÐ¾ß¿¡ °üÇÑ »ç¾÷ÀÌ ´Ã¾î³ª°í ÀÖ´Ù. ÀÌ·¯ÇÑ »ç¹°ÀÎÅͳÝÀÇ ´Ù¾çÇÑ ¼ºñ½º¿¡ ¹ÝÇÏ¿© »ç¹° °£ ¶Ç´Â »ç¶÷°ú »ç¹° °£ À¯¡¤¹«¼± ³×Æ®¿öÅ©·Î »óÈ£ ¿¬°áµÇ´Â °úÁ¤¿¡¼ ¹ß»ýÇÏ´Â º¸¾È ÀûÀÎ À§Çù ¿ä¼Ò°¡ ¹ß»ýÇϱ⠽ÃÀÛÇÑ´Ù [2]. µû¶ó¼ º» ³í¹®¿¡¼´Â ÀÌ·¯ÇÑ »ç¹°ÀÎÅͳÝÀÇ º¸¾È À§ÇùÀÌ ¾î¶² °ÍÀÌ ÀÖ´ÂÁö, ¶ÇÇÑ ±×¿¡ µû¸¥ º¸¾È °í·Á»çÇ×À» ºÐ¼®ÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
Recently, IoT has been supported by ICT technology with a variety of ICT powers. In May 2014, Information and Communication Strategy Committee announced the ¡®Basic plan for Internet of Things¡¯. Also on Febuary 24 this SAME year, KISA(Korea Internet&Security Agency) provides many projects related to IoT, such as announcement of ¡®K-Global Project¡¯ for start-up and venture support related to IoT and ICT companies. In contrast to the various services of Internet of Things, when a connection is made between object-to-object or person-to-object wired and wireless networks, security threats have occurred in the process of communication. We analyzed these kinds of security threats related to Internet of things, and gave a consideration for requirement.
|
Å°¿öµå(Keyword) |
»ç¹°ÀÎÅͳÝ
Åë½Å
º¸¾È À§Çù
º¸¾È ¿ä±¸»çÇ×
À¯ºñÄõÅͽº
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|