DOI QR코드

DOI QR Code

Smart Device Security Technology for Cyber Defense

사이버 국방을 위한 스마트 단말 보안기술

  • Received : 2012.08.17
  • Accepted : 2012.10.16
  • Published : 2012.10.30

Abstract

As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

스마트폰과 같은 스마트 모바일 단말의 활용이 급증하면서 군에서도 스마트 단말을 이용하여 전투를 지휘하고 전장에서 활용하고자 하는 움직임이 있다. 이에 따라 미래전은 각종 정보통신기술이 융합된 스마트 모바일 단말이군의 지휘통제체계를 포함한 각종 무기체계에 접목되면서 전쟁양상의 일대 변화를 일으킬 가능성이 존재하며, 합동 전투지휘를 위한 스마트폰 기반의 실시간 정보기술은 감시정찰, 지휘통제체계에 융합되어 국방-IT 융합에 대표적인 사례가 될 것이다. 더 나아가서 이동망과 무선망 환경에 최적화된 모바일 단말 보안기술은 무인화체계인 국방로봇에 적용이 가능할 것이다. 이 논문에서는 전투지휘체계를 지원하거나 군사용으로 쓰이는 스마트 단말 동향을 살펴보고 보안 위협요소와 함께 이들 위협에 대응하기 위한 군사용 모바일 단말 보안기술 동향을 소개하고자 한다.

Keywords

References

  1. KISA, "Internet & Security issues", 2010.03.
  2. Ki-young Kim, Dong-ho Kang, "Smart phone security technology at open mobile environment", Korean Institute of Information Scientists and Engineers, vol. 19, no. 5, 2009.12.
  3. Ji-eon Lyu, "Key enabler of the smart phone: Software", SW Insight, 2009.04.
  4. Gwang-ho Baek, "Recent trends in research and technology of Secure Execution Environment", Electronics and Telecommunications Trends, vol. 22, no. 5, 2007.10.
  5. ARM, "ARM Security Technology Building a Secure System using TrustZone Technology", Apr. 2009. pp1-108.
  6. Trusted Computing Group, "TCG specification architecture overview. specification revision 1.4", Aug. 2, 2007. pp1-54.
  7. Trusted Computing Group, "TCG mobile trusted module specification. Specification version 1.0, revision 6", June 26, 2008. pp1-105.
  8. Trusted Computing Group, "TCG mobile reference architecture. Specification version 1.0, revision 1", June 12, 2007. pp1-87.
  9. Reiner Sailer, "Xiaolan zhang, Trent faeger, Leendert van doorn: design and Implementation of a TCG-based integrity measurement architecture", 13th Usenix Security Symposium, June 27, 2004.
  10. Ji-ho Bang, Lan Ha, Pil-young Kang and Hong-geon Kim, "Security verification framework for e-GOV mobile App.", Journal of the Korean Institute of Communications and Information Sciences, vol.37, no.2, pp119-131, .2012. https://doi.org/10.7840/KICS.2012.37C.2.119