DOI QR코드

DOI QR Code

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment

산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구

  • Na, Onechul (Department of Security Convergence, Graduate School, Chung-Ang University) ;
  • Lee, Hyojik (Department of Security Convergence, Graduate School, Chung-Ang University) ;
  • Sung, Soyoung (Department of Security Convergence, Graduate School, Chung-Ang University) ;
  • Chang, Hangbae (Department of Industrial Security, College of Business and Economics, Chung-Ang University)
  • 나원철 (중앙대학교 대학원 융합보안학과) ;
  • 이효직 (중앙대학교 대학원 융합보안학과) ;
  • 성소영 (중앙대학교 대학원 융합보안학과) ;
  • 장항배 (중앙대학교 산업보안학과)
  • Received : 2015.06.08
  • Accepted : 2015.08.20
  • Published : 2015.08.31

Abstract

WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

융합환경의 대표적인 도구인 WSN은 환경 구성의 기본 인프라에서부터 기업의 재고-생산-유통 관리에 이르는 비즈니스 모델까지 다양한 방향으로 활용되고 있다. 그러나, 안전하게 보호되어야 할 조직의 고유정보가 WSN과 같은 ICT와 융합되어 정보화 되면서 외부로 손쉽게 유출될 수 있는 위험에 놓여져 있다. 이에 따라, 안정적인 기업의 비즈니스를 위하여 보안성 있는 센서노드의 배치 전략이 필요한 시점이다. 조직의 보안현황을 고려하지 않은 단편적인 보안성 강화전략의 수립은 보안사고 발생 시 조직의 비즈니스 연속성에 큰 영향을 미친다. 그러나 그간의 조직의 보안성 진단을 위한 보안 수준평가 모형들은 대부분 기술적 중심의 측정방법이 진행되고 있으며, 관리적 요인과 환경적 요인에 대한 연구는 매우 부족한 상태이다. 따라서, 본 연구에서는 보안성 있는 센서노드 배치전략을 수립하기 위하여 융합환경을 기반으로 조직의 보안성을 진단하고 이에 따르는 전략수립방안을 연구하고자 한다.

Keywords

References

  1. A. D'osta and A. M. Sayeed. Collaborative signal processing for distributed classification in sensor networks. In Proc. IPSN, Palo Alto, CA, 2003.
  2. Adam Silberstein, Rebecca Braynard, Carla Ellis, Kamesh Munagala, and Jun Yang, 2006, A Sampling-Based Approach to Optimizing Top-k Queries in Sensor Networks, Data Engineering, 2006. ICDE '06. Proceedings of the 22nd International Conference on, pp. 68, 2006.
  3. C. Moallemi and B. Van Roy, Distributed optimization in adaptive networks. In Proc. NIPS, Vancouver, BC, Canada, 2003.
  4. Da Veiga A, Eloff JHP., An information security governance framework, Information Systems Management, Vol. 24, No. 4, pp. 361-372, 2007. https://doi.org/10.1080/10580530701586136
  5. Jonggu Kang, Jaewhan Lim, Hongjoo Lee, Hangbae Chang, A Study on Classification of Information Asset Considering Business Process Characteristics for Small IT Service Organization, The Journal of Society for e-business Studies, vol. 16, No.4, pp. 97-108., 2011.
  6. Ken H. Guo, Security-Related Behavior in Using Information Systems in the Workplace: A Review and Synthesis, Computer&Security, Vol. 32, pp. 242-251, 2013.
  7. Martins A, Eloff JHP., Information security culture, IFIP/SEC2002. In: Security in the information society, Boston: Kluwer Academic, pp. 203-214, 2002.
  8. Michael Rabbat and Robert Nowak, Distributed Optimization in Sensor Networks, IPSN '04 Proceedings of the 3rd international symposium on Information processing in sensor networks, pp. 20-27, 2004.
  9. Mohamed Younis, Kemal Akkaya, Strategies and techniques for node placement in wireless sensor networks: A survey, Ad Hoc Networks, Vol. 6, Issue 4, pp. 621-655, 2008. https://doi.org/10.1016/j.adhoc.2007.05.003
  10. Niki Trigoni, Yong Yao, Alan Demers, Johannes Gehrke, Rajmohan Rajaraman, Multi-query Optimization for Sensor Networks, Vol. 3560, pp. 307-321, 2005.
  11. Robbins S, Odendaal A, Roodt G., Organizational Behaviour - Global and Southern African perspectives, Cape Town: Pearson Education South Africa, 2003
  12. Robert Nowak and Urbashi Mitra, Boundary Estimation in Sensor Networks: Theory and Methods, Lecture notes in computer science, Vol. 2634, pp. 80-95, 2003
  13. Ruighaver AB, Maynard SB, Chang S. Organisational security, culture: extending the end-user perspective. Computers and Security, No. 26, pp. 56-62, 2007.
  14. Kyoung-nam Kim, Lee, Jae Moon, Sunghyuck Hong, MyounJae Lee, Convergent Secure Wireless Sensor Network Routing Algorithm, Journal of the Korea Convergence Society, Vol. 6, No. 1, pp. 65-70, 2015. https://doi.org/10.15207/JKCS.2015.6.1.065
  15. Myung-Seong, Yim, Development of Measures of Information Security Policy Effectiveness To Maximize the Convergence Security, Journal of the Korea Convergence Society, Vol. 5, No. 4, pp. 27-32, 2014. https://doi.org/10.15207/JKCS.2014.5.4.027