DOI QR코드

DOI QR Code

A Study on the Improvement of Security Threat Analysis and Response Technology by IoT Layer

IoT 계층별 보안위협 분석 및 대응기술 개선 방안 연구

  • Won, Jong-Hyuk (Dept. of Smart Convergence Consulting, Hansung University) ;
  • Hong, Jung-Wan (Dept. of Industrial Management Engineering, Hansung University) ;
  • You, Yen-Yoo (Faculty of Smart Management, Hansung University)
  • 원종혁 (한성대학교 스마트융합컨설팅학과) ;
  • 홍정완 (한성대학교 산업경영공학과) ;
  • 유연우 (한성대학교 스마트융합공학부)
  • Received : 2018.10.08
  • Accepted : 2018.12.20
  • Published : 2018.12.31

Abstract

In this paper, we propose an attack detection technology using SDN Controller to study security threats in IoT environment. The research methodology has been developed by applying IoT security threat management technology to the IoT layer and analyzing the research trend of applied security technology. The study results show that the effectiveness of the detection method using the sampling method is studied by adding OpenFlow based SDN Controller to the network switch equipment of the existing IoT network. This method can detect the monitoring and attack of the whole network by interworking with IDS and IPS without affecting the performance of existing IoT devices. By applying such improved security threat countermeasure technology, we expect to be able to relieve anxiety of IoT security threat and increase service reliability.

최근 급격히 증가하고 있는 IoT 환경에서의 보안위협 대응방안에 관한 연구를 위해서 SDN Controller 기능을 활용한 침입감시 대응기술 방안을 연구하고자 한다. 연구방법은 IoT 계층별 보안위협에 따른 대응기술 및 적용되는 보안기술의 연구 동향 분석을 통해 향상된 IoT 보안위협 대응기술 구현 방안을 수립하였다. 연구결과는 기존의 IoT망의 네트워크스위치 장비에 OpenFlow 기반의 SDN Controller를 추가하여 샘플링 기법을 통한 탐지방법의 실효성을 연구하였다. 이 방법은 기존 IoT 기기의 성능에 영향을 미치지 않으면서도 IDS 및 IPS와의 연동만으로도 네트워크 전체의 모니터링 및 공격에 대한 탐지가 가능해 졌다. 이와 같이 향상된 보안위협 대응기술을 적용하면 IoT 보안위협 불안감 해소와 서비스 신뢰를 높일 수 있을 것으로 기대 한다.

Keywords

JKOHBZ_2018_v8n6_149_f0001.png 이미지

Fig. 1. IoT Environment Security Threats by Hierarchy [12]

JKOHBZ_2018_v8n6_149_f0002.png 이미지

Fig. 2. SDN Controller Architecture

JKOHBZ_2018_v8n6_149_f0003.png 이미지

Fig. 3. SDN Controller Process Flow Diagram [12]

JKOHBZ_2018_v8n6_149_f0004.png 이미지

Fig. 4. SDN Controller utilization technology flow chart [20,21]

JKOHBZ_2018_v8n6_149_f0005.png 이미지

Fig. 5. Measurement of defect rate by sampling application ratio change using SDN controller

Table 1. Internet of Things Technical stack [3,4]

JKOHBZ_2018_v8n6_149_t0001.png 이미지

Table 2. IoT Top Ten Technologies [4]

JKOHBZ_2018_v8n6_149_t0002.png 이미지

Table 3. Security Requirements by IoT Tier [14]

JKOHBZ_2018_v8n6_149_t0003.png 이미지

Table 4. IoT security technology research trend [17]

JKOHBZ_2018_v8n6_149_t0004.png 이미지

References

  1. S. H. Hong & H. J. Shin. (2017). Analysis of the Vulnerability of the IoT by the Scenario. Journal of the Korea Convergence Society, 8(9), 1-7. https://doi.org/10.15207/JKCS.2017.8.9.001
  2. J. O. Park. (2016). A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment. Journal of Digital Convergence, 14(10), 295-302. https://doi.org/10.14400/JDC.2016.14.10.295
  3. Maciej Kranz. (2017). The Core Objects of the Fourth Industrial Revolution The Future of the Internet IoT Innovation : First Books Publishing. ISBN 979-11-7022-121-0 03320 / 2017.7.24.001
  4. Things Internet World Forum Architecture Committee 2015. http://iotforum.kr
  5. Gartner. Top 10 Internet of Things Technologies for 2017 and 2018. https://www.gartner.com
  6. R. Di Pietro, S. Guarino, N. Verde & J. Domingo-Ferrer. (2014). Security in wireless ad-hoc networks-a survey. Comput. Commun. 51, 1-20. https://doi.org/10.1016/j.comcom.2014.06.003
  7. H. Gaur. (2013). Internet of things: thinking services.
  8. D. Miorandi, S. Sicari, F. De Pellegrini & I. Chlamtac. (2012). Internet of things: vision, applications and research challenges. Ad Hoc networks, 10(7), 1497-1516. https://doi.org/10.1016/j.adhoc.2012.02.016
  9. R. Roman & J. Zhou. (2013). On the features and challenges of security and privacy in distributed internet of things. Comput. Networks, 57(10), 2266-2279. https://doi.org/10.1016/j.comnet.2012.12.018
  10. R. H. Weber. (2013). internet of things-govemance quo vadis. Comput. Law Security Rev, 29(4), 341-347. https://doi.org/10.1016/j.clsr.2013.05.010
  11. J. H. Kim, H. M. Jung & H. J. Cho. (2017). Design Plan of Secure IoT System based Common Criteria. Journal of the Korea Convergence Society, 8(10), 61-66. https://doi.org/10.15207/JKCS.2017.8.1.061
  12. K. S. Jeon. (2016). IoT Security. https://kisa.or.kr
  13. J. O. Park. (2015). Verifying a Safe P2P Security Protocol in M2M Communication Environment. Journal of Digital Convergence, 13(5), 213-218. https://doi.org/10.14400/JDC.2015.13.5.213
  14. S. Li & L. Xu. (2017). Securing the Internet of Things : Acorn Publishing. ISBN 979-11-6175-039-2 / 2017.8.30.001
  15. B. Russell & D. V. Duren. (2017). Things Security Guide for the Internet Age : Acorn Publishing. ISBN 979-11-6175-041-5 / 2017.8.30.001
  16. S. S. Jang (2016). General Information Protection : Saengneung Publishing. ISBN 978-89-7050-848-1 93000 / 2016.10.31.001
  17. J. N. Kim & H. H. Jin. (2017). Internet(Iot) Security Technology for Security Threats in Second Connection Environment. The Journal of The Korean Institute of Communication Sciences, 34(3), 57-64.
  18. S. H. Hong. (2017). Research on IoT International Strategic Standard Model. Journal of the Korea Convergence Society, 8(2), 21-26. https://doi.org/10.15207/JKCS.2017.8.2.021
  19. J. S. Lee. (2018). A Study of protective measures of the source program for the development of the Internet of Things (IoT). Journal of the Korea Convergence Society, 9(4), 31-45. https://doi.org/10.15207/JKCS.2018.9.4.031
  20. H. Im, J. W. Kim, J. Na, T. J. Ha & C. Jung. (2016. 7). Intrusion detection method in network. Seoul : Metrocomnet Co., Ltd. ICT Research Institute
  21. M. H. Kang (2016). Completion of IDS and security control : Wowbooks Publishing. ISBN 978-89-94405-14-8 13560 / 2016.3.8.00