Abstract
As the age of Internet of Things (IoT) has come, national-level cyber security measures should be prepared and concrete implementation plans should be established, so that critical infrastructure can be operated and maintained safely, protected from cyber attacks. In addition, IoT services for such infrastructure should be capable of closely obtaining and processing information in environments experienced by users. To provide reliable IoT services for critical infrastructure utilizing IoT devices, based on an understanding of the vulnerabilities of IoT technology and cutting-edge cyber threats, this paper proposes methods for predicting errors that may occur in physical situations, where things are connected to each other and analyzing and modeling the errors as a functional requirement. In addition to technical measures, security guidelines are presented for individual fields, such as policy, organization, manpower, budget, industry, R&D, and education.




Similar content being viewed by others
References
Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805
Clarke RA, Knake RK (2010) Cyber war: the next threat to national security and what to do about it. Harper Collins, New York, pp 147–149
Coleman KG (2008) The growing risk of cyber attack and other security threats, vol XXXI, No. 3. The risk report. http://www.defensetech.org/2008/09/23/iranian-cyber-warfare-threat-assessment/
HP (2014) Internet of things research study, 2014 report
Kim K (2016) Cyber security considerations for designing IoT-based control systems. Lecture Notes in Computer Science 9503:288–299
Kim I, Chung Y, Lee Y, Dongho W ( 2005) A time-variant risk analysis and damage estimation for large-scale network systems, 2005 ICCSA 2005 part 2, LNCS 3481, pp 92–102
Kim K, Park S, Lim J (2015) Changes of cybersecurity legal system in East Asia: focusing on comparison between Korea and Japan. WISA, pp 348–356
Moon M, Lee T (2016) Functional requirements modeling method for reliability of IoT services. J Korea Inst Next Gener Comput 12(2):97–106
Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8(4):205–219
Park N, Bang HC (2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Secur Commun Netw 9(6):500–512
Park N, Kang N (2016) Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors 16(1):20
Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) APWeb Workshops 2006. LNCS, vol. 3842, pp 741–748. Springer, Heidelberg
Seo HJ, Choy YC (2011) Criteria for Comparing Cyberwarfare Capability. In: Proceedings of the International Conference on IT Convergence and Security 2011, pp 111–120
Seo HJ, Kim I (2015) Diagnosis of future cyber activities by the analysis of North Korean cyberterror and capability. J Natl Intell Stud 8(1):123–161
Shim H, Kim I, Koh J (1999) Sofeware ILS proposed. J KIMST 2(2):173–185
Technolytics (2007) World war III: a cyber war has begun. http://www.technolytics.com/Technolytics_Cyber_War. Accessed 16 July 2014
United States District Court. Case 5:15-mj-00154-ATB Document 1, 04/15/15
Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. Computer-Aided Design (ICCAD), 2014 IEEE/ACM international conference on, 2–6 Nov 2014
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kim, K., Kim, I. & Lim, J. National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment. J Supercomput 73, 1140–1151 (2017). https://doi.org/10.1007/s11227-016-1855-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-016-1855-z