Skip to main content

Advertisement

Log in

National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

As the age of Internet of Things (IoT) has come, national-level cyber security measures should be prepared and concrete implementation plans should be established, so that critical infrastructure can be operated and maintained safely, protected from cyber attacks. In addition, IoT services for such infrastructure should be capable of closely obtaining and processing information in environments experienced by users. To provide reliable IoT services for critical infrastructure utilizing IoT devices, based on an understanding of the vulnerabilities of IoT technology and cutting-edge cyber threats, this paper proposes methods for predicting errors that may occur in physical situations, where things are connected to each other and analyzing and modeling the errors as a functional requirement. In addition to technical measures, security guidelines are presented for individual fields, such as policy, organization, manpower, budget, industry, R&D, and education.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  MATH  Google Scholar 

  2. Clarke RA, Knake RK (2010) Cyber war: the next threat to national security and what to do about it. Harper Collins, New York, pp 147–149

  3. Coleman KG (2008) The growing risk of cyber attack and other security threats, vol XXXI, No. 3. The risk report. http://www.defensetech.org/2008/09/23/iranian-cyber-warfare-threat-assessment/

  4. HP (2014) Internet of things research study, 2014 report

  5. Kim K (2016) Cyber security considerations for designing IoT-based control systems. Lecture Notes in Computer Science 9503:288–299

  6. Kim I, Chung Y, Lee Y, Dongho W ( 2005) A time-variant risk analysis and damage estimation for large-scale network systems, 2005 ICCSA 2005 part 2, LNCS 3481, pp 92–102

  7. Kim K, Park S, Lim J (2015) Changes of cybersecurity legal system in East Asia: focusing on comparison between Korea and Japan. WISA, pp 348–356

  8. Moon M, Lee T (2016) Functional requirements modeling method for reliability of IoT services. J Korea Inst Next Gener Comput 12(2):97–106

    Google Scholar 

  9. Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8(4):205–219

    Article  Google Scholar 

  10. Park N, Bang HC (2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Secur Commun Netw 9(6):500–512

    Article  Google Scholar 

  11. Park N, Kang N (2016) Mutual authentication scheme in secure internet of things technology for comfortable lifestyle. Sensors 16(1):20

    Article  Google Scholar 

  12. Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) APWeb Workshops 2006. LNCS, vol. 3842, pp 741–748. Springer, Heidelberg

  13. Seo HJ, Choy YC (2011) Criteria for Comparing Cyberwarfare Capability. In: Proceedings of the International Conference on IT Convergence and Security 2011, pp 111–120

  14. Seo HJ, Kim I (2015) Diagnosis of future cyber activities by the analysis of North Korean cyberterror and capability. J Natl Intell Stud 8(1):123–161

    MathSciNet  Google Scholar 

  15. Shim H, Kim I, Koh J (1999) Sofeware ILS proposed. J KIMST 2(2):173–185

    Google Scholar 

  16. Technolytics (2007) World war III: a cyber war has begun. http://www.technolytics.com/Technolytics_Cyber_War. Accessed 16 July 2014

  17. United States District Court. Case 5:15-mj-00154-ATB Document 1, 04/15/15

  18. Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. Computer-Aided Design (ICCAD), 2014 IEEE/ACM international conference on, 2–6 Nov 2014

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to InJung Kim.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, K., Kim, I. & Lim, J. National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment. J Supercomput 73, 1140–1151 (2017). https://doi.org/10.1007/s11227-016-1855-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-016-1855-z

Keywords

Navigation