2016 (415)
2015 (402)
2014 (223)
2013 (190)
2012 (106)
2011 (29)
2010 (20)
2009 (25)
2008 (40)
2007 (18)
Security Authentication Method of Terminal Trusted Access in Smart Grid
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.7 2015.07 pp.337-346
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A security authentication method in smart grid terminal is proposed in this paper. This method layers the terminal authentication system structure of smart grid so as to improve the simplicity and extensibility on system deployment and realize flexible communication mechanism and the interaction mechanism among systems. This paper aims at preventing terminal information from being destroyed and achieving terminal verification integrity. Besides, this kind of authentication method has no special requirements for terminal users.
Security Threats Recognition and Countermeasures on Smart Battlefield Environment based on IoT
보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.9 No.7 2015.07 pp.347-356
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we drew new security threats on IoT (Internet of Thing) based smart battlefield environment and proposed countermeasures against them. DoD (Department of Defense) is focusing its attention on the development of unmanned combat systems (UCS) to prepare for future war. The IoT technology provides networking service to connect each other unmanned combat system. But, IoT has the security vulnerabilities of each element of the technology itself because the technology integrates several components to configure a specific service. And new security vulnerabilities will be caused when they are interconnecting. If we fail to defend the security threat that may arise from IoT based smart battlefield environment, we can’t obtain intelligence superiority and furthermore will not be able to assure the victory of the cyber war. In smart battlefield environment applied to IoT, we can draw four main security threats; illegal remote control, information leakage, false information insert, and signal disturbance. And we propose countermeasures in response to these security threats; authentication, access control, intrusion prevention, and cryptography technology.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.