National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment

As the age of Internet of Things (IoT) has come, national-level cyber security measures should be prepared and concrete implementation plans should be established, so that critical infrastructure can be operated and maintained safely, protected from cyber attacks. In addition, IoT services for such infrastructure should be capable of closely obtaining and processing information in environments experienced by users. To provide reliable IoT services for critical infrastructure utilizing IoT devices, based on an understanding of the vulnerabilities of IoT technology and cutting-edge cyber threats, this paper proposes methods for predicting errors that may occur in physical situations, where things are connected to each other and analyzing and modeling the errors as a functional requirement. In addition to technical measures, security guidelines are presented for individual fields, such as policy, organization, manpower, budget, industry, R&D, and education.

[1]  Kwangho Kim Cyber Security Considerations for Designing IoT-Based Control Systems , 2015, WISA.

[2]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[3]  Dongho Won,et al.  WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment , 2006, APWeb Workshops.

[4]  Namje Park,et al.  Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle , 2015, Sensors.

[5]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[6]  Miodrag Potkonjak,et al.  Security of IoT systems: Design challenges and opportunities , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[7]  Eastern District,et al.  UNITED STATES DISTRICT COURT , 1999 .

[8]  Namje Park Implementation of terminal middleware platform for mobile RFID computing , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[9]  Hyung-Jun Seo,et al.  Criteria for Comparing Cyberwarfare Capability , 2011, ICITCS.

[10]  Dongho Won,et al.  A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems , 2005, ICCSA.

[11]  Namje Park,et al.  Mobile middleware platform for secure vessel traffic system in IoT service environment , 2016, Secur. Commun. Networks.

[12]  Jongin Lim,et al.  Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan , 2015, Web Information System and Application Conference.

[13]  Ray Bert,et al.  Cyber War: The Next Threat to National Security and What to Do About It , by Richard A. Clarke and Robert K. Knake. New York: HarperCollins, 2010. , 2010 .

[14]  M. Lakomy Richard A. Clarke, Robert K. Knake: Cyber War The Next Threat to National Security and What to Do About It New York: Ecco, 2010, ss. 290. , 2013 .