National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment

被引:0
|
作者
Kwangho Kim
InJung Kim
Jongin Lim
机构
[1] Korea University,Graduate School of Information Management and Security
[2] National Security Research Institute,undefined
来源
关键词
Smart surveillance; Public IoT; National cyber security; Surveillance capacity;
D O I
暂无
中图分类号
学科分类号
摘要
As the age of Internet of Things (IoT) has come, national-level cyber security measures should be prepared and concrete implementation plans should be established, so that critical infrastructure can be operated and maintained safely, protected from cyber attacks. In addition, IoT services for such infrastructure should be capable of closely obtaining and processing information in environments experienced by users. To provide reliable IoT services for critical infrastructure utilizing IoT devices, based on an understanding of the vulnerabilities of IoT technology and cutting-edge cyber threats, this paper proposes methods for predicting errors that may occur in physical situations, where things are connected to each other and analyzing and modeling the errors as a functional requirement. In addition to technical measures, security guidelines are presented for individual fields, such as policy, organization, manpower, budget, industry, R&D, and education.
引用
收藏
页码:1140 / 1151
页数:11
相关论文
共 50 条
  • [1] National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment
    Kim, Kwangho
    Kim, InJung
    Lim, Jongin
    [J]. JOURNAL OF SUPERCOMPUTING, 2017, 73 (03): : 1140 - 1151
  • [2] A Sequential Scheme for Detecting Cyber Attacks in IoT Environment
    Soe, Yan Naung
    Feng, Yaokai
    Santosa, Paulus Insap
    Hartanto, Rudy
    Sakurai, Kouichi
    [J]. IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 238 - 244
  • [3] IoT scheme for surveillance system and laboratory security access
    Fushshilat, I
    Yogasmana, Y.
    [J]. INTERNATIONAL SYMPOSIUM ON MATERIALS AND ELECTRICAL ENGINEERING 2019 (ISMEE 2019), 2020, 850
  • [4] Research on intelligent visual surveillance for public security
    Kang, Wenxiong
    Deng, Feiqi
    [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 824 - +
  • [5] An Intelligent Surveillance System Based on IoT for Internal Security of a Nation
    Kumar, Tarun
    Kushwaha, Dharmender Singh
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (03) : 1 - 30
  • [6] Security Challenges and Cyber Forensic Ecosystem in IoT Driven BYOD Environment
    Ali, Md Iman
    Kaur, Sukhkirandeep
    Khamparia, Aditya
    Gupta, Deepak
    Kumar, Sachin
    Khanna, Ashish
    Al-Turjman, Fadi
    [J]. IEEE ACCESS, 2020, 8 : 172770 - 172782
  • [7] An efficient public key secure scheme for cloud and IoT security
    Thirumalai, Chandrasegar
    Mohan, Senthilkumar
    Srivastava, Gautam
    [J]. COMPUTER COMMUNICATIONS, 2020, 150 (150) : 634 - 643
  • [8] Security Enhancement of Fog Nodes in IoT Networks Using the IBF Scheme
    Natraj, N. A.
    Sundari, V. Kamatchi
    Ananthi, K.
    Rathika, S.
    Indira, G.
    Rathish, C. R.
    [J]. THIRD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND CAPSULE NETWORKS (ICIPCN 2022), 2022, 514 : 119 - 129
  • [9] Public-private partnerships in national cyber-security strategies
    Carr, Madeline
    [J]. INTERNATIONAL AFFAIRS, 2016, 92 (01) : 43 - +
  • [10] A water environment security monitoring algorithm based on intelligent video surveillance
    Pang, Zihan
    Jia, Kebin
    Feng, Jinchao
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 191 - 194