Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security Evaluation Framework for Military IoT Devices

Full metadata record
DC Field Value Language
dc.contributor.authorCha, Sungyong-
dc.contributor.authorBaek, Seungsoo-
dc.contributor.authorKang, Sooyoung-
dc.contributor.authorKim, Seungjoo-
dc.date.accessioned2021-12-19T05:40:32Z-
dc.date.available2021-12-19T05:40:32Z-
dc.date.created2021-08-30-
dc.date.issued2018-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/132136-
dc.description.abstractIoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system's connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT's benefits. Coping with these cybersecurity threats nowadays, we require the implementation of "security by design" concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt "security by design" when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and amethod to address cybersecurity requirements using international standard security control.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.titleSecurity Evaluation Framework for Military IoT Devices-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Seungjoo-
dc.identifier.doi10.1155/2018/6135845-
dc.identifier.scopusid2-s2.0-85050249644-
dc.identifier.wosid000438898000001-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Seung joo photo

Kim, Seung joo
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE