Security Evaluation Framework for Military IoT Devices
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cha, Sungyong | - |
dc.contributor.author | Baek, Seungsoo | - |
dc.contributor.author | Kang, Sooyoung | - |
dc.contributor.author | Kim, Seungjoo | - |
dc.date.accessioned | 2021-12-19T05:40:32Z | - |
dc.date.available | 2021-12-19T05:40:32Z | - |
dc.date.created | 2021-08-30 | - |
dc.date.issued | 2018 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/132136 | - |
dc.description.abstract | IoT is gaining importance in our lives and in the military too. With the application of IoT paradigm in the military and the weapon system's connectivity to the network, this facilitates the commanders to make real-time decisions. However, cybersecurity threats to weapon systems intensify along with the growing of IoT's benefits. Coping with these cybersecurity threats nowadays, we require the implementation of "security by design" concept during weapon system development throughout the system lifecycle, but not traditional security solutions. Since only developed countries are capable of developing systems on their own, they adopt "security by design" when developing new weapon systems; another approach to acquire weapon systems is through import if a country cannot develop the whole weapon system. However, few studies have been done on the security evaluation framework that could be used upon purchase and integration of the developed weapon system. In this paper, we proposed a novel security evaluation framework that could be used to integrate IoT devices and components into the weapon system and amethod to address cybersecurity requirements using international standard security control. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.title | Security Evaluation Framework for Military IoT Devices | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Seungjoo | - |
dc.identifier.doi | 10.1155/2018/6135845 | - |
dc.identifier.scopusid | 2-s2.0-85050249644 | - |
dc.identifier.wosid | 000438898000001 | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.