Developing iot security requirements for service providers

Dong Hee Kim, Ji Yeon Cho, Jongin Lim, Bong Gyou Lee

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

The purpose of this paper is to identify IoT (Internet of Things) security requirements for service providers. An IoT service based on an interconnected environment has critical security issues. The IoT service model includes various components, such as devices, network protocols, and platforms. A complicated IoT environment has the potential for many security risks, such as IoT device hacking, privacy infringement, information leakage, etc. Therefore, it is important to make a secure and safe IoT environment for active IoT services. This study examines the IoT security requirement model, considering the IoT components and lifecycle. A total of nine IoT security requirements and their priorities were derived through in-depth interviews and the ANP method. This study is expected to provide a wide view of both technical and non-technical security requirements by considering the IoT lifecycle.

Original languageEnglish
Pages (from-to)595-603
Number of pages9
JournalInformation (Japan)
Volume19
Issue number2
Publication statusPublished - 2016 Feb 1

Fingerprint

Internet of things
Network protocols

All Science Journal Classification (ASJC) codes

  • General

Cite this

Kim, D. H., Yeon Cho, J., Lim, J., & Lee, B. G. (2016). Developing iot security requirements for service providers. Information (Japan), 19(2), 595-603.
Kim, Dong Hee ; Yeon Cho, Ji ; Lim, Jongin ; Lee, Bong Gyou. / Developing iot security requirements for service providers. In: Information (Japan). 2016 ; Vol. 19, No. 2. pp. 595-603.
@article{e46ac5e2a66748e78c15b90d5829723b,
title = "Developing iot security requirements for service providers",
abstract = "The purpose of this paper is to identify IoT (Internet of Things) security requirements for service providers. An IoT service based on an interconnected environment has critical security issues. The IoT service model includes various components, such as devices, network protocols, and platforms. A complicated IoT environment has the potential for many security risks, such as IoT device hacking, privacy infringement, information leakage, etc. Therefore, it is important to make a secure and safe IoT environment for active IoT services. This study examines the IoT security requirement model, considering the IoT components and lifecycle. A total of nine IoT security requirements and their priorities were derived through in-depth interviews and the ANP method. This study is expected to provide a wide view of both technical and non-technical security requirements by considering the IoT lifecycle.",
author = "Kim, {Dong Hee} and {Yeon Cho}, Ji and Jongin Lim and Lee, {Bong Gyou}",
year = "2016",
month = "2",
day = "1",
language = "English",
volume = "19",
pages = "595--603",
journal = "Information",
issn = "1343-4500",
publisher = "International Information Institute",
number = "2",

}

Kim, DH, Yeon Cho, J, Lim, J & Lee, BG 2016, 'Developing iot security requirements for service providers', Information (Japan), vol. 19, no. 2, pp. 595-603.

Developing iot security requirements for service providers. / Kim, Dong Hee; Yeon Cho, Ji; Lim, Jongin; Lee, Bong Gyou.

In: Information (Japan), Vol. 19, No. 2, 01.02.2016, p. 595-603.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Developing iot security requirements for service providers

AU - Kim, Dong Hee

AU - Yeon Cho, Ji

AU - Lim, Jongin

AU - Lee, Bong Gyou

PY - 2016/2/1

Y1 - 2016/2/1

N2 - The purpose of this paper is to identify IoT (Internet of Things) security requirements for service providers. An IoT service based on an interconnected environment has critical security issues. The IoT service model includes various components, such as devices, network protocols, and platforms. A complicated IoT environment has the potential for many security risks, such as IoT device hacking, privacy infringement, information leakage, etc. Therefore, it is important to make a secure and safe IoT environment for active IoT services. This study examines the IoT security requirement model, considering the IoT components and lifecycle. A total of nine IoT security requirements and their priorities were derived through in-depth interviews and the ANP method. This study is expected to provide a wide view of both technical and non-technical security requirements by considering the IoT lifecycle.

AB - The purpose of this paper is to identify IoT (Internet of Things) security requirements for service providers. An IoT service based on an interconnected environment has critical security issues. The IoT service model includes various components, such as devices, network protocols, and platforms. A complicated IoT environment has the potential for many security risks, such as IoT device hacking, privacy infringement, information leakage, etc. Therefore, it is important to make a secure and safe IoT environment for active IoT services. This study examines the IoT security requirement model, considering the IoT components and lifecycle. A total of nine IoT security requirements and their priorities were derived through in-depth interviews and the ANP method. This study is expected to provide a wide view of both technical and non-technical security requirements by considering the IoT lifecycle.

UR - http://www.scopus.com/inward/record.url?scp=84962614432&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84962614432&partnerID=8YFLogxK

M3 - Article

VL - 19

SP - 595

EP - 603

JO - Information

JF - Information

SN - 1343-4500

IS - 2

ER -