A Study on Development of IoT Software Vulnerability (Using Fake Information) Response System based on Artificial Intelligence

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The use of IoT devices such as wearable digital devices based on mobile devices is increasingly evident. In IoT-based environment, communication protocol of IoT category and lightweight special environment software are used instead of universal network configuration. Due to the operating structure of IoT, preparation of countermeasures to automatically analyze IoT software vulnerabilities based on artificial intelligence should be considered. Because of the rapid growth of IoT equipment and the expectation that there will be a sharp increase in the need to identify facts about vulnerabilities and improper use associated with IoT services naturally. It is necessary to apply artificial intelligence technology for classification and automatic collection and analysis of IoT vulnerabilities for wearable devices and smart home devices through artificial intelligence analysis technology. Sequentially, To acquire the data from the device, internal data and network data of the specified device after searching the protocol of the IoT device, it is possible to cope with IoT software vulnerability applying AI intelligence analysis method to related data. In this paper, we investigate software vulnerabilities in IoT environment and propose a technique to cope with ioT vulnerabilities through artificial intelligence.

     


  • Keywords


    IoT software vulnerabilities, Digital Forensics, Artificial intelligence

  • References


      [1] Son Young Seong, Park Joon Hee, Home IoT technology status and development direction. Journal of the Korean Institute of Communication Sciences (Information and Communication)., 32(4)(2015), 23-28.

      [2] Park Joon-Hee, Home network middleware technology and standardization trend, Electronic communication trend analysis., 19 (5) (2004), 53-58.

      [3] Jang Dae-il, Yu, Chang-hoon, IoT Software Mitch Network Vulnerability Assessment System Study, Journal of Digital Forensics., 11-3 (2017), 1-13.

      [4] Kang Min Soo, IOT platform technology trend in the open direction, KEIT PD Report, 12 (2012), 201-219.

      [5] Oh Seung Hoon, Trend of IoT device management standard protocol based on mobile communication, Analysis of electronic communication trend., 30 (2015), 2.

      [6] EU Butler Project- Communication Issue., https://www.postscapes.com/internet-of-things-protocols/


 

View

Download

Article ID: 18598
 
DOI: 10.14419/ijet.v7i3.33.18598




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.