Threat Analysis of the Smart Doorlock Systems Using Threat Modeling 


Vol. 45,  No. 11, pp. 1868-1877, Nov.  2020
10.7840/kics.2020.45.11.1868


PDF
  Abstract

Smart doorlocks are prevailing because of the convenience of the smart doorlocks. The lack of security on smart doorlocks can lead to the significant loss of safety on user’s asset because smart doorlocks are the basic and essential physical security equipments which protect user’s asset. However, the technology on the securities of the manufacturing companies differ and the criterions on the smart doorlocks are lacking. Therefore the research on the security analysis on the smart doorlocks is needed. This paper analyzes the operation of the smart doorlock systems by DFD(Data Flow Diagram) and the possible threats are identified. By using the identified threats, attack tree is drawn and the attack scenarios are described by analyzing the intention and the actions of the adversaries. We analyzed the risk of the attacks and finally the countermeasures will be drawn by using DREAD analysis.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

S. Shim, S. Im, H. Ryu, S. Jun, T. Kim, "Threat Analysis of the Smart Doorlock Systems Using Threat Modeling," The Journal of Korean Institute of Communications and Information Sciences, vol. 45, no. 11, pp. 1868-1877, 2020. DOI: 10.7840/kics.2020.45.11.1868.

[ACM Style]

Shinwoo Shim, Sun-Young Im, Han-Eul Ryu, Sung-Goo Jun, and Taekyu Kim. 2020. Threat Analysis of the Smart Doorlock Systems Using Threat Modeling. The Journal of Korean Institute of Communications and Information Sciences, 45, 11, (2020), 1868-1877. DOI: 10.7840/kics.2020.45.11.1868.

[KICS Style]

Shinwoo Shim, Sun-Young Im, Han-Eul Ryu, Sung-Goo Jun, Taekyu Kim, "Threat Analysis of the Smart Doorlock Systems Using Threat Modeling," The Journal of Korean Institute of Communications and Information Sciences, vol. 45, no. 11, pp. 1868-1877, 11. 2020. (https://doi.org/10.7840/kics.2020.45.11.1868)