DOI QR코드

DOI QR Code

A Study of Authentication Method for Id-Based Encryption Using In M2M Environment

M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구

  • Jin, Byung-Wook (Department of Computer Science, SoongSil University) ;
  • Park, Jae-Pyo (Graduate School of Information Science, SoongSil University) ;
  • Lee, Keun-Wang (Department of Multimedia Science, ChungWoon University) ;
  • Jun, Mun-Seok (Department of Computer Science, SoongSil University)
  • 진병욱 (숭실대학교 컴퓨터학과) ;
  • 박재표 (숭실대학교 정보과학대학원) ;
  • 이근왕 (청운대학교 멀티미디어학과) ;
  • 전문석 (숭실대학교 컴퓨터학과)
  • Received : 2013.03.19
  • Accepted : 2013.04.11
  • Published : 2013.04.30

Abstract

M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it has a wireless-communicate weakness because of the machine-communicate request, and also it is difficult to administrate and control each other. So In this Paper, It suggests the safety protocol between Device, Gateway and Network Domain in M2M environment. Proposed protocol is based on ID-Based encryption's certificate and creates session key between the Access Server and the Core Server in the Network Domain. It uses that session key for sending and receiving data in mutual, and adds key renewal protocol so it will automatically update discern result. a comparative analysis of the existing M2M communication technologies and PKI-based certificate technology is compared with the proposed protocol efficiency and safety.

M2M(Machine-to-Machine Communication)은 한 기기가 비슷한 다른 기기와 유선 혹은 무선으로 통신하는 기술로서 환경의 특성 상 저전력, 소규모, 저렴한 가격, WAN, WLAN 등 네트워크를 통하여 사물간의 통신으로 정의하고 있다. 또한 사람의 개입이 없이도 운영이 가능할 수 있는 특징이 요구된다. 그러나 사물통신 기기들의 요구사항으로 인하여 무선 통신 등에 취약점은 가지게 되고, 각 기기를 관리 혹은 제어하는 것에 대한 어려움으로 인한 취약점이 있다. 본 논문은 M2M 환경에서 Device 및 Gateway와 Network Domain간의 안전한 인증 프로토콜 기법을 제안하였다. 제안 프로토콜은 ID-Based Encryption 기반으로 인증 하며, Network Domain안에 Access Server 및 Core Server 간의 세션키를 생성한다. 그리고 생성한 세션키를 활용하여 상호간에 데이터를 송 수신하고, 키 갱신 프로토콜을 추가하여 자동으로 식별값을 갱신한다.

Keywords

References

  1. TTA. "M2M Service Capability Structure", Telecommunication Technology Association, 2012.06.12.
  2. TTA. "M2M Security threats and requirements of service", Telecommunication Technology Association, May., 23. 2012.
  3. Inhyok Cha et al. "Trust in M2M communication", IEEE Vehicular Technology Magazine, 2009. DOI: http://dx.doi.org/10.1109/MVT.2009.933478
  4. Korea Communications Commission, "Construction of communication infrastructure things basic plan (draft)", 2009.
  5. NIA, "Law on the activation of the construction of communication infrastructure and information use things things", 2009.11
  6. Ki Hyung Ki,. "The difference between the concept of intelligence communication things". RFID/USN Online Forum Conference.
  7. Jae Young Ahn, "M2M technology and service network". The 20th High-Speed Network Workshop. 2010
  8. Dong Hee Shim, "M2M (Machine to Machine Communication) In the center Europe - Standardization Trends". TTA.
  9. Adi Shamir. "Identity-Based Cryptosystems and signature System". SpringerLink. 1985.
  10. Dan Boneh, Matthew Franklin. "Identity-Based Encryption from the Weil Pairing". Crypto. 2001.
  11. "How Machine-to-Machine Communication Works". HowStuffWorks.
  12. Marc Joye, Sung-Ming Yen. "Id-Based Secket-key Cryptography". sigops. 1998.
  13. Y.-D. Joo, "Security Improvements on Smart-Card Based Mutual Authentication Scheme", Journal of The Institute of Webcasting, Internet and Telecommunication, Vol 12, No 6, pp. 91-98, 2012. https://doi.org/10.7236/JIWIT.2012.12.6.91
  14. J.-G. Song, T.-Y. Kim, H.-J. Lee, W.-T. Jang, "A new password authentication scheme using two-way password in Smartphone Banking", Journal of The Institute of Webcasting, Internet and Telecommunication, Vol 12, No 3, pp. 195-200, 2012. https://doi.org/10.7236/JIWIT.2012.12.3.195
  15. Y.-D. Joo Y.-H. An, "Improvements of a Dynamic ID-Based Remote User Authentication Scheme", Journal of The Institute of Webcasting, Internet and Telecommunication, Vol 11, No 6, pp. 303-310, 2011.
  16. Y.-H. An, Y.-D. Joo, "Security Enhancement of Biometrics-based Remote User Authentication Scheme Using Smart Cards", Journal of The Institute of Webcasting, Internet and Telecommunication, Vol 12, No 1, pp. 231-237, 2012. https://doi.org/10.7236/JIWIT.2012.12.1.231
  17. M.-S. Kang, "Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm", Journal of The Institute of Webcasting, Internet and Telecommunication, Vol 12, No 6, pp. 83-89, 2012. https://doi.org/10.7236/JIWIT.2012.12.6.83