DOI QR코드

DOI QR Code

A Study on Efficient Encryption for Message Communication between Devices

기기 간 메시지 부분 암호화 연구

  • Received : 2014.07.25
  • Accepted : 2014.10.10
  • Published : 2014.10.31

Abstract

The advent of smart phones brought adverse effect between devices recently. For example, adverse effects of info-communication with advent of computer. Also, hacking threat aiming cyber space that is getting more advanced is spreading in terms of range and danger, so that it reaches the level that the nation has to concern. In this circumstance, crimes involving info-technology is now problem in society. As internet technology advances, it enlarges the range of hacker's threat to not only smart phones, but ships, aircrafts, buildings, and cars. It could be seen as social threat of between human and human, between machine and machine, and between human and machine. This study discuss these problems.

최근의 스마트폰의 등장으로 기기간의 역기능들이 속속히 드러나고 있다. 대표적으로 컴퓨터에 의한 정보통신의 역기능을 그 예로 들 수 있다. 또한 갈수록 고도화 되어가는 사이버를 겨냥한 해킹 위협은 그 피해와 파괴력이 점점 확산되고 있어 국가적인 위기로까지 고려해 보아야 할 상황에 이르렀다. 이러한 상황에서 정보기술의 범죄는 사회적인 문제로 볼 수 있다. 인터넷의 발달로 스마트해진 기기뿐 아니라 선박, 비행기, 건물 그리고 자동차에도 디지털화된 기술이 많이 추가됨으로써 해커들의 공격이 가능해 지고 있다. 인간과 인간, 기기들간, 인간과 기기간 모두 사회적 위기로 볼 수 있다. 본 논문에서는 이와 같은 문제를 연구하고자 한다.

Keywords

References

  1. JeongHoon Park, Chan-Woo Moon, "Design and Implementtation of a FlexRay-CAN gateway for Real-Time Control", The Journal of the Institute of Internet, Broadcasting and Communication, Vol.14, No.2, pp.53-58, 2014 https://doi.org/10.7236/JIIBC.2014.14.2.53
  2. Dea Su Kim, Soon Cheol Baeg, Kwang Lo Lee, Young Whan Lim, Design and Analysis of Fussy-Expert System Model utilizing Fuzzy Cognitive Maps, PRICAI'92, Sept. 1992.
  3. J. Caballero, H. Yin, Z. Liang and D. Song, "Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis," CCS 2007 Proceeding of the 14th Conference on Computer and Communication Security, ACM, p. 1(15), Sep, 2007.
  4. W. Cui, J. Kannan and H. J. Wang, "Discoverer: Automatic Protocol Reverse Engineering from Network Traces," USENIX Security 2007 Proceeding of the 16th USENIX Security Symposium, USENIX, p. 1(15), Aug, 2007.
  5. Z. Lin, X. Jiang, D. Xu, and X. Zhang, "Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution," NDSS 2008 Proceeding of the 15th Annual Network and Distributed System Security Symposium, INTERNET SOCIETY, p. (17), Feb, 2008.
  6. R.Makowitz, and C. Temple, "A communication network for automotive control systems," IEEE 2006 International Workshop on Factory Communication Systems, pp. 207-212, June 2006.
  7. K. Akkaya and M. Younis, "A Survey on Routing Protocols for Wireless Sensor Networks," Ad Hoc Networks, Vol.3 No.5, pp.352-349, 2005.
  8. F. Xiangning, S. Yulin, "Improvement on LEACH Protocol of Wireless Sensor Network", International Conference on Sensor Technologies and Applications, IEEE, pp.260-264, 2007.
  9. Robert I. Davis, Alan Burns, "Robust priority assignment for message on Controller Area Network(CAN)", 26 November 2008. Springer Science Business Media, LLC 2008.
  10. Seung-Hyun Yang, Suk-Won Lee, "A Study of Vehicle's Sensor Signal Monitoring and Control Using Zigbee Wireless Communication and Web-based Embedded System", KAIS, Vol.10 No.1, pp.352-349, Jan 2009.