DOI QR코드

DOI QR Code

Performance Analysis of Key Exchange Protocols on ETSI Standard

ETSI 표준 키 교환 프로토콜의 성능 분석

  • Received : 2015.12.02
  • Accepted : 2015.12.20
  • Published : 2015.12.30

Abstract

The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the security functions in ETSI(European Telecommunications Standards Institute), and analyze the specification of the security primitives and the key exchange protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(Network Control Centre). ETSI key exchange protocols consists of Main Key Exchange, Quick Key Exchange, and Explicit Key Exchange. We analyse the pros and cons of key exchange protocols based on performance analysis and performance evaluation.

ETSI(European Telecommunications Standards Institute) EN 301 790에서는 광대역 위성망에서 제공되어야 할 두 가지 보안 서비스를 기술하고 있는데, 하나는 사용자(개체) 인증 서비스이고, 다른 하나는 사용자들 간의 데이터의 흐름이나 사용자와 관리자간의 데이터의 흐름을 악의적으로 공격하여 허락되지 않도록 불법적인 접근으로부터 데이터를 보호하는 기밀성 서비스이다. 특히, 기밀성 서비스를 제공하기 위해 ETSI에서는 NCC(Network Control Centre)와 RCST(Return Channel Satellite Terminal) 사이에 Main Key Exchange, Quick Key Exchange, 그리고 Explicit Key Exchange 세 가지 키 교환 프로토콜을 제시하고 있다. 본 논문에서는 ETSI 표준의 키 교환 프로토콜을 분석하고, 성능 분석과 성능 평가를 통하여 키 교환 프로토콜의 효율성과 장단점을 분석한다.

Keywords

References

  1. Zhong Yantao and Ma Jianfeng, "A Highly Secure Identity-Based Authenticated Key-Exchange Protocol for Satellite Communication", JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 12, NO 6, 2010
  2. ETSI EN 301 790 V1.2.2 : "Digital Video Broadcasting(DVB) : Interaction channel for satellite distribution systems" 2000.12, European Standard (Telecommunications series).
  3. Sergio PARDO MARTINEZ, "Estudio de algoritmos basados en DAMA para la distribuction de ancho de banda en redes DVB-RCS", 2010
  4. Heung-Ryong Oh,Heung-Youl Youm, "Key Exchange Protocols for Domestic Broadband Satellite Access Network," Korea Industrial of Information Security & Cryptology, Vol. 14, No. 3, pp.13-24, 2004.6.
  5. Sam Tran and Tuan Anh Nguyen, "Encryption/Decryption functions for NS-2", CSCI 5931 Project 2, 2005
  6. Young-seok Lee, "Device Authentication Method for Safe Internet of Things Environments," Korea Institute of Information, Electronics, and Communication Technology, Vol.8, No.1, pp. 51-58. 22015. 1. https://doi.org/10.17661/jkiiect.2015.8.1.051