DOI QR코드

DOI QR Code

Authentication Method for Safe Internet of Things Environments

안전한 사물 인터넷 환경을 위한 인증 방식

  • Lee, Young-Seok (School of Computer & Information Communication, Kunsan National University)
  • Received : 2015.01.07
  • Accepted : 2015.02.08
  • Published : 2015.02.28

Abstract

Internet of Thing is a collection of various technical components, and the interworking among heterogeneous devices, networks, applications is expected to be accelerated through the openness of IoT platform. For this reason, many technical and administrative security threats will occur in IoT environments. In this paper, authentication methods of recent researches are analyzed for safe IoT services, and new mutual authentication protocol is proposed to provide more secure communication. The proposed protocol prevents an impersonation as malicious gateway or illegal device providing mutual authentication between gateway and IoT device. The performance analysis and evaluation of proposed authentication protocol are performed.

사물 인터넷(Internet of Thing)은 다양한 기술 요소의 집합체로서, 최근 IoT 플랫폼의 개방화를 통하여 이기종 단말, 네트워크, 애플리케이션 간의 연동이 가속화될 것으로 예상된다. 이에 따라, IoT 환경에서 많은 기술적이고 관리적인 보안 위협이 발생할 것이다. 본 논문에서는 안전한 IoT 서비스를 위해 최근에 연구되었던 인증 기술을 분석하여 더욱 안전한 통신을 제공하기 위한 상호 인증 프로토콜을 제안한다. 제안한 인증 프로토콜은 게이트웨이와 IoT 디바이스 간 상호 인증을 제공함으로써 악의적인 게이트웨이나 불법적인 디바이스로 위장을 방지할 수 있다. 제안된 인증 프로토콜의 성능분석과 평가를 수행한다.

Keywords

References

  1. O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
  2. Hwa-jeon Seo, et al, "IoT Security Technical Trend", Korean Institute of Electromagnetic Engineering Society, Vol. 24, No. 4, pp. 27-35, 2013, 7. https://doi.org/10.5515/KJKIEES.2013.24.1.27
  3. P. de Leusse, P. Periorellis, T. Dimitrakos, and S.K. Nair, "Self managed security cell, a security model for the internet of things and services", In Advances in Future Internet, 2009 First International Conference on, pp. 47-52, 2009.
  4. D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device," In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), pp. 46-59, 2006.
  5. Jin-seob Shin, Young-ho Park, "An Authentication Protocol using the EXOR and the Hash Function in RFID/USN," Korea Society of Industrial Information Systems, Vol. 12, No. 2, pp.24-29, 2007. 6.
  6. Hae-Soon Ahn, Ki-Dong Bu, "Improved Authentication Protocol for RFID/USN Environment," The Institute of Electronics and Information Engineers, Vol.46, No. CI-1, 2009.
  7. O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
  8. D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), pp. 19-31, 2011.
  9. http://www.opnet.com
  10. Taeyang Eom, Jeong-Hyun, "Performance Evaluation of Authentication Protocol for Mobile RFID Privacy", Korean Institute of Communication and Information Sciences, Vol. 36, No 6, 2011. 6.

Cited by

  1. Performance Analysis of Key Exchange Protocols on ETSI Standard vol.8, pp.6, 2015, https://doi.org/10.17661/jkiiect.2015.8.6.520
  2. 로그 분석 처리율 향상을 위한 맵리듀스 기반 분할 빅데이터 분석 기법 vol.11, pp.5, 2015, https://doi.org/10.17661/jkiiect.2018.11.5.593
  3. Research on Security Control Scheme of Power Distribution Internet of Things vol.645, pp.None, 2015, https://doi.org/10.1088/1755-1315/645/1/012070