DOI QR코드

DOI QR Code

Lightweight DTLS Message Authentication Based on a Hash Tree

해시 트리 기반의 경량화된 DTLS 메시지 인증

  • Lee, Boo-Hyung (Dept. of Computer Science & Engineering, Sangmyung University) ;
  • Lee, Sung-Bum (Dept. of Computer Science & Engineering, Sangmyung University) ;
  • Moon, Ji-Yeon (Dept. of Computer Science & Engineering, Sangmyung University) ;
  • Lee, Jong-Hyouk (Dept. of Computer Science & Engineering, Sangmyung University)
  • Received : 2015.06.12
  • Accepted : 2015.10.15
  • Published : 2015.10.31

Abstract

The Internet of Things (IoT), in which resource constrained devices communicate with each other, requires a lightweight security protocol. In this paper, we propose a new message authentication scheme using a hash tree for lightweight message authentication in the Datagram Transport Layer Security (DTLS) protocol. The proposed scheme provides lightweight secure operations compared with those of the DTLS protocol. Besides, it provides more suitable performance than the DTLS protocol for an IoT environment, thanks to the reduced use of message authentication code.

제한된 자원을 가지는 장비들이 서로 통신을 하는 사물인터넷 환경에서는 경량화된 보안 프로토콜이 요구된다. 본 논문은 DTLS 프로토콜의 메시지 인증 경량화를 위해 해시 트리를 이용한 새로운 메시지 인증 기법을 제안한다. 제안된 기법은 DTLS 프로토콜의 기본 동작에 비해 경량화된 보안 동작을 제공하며, 통신과정 중에서도 불필요한 메시지 인증 코드의 사용을 줄여 사물인터넷 환경에 더욱 적합한 성능을 나타낸다.

Keywords

References

  1. J. Park and N. Kang, "Entity authentication scheme for secure WEB of things applications," J. KICS, vol. 38B, no. 05, pp. 394-400, May 2013. https://doi.org/10.7840/kics.2013.38B.5.394
  2. E. Rescorla and N. Modadugu, Datagram Transport Layer Security Version 1.2, IETF RFC 6347, Jan. 2012.
  3. J. Park, S. Shin, and N. Kang, "Mutual authentication and key agreement scheme between lightweight devices in internet of things," J. KICS, vol. 38B, no. 09, pp. 707-714, Sept. 2013. https://doi.org/10.7840/kics.2013.38B.9.707
  4. T. Dierks and E. Rescorla, The Transport Layer Security Protocol Version 1.2, IETF RFC 5246, Aug. 2008.
  5. M.-H. Park, C.-K. Lee, J.-H. Son, and S.-W. Seo, "Efficient security mechanism using light-weight data origin authentication in sensor network," J. KICS, vol. 32, no. 05, pp. 402-408, May 2007.
  6. Y. Hu, A. Perrig, and D. B. Johnson, "Efficient security mechanisms for routing protocols," in Proc. NDSS'03, Feb. 2003.
  7. D. Eastlake and P. Jones, US Secure Hash Algorithm 1(SHA1), IETF RFC 3174, Sept. 2001.
  8. F. Dotzer, "Privacy issues in vehicular ad hoc networks," in Proc. 2nd ACM Int. Workshop Veh. Ad Hoc Netw., Sept. 2005.
  9. H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-Hashing for Message Authentication, IETF RFC 2104, Feb 1997.
  10. I. Ishaq, D. Carels, G. Teklemariam, J. Hoebeke, F. Abeele, E. Poorter, I. Moerman, and P. Demeester, "IETF standardization in the field of the internet of things (IoT): A survey," J. Sensor and Actuator Networks, vol. 2, no. 2, pp. 235-287, Apr. 2013. https://doi.org/10.3390/jsan2020235
  11. H. R. Lee, K.-H. Jung, and Y.-J. Suh, "Contention/Collision mitigation scheme in IEEE 802.15.4 mesh sensor networks," J. KICS, vo1. 38C, no. 08, pp. 683-691, Sept. 2013. https://doi.org/10.7840/kics.2013.38C.8.683

Cited by

  1. 위성환경에서의 Timestamp 기반 키 교환 프로토콜 vol.9, pp.2, 2015, https://doi.org/10.17661/jkiiect.2016.9.2.162
  2. 차량용 블랙박스 영상파일의 무결성 검증에 해시함수 이용 방법 vol.42, pp.1, 2015, https://doi.org/10.7840/kics.2017.42.1.241
  3. 이더리움 기반 이메일 시스템 모델 vol.13, pp.4, 2015, https://doi.org/10.17662/ksdim.2017.13.4.099