DOI QR코드

DOI QR Code

난독화와 변화량 분석을 통한 IoT 센싱 데이터의 경량 유효성 검증 기법

Lightweight Validation Mechanism for IoT Sensing Data Based on Obfuscation and Variance Analysis

  • 투고 : 2019.03.14
  • 심사 : 2019.06.03
  • 발행 : 2019.09.30

초록

최근 가정, 교통, 의료, 전력망 등 우리 생활과 밀접한 연관을 가진 여러 분야에서 IoT(Internet of Things) 센서 장치를 활용해 데이터를 수집하는 센서 네트워크를 구축하고 활용하고 있다. 이러한 센서 네트워크에서 센싱 데이터 조작은 재산 상, 안전 상의 심각한 위협이 될 수 있다. 따라서 외부 공격자가 센싱 데이터를 조작하지 못하도록 하는 방법이 필요하다. 본 논문에서는 외부 공격자에 의해 조작된 센싱 데이터를 효과적으로 제거하기 위해 데이터 난독화와 변화량 분석을 활용한 IoT 센싱 데이터 유효성 검증 기법을 제안한다. IoT 센서 장치는 난독화 함수에 따라 센싱 데이터를 변조하여 사용자에게 전송하고, 사용자는 전송받은 값을 원래의 값으로 되돌려 사용한다. 적절한 난독화를 거치지 않은 거짓 데이터는 유효 데이터와 다른 변화 양상을 보이고, 변화량 분석을 통해 거짓 데이터를 탐지할 수 있다. 성능 분석을 위해 데이터 유효성 검증 성능 및 검증 소요시간을 측정하였다. 그 결과, 기존 기법에 비해 최대 1.45배 거짓 데이터 차단율을 향상시키고, 0.1~002.0% 수준의 오검출률을 보였다. 또한 저전력, 저성능 IoT 센서 장치에서 검증 소요시간을 측정 결과, 데이터량 증가에 따라 2.5969초까지 증가되는 RSA 암호화 기법에 비해 제안 기법은 0.0003초로 높은 검증 효율을 확인하였다.

Recently, sensor networks are built and used on many kinds of fields such as home, traffic, medical treatment and power grid. Sensing data manipulation on these fields could be a serious threat on property and safety. Thus, a proper way to block sensing data manipulation is necessary. In this paper, we propose IoT(Internet of Things) sensing data validation mechanism based on data obfuscation and variance analysis to remove manipulated sensing data effectively. IoT sensor device modulates sensing data with obfuscation function and sends it to a user. The user demodulates received data to use it. Fake data which are not modulated with proper obfuscation function show different variance aspect with valid data. Our proposed mechanism thus can detect fake data by analyzing data variance. Finally, we measured data validation time for performance analysis. As a result, block rate for false data was improved by up to 1.45 times compared with the existing technique and false alarm rate was 0.1~2.0%. In addition, the validation time on the low-power, low-performance IoT sensor device was measured. Compared to the RSA encryption method, which increased to 2.5969 seconds according to the increase of the data amount, the proposed method showed high validation efficiency as 0.0003 seconds.

키워드

참고문헌

  1. "Information technology-Trusted Platform Module Library-Part1: Architecture," ISO/IEC 11889-1, 2015.
  2. K. R. Kishore, J. Vishal, B. Suvadeep, and B. Lakshmi, "IoT based smart security and home automation system," in Proceedings of International Conference on Computing, Communication and Automation (ICCCA), 2016, pp.1286-1289.
  3. M. Yu, D. Zhang, Y. Cheng, and M. Wang, "An RFID electronic tag based automatic vehicle identification system for traffic iot applications," in Proceedings of Chinese Control and Decision Conference, Mianyang, 2011. pp.4192-1497.
  4. D. Lu and T. Liu, "The application of IOT in medical system," in Proceedings of International Symposium on IT in Medicine and Education, Cuangzhou, 2011, pp.272-275.
  5. V. C. Gungor, D. Sahin, T. Kocak, S. Ergut, C. Buccella, C. Cecati, and G. P. Hancke, "Smart Grid Technologies: Communication Technologies and Standards," IEEE Transactions on Industrial Informatics, Vol.7, Issue.4, pp.529-539, 2011. https://doi.org/10.1109/TII.2011.2166794
  6. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, "Internet of Things (IoT): A vision, architectural elements, and future directions," Elsevier Future Generation Computer Systems, Vol.29, Issue.7, pp.1645-1660, 2013. https://doi.org/10.1016/j.future.2013.01.010
  7. X. Wang, J. ZHang, E. M. Schooler, and M. Ion, "Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT," in Proceedings of IEEE International Conference on Communications, Sydney, 2014, pp.725-730.
  8. H. Snador, B. Genge, and Z. Szanto, "Sensor data validation and abnormal behavior detection in the Internet of Things," in Proceedings of 16th RoEduNet Conference: Networking in Education and Research, Targu Mures, 2017, pp.1-5.
  9. D. E. Bakken, R. Rarameswaran, D. M. Blough, A. A. Franz, and T. J. Palmer, "Data obfuscation: anonymity and desensitization of usable data sets," IEEE Security and Privacy Magazine, Vol.2, Issue.6, pp.34-41, 2004. https://doi.org/10.1109/MSP.2004.97
  10. "Protection Profile PC Client Specific TPM," Version 1.1, TCG, 2018.
  11. A. Suciu and T. Carean, "Benchmarking the True Random Number Generator of TPM Chips," arXiv:1008.2223, 2010.
  12. L. Chen, S. Pearson, and A. Vamvakas "A Trusted Biometric System," Technical Report HPL-2002-185, HP Laboratories Bristol, 2002.
  13. B. Bock, D. Huemer, and A. M. Tjoa, "Towards More Trustable Log Files for Digital Forensics by Means of Trusted Computing," in Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications, Perth, 2010, pp.1020-1027.
  14. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Elsevier, Computer Networks, Vol.38, Issue.4, pp.393-422, 2002. https://doi.org/10.1016/S1389-1286(01)00302-4
  15. A. Hessler, T. Kakumaru, H. Perrey, and D. Westhoff, "Data obfuscation with network coding," Elsevier Computer Communication, Vol.25, Issue.1, pp.48-61, 2012. https://doi.org/10.3963/j.issn.1674-4861.2007.01.012
  16. J. Yang, H. Lee, M. Park, and J. Eom, "Security Threats on National Defense ICT based on IoT," in Proceedings of Ubiquitous Computing and Multimedia Applications, pp.94-98, 2015.
  17. M. Nawir, A. Amir, N. Yaakob, and O. B. Lynn, "Internet of Things(IoT): Taxonomy of security attacks," in Proceedings of 3rd International Conference on Electronic Design, Phuket, 2016, pp.321-326.
  18. L. Ertaul, "Novel Obfuscation Algorithms for Software Security," in Proceedings of the International Conference on Software Engineering Research and Practice, Vol. 5. 2005.
  19. Raspberry Pi, [Internet] https://www.raspberrypi.org/.
  20. Infineon's Trusted Platform Module (TPM), [Internet] https://www.infineon.com/cms/en/product/security-smartcard-solutions/optiga-embedded-security-solutions/optiga-tpm/slb-9670vq2.0/.
  21. The Metropolis of Seoul Weather Information Open Data Portal, [Internet] https://www.data.go.kr/dataset/3045278/fileData.do.