DOI QR코드

DOI QR Code

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service

클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계

  • 박중오 (성결대학교 파이데이아학부)
  • Received : 2021.05.31
  • Accepted : 2021.07.20
  • Published : 2021.07.28

Abstract

With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.

사물인터넷 기술 발전으로 스마트 차, 스마트 헬스케어, 스마트 홈, 스마트 팜 등 다양한 클라우드 컴퓨팅 기반 서비스가 확대되고 있다. 새로운 환경의 등장함에 따라 개인정보 또는 기업 기밀 등 중요 정보에 대한 노출 가능성, 해킹으로 인한 금전적인 피해 사례, 악의적인 공격기법으로 인한 인명피해 등 다양한 문제가 지속하여 발생하고 있다. 본 논문에서는 스마트 홈 기반의 안전한 통신을 수행하고, 사용자 데이터 보호를 위한 메시지 통신프로토콜을 제안한다. 세부 과정으로 스마트 홈 환경에서 안전한 디바이스 등록, 메시지 인증 프로토콜, 갱신프로토콜을 새롭게 설계하였다. 스마트 홈 서비스 관련 보안 요구사항을 참고하여 대표 공격기법에 대한 안정성을 검증하고, 성능을 비교분석을 수행한 결과 통신 측면 약 50%, 서명검증 측면 약 25%의 효율성을 확인했다.

Keywords

References

  1. J. H. Han. (2016). Security Requirements for a Smart Home Service, TTAK.KO-10.0963. TTA.
  2. D. H. Kim & J. Kwak. (2015). Design of Improved Authentication Protocol for Sensor Networks in IoT Environment. Journal of the Korea Institute of Information Security & Cryptology, 25(2), 467-478, https://doi.org/10.13089/JKIISC.2015.25.2.467
  3. V. Sivaraman et al. (2015, October). Network-level security and privacy control for smart-home IoT devices. In 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob) (pp. 163-167). IEEE. DOI : 10.1109/WiMOB.2015.7347956
  4. B. W. Jin, J. O. Park & M. S. Jun. (2016). Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments. Journal of the Korea Society of Digital Industry and Information Management, 12(1), 35-41. DOI : 10.17662/ksdim.2016.12.1.035
  5. B. Jin, D.Jung, S. Cha & M. Jun. (2016). Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments. Journal of the Korea Society of Digital Industry and Information Management, 12(1), 35-41. DOI : 10.17662/ksdim.2016.12.1.035
  6. N. Komninos, E. Philippou & A. Pitsillides. (2014). Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials, 16(4), 1933-1954. DOI : 10.1109/COMST.2014.2320093
  7. C. C. Wu, W. B. Lee & W. J. Tsaur. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722-723. DOI : 10.1109/LCOMM.2008.080283
  8. Z. N. Rashid, S. R. Zeebaree & A. Shengul, (2019). Design and analysis of proposed remote controlling distributed parallel computing system over the cloud. In 2019 International Conference on Advanced Science and Engineering (ICOASE) (pp. 118-123). IEEE.
  9. B. R. Zebari, A. Abdulazeez, D. Zeebaree, D. Zebari & J. Saeed. (2020). A comprehensive review of dimensionality reduction techniques for feature selection and feature extraction. Journal of Applied Science and Technology Trends, 1(2), 56-70. DOI : 10.38094/jastt1224.
  10. H. J. Mun. (2018). Biometric information and OTP based on Authentication Mechanism using Blockchain. Journal of convergence for Information Technology, 8(3), 85-90. DOI : 10.22156/CS4SMB.2018.8.3.085