DOI QR코드

DOI QR Code

A Research on IoT Security Technology based on Blockchain and Lightweight Cryptographic Algorithms

  • Received : 2023.01.30
  • Accepted : 2023.03.15
  • Published : 2023.03.31

Abstract

As the IoT market continues to grow, security threats to IoT devices with limited resources are also increasing. However, the application of security technology to the existing system to IoT devices with limited resources is impossible due to the inherent characteristics of IoT devices. Various methods for solving related problems have been studied in existing studies to solve this problem. Therefore, this study analyzes the characteristics of domestic IoT authentication standards and existing research to propose an algorithm that applies blockchain-based authentication and lightweight encryption algorithms to IoT equipment with limited resources. In this study, a key generation method was applied using a Lamport hash-chain and data integrity between IoT devices were provided using a Merkle Tree, and an LEA encryption algorithm was applied using confidentiality in data communication. In the experiment, it was verified that the efficiency is high when the LEA encryption algorithm, which is a lightweight encryption algorithm, is applied to IoT devices with limited resources.

Keywords

References

  1. S. Pal, M. Hitchens, T. Rabehaja, and S. Mukhopadhyay, "Security Requirements for the Internet of Things: A Systematic Approach," Sensors-20-05897, 2020.
  2. Korea Internet & Security Agency, "IoT Common Security Guide for Security Internalization of ICT Convergence Products and Services," Jinhan M&B, 2016.
  3. S. K. Ji, "IoT Security Certification Inspection Standards and Trends in Domestic Certification," TTA Journal 186, Special Report, 2019.
  4. B. J. Park, T. J. Lee, and J. Kwak, "Blockchain-Based IoT Device Authentication Scheme," Journal of The Korea Institute of Information Security & Cryptology, Vol. 27, No. 2, pp. 343-351, 2017. https://doi.org/10.13089/JKIISC.2017.27.2.343
  5. W. S. Choi and S. S. Kim, "Blockchain-based IoT Authentication techniques for DDoS Attacks," Journal of the Korea Society of Computer and information, Vol. 24, Issue. 7, pp. 87-91, 2019.
  6. S. H. Hong, "P2P networking based internet of things (IoT) sensor node authentication by Blockchain," Springer, Peer-to-Peer Networking and Applications 13, pp. 579-589, 2019. https://doi.org/10.1007/s12083-019-00739-x
  7. J. Daemen and V. Rjjmen, "The design of Rijnde l: AES-the advanced encryption standard," Springer, 2013.
  8. D. Hong, J. Lee, D. Kim, D. Kwon, K. Ryu, and D. Lee, "LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors," ISA. LNCS, Vol. 8267, pp. 3-27, 2013.
  9. J. M. Jeong, P. H. Kim, K. Y. Jung, E. J. Yoon, and K.Y. Yoo, "Key Management Method for LEA Lightweight Block Cipher," Proceedings of Symposium of the Korean Institute of communications and Information Sciences, pp. 959-960, 2017.
  10. R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining Digital Signatures and Public-Key Crypto-systems," Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978. https://doi.org/10.1145/359340.359342
  11. N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, Vol. 48, No. 177, pp. 203-209, 1987. https://doi.org/10.1090/S0025-5718-1987-0866109-5
  12. S. J. Kim, "A Study on the Security Management System for Preventing Technology Leakage of Small and Medium Enterprise in Digital New Deal Environment," The International Journal of Advanced Culture Technology, Vol. 9, No. 4, pp. 355-362, 2021.