Browse > Article
http://dx.doi.org/10.17662/ksdim.2017.13.4.013

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose  

Park, Jungoh (성결대학교 파이데이아학부)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.13, no.4, 2017 , pp. 13-23 More about this Journal
Abstract
In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.
Keywords
Interval Encryption; IoT(Internet of Things); Network Control Server; Mutual Authentication; Secure Channel;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 양태훈, 이영석, 김상대, 김천용, 김상하, "사물인터넷에서 근거리 무선 통신 기술을 활용한 정보 수집 시스템 비교 분석 연구," 한국통신학회 학술대회논문집, Vol.8, No.6, 2017, pp.1288-1289.
2 신승혁, "오픈소스 하드웨어를 이용한 경량 IoT 센서 게이트웨이에 관한 연구," Journal of KIIT, Vol. 13, No.10, 2015, pp.85-90.
3 이영석, "안전한 사물 인터넷 환경을 위한 인증 방식," JKIIECT, Vol.8, No.1, 2015, pp.51-58.
4 Lionel Nkenyereye, 장종욱, "IoT 게이트웨이 기반의 이벤트 중심 접근 방식 응용프로그램 설계," JKIICE, Vol.20, No.11, 2016, pp.2119-2124.
5 TTA, "IoT 보안게이트웨이 보안요구사항," TTA.KO-12.0297, 2016. 12.
6 김나언, Nguyen Duc Lam, 김서향, 김종권, "공공안전 환경을 위한 사물인터넷 통신망 기술 개요," KICS, Vol.34, No.6, 2017, pp.35-42.