Browse > Article
http://dx.doi.org/10.17662/ksdim.2019.15.2.043

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment  

Park, JungOh (성결대학교 파이데이아학부)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.15, no.2, 2019 , pp. 43-52 More about this Journal
Abstract
The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.
Keywords
Device Management; User Authentication; Wireless Network;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Security Requirements for the Smart Phone Security Management Product, TTA.Ko-12.0265, TTA, 2014.
2 Security Requirements for IoT Gateway, TTAK.KO-12.0297, 2016.
3 Keun-Ho Lee, "A Security Threats in Wireless Charger Systems in M2M", Journal of the Korea Convergence Society, Vol. 4, No. 1, 2013, pp. 27-31.   DOI
4 임철수, "IoT 서비스 활용사례 분석 및 산업 활성화 이슈," 한국차세대컴퓨팅학회, 한국차세대컴퓨팅학회논문지, 제11권, 제6호, 2015, pp. 41-50.
5 유재학,"사물 웹(WoT) 융합 기술 및 표준화 동향", 정보통신산업진흥원, 주간기술동향, 2014.
6 류호석․곽진, 스마트홈에서의 보안 위협 및 보안 요구사항 분석, 한국인터넷정보학회 추계학술대회 논문집, 2014.
7 D. Gessner, A. Olivereau, A. Salinas Segura, A. Serbanati, 'Trustworthy Infrastructure Services for a Secure and Privacy-respecting Internet of Things,' IEEE Conference on Trust, Security and Privacy, 2012.
8 Internet of Things Architecture, www.iot-a.eu/public