Browse > Article
http://dx.doi.org/10.3837/tiis.2018.02.021

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments  

Ra, Gyeong-Jin (Department of Computer Science and Engineering, Soonchunhyang University)
Lee, Im-Yeong (Department of Computer Software and Engineering, Soonchunhyang University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.2, 2018 , pp. 892-905 More about this Journal
Abstract
In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.
Keywords
Smart Home; Internet of Things; Keyless Signature Infrastructure; Block Chain; Extended Merkle Tree; XOR Tree;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 T.Mendes, R. Godina, E. Rodrigues, Matias. M, Catalao. J. C, &, J. P, "Smart home communication technologies and applications," Wireless protocol assessment for home area network resources. Energies, pp. 7279-7311, 2015.
2 M. Schukat, & P. Cortijo, "Public key infrastructures and digital certificates for the Internet of things," in Proc. of Signals and Systems Conference (ISSC), pp. 1-5, 2015.
3 S. M. Kim, H. S. Choi, & W. S. Rhee, "IoT home gateway for auto-configuration and management of MQTT devices. In Wireless Sensors (ICWiSe)," in Proc. of IEEE Conference on, pp. 12-17, 2015.
4 Zhang, X., Hsiao, H. C., Hasker, G., Chan, H., Perrig, A., & Andersen, D. G., "SCION: Scalability, control, and isolation on next-generation networks," in Proc. of Security and Privacy (SP), IEEE Symposium on, pp. 212-227, 2011.
5 B.W. Jin, J.O. Park and M.S. Jeon, "A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment," Journal of IIBC, Vol.16, No.6, pp.25-31, 2016.
6 A.Buldas, A.Kroonmaa, & R.Laanoja, "Keyless signatures' infrastructure: How to build global distributed hash-trees," in Proc. of Nordic Conference on Secure IT Systems, pp. 313-320, 2013.
7 M. Bellare, & P. Rogaway, "Collision-resistant hashing: Towards making UOWHFs practical," in Proc. of Advances in Cryptology-CRYPTO'97: 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1997. Proceedings, pp. 470, 1997.
8 G.J. Ra, Y.H. Park, & I.Y. Lee, "A Study on Secure Home System using KSI," in Proc. of Asia Pacific International Conference on Information Science and Technology, 2017.
9 A.Dorri, S. Kanhere, R.Jurdak, & P.Gauravaram, "Blockchain for IoT security and privacy: The case study of a smart home," in Proc. of Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on IEEE, pp. 618-623, 2017.
10 C. Jamthagen, and M. Hell, "Blockchain-based publishing layer for the Keyless Signing Infrastructure," in Proc. of 13th IEEE International Conference on Advanced and Trusted Computing, IEEE--Institute of Electrical and Electronics Engineers Inc, 2016.
11 E.Dahmen, K.Okeya, T.Takagi, & C. Vuillaume, "Digital Signatures Out of Second-Preimage Resistant Hash Functions," PQCrypto5299, pp. 109-123, 2008.
12 J. Buchmann, E. Dahmen and A. Hulsing, "XMSS-a practical forward secure signature scheme based on minimal security assumptions," in Proc. of Post-Quantum Cryptography: 4th International Workshop, pp. 117-129, 2011.