Browse > Article
http://dx.doi.org/10.7840/kics.2013.38B.5.394

Entity Authentication Scheme for Secure WEB of Things Applications  

Park, Jiye (덕성여자대학교 컴퓨터공학부)
Kang, Namhi (덕성여자대학교 컴퓨터공학부)
Abstract
WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.
Keywords
WoT(Web of Things); IoT(Internet of Things); Authentication; LLN; DTLS;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 EU, European Commission -Press release, Retreived Apr., 12, 2012, from http://europa.eu.
2 S. K. Yoo, Y. G. Hong, and H. J. Kim, "Smart mobile services - M2M technology and its standardization trends," J. ETRI, vol. 26, no. 2, Apr. 2011.
3 D. Guinard, A web of things application architecture-integrating the real-world into the web, Retrieved Dec, 1, 2012, from http://www.webofthings.org.
4 Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol (CoAP)," IETF CoRE WG draft, Apr., 2013.
5 O. G.-Morchon, S. L. Keoh, S. S. Kumar, R. Hummen, and R. Struik, "Security considerations for the IoT," IETF CoRE WG draft, Mar., 2013
6 Z. Lan and Z. Huaibei, "An improved approach to security and privacy of RFID application system," in Proc. Int. Conf. Wireless, Commun., Networking and Mobile Comput., vol. 2, pp. 1195-1198, Wuhan, China, Sep. 2005.
7 KISA, "Research for Random number generator using a domestic cipher algorithm," KISA-WP-2011-0039, 2011
8 M. Son and N. Kang, "Design and implementation of Java crypto provider for Android platform," J. KICS, vol. 37C, no. 9, pp. 851-858, Sep. 2012.   과학기술학회마을   DOI   ScienceOn