Browse > Article
http://dx.doi.org/10.6109/jkiice.2011.15.8.1735

USB Device Authentication Protocol based on OTP  

Jeong, Yoon-Su (한남대학교 산업기술연구소)
Kim, Yong-Tae (한남대학교 멀티미디어학부)
Park, Gil-Cheol (한남대학교 멀티미디어학부)
Abstract
Now a days, as a mass-storage USB becomes comfortable to carry, function of USB is being developed fast. However, there is a problem that the personal information which is stored in USB could be exposed being used with negative purpose without other certification process. This paper suggests OTP(One-Time Password)-based certification protocol of USB to securely protect personal information stored in USB without additional certification information. The proposed OTP based certification protocol of USB not only demands low calculations but also prevents physical approach of USB of other network and does not allow unnecessary service access of user because it conducts simple action and uses one-way hash function. Therefore, communication overhead and service delay is improved. In the experiment, the proposed protocol compares and evaluates throughput of certification server according to the numbers of USB and delay time of packet certification with a device(USB driver) which simply save device and a device(USB Token) which can calculate by oneself. As a result, it is improved as the number of 12.5% in the certification delay time on average and is improved as the number of 10.8% in the throughput of certification server according to the numbers of USB.
Keywords
USB; OTP; Device Authentication; Protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W.J. Lee, and I.S. Jeon, "Attribute-base Authenticated Key Agreement Protocol over Home Network", Journal of Korea Institute of Information Security & Cryptology (KIISC), 18(5), pp.49-57, Oct. 2008
2 "Device Certificate Profile for the Home Network", TTAS.KO-12.0052, 2007.
3 STEALTH MXP FAMILY MXI Security, http://www.mxisecurity.com/
4 IronKey, https://www.ironkey.com/
5 P. J. Bakker et al. "Investing Secure USB sticks", Nov. 2007.
6 S. H. Lee, J. Kwak and I. Y. Lee, "The Study on The Security Solutions of USB Memory", Proceedings of the 4th International Conference Ubiquitous Information Technologies & Applications, 2009(ICUT'09), pp. 1-4, Dec. 2009.
7 D. W. Kim, J. W. Han, and K. I. Chung, "Trend of Home Device Authentication/Authorization Technology", Weekly IT BRIEF, No. 1329, pp. 1-11, 2008.
8 J. H. Kim, J. W. Gi, and C. K. Kim, "A User Authentication Method between Domains Using Privilege Certificates", Korea Institute of Information Security&Cryptology, Journal of KIISC, 18(6A), pp. 75-83, Dec. 2008.
9 J. S. Moon, D. G. Lee, I. Y. Lee, "Device Authentication/Authorization PRotocol for Home Network in Next Generation Security", Advances in Information Security and Assurance(ISA 2009), LNCS 5576, pp. 760-768, Jun. 2009.
10 S.Y. Lee, K.B. Yim, K.J. Bae, Taeyoung Jeong, and Jong-Wook Han, "Counterplan of Ubiquitous Home Network Privacy based on Device Authentication and Authorization," Korea Institute of Information Security & Cryptology, Review of KIISC, 18(5), pp.125-131, Oct. 2008.