Browse > Article
http://dx.doi.org/10.17661/jkiiect.2015.8.1.051

Authentication Method for Safe Internet of Things Environments  

Lee, Young-Seok (School of Computer & Information Communication, Kunsan National University)
Publication Information
The Journal of Korea Institute of Information, Electronics, and Communication Technology / v.8, no.1, 2015 , pp. 51-58 More about this Journal
Abstract
Internet of Thing is a collection of various technical components, and the interworking among heterogeneous devices, networks, applications is expected to be accelerated through the openness of IoT platform. For this reason, many technical and administrative security threats will occur in IoT environments. In this paper, authentication methods of recent researches are analyzed for safe IoT services, and new mutual authentication protocol is proposed to provide more secure communication. The proposed protocol prevents an impersonation as malicious gateway or illegal device providing mutual authentication between gateway and IoT device. The performance analysis and evaluation of proposed authentication protocol are performed.
Keywords
Internet of Things; authentication; access server; gateway; IoT device;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
2 Hwa-jeon Seo, et al, "IoT Security Technical Trend", Korean Institute of Electromagnetic Engineering Society, Vol. 24, No. 4, pp. 27-35, 2013, 7.   DOI
3 P. de Leusse, P. Periorellis, T. Dimitrakos, and S.K. Nair, "Self managed security cell, a security model for the internet of things and services", In Advances in Future Internet, 2009 First International Conference on, pp. 47-52, 2009.
4 D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device," In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), pp. 46-59, 2006.
5 Jin-seob Shin, Young-ho Park, "An Authentication Protocol using the EXOR and the Hash Function in RFID/USN," Korea Society of Industrial Information Systems, Vol. 12, No. 2, pp.24-29, 2007. 6.
6 Hae-Soon Ahn, Ki-Dong Bu, "Improved Authentication Protocol for RFID/USN Environment," The Institute of Electronics and Information Engineers, Vol.46, No. CI-1, 2009.
7 O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
8 D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), pp. 19-31, 2011.
9 http://www.opnet.com
10 Taeyang Eom, Jeong-Hyun, "Performance Evaluation of Authentication Protocol for Mobile RFID Privacy", Korean Institute of Communication and Information Sciences, Vol. 36, No 6, 2011. 6.