Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2017.7.3.091

A Study on gateway authentication protocol in IoT  

Lee, Jae-Young (School of Information & Communication Systems, Semyung University)
Publication Information
Journal of Convergence for Information Technology / v.7, no.3, 2017 , pp. 91-96 More about this Journal
Abstract
IoT which is an abbreviation of Internet of Things refers to the communication network service among various objects such as people-people, objects-objects interconnection. The characteristic of IoT that enables direct connection among each device makes security to be considered as more emphasized factor. Though a security module such as an authentication protocol for resolving various security problems that may occur in the IoT environment has been developed, some weak points in security are still being revealed. Therefore, this paper proposes a method for including a protocol including gateway authentication procedure and mutual authentication between the devices and gateways. Protocols with additional authentication procedures can appropriately respond to attackers' spoofing attacks. In addition, important information in the message used for authentication process is protected by encryption or hash function so that it can respond to wiretapping attacks.
Keywords
Internet of Things(IoT); Authentication; Device; Encryption; Wireless network;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 D. H. Kim and J. Kwak, "Design of Improved Authentication Protocol for Sensor Networks," Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 2, 2015.
2 C. W. Park and J. W. Kim, “An Empirical Research on Information Privacy Concern in the IoT Era,” Journal of Digital Convergence, Vol. 14, No. 2, pp. 65-72, Feb. 2016. DOI : 10.14400/JDC.2016.14.2.65   DOI
3 J. O. Park, “A Study of Message Communication Method Using Attribute Based,” Journal of Digital Convergence, Vol. 14, No. 10, pp. 295-302, Oct. 2016. DOI : 10.14400/JDC.2016.14.10.295   DOI
4 E. Kim, Secure device authentication method in the internet of things, Graduate School Kyungnam University. 2014.
5 Ministry of Science, ICT and Future Planning, Internet of Things Information Security Roadmap, Oct. 2014.
6 H. J. Mun, G. H. Choi and Y. C. H, “Countermeasure to underlying security threats in IoT communication,” Journal of convergence society for SMB, Vol. 6, No. 2, pp. 37-44, Jun. 2016. DOI : 10.22156/cs4smb.2016.6.2.037
7 S. S. Shin, G. S. Chae, T. H. Lee, “An Investigation study to reduce security threat in the Internet of things environment,” Journal of convergence society for SMB, Vol. 6, No. 2, pp. 31-36, Jun. 2016. DOI : 10.22156/cs4smb.2016.6.2.031
8 Y. S. Lee, "Authentication Method for Safe Internet of Things Environments," The Journal of Korea Institute of Information, Electronics, and Communication Technology, Vol. 18, No. 1, pp. 51-58, 2015. DOI : 10.17661/jkiiect.2015.8.1.051
9 S. G. Yeo and K. H. Lee, “Smart Phone and vehicle Authentication scheme with M2M device,” Journal of the korea convergence society, Vol. 2, No. 4, pp. 1-7, 2011.
10 J. S. Shin and Y. H. Park, “An Authentication Protocol using the EXOR and the Hash Function in RFID/USN,” Journal of the Korea Industrial Information Systems Research, Vol. 12, No. 2, pp. 24-29, 2007.
11 B. I. Jang and C. S. Kim, “A Study on the Security Technology for the Internet of Things,” Journal of Security Engineering, Vol. 11, No. 5, pp. 429-438, 2014.   DOI
12 S. H. Hong, "Research on IoT international strategic standard model," Journal of the korea convergence society, Vol. 8, No. 2, pp. 21-26, 2017, DOI : 10.15207/JKCS.2017.8.2..021   DOI
13 S. H. Kim, Key distribution scheme between lightweight devices in internet of thing, Graduate School Sungkyunkwan University, 2015.