Browse > Article
http://dx.doi.org/10.22156/CS4SMB.2020.10.11.055

A Design of Secure Communication for Device Management Based on IoT  

Park, Jung-Oh (Division of Paideia, Sungkyul University)
Choi, Do-Hyeon (Department of Computer Science, Soongsil University)
Hong, Chan-Ki (Department of Medical IT, Catholic Kwandong University)
Publication Information
Journal of Convergence for Information Technology / v.10, no.11, 2020 , pp. 55-63 More about this Journal
Abstract
The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.
Keywords
ICT Convergence; Managing Certificates; Self-Certification; Communication Protocol; Hashtree;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 J. I. Lee. (2015). Convergent Case Study of Research and Education: Internet of Things Based Wireless Device Forming Research. Journal of the Korea Convergence Society, 6(4), 1-7,   DOI
2 CoAP(Constrained Application Protocol), IETF(Internet Engineering Task Force, http://www.ietf.org)
3 L. A. Tawalbeh, F. Muheidat, M. Tawalbeh & M. Quwaider. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102.   DOI
4 B. K. Rios & J. Butts. (2017). When IoT Attacks: understanding the safety risks associated with connected devices. Proceedings of Black Hat USA. https://www.blackhat.com/docs/us-17/wednesday/us-17-Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices.pdf
5 D. Y. Kang & J. H. Hwang. (2019). A Study on Priority of Certification Criteria for IoT Security Certification Service. The Journal of the Korea Contents Association, 19(7), 13-21.   DOI
6 Y. An. (2016). A Strong Biometric-based Remote User Authentication Scheme for Telecare Medicine Information Systems with Session Key Agreement. International Journal of Internet, Broadcasting and Communication, 8(3), 41-49, DOI : 10.7236/IJIBC.2016.8.3.41   DOI
7 Common Criteria Recognition Arrangement. (2017). Common Criteria for Information Technology Security Evaluation. Part 1 : Introduction and general model, CCMB-2017-04-001.
8 B. W. Jin, J. O. Park & M. S. Jun. (2017). A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment. The Journal of The Institute of Internet, Broadcasting and Communication, 16(6), 25-31, DOI : 10.7236/JIIBC.2016.16.6.25   DOI
9 T. H Kim, J. H Hong & H. Y. Jung. (2015). Trend in Trustworthy Communication for the Next-Generation. Electronics and Telecommunications Trends, 30(4), 129-139.
10 T. H. J. Kim et al. (2013). Accountable key infrastructure (AKI) a proposal for a public-key validation infrastructure. In Proceedings of the 22nd international conference on World Wide Web (pp. 679-690).
11 Y. T. Kim. (2015.). Secure Messenger System using Attribute Based Encryption. Journal of Security Engineering, 12(5), 469-486,   DOI
12 S. E. Ponta, H. Plate & A. Sabetta. (2018, September). Beyond metadata: Code-centric and usage-based analysis of known vulnerabilities in open-source software. In 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME) (pp. 449-460). IEEE.
13 Y. Yang, L. Wu, G. Yin, L. Li & H. Zhao. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250-1258. DOI : 10.1109/JIOT.2017.2694844   DOI
14 K. H. Lee, ( 2013). A Security Threats in Wireless Charger Systems in M2M. Journal of the Korea Convergence Society, 4(1), 27-31. DOI : 10.15207/JKCS.2013.4.1.027   DOI
15 Malcolm Shore. (2017). IoT Common Security Principle v1.0, KISA.