Browse > Article
http://dx.doi.org/10.13067/JKIECS.2020.15.5.981

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value  

Yim, Geo-Su (Dept. of AI.Electrical Engineering, PaiChai University)
Publication Information
The Journal of the Korea institute of electronic communication sciences / v.15, no.5, 2020 , pp. 981-986 More about this Journal
Abstract
The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.
Keywords
IoT; MQTT; Security ProtocoL; Chaotic Signal; Chaotic Map;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 S. H. Oh, S. K. Ko, S. C. Son, B. T. Lee, and Y. S. Kim, "IoT Device Management Standard Protocol Trends in Mobile Communications," Electronics and Telecommunications Trends, Trans. Aerospace and Electronic Systems, vol. 30, no. 1, 2015, pp. 94-101.
2 Y. H. Jeon, "A Study on the Security Modeling of Internet of Things(IoT)," J. of Korean Institute of Information Technology, vol. 15, no. 12, December. 2017, pp. 17-27.   DOI
3 J. Y. Ko. So. G. Lee, J. W. Kim, and C. H. Lee, "Technologies Analysis based on IoT Security Requirements and Secure Operation System," j. of The Korea Contents Association, vol. 18, no. 4, March 2018, pp. 164-177.   DOI
4 N. H. Kim, and C. S. Hong, "Lightweight Cryptography Algorithm basd Secure MQTT Protocol," j. of The Korean Institute of Information Scientists and Engineers, vol. 16, no. 12, December 2016, pp. 757-759.
5 N. H. Kim, and C. S. Hong, "Secure MQTT Protocol based on Attribute-Based Encryption Scheme," j. of The Korean Institute of Information Scientists and Engineers, vol. 45, no. 3, December 2018, pp. 195-199.
6 G. L. Baker, and J. P. Gollub, Chaotic Dynamics an Introduction. Cambridge University Press, 1996.
7 H. G. Schuster, Deterministic Chaos: An Introduction 2nd editionl. Wiley-VCH, 1997.
8 E. Ott, Chaose in Dynamical Systems Second Edition. Cambridge University Press, 2002.
9 G. -S. Yim, and H. -S. Kim "Chaos-based Image Encryption Scheme using Noise-induced Synchronizaiton," j. of The Korea Society of Computer and Information, vol. 13, no. 5, September 2008, pp. 155-162.
10 H. -S. Kim, and G. -S. Yim "Design of a digigal photo frame for close-range security using the chaotic signals synchronization," j. of The Korea Society of Computer and Information, vol. 16, no. 2, February 2011, pp. 201-206.   DOI
11 G. -S. Yim "IoT MQTT Security Protocaol Design Using Chaotic Signals," j. of The Korea Institute of Information & Electronic Communication Technology, vol. 11, no. 6, December 2018, pp. 778-782.   DOI
12 G. -S. Yim "RFID Security Protocol Design Using Noise Synchronization of Chaotic Signal," j. of Korean Institute of Information Technology, vol. 16, no. 10, October 2018, pp. 119-123.   DOI