Browse > Article
http://dx.doi.org/10.15207/JKCS.2017.8.11.057

The Research on Blockchain-based Secure loT Authentication  

Hong, Sunghyuck (Div. of Information & Communication, Baekseok University)
Park, Sanghee (Div. of Information & Communication, Baekseok University)
Publication Information
Journal of the Korea Convergence Society / v.8, no.11, 2017 , pp. 57-62 More about this Journal
Abstract
With various sensors and communications capabilities, the Internet is growing larger as the internet can communicate with the Internet. Given the growing vulnerability of the internet market, the development of security and security is increasing, and the development of the internet is actively evolving and the development of the internet is actively being carried out. In particular, it is required to introduce lightweight and secure authentication schemes, especially those that are difficult to use due to the difficulty of using authentication schemes. Thus, the safety of the secure authentication system of the Internet is becoming very important. Therefore, in this thesis, we propose certification technologies on secure objects to ensure correct, safe communication in the context of the internet context.
Keywords
IoT; Authentication technology; Network security; Data communication; Sensor network;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 Y. K. Choi, "A User Authentication Mechanism for IoT Network based on OAuth Protocol", Ajou University : Knowledge Information Technology Division, 2015.
2 D. G. Jeong, "A Study on IoT-Related Industry Trend", Korea Information Technology Journal 15(1), pp.31-37, 2017.
3 T. A. Alghamdi, A. Lasebae, and M. Aiash, "Security analysis of the constrained application protocol in the Internet of Things", Future Generation Communication Technology (FGCT), 2013 Second International Conference on, pp. 163-168, 2013.
4 S. H. Kang, "Internet of Things technique", Journal of Electronic Engineering 43(3), pp.64-71, 2016.3.
5 H. J. Seo, D. G. Lee, J. S. Choi, and H. W. Kim, "Iot Security Technical Trend", Korean Institute of Electromagnetic Engineering Society 24(4), pp.27-35, 2013.   DOI
6 J. H. Kang, H. J. Kim, and M. S. Jeon, "Market and Technical Trends of internet of things", Korea Creative Content Association 13(1), pp.14-17, 2015.
7 Y. S. Lee, "Authentication Method for Safe Internet of Things", Korea Information Technology Institute of Telecommunications & Technology Papers 8(1), pp.51-58, 2015.
8 M. G. Choi, K. R. Cho, "A Study on the Methodology in Classifying the Importance of Information System", Information Protection Society Papers 24(6), pp.1329-1335, 2014.
9 S. T. Yu, S. H. Oh, "OAuth-based User Authentication Framework for Internet of Things", Journal of Economic Accumulation of the Korean Academy of Acquisitions 16(11), pp.8057-8063, 2015.
10 G. B. Lee, B. S. Lee, "A Study on RFID information protection with the modified ECC Algorithm", Korea Information Technology Institute 8(3), pp.77-85, 2010.
11 J. H. You, C. K. Park, and M. S. Jeon, "Mechanism for Phishing Protection in OpenID", Korea Institute of Academiums and Acquisitions 2010 Proceedings of the Spring Conference Part 1, pp.199-202, 2010.
12 J.J. Lee, "ECC and OpenID Based User Authentication in Intermet of Things", Incheon National University A graduate school : Information and communication network communications network and security, 2016.
13 S. J. Park, "Block Chain Paradigm and FinTech Security", Korea Telecommunications Association (Information and communication) 34(3), pp.23-26, 2017.
14 D. Y. Lee, J. W. Park, J. H. Lee, S. R. Lee, and S. Y. Park, "Blockchain Core Technology and Domestic and Foreign Trends", Information science magazine 35(6), pp.22-28, 2017.
15 B. J. Park, T. J. Lee, and J. Kwak, "Blockchain-Based IoT Device Authentication Scheme", Information Protection Society Papers 27(2), pp.343-351, 2017.