Browse > Article
http://dx.doi.org/10.15207/JKCS.2017.8.7.015

Efficient Authentication Establishment Scheme between IoT Device based on Pascal Triangle Theory  

Han, Kun-Hee (Dept. of Information Communication & Engineeringe, Baeseok University)
Jeong, Yoon-Su (Dept. of information Communication Convergence Engineering, Mokwon University)
Publication Information
Journal of the Korea Convergence Society / v.8, no.7, 2017 , pp. 15-21 More about this Journal
Abstract
Recently, users' interest in IoT related products is increasing as the 4th industrial revolution has become social. The types and functions of sensors used in IoT devices are becoming increasingly diverse, and mutual authentication technology of IoT devices is required. In this paper, we propose an efficient double signature authentication scheme using Pascal's triangle theory so that different types of IoT devices can operate smoothly with each other. The proposed scheme divides the authentication path between IoT devices into two (main path and auxiliary path) to guarantee authentication and integrity of the IoT device. In addition, the proposed scheme is suitable for IoT devices that require a small capacity because they generate keys so that additional encryption algorithms are unnecessary when authenticating IoT devices. As a result of the performance evaluation, the delay time of the IoT device is improved by 6.9% and the overhead is 11.1% lower than that of the existing technique. The throughput of IoT devices was improved by an average of 12.5% over the existing techniques.
Keywords
RFID; Authentication; Internet of Thing; Key Establishment; 4th industrial revolution;
Citations & Related Records
Times Cited By KSCI : 7  (Citation Analysis)
연도 인용수 순위
1 Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle and S. C. Shantz, "Sizzle : A standards - Based End to End Security Architecture for the Embeded Internet", Pervasive mobile computing, Vol. 1, pp. 425-446, Dec. 2005.   DOI
2 T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and K. Wehrle, "Security challenges in the ip based interent of things", Wireless Personal Communications, Vol. 61, No. 3, pp. 527-524, 2011.   DOI
3 R. H. Weber, "Internet of Things: New Security and Privacy Challenges," Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, 2010.   DOI
4 R. Roman, P. Najera, J. Lopez, "Securing the Internet of Things," Computer, vol.44, no.9, pp.51,58, Sept. 2011
5 Sahid Raza, "Lightweight security solutions for the Internet Of Things", Malardalen University Sweden, 2013.
6 Shahid Raza, Hossein Shafagh, Kasun Hewage, Rene Hummen, and Hiemo Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things", IEEE Sensor Journals, 2013.
7 Daniele Trabalza, "Implementation and Evaluation of Datagram Transport Layer Security for the android operating system", 2013.
8 H. S. Ning, H. Liu; Y, L.T. "Cyberentity Security in the Internet of Things," Computer, Vol. 46, No.4, pp. 46-53, Apr. 2013.   DOI
9 T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and K.laus Wehrle. Security challenges in the ipbased internet of things. Wireless Personal Comomunications, Vol. 61, No. 3, pp. 527-542, 2011.   DOI
10 D. R Raymond and S. F. midkiff, "Denial of service in wireless sensor Networks: Attacks and Defenses" Pervasive Computing, Vol. 7, No. 1, pp. 74-81, Jan-Mar 2008.   DOI
11 V. Gupta, M Wurm, Y. Zhu, M. Millard, S Fung, N. Gura, H. Eberle and S.C. Shantz, "Sizzle: A standards - Based End to End Security Architecture for the Embeded Internet" pervasive moblie computing, Vol. 1, pp. 425-445, Dec. 2005.   DOI
12 J. W. Jung, J. D. Kim, M. G. Song, Chul-Gu Jin, "A study on Development of Certification Schemes for Cloud Security", Journal of digital Convergence , Vol. 13, No. 8, pp. 43-49, 2015.   DOI
13 S. J. Lee and W. S. Bae, "Inter-device Mutual Authentication and Formal Verification in Vehicular Security System", Journal of digital Convergence, Vol. 13, No. 4, pp. 205-210, 2015.   DOI
14 Y. S. Choo, B. W. Jin, J. P. Park and M. S. Jun, "Design The User Authentication Framework Using u-health System", Journal of digital Convergence, Vol. 13, No. 5, pp. 219-226, 2015.   DOI
15 K. B. Kim and H. J. Cho, "A Study on the Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence", Journal of the Korea Convergence Society, Vol. 8. No. 5, pp. 29-35, 2017.   DOI
16 J. S. Park, "A Data Driven Index for Convergence Sensor Networks", Journal of the Korea Convergence Society, Vol. 7. No. 6, pp. 43-48, 2016.   DOI
17 D. Y. Jung and Y. Y. Sok, "A Study on the Edu-tainer Convergence App for Young Children's Play learning in Mobile Environments", Journal of the Korea Convergence Society, Vol. 7. No. 5, pp. 23-28, 2016.   DOI
18 S. S. Shin, S. H. Lee, "Security Requirements Analysis and Countermeasures in Cloud Computing," Journal of IT Convergence Society for SMB, Vol. 5, No. 1, pp. 27-32, 2015.
19 H. G. Hong, "Business Process Support Based on IoT Technology," Journal of Convergence for Information Technology , Vol. 7, No. 1, pp. 75-79, 2017.   DOI
20 B. W. Min, "An Improvement of Personalized Computer Aided Diagnosis Probability for Smart Healthcare Service System," Journal of IT Convergence Society for SMB, Vol. 6, No. 4, pp. 85-91, 2016.
21 W. Trappe, R. Howard, and R. S. Moore, "Low-Energy Security: Limits and Opportunities in the Internet of Things," IEEE Security & Privacy, Vol. 13, No. 1, pp. 14-21, 2015.   DOI
22 S. Haller, S. Karnouskos, and C. Schroth, "The Internet of Things in an Enterprise Context," in Future Internet - FIS 2008 Lecture Notes in Computer Science Vol. 5468, pp. 14-28, 2009.
23 S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things," IEEE Sensors Journal, Vol. 13, No. 10, 2013.
24 R. Roman, J. Zhou, and J. Lopez, "On the Features and Challenges of Security and Privacy in Distributed Internet of Things," Computer Networks, Vol. 57, Elsevier, pp. 2266-2279, July 2013.   DOI
25 D. R. Raymond and S. F. midkiff, "Denial of service in wireless sensor Networks: Attakcs andDefenses", Pervasive Computing, Vol. 7, No. 1, pp. 74-81, Jan-Mar, 2008.   DOI
26 K. Jaffres-Runser, M. R. Schurgot, Q. Wang, C. Comaniciu and J M. Gorce, "A Cross-layer Framework for Multiobjective Performance Evaluation of Wireless Ad Hoc Networks," Ad Hoc Networks, Vol. 11, No. 8, pp. 2147-2171, 2013.   DOI