Browse > Article
http://dx.doi.org/10.7236/JIIBC.2016.16.4.41

A Design of Authentication Method for Secure Communication based on Wearable Device  

Park, Jung-Oh (Dept. of Computer Engineering, Sungkyul University)
Publication Information
The Journal of the Institute of Internet, Broadcasting and Communication / v.16, no.4, 2016 , pp. 41-46 More about this Journal
Abstract
Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.
Keywords
Wearable Device; Authentication; Communication Protocol;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Wen-Quan JIN, D. H. Kim, "Implementation and Experiment of CoAP Protocol Based on IoT for Verification of Interoperability," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 14, No. 4, pp. 7-12, 2014.
2 I. k Im, J. p Jeong, "Authentication eXtention Scheme of Fast Handover for Secure NEMO-based PMIPv6 Networks ," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 13, No. 4, pp. 107-119, 2013.   DOI
3 S. T. Yoo, S. H. Oh, " OAuth-based User Authentication Framework for Internet of Things". KAIS, Vol 16, No. 11, pp.8057-8063, 2015.
4 Y. H. Lee, H. S. Kim, "Remarks on Smart Watch Security Vulnerability and Solution", JSE, Vol. 12, No. 3, pp. 191-206. 2015   DOI
5 S. T. Kim, "Wearless OS Technology Trends", TTA Special Report. Vol 154, pp44-50. 2014
6 Toorani, Mohsen. "On vulnerabilities of the security association in the IEEE 802.15. 6 standard." Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2015. 245-260.
7 Luyi Xing, Xiaolong Bai, Tongxin Li, XiaoFeng Wang, Kai Chen, Xiaojing Liao, "Unauthorized Cross-App Resource Access on MAC OS X and iOS", May 2015