Browse > Article
http://dx.doi.org/10.5762/KAIS.2019.20.12.76

Authentication and Group Key Management Techniques for Secure Communication in IoT  

Min, So-Yeon (Dept. of Information and Communication Eng., Seoil University)
Lee, Jae-Seung (Dept. of Computer Science and Eng., Soongsil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.20, no.12, 2019 , pp. 76-82 More about this Journal
Abstract
The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.
Keywords
Internet of Things; IoT; IoT Authentication; IoT Security; IoT Device Authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 KOLIAS, Constantinos, et al. DDoS in the IoT: Mirai and other botnets. Computer, 2017, 50.7: 80-84. DOI : https://doi.org/10.1109/mc.2017.201   DOI
2 YANG, Yuchen, et al. A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 2017, 4.5: 1250-1258. DOI : https://doi.org/10.1109/jiot.2017.2694844   DOI
3 FRUSTACI, Mario, et al. Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of Things Journal, 2017, 5.4: 2483-2495. DOI : https://doi.org/10.1109/jiot.2017.2767291   DOI
4 KHAN, Minhaj Ahmad; SALAH, Khaled. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 2018, 82: 395-411. DOI : https://doi.org/10.1016/j.future.2017.11.022   DOI
5 BKAMBLE, Ashvini; BHUTAD, Sonali. Survey on Internet of Things (IoT) security issues & solutions. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC). IEEE, 2018. pp. 307-312. DOI : https://doi.org/10.1109/icisc.2018.8399084
6 SAMIE, Farzad; BAUER, Lars; HENKEL, Jorg. IoT technologies for embedded computing: A survey. In: Proceedings of the Eleventh IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis. ACM, 2016. p. 8. DOI : https://doi.org/10.1145/2968456.2974004
7 SAHA, Himadri Nath; MANDAL, Abhilasha; SINHA, Abhirup. Recent trends in the Internet of Things. In: 2017 IEEE 7th annual computing and communication workshop and conference (CCWC). IEEE, 2017. pp. 1-4.
8 SOHOEL, Halldis; JAATUN, Martin Gilje; BOYD, Colin. OWASP Top 10-Do Startups Care?. In: 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 2018. pp. 1-8. DOI : https://doi.org/10.1109/cybersecpods.2018.8560666
9 RAY, Partha Pratim. Internet of things for smart agriculture: Technologies, practices and future direction. Journal of Ambient Intelligence and Smart Environments, 2017, 9.4: 395-420. DOI : https://doi.org/10.3233/ais-170440   DOI
10 PONTA, Serena Elisa; PLATE, Henrik; SABETTA, Antonino. Beyond metadata: Code-centric and usage-based analysis of known vulnerabilities in open-source software. In: 2018 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE, 2018. pp. 449-460. DOI : https://doi.org/10.1109/icsme.2018.00054
11 FELDMAN, Paul. A practical scheme for non-interactive verifiable secret sharing. In: 28th Annual Symposium on Foundations of Computer Science (sfcs 1987). IEEE, 1987. pp. 427-438. DOI : https://doi.org/10.1109/sfcs.1987.4
12 ZHANG, Wensheng; ZHU, Sencun; CAO, Guohong. Predistribution and local collaboration-based group rekeying for wireless sensor networks. Ad hoc networks, 2009, 7.6: 1229-1242. DOI : https://doi.org/10.1016/j.adhoc.2008.11.004   DOI