Browse > Article
http://dx.doi.org/10.5762/KAIS.2019.20.5.550

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment  

Kim, Jeong-Ho (Dept. of Computer Science and Engineering, Soongsil University)
Heo, Jae-Wook (Dept. of Computer Science and Engineering, Soongsil University)
Jun, Moon-Seog (Dept. of Computer Science and Engineering, Soongsil University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.20, no.5, 2019 , pp. 550-558 More about this Journal
Abstract
As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.
Keywords
IoT; Blockchain; PBFT; Device Authentication; Consensus Algorithm; Smart Home;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Zhang, Zhi-Kai, "IoT security: ongoing challenges and research opportunities", Service-Oriented Computing and Applications(SOCA) , 2014 IEEE 7th International Conference on. IEEE, pp. 230-234. 2014. DOI: https://doi.org/10.1109/soca.2014.58
2 Seokung Yoon, Haeryong Park, HyeongSeon Yoo, "Security issues on Smarthome in IoT environment", Computer science and its applications, Springer, Berlin, Heidelberg, pp.691-696, 2015. DOI: https://doi.org/10.1007/978-3-662-45402-2_97   DOI
3 Sivaraman Vijay, "Network-level security and privacy control for smart-home IoT devices", Wireless and Mobile Computing, Networking and Communications (WiMob) , 2015 IEEE 11th International Conference on. IEEE, pp.163-167, 2015. DOI: https://doi.org/10.1109/wimob.2015.7347956
4 Konstantinos Christidis, Michael Devetsikiotis, "Blockchains and Smart Contracts for the Internet of Things", IEEE Access , IEEE, pp.2292-2303, 2016 DOI: https://doi.org/10.1109/ACCESS.2016.2566339   DOI
5 Chul-Jin Kim, "A Static and Dynamic Design Technique of Smart Contract based on BlockChain" Korea Academy Industrial Cooperation Society, vol. 19, no. 6, pp. 110-119, Jun. 2018 DOI: https://doi.org/10.5762/KAIS.2018.19.6.110
6 Atwady Yahya, Hammoudeh Mohammed, "A survey on authentication techniques for the internet of things", Proceedings of the International Conference on Future Networks and Distributed Systems, ACM, NY, USA, p. 8, 2017. DOI: https://doi.org/10.1145/3102304.3102312
7 X. Yao, X. Han, X. Du, X. Zhou, "A lightweight multicast authentication mechanism for small scale IoT applications", IEEE Sensors Journal, vol 13, no. 10, pp.3693-3701, Oct, 2013. DOI: https://doi.org/10.1109/JSEN.2013.2266116   DOI
8 N. Mahalle, B. Anggorojati, N. R. Prasad and R. Prasad, "Identity Authentication and Capability Based Access Control(IACAC) for the Internet of Things". Journal of Cyber Security and Mobility , vol. 1, no. 4, pp. 309-348, Mar. 2013.
9 P. Porambage, C. Schmitt, P. Kumar, A. Gurtov and M. Ylianttila, "Two-phase Authentication Protocol for Wireless Sensor Networks in Distributed IoT Applications", 2014 IEEE Wireless Communications and Networking Conference(WCNC), Istanbul, Turkey, pp. 2728-2733, Apr. 2014. DOI: https://doi.org/10.1109/WCNC.2014.6952860
10 Thomas Kothmayr, Corinna Schmitt, Wen Hu, Michael Brunig and Georg Carle,. "DTLS based security and two-way authentication for the Internet of Things", AD Hoc Networks, vol. 11, issue 8, pp. 2710-2723, Nov. 2013. DOI: https://doi.org/10.1016/j.adhoc.2013.05.003   DOI
11 H. Sukhwani, J. M. Martinez, X. Chang, K. S. Trivedi and A. Rindos, "Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)", 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, p. 253-255, 2017. DOI: https://doi.org/10.1109/SRDS.2017.36
12 Deuk-hun Kim, Jin Kwak, "Design of Improved Authentication Protocol for Sensor Networks in IoT Environment" Journal of the Korea Institute of Information Security & Cryptology , vol. 25, no. 2, pp. 467-478, April, 2015. DOI: https://doi.org/10.13089/JKIISC.2015.25.2.467   DOI
13 O. Flauzac, C. Gonzalez, A. Hachani and F. Nolot, "SDN based architecture for IoT and improvement of the security", 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangju, p. 688-693, 2015. DOI: https://doi.org/10.1109/WAINA.2015.110
14 V. L. Shivraj, M. A. Rajan, M. Singh and P. Balamuralidha, "One time password authentication scheme based on elliptic curves for Internet of Things (IoT)", 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), IEEE, Riyadh, p. 1-6, 2015. DOI: https://doi.org/10.1109/NSITNSW.2015.7176384
15 Castro Miguel, "Practical Byzantine fault tolerance", Appears in the Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI), p. 173-186, 1999.