• Title/Summary/Keyword: IoT Authentication

Search Result 192, Processing Time 0.035 seconds

Two-Phase Security Protection for the Internet of Things Object

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1431-1437
    • /
    • 2018
  • Securing objects in the Internet of Things (IoT) is essential. Authentication model is one candidate to secure an object, but it is only limited to handle a specific type of attack such as Sybil attack. The authentication model cannot handle other types of attack such as trust-based attacks. This paper proposed two-phase security protection for objects in IoT. The proposed method combined authentication and statistical models. The results showed that the proposed method could handle other attacks in addition to Sybil attacks, such as bad-mouthing attack, good-mouthing attack, and ballot stuffing attack.

An IoT Information Security Model for Securing Bigdata Information for IoT Users (IoT 사용자의 빅데이터 정보를 안전하게 보호하기 위한 IoT 정보 보안 모델)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.8-14
    • /
    • 2019
  • Due to the development of computer technology, IoT technology is being used in various fields of industry, economy, medical service and education. However, multimedia information processed through IoT equipment is still one of the major issues in the application sector. In this paper, a big data protection model for users of IoT based IoT is proposed to ensure integrity of users' multimedia information processed through IoT equipment. The proposed model aims to prevent users' illegal exploitation of big data information collected through IoT equipment without users' consent. The proposed model uses signatures and authentication information for IoT users in a hybrid cryptographic method. The proposed model feature ensuring integrity and confidentiality of users' big data collected through IoT equipment. In addition, the user's big data is not abused without the user's consent because the user's signature information is encrypted using a steganography-based cryptography-based encryption technique.

A Scheme of User Face Recognition using a Moire Phenomenon in IoT Environment (IoT환경에서 무아레 현상을 이용한 사용자 얼굴 인증 기법)

  • Cho, Ik-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.171-176
    • /
    • 2019
  • In modern times, many IoT products are being used as all things and devices are connected to the Internet and IoT products become easily accessible through the network. For the convenience of users, IoT products can be remotely operated automatically without manual operation. Various research and development are underway to improve the convenience of users by using IoT products. However, since only the convenience of the users is pursued, in terms of security, there is a serious problem that exposes the user's personal information. This paper has proposed a method to apply $moir{\acute{e}}$ technology to IoT products in order to improve the performance of security, and a method to increase the safety of IoT products using user face authentication based on shadow $moir{\acute{e}}$ as a $moir{\acute{e}}$ phenomenon method, and the projection $moir{\acute{e}}$. When comparing the existing IoT products and IoT products applied with $moir{\acute{e}}$ technology, IoT products applied with $moir{\acute{e}}$ technology are safer in terms of security.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

Design of Authentication and Key Agreement Scheme using ECQV for IoT Environments (IoT 환경을 위한 ECQV 기반의 인증 및 키 합의 기법 설계)

  • Lee, Dae-Hwi;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.188-189
    • /
    • 2019
  • 최근 출시되는 다양한 IoT 서비스 환경에 참여하고 있는 객체들은 각자 인터넷에 연결되어 다른 객체와 통신할 수 있다. 이전에는 디바이스가 직접 인터넷에 연결될 수 있는 능력이 없었기 때문에 게이트웨이와 같은 중간 연결 매개체를 통해 인터넷에 연결되었다. 이후 IoT 디바이스의 성능이 좋아짐에 따라 디바이스가 직접 인터넷에 연결되고, 다른 디바이스들과 직접 통신할 수 있게 되었다. 디바이스는 사용자의 스마트폰이 될 수 있고, 스마트홈이나 스마트시티를 구성하는 여러 디바이스들이 될 수 있으며, 이를 확인하고 안전하게 데이터를 송수신하기 위해서는 인증 및 키 관리가 필수적이다. 객체가 인터넷에 연결될 수 있음에도 불구하고 IoT 디바이스들은 제한된 환경에서 동작하는 특성을 가지기 때문에, 기존 인증 및 키 합의 프로토콜을 그대로 적용할 수 없다. 따라서 본 논문에서는 IoT를 구성하는 객체가 인터넷에 직접 연결되고 서로 안전하게 통신하기 위해 ECQV(Elliptic Curve Qu-Vanstone) 묵시적 인증서를 통해 상호 인증 후 키를 안전하게 합의할 수 있는 인증 및 키 합의 기법에 대해 연구한다.

A Study on the Remote Authentication Method between IoT Devices using a Trusted Security Module (신뢰 보안 모듈을 이용한 IoT 기기 간 원격 인증 방법에 관한 연구)

  • Han, Jin-Hee;Jeon, YongSung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.587-590
    • /
    • 2015
  • IoT 환경에서 서로 다른 사양을 갖는 기기 간 통신에서의 보안 취약성, 사용자의 프라이버시 데이터 유출, 인가 받지 않은 기기나 사용자로 인한 기기 위 변조, 기기 오작동 등의 보안 위협 발생 가능성이 증가할 것이라는 예측과 더불어 다양한 보안 위협에 대응할 수 있는 보안 기술에 대한 관심이 높아지고 있다. 본 논문에서는 신뢰 보안 모듈과 클라우드 서버를 이용한 기기 간 원격 인증 및 기기 관리 방법에 대해 기술한다. 수 많은 기기가 인터넷으로 연결되어 운용되는 IoT 환경에서 신뢰 보안 모듈을 활용한 IoT 기기 간 원격 인증, 기기 보안 업데이트 및 안전한 기기 관리 기능 등을 통해 보다 안전하고 신뢰할 수 있는 IoT 서비스 제공이 가능해짙 수 있을 것이다.

A Scheme for Better Authentication of IoT System based-on Blockchain and IPFS (블록체인과 IPFS 기반 IoT 시스템 인증 강화 기법)

  • Lee, Byeong-min
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.313-316
    • /
    • 2021
  • 사물 인터넷 시스템에서 서버와 클라이언트의 신뢰성 확보는 매우 중요하다. 대부분의 IoT 시스템에서 신뢰성 확보를 위해 인증서 기법이 사용되고 있다. 인증서 기법을 사용하는 IoT 시스템은 데이터(인증서,공개키) 탈취 및 분실 취약점이 있다. 이러한 취약점을 강화하기 위해 서버와 클라이언트는 서로 주고받는 데이터의 무결성과 신뢰성을 보장할 수 있는 환경이 구축되어야 한다. 본 논문에서는 이러한 취약점을 보완하기 위하여 IPFS와 블록체인을 결합한 인증 강화 기법을 제시한다. 제시한 기법의 기본 개념은 IPFS를 이용하여 CA와 서버의 인증서와 공개키를 분산 저장하고, IPFS에 저장한 인증서와 공개키의 Content-Address를 블록체인에 보관한다. 마지막으로 제시한 기법의 타당성을 검토하기 위하여 Mobius, nCube, Ethereum, IPFS를 결합한 IoT 시스템을 구축하고 SSL을 사용한 인증 과정을 실험한다.

  • PDF

Hash-based SSDP for IoT Device Security (IoT 기기 보안을 위한 해시 기반의 SSDP)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Due to the prolonged infectious disease of COVID-19 worldwide, there are various security threats due to network attacks on Internet of Things devices that are vulnerable to telecommuting. Initially, users of Internet of Things devices were exploited for vulnerabilities in Remote Desktop Protocol, spear phishing and APT attacks. Since then, the technology of network attacks has gradually evolved, exploiting the simple service discovery protocol of Internet of Things devices, and DRDoS attacks have continued to increase. Existing SSDPs are accessible to unauthorized devices on the network, resulting in problems with information disclosure and amplification attacks on SSDP servers. To compensate for the problem with the authentication procedure of existing SSDPs, we propose a hash-based SSDP that encrypts server-specific information with hash and adds authentication fields to both Notify and M-Search message packets to determine whether an authorized IoT device is present.

Efficient ID-Based Authentication and Key Exchange Protocol (효율적인 ID 기반 인증 및 키 교환 프로토콜)

  • Eom, Jieun;Seo, Minhye;Park, Jong Hwan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1387-1399
    • /
    • 2016
  • In a hyper-connected society realized through IoT-enabled technology, a large amount of data is collected by various devices and is processed to provide new services to users. While communicating through a network, it is essential for devices to execute mutual authentication since users' privacy can be infringed by malicious attackers. ID-based signature enables authentication and key exchange with a unique ID of a device. However, most of the previous ID-based signature schemes based on RSA require an additional step to share parameters for key exchange so that they are not suitable for resource-constrained devices in terms of efficiency. In this paper, we design an efficient ID-based signature and thereby propose an efficient ID-based authentication and key exchange protocol in which sessions for both an authentication and a key exchange are executed simultaneously. In addition, we prove the security of our scheme under the RSA onewayness problem and analyze the efficiency by comparing with the previous schemes.

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.