• 제목/요약/키워드: Message Integrity Code (MIC)

검색결과 2건 처리시간 0.016초

IEEE 802.11i 4-way 핸드쉐이크 프로토콜의 안전성과 신뢰성 (Security and Reliability of the 4-way Handshake Protocol in IEEE 802.11i)

  • 박창섭;우병덕
    • 정보처리학회논문지C
    • /
    • 제16C권3호
    • /
    • pp.317-324
    • /
    • 2009
  • 본 논문은 IEEE 802.11i의 4-way 핸드쉐이크 프로토콜을 안전성과 신뢰성의 측면에서 분석한다. 분석을 통해 MIC 오류와 같은 특정한 상황에서 4-way 핸드쉐이크가 정상적으로 수행되지 못하는 것을 보여주고 문제 해결을 위한 수정방안을 제안한다. 또한 4-way 핸드쉐이크 프로토콜보다 안전하고 효율적인 2-way 핸드쉐이크 프로토콜을 제안한다.

클라우드와 포그 컴퓨팅 기반 IoT 서비스를 위한 보안 프레임워크 연구 (A Study on the Security Framework for IoT Services based on Cloud and Fog Computing)

  • 신민정;김성운
    • 한국멀티미디어학회논문지
    • /
    • 제20권12호
    • /
    • pp.1928-1939
    • /
    • 2017
  • Fog computing is another paradigm of the cloud computing, which extends the ubiquitous services to applications on many connected devices in the IoT (Internet of Things). In general, if we access a lot of IoT devices with existing cloud, we waste a huge amount of bandwidth and work efficiency becomes low. So we apply the paradigm called fog between IoT devices and cloud. The network architecture based on cloud and fog computing discloses the security and privacy issues according to mixed paradigm. There are so many security issues in many aspects. Moreover many IoT devices are connected at fog and they generate much data, therefore light and efficient security mechanism is needed. For example, with inappropriate encryption or authentication algorithm, it causes a huge bandwidth loss. In this paper, we consider issues related with data encryption and authentication mechanism in the network architecture for cloud and fog-based M2M (Machine to Machine) IoT services. This includes trusted encryption and authentication algorithm, and key generation method. The contribution of this paper is to provide efficient security mechanisms for the proposed service architecture. We implemented the envisaged conceptual security check mechanisms and verified their performance.