• 제목/요약/키워드: lightweight protocols

검색결과 68건 처리시간 0.021초

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • 제37권1호
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.

A Lightweight NEMO Protocol to Support 6LoWPAN

  • Kim, Jin-Ho;Hong, Choong-Seon;Shon, Tae-Shik
    • ETRI Journal
    • /
    • 제30권5호
    • /
    • pp.685-695
    • /
    • 2008
  • The Network Mobility (NEMO) and IPv6 over Low power WPAN (6LoWPAN) protocols are the two most important technologies in current networking research and are vital for the future ubiquitous environment. In this paper, we propose a compressed packet header format to support the mobility of 6LoWPAN. Also, a Lightweight NEMO protocol is proposed to minimize the signaling overhead between 6LoWPAN mobile routers and 6LoWPAN gateways by using a compressed mobility header. Performance results show that our Lightweight NEMO protocol can minimize total signaling costs and handoff signaling delay.

  • PDF

RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜 분석 (Analyses of Light-weight Protocol for Tag Security in RFID System)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2011년도 추계학술대회
    • /
    • pp.253-254
    • /
    • 2011
  • Most of existing RFID authentication protocols either suffer from some security weaknesses or require costly operations that are not available on low-cost tags. In this paper, we analyzed the security mechanism of a lightweight authentication protocol.

  • PDF

RFID를 위한 HB++ 프로토콜의 공격 방법 연구 (A study of various attacks on the HB++ protocol for RFID)

  • 신수연;권태경
    • 정보보호학회논문지
    • /
    • 제21권1호
    • /
    • pp.117-123
    • /
    • 2011
  • RFID 태그의 연산 능력의 제한으로 인해 RFID 시스템은 경량화된 인증 프로토콜을 필요로 하며, 최근 몇 년간 이에 대한 연구가 이루어져왔다. 본 논문에서는 RFID 시스템을 위한 경량화된 인증 프로토콜인 HB 프로토콜과 그 변형 프로토콜들에 대해 살펴보고 해당 프로토콜의 공격에 대해서 살펴본다. 그 중에서도 HB++ 프로토콜에 대한 Piramuthu의 공격이 문제가 있음을 지적하고 안전한 프로토콜을 위한 설정을 제안한다.

Post-quantum identity-based authenticated multiple key agreement protocol

  • Yang Yang;Hongji Yuan;Linbo Yan;Yinglan Ruan
    • ETRI Journal
    • /
    • 제45권6호
    • /
    • pp.1090-1102
    • /
    • 2023
  • Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that are vulnerable to quantum algorithms. Lattice cryptography provides quantum resistance to authenticated key agreement protocols, but the certificate always incurs excessive public key infrastructure management overhead. Thus, a lightweight lattice-based secure system is needed that removes this overhead. To answer this need, we provide a two-party lattice- and identity-based AMKA scheme based on bilateral short integer or computational bilateral inhomogeneous small integer solutions, and we provide a security proof based on the random oracle model. Compared with existing AMKA protocols, our new protocol has higher efficiency and stronger security.

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1313-1327
    • /
    • 2013
  • How to make people keep both the confidentiality of the sensitive data and the privacy of their real identity in communication networks has been a hot topic in recent years. Researchers proposed privacy-preserving authenticated key exchange protocols (PPAKE) to answer this question. However, lots of PPAKE protocols need users to remember long secrets which are inconvenient for them. In this paper we propose a lightweight three-party privacy-preserving authentication key exchange (3PPAKE) protocol using smart card to address the problem. The advantages of the new 3PPAKE protocol are: 1. The only secrets that the users need to remember in the authentication are their short passwords; 2. Both of the users can negotiate a common key and keep their identity privacy, i.e., providing anonymity for both users in the communication; 3. It enjoys better performance in terms of computation cost and security. The security of the scheme is given in the random oracle model. To the best of our knowledge, the new protocol is the first provably secure authentication protocol which provides anonymity for both users in the three-party setting.

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

  • Sharif, Lukman;Ahmed, Munir
    • Journal of Information Processing Systems
    • /
    • 제6권2호
    • /
    • pp.177-184
    • /
    • 2010
  • Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.

사물인터넷용 경량 프로토콜 비교 연구 (Research on Secure IoT Lightweight Protocols)

  • 홍성혁
    • 산업과 과학
    • /
    • 제2권1호
    • /
    • pp.1-7
    • /
    • 2023
  • 스마트시티와 스마트 홈에서 사물인터넷의 사용이 필수적이다. 사물인터넷의 핵심인 센서 노드들에 대한 보안성이 취약하여 해킹공격을 받을 경우 실생활에 치명적인 영향을 미칠 만큼 심각하나, 사물인터넷을 구성하는 센서 노드들의 물리적 기술적 제약으로 인하여 보안모듈이 탑재되어 운영되지 못하고 있는 실정이어서 사물인터넷용 경량 보안 통신 프로토콜을 개발하여 사물인터넷의 보안성을 향상하고, 앞으로 4차산업혁명 시대에 맞는 안전한 사물인터넷 환경 구축을 위해 본 연구를 실시하며, IoT사물인터넷 인증체제 구축과 통신의 기밀성을 높이기 위한 키 관리 및 식별자 개발을 대한 제안을 하여 안전하고 편리한 스마트시티와 스마트 홈을 구축하는데 기여한다.

스마트 홈/오피스 임베디드 장치를 위한 가상 저장 시스템 (A Virtual Storage System for Smart Home/Office Embedded Devices)

  • 데이위슈;김영진;임효택
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1237-1239
    • /
    • 2007
  • This paper proposes a virtual storage system for smart home/office embedded devices by utilizing AoE and HyperSCSI protocols. It relies on current Ethernet infrastructures and aims to provide a low-cost solution for the storage limitation problem on embedded devices. We choose AoE (ATA over Ethernet) and HyperSCSI in our implementation because they are relatively lightweight compared to other network storage protocols such as NFS(Network File System), CIFS(Common Internet File System) and iSCSI(internet Small Computer System Interface). The design and architecture of our proposed virtual system as well as the prototype demonstration are presented in this paper.

  • PDF

발행-구독 프로토콜에서 전송 성능의 비교 및 분석 (Transmission Performance Comparison and Analysis with Different Publish/Subscribe Protocol)

  • 판주지에;김재수
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2020년도 제62차 하계학술대회논문집 28권2호
    • /
    • pp.77-80
    • /
    • 2020
  • In this paper, we analyze and compare the performance of different publish and subscribe protocols in the real application environment. This paper provides a horizontal comparison of current publish/subscribe protocols in terms of security, throughput, and delay performance. Thanks to the use of lightweight frameworks, the MQTT protocol has demonstrated excellent performance in terms of delay performance. However, the AMQP protocol has more advantages in security and throughput. Although the REST/HTTP protocol has the worst delay performance, it is excellent in terms of compatibility because it is based on the HTTP protocol.

  • PDF