JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments
Jin, Byungwook; Jung, Dongwoog; Cha, Siho; Jun, Moonseog;
  PDF(new window)
 Abstract
Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.
 Keywords
Internet of Things;Key Generation;Access Control;Session Key;
 Language
Korean
 Cited by
 References
1.
미래창조과학부 2013년도 업무보고 자료(과학기술과 ICT를 통한 창조경제와 국민행복 실현,) 2013.

2.
ITU, "ITU Internet Reports 2005, Internet of Thing," ITU, 2005.

3.
ITU-T Y. 2060, "Overview of the Internet of Things," ITU, 2012.

4.
EPoSS, "Internet of Things in 2020, A Roadmap for the Future," EPoSS, 2008.

5.
진병욱, 전문석, "IoT환경에서 안전한 데이터 송신을 위한 키 생성 프로토콜 설계," 디지털산업정보학회 학술발표집, 2014.

6.
임철수, "IoT 서비스 활용사례 분석 및 산업 활성화 이슈," 한국차세대컴퓨팅학회논문지, Vol. 11 No. 6, 2015, pp. 41-50.

7.
정종수, 김재석, 김상철, 신규상, 마평수, 박승민, "M2M 지능형 사물 플랫폼 동향," 정보통신산업진흥원, 주간기술동향 통권 1455호, 2010.

8.
ITU-T Y. 2060, "Overview of the Internet of Things," ITU, 2012.

9.
진병욱, 박재표, 이근왕, 전문석, "M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구," 한국산학기술학회논문지, 제14권, 제4호, 2013, pp. 1926-1934.