JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment
Kim, Sung-Soo; Jun, Moon-Seog; Choi, Do-Hyeon;
  PDF(new window)
 Abstract
The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.
 Keywords
M2M;IoT;Trapdoor Collision Hash;Group Key;
 Language
Korean
 Cited by
1.
효율적인 정보 저장과 활용을 극대화하기 위한 IoE 서비스 프로세스 연구,장영현;오상엽;고창배;

한국인터넷방송통신학회논문지, 2015. vol.15. 6, pp.31-35 crossref(new window)
 References
1.
Wen Quan JIN, Do Hyeun Kim, "Implemen tation and Experiment of CoAP Protocol Based on IoT for Verification of Interoperability," The Journal of The Institute of Internet Broadcasting and Communication(JIIBC), Vol 14, No 4, pp 7-12, Aug 2014.

2.
JungOh Park, Sangkun Kim, "Mutual Authentica tion and Key Establishment Mechanism for Secure Data Sharing in M2M Environment," The Journal of The Institute of Internet Broadcasting and Communication(JIIBC), Vol 15, No 4, pp 33-41, Aug 2015. crossref(new window)

3.
G. Lawton, "Machine-to-Machine technology ge ars up for growth," IEEE Computer Society, Vol 37, No 9, pp 12-15, Sep 2004.

4.
KISA, "Internet Threat Trend things", Korea Internet & Security Agency, 2014.

5.
Jeongin Kim, Namhi Kan, "Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol 15, No 3, pp 1-6, Jun 2015.

6.
oneM2M-TS-0001, "oneM2M Functional Archi tecture Technical Specification" v0.2.1, 2013.

7.
Kim Zongheon, Kim Jaeu, Yoo Seok, Lee Jaeyong, "Wireless technology for M2M/IoT services," Korea Institute of Communications and Information Sciences(KICS), Vol 30, No 8, pp 11-19, 2013.

8.
Lee Junseop, "A Study on the M2M service layer in ITU-T and oneM2M," Conf. of Korea Information and Communications Society, pp 1381-1382, Jan 2015.

9.
oneM2M-TR-0008, "Analysis of security solution s for oneM2M system", v0.2.1, 2013.

10.
Yoo Heekyung, Sung Kyung, "Analysis and implementation of Digital Signature Algorithm using Hash function," Journal of The Korea Knowledge Information Technology Society (KKITS), Vol 6, No 3, pp 129-142, Jun 2011.

11.
KISA, "The Trend of Project related to Tech nology for Personal Information protection", Korea Internet and Security Agency, 2006.

12.
Ateniese Giuseppe, De Medeiros Breno, "Iden tity-based chameleon hash and applications," Financial Cryptography. Springer Berlin Heidelberg, pp 164-180, 2004.

13.
Krawczyk H., Rabin T., "Chameleon signatures," Proceedings of NDSS, pp 143-154, 2000.