JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Secure Configuration Scheme for Internet of Things using NFC as OOB Channel
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Secure Configuration Scheme for Internet of Things using NFC as OOB Channel
Kim, Jeongin; Kang, Namhi;
  PDF(new window)
 Abstract
The PSK (Pre-shared Secret Key) based method is appropriate for the IoT environment consisting of lightweight devices since this method requires less computing time and energy than the method to configure the session key based on the public key algorithm. A fundamental prerequisite for the PSK based method is that PSK should have been configured between the communication entities safely in advance. However, in case of a small sensor or actuator, no input and output interface such as keyboard and monitor required for configuration exists, so it is more difficult to configure PSK for such lightweight devices safely in the IoT environment than the previous Internet devices. Especially, normal users lack expertise in security so they face difficulty in configuration. Therefore, the default value configured at the time of manufacturing at factories is used or the device installer configures PSK in most cases. In such case, it is a matter for consideration whether all installers and manufacturers can be trusted or not. In order to solve such problem, this paper proposes a secure bootstrapping scheme, which utilizes the NFC (Near Field Communication) as an OOB (Out-Of-Band) channel, for lightweight devices with limited resources.
 Keywords
Secure bootstrapping;Internet of Things;Resource-constrained devices;NFC;OOB;
 Language
Korean
 Cited by
1.
시계열 데이터에 적합한 다단계 비정상 탐지 시스템 설계,채문창;임혁;강남희;

한국인터넷방송통신학회논문지, 2016. vol.16. 6, pp.1-7 crossref(new window)
 References
1.
Gartner, http://www.gartner.com/newsroom/id/2905717, Nov. 2014.

2.
Namhi Kang, “Survey on standard technologies for Internet of Things security,” Information and Communications Magazine, Vol. 31, No. 9, pp. 40-45, 2014.

3.
Jeongin Kim, Namhi Kang, “Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things,” The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 15, No. 3, pp. 1-6, 2015.

4.
Jiye Park, Saemi Shin, Namhi Kang, "Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things," The journal of KOREAN Institute of Communication and Information Science," Vol. 38, No. 9, pp. 707-714, 2013.

5.
P. Eronen, H. Tschofenig, "Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)", IETF Standard, RFC 4279, 2005.

6.
Myny, Kris, et al., “Flexible thin-film NFC tags,” IEEE Communications Magazine, Vol. 53, No. 10, pp. 182-189, 2015.

7.
Atzori, Luigi, Antonio Iera, Giacomo Morabito, “The internet of things: A survey,” Computer networks, Vol. 54, No. 15, pp. 2787-2805, 2010. crossref(new window)

8.
Kortvedt, Henning, and S. Mjolsnes. "Eavesdropping near field communication." The Norwegian Information Security Conference (NISK). Vol. 27. 2009.

9.
C. Jennings, "Transitive Trust Enrollment for Constrained Devices," IETF Internet Draft, draft-jennings-core-transitive-trust-enrollment-01, 2012.

10.
Han, J., Lin, Y. H., Perrig, A., & Bai, F, "MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles," CMU White Paper, CMUCyLab-14-006, 2014.

11.
Jiye Park, Namhi Kang, “Design of Smart Service based on Reverse-proxy for the Internet of Things,” The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 14, No. 06, pp. 1-6, 2014.

12.
Yong-Soon Im, Eun-Young Kang, Jae-Pyo Park, “Security of Image Information using Steganography and QR Code in IoT,” The Journal of the Institute of Internet, Broadcasting and Communication, Vol. 15, No. 02, pp. 31-37, 2015.