DOI QR코드

DOI QR Code

Design of Integrated Security Framework for Open Wireless Networking Architecture

개방형 무선 통신망 구조를 위한 복합 보안 프레임워크 설계

  • Received : 2013.05.01
  • Accepted : 2013.05.24
  • Published : 2013.06.30

Abstract

The increasing demand of users for various wireless communication services has lead to the development with uniting co-existence of different and wireless networks. Each one of the these wireless networks has its own unique characteristics, as compared to other networks. An integrated security mechanism is one of the key issue in the open wireless network. To realize overall security mechanism in open wireless architecture, we should provide practical workable framework for the realization of the integrated security challenges. In this paper, we analysed integrated security platform and considerations based on the security concept.

다음은 요약문 입니다. 여러 종류의 무선 통신망들에 대한 통합화된 서비스에 대한 수요가 요구되고 있다. 이러한 요구는 기존의 유선망과 무선 통신망의 통합 배치를 통하여 가능하게 되었다. 각각의 무선 통신망들은 기존이 망들에 비해 고유의 특징을 가지고 있다. 개방형 무선 통심 환경 하에서의 주요한 문제 중의 하나가 보안성에 관련된 문제이다. 개방형 환경 하에서 통합된 환경의 보안성을 실현하기 위해서는 현실에서 실제적으로 적용 가능한 통합 보안 구조를 개발하여야 한다. 따라서 본 논문에서는 이러한 요구조건을 만족하기 위해서 고려해야 하는 사항들을 분석하였다.

Keywords

References

  1. Di Ma and Gene Tsudik, "Security and Privacy in Emerging Wireless Networks", IEEE Wireless Communication, Oct 2011, pp.12-21
  2. Lenka Lhotska, "Security Recommendation for Implementation in Distributed Healthcare System", ICCST 2008, pp76-83
  3. Ming Li, etc, "Data Security and Privacy in Wireless Body Area Networks", IEEE Wireless Communication, 2010, pp.51-58
  4. Jelena Misic, "Enforcing Patient Privacy in Healthcare WSAs Using ECC Implemented on 802.15.4 Beacon Enabled Clusters", 6th Annual IEEE International Conference on Pervasive Computing and Communications", 2008, pp.686-690
  5. Jung Tae Kim, "Privacy and Security Model for RFID Healthcare System in Wireless Communication Network", vol.16, no.6, 2012, pp.1223-1128 https://doi.org/10.6109/jkiice.2012.16.6.1223
  6. Hai Liu, etc, "Taxonomy and Challenges of the Integration of RFID and Wireless Sensor Networks", IEEE Network, 2008, pp.26-32
  7. Faouzi Kamoun. "RFID System Management: State-of-the Art and Open Research Issues" IEEE Transactions on Network and Service Management, vol.6, no. 3, pp.190-205, Sep. 2009 https://doi.org/10.1109/TNSM.2009.03.090305
  8. George Poulopoulos, Konstantinos Markantonakis, Keith Mayes, "A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems", pp.706-p.711, 2009 International Conference on Availability, Reliability and Security
  9. S.A.Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Comp., volume 2802 of LNCS, pages 201-212, 2004.
  10. H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 4, 2007, pp.337-340. https://doi.org/10.1109/TDSC.2007.70226
  11. A. Juels, "RFID Security and Privacy: A research survey", Selected Areas in Communications, IEEE Journal, pp.104-112, 2006
  12. Faouzi Kamoun, "RFID System Management: State-of-the Art and Open Research Issues", IEEE Transaction on Network and Service Management, vol.6, no.3, Sep, p.190-1205, 2009 https://doi.org/10.1109/TNSM.2009.03.090305
  13. A. Bongdanov, etal, " Hash Functions and RFID Tags: Mind the Gap," Proc. of the CHES08, vol. 5154 of LNCS, p.283-299, 2008
  14. M. Feldhofer, etal, "Strong Authentication for RFID Systems Using the AES Algorithm," Proc. of the CHES04, vol.3156, p.85-140, 2004