DOI QR코드

DOI QR Code

Efficient Authentication Establishment Scheme between IoT Device based on Pascal Triangle Theory

파스칼 삼각 이론 기반의 IoT 장치간 효율적인 인증 설립 기법

  • Han, Kun-Hee (Dept. of Information Communication & Engineeringe, Baeseok University) ;
  • Jeong, Yoon-Su (Dept. of information Communication Convergence Engineering, Mokwon University)
  • 한군희 (백석대학교 정보통신공학과) ;
  • 정윤수 (목원대학교 정보통신융합공학부)
  • Received : 2017.05.22
  • Accepted : 2017.07.20
  • Published : 2017.07.28

Abstract

Recently, users' interest in IoT related products is increasing as the 4th industrial revolution has become social. The types and functions of sensors used in IoT devices are becoming increasingly diverse, and mutual authentication technology of IoT devices is required. In this paper, we propose an efficient double signature authentication scheme using Pascal's triangle theory so that different types of IoT devices can operate smoothly with each other. The proposed scheme divides the authentication path between IoT devices into two (main path and auxiliary path) to guarantee authentication and integrity of the IoT device. In addition, the proposed scheme is suitable for IoT devices that require a small capacity because they generate keys so that additional encryption algorithms are unnecessary when authenticating IoT devices. As a result of the performance evaluation, the delay time of the IoT device is improved by 6.9% and the overhead is 11.1% lower than that of the existing technique. The throughput of IoT devices was improved by an average of 12.5% over the existing techniques.

최근 4차 산업 혁명이 사회적으로 대두되면서 IoT 관련 제품에 대한 사용자들의 관심이 증가하고 있다. IoT 장치에 사용되고 있는 센서의 종류와 기능은 점점 다양화되고 있어 IoT 장치의 상호 인증 기술이 요구되고 있다. 본 논문에서는 서로 다른 종류의 IoT 장치들이 서로 상호 연계하여 원활하게 동작될 수 있도록 파스칼 삼각형 이론을 이용한 효율적인 이중 서명 인증 키 설립 기법을 제안한다. 제안 기법은 IoT 장치간 인증 경로를 2개(주경로와 보조 경로)로 구분하여 IoT 장치의 인증 및 무결성을 보장한다. 또한, 제안 기법은 IoT 장치를 인증할 때 추가적인 암호 알고리즘이 필요하지 않도록 키를 생성하기 때문에 적은 용량을 필요로 하는 IoT 장치에 적합하다. 성능 평가 결과, 제안 기법은 IoT 장치의 지연시간을 기존 기법보다 6.9% 향상되었고, 오버헤드는 기존 기법보다 11.1% 낮은 결과를 얻었다. IoT 장치의 인증 처리율은 기존 기법보다 평균 12.5% 향상되었다.

Keywords

References

  1. S. Haller, S. Karnouskos, and C. Schroth, "The Internet of Things in an Enterprise Context," in Future Internet - FIS 2008 Lecture Notes in Computer Science Vol. 5468, pp. 14-28, 2009.
  2. S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things," IEEE Sensors Journal, Vol. 13, No. 10, 2013.
  3. R. Roman, J. Zhou, and J. Lopez, "On the Features and Challenges of Security and Privacy in Distributed Internet of Things," Computer Networks, Vol. 57, Elsevier, pp. 2266-2279, July 2013. https://doi.org/10.1016/j.comnet.2012.12.018
  4. W. Trappe, R. Howard, and R. S. Moore, "Low-Energy Security: Limits and Opportunities in the Internet of Things," IEEE Security & Privacy, Vol. 13, No. 1, pp. 14-21, 2015. https://doi.org/10.1109/MSP.2015.7
  5. K. Jaffres-Runser, M. R. Schurgot, Q. Wang, C. Comaniciu and J M. Gorce, "A Cross-layer Framework for Multiobjective Performance Evaluation of Wireless Ad Hoc Networks," Ad Hoc Networks, Vol. 11, No. 8, pp. 2147-2171, 2013. https://doi.org/10.1016/j.adhoc.2013.04.006
  6. D. R. Raymond and S. F. midkiff, "Denial of service in wireless sensor Networks: Attakcs andDefenses", Pervasive Computing, Vol. 7, No. 1, pp. 74-81, Jan-Mar, 2008. https://doi.org/10.1109/MPRV.2008.6
  7. Gupta, M. Wurm, Y. Zhu, M. Millard, S. Fung, N. Gura, H. Eberle and S. C. Shantz, "Sizzle : A standards - Based End to End Security Architecture for the Embeded Internet", Pervasive mobile computing, Vol. 1, pp. 425-446, Dec. 2005. https://doi.org/10.1016/j.pmcj.2005.08.005
  8. T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and K. Wehrle, "Security challenges in the ip based interent of things", Wireless Personal Communications, Vol. 61, No. 3, pp. 527-524, 2011. https://doi.org/10.1007/s11277-011-0385-5
  9. R. H. Weber, "Internet of Things: New Security and Privacy Challenges," Computer Law & Security Review, vol. 26, no. 1, pp. 23-30, 2010. https://doi.org/10.1016/j.clsr.2009.11.008
  10. R. Roman, P. Najera, J. Lopez, "Securing the Internet of Things," Computer, vol.44, no.9, pp.51,58, Sept. 2011
  11. Sahid Raza, "Lightweight security solutions for the Internet Of Things", Malardalen University Sweden, 2013.
  12. Shahid Raza, Hossein Shafagh, Kasun Hewage, Rene Hummen, and Hiemo Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things", IEEE Sensor Journals, 2013.
  13. Daniele Trabalza, "Implementation and Evaluation of Datagram Transport Layer Security for the android operating system", 2013.
  14. H. S. Ning, H. Liu; Y, L.T. "Cyberentity Security in the Internet of Things," Computer, Vol. 46, No.4, pp. 46-53, Apr. 2013. https://doi.org/10.1109/MC.2013.74
  15. T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar and K.laus Wehrle. Security challenges in the ipbased internet of things. Wireless Personal Comomunications, Vol. 61, No. 3, pp. 527-542, 2011. https://doi.org/10.1007/s11277-011-0385-5
  16. D. R Raymond and S. F. midkiff, "Denial of service in wireless sensor Networks: Attacks and Defenses" Pervasive Computing, Vol. 7, No. 1, pp. 74-81, Jan-Mar 2008. https://doi.org/10.1109/MPRV.2008.6
  17. V. Gupta, M Wurm, Y. Zhu, M. Millard, S Fung, N. Gura, H. Eberle and S.C. Shantz, "Sizzle: A standards - Based End to End Security Architecture for the Embeded Internet" pervasive moblie computing, Vol. 1, pp. 425-445, Dec. 2005. https://doi.org/10.1016/j.pmcj.2005.08.005
  18. J. W. Jung, J. D. Kim, M. G. Song, Chul-Gu Jin, "A study on Development of Certification Schemes for Cloud Security", Journal of digital Convergence , Vol. 13, No. 8, pp. 43-49, 2015. https://doi.org/10.14400/JDC.2015.13.8.43
  19. S. J. Lee and W. S. Bae, "Inter-device Mutual Authentication and Formal Verification in Vehicular Security System", Journal of digital Convergence, Vol. 13, No. 4, pp. 205-210, 2015. https://doi.org/10.14400/JDC.2015.13.4.205
  20. Y. S. Choo, B. W. Jin, J. P. Park and M. S. Jun, "Design The User Authentication Framework Using u-health System", Journal of digital Convergence, Vol. 13, No. 5, pp. 219-226, 2015. https://doi.org/10.14400/JDC.2015.13.5.219
  21. K. B. Kim and H. J. Cho, "A Study on the Regulation Improvement Measures for Activation of Internet of Things and Big Data Convergence", Journal of the Korea Convergence Society, Vol. 8. No. 5, pp. 29-35, 2017. https://doi.org/10.15207/JKCS.2017.8.5.029
  22. J. S. Park, "A Data Driven Index for Convergence Sensor Networks", Journal of the Korea Convergence Society, Vol. 7. No. 6, pp. 43-48, 2016. https://doi.org/10.15207/JKCS.2016.7.6.043
  23. D. Y. Jung and Y. Y. Sok, "A Study on the Edu-tainer Convergence App for Young Children's Play learning in Mobile Environments", Journal of the Korea Convergence Society, Vol. 7. No. 5, pp. 23-28, 2016. https://doi.org/10.15207/JKCS.2016.7.5.023
  24. S. S. Shin, S. H. Lee, "Security Requirements Analysis and Countermeasures in Cloud Computing," Journal of IT Convergence Society for SMB, Vol. 5, No. 1, pp. 27-32, 2015.
  25. H. G. Hong, "Business Process Support Based on IoT Technology," Journal of Convergence for Information Technology , Vol. 7, No. 1, pp. 75-79, 2017. https://doi.org/10.22156/CS4SMB.2017.7.1.075
  26. B. W. Min, "An Improvement of Personalized Computer Aided Diagnosis Probability for Smart Healthcare Service System," Journal of IT Convergence Society for SMB, Vol. 6, No. 4, pp. 85-91, 2016.