DOI QR코드

DOI QR Code

Lightweight Key Escrow Scheme for Internet of Battlefield Things Environment

사물인터넷 환경을 위한 경량화 키 위탁 기법

  • Tuan, Vu Quoc (Department of Military Digital Convergence, Ajou University) ;
  • Lee, Minwoo (Department of Military Digital Convergence, Ajou University) ;
  • Lim, Jaesung (Department of Military Digital Convergence, Ajou University)
  • Received : 2022.09.29
  • Accepted : 2022.10.24
  • Published : 2022.12.31

Abstract

In the era of Fourth Industrial Revolution, secure networking technology is playing an essential role in the defense weapon systems. Encryption technology is used for information security. The safety of cryptographic technology, according to Kerchoff's principles, is based on secure key management of cryptographic technology, not on cryptographic algorithms. However, traditional centralized key management is one of the problematic issues in battlefield environments since the frequent movement of the forces and the time-varying quality of tactical networks. Alternatively, the system resources of each node used in the IoBT(Internet of Battlefield Things) environment are limited in size, capacity, and performance, so a lightweight key management system with less computation and complexity is needed than a conventional key management algorithm. This paper proposes a novel key escrow scheme in a lightweight manner for the IoBT environment. The safety and performance of the proposed technique are verified through numerical analysis and simulations.

4차 산업혁명 시대에는 보안 네트워킹 기술이 국방 무기 체계에서 필수적인 역할을 하고 있다. 정보보안을 위해 암호 기술을 사용한다. 암호 기술의 안전성은 케르크호프의 원칙(Kerchoff's principle)에서 강조하듯 암호 기술 알고리즘이 아닌 암호 기술의 안전한 키 관리에 기반한다. 그러나, 전장 환경에서 무기체계의 잦은 이동으로 인해 네트워크 구조가 변하며 전통적인 중앙 집중식 키 관리 방법을 사용하기가 어렵다. 또한 IoBT(Internet of Battlefield Things) 환경에서 사용되는 각 노드의 시스템 자원은 크기, 용량, 성능이 제한되므로 기존의 키 관리 알고리즘보다 계산량과 복잡도가 적은 경량화 키 관리 시스템이 필요하다. 본 논문은 IoBT 환경을 위한 경량화 방식의 새로운 키 위탁 방식을 제안한다. 제안된 기법의 안전성과 성능을 수치 분석과 시뮬레이션을 통해 검증하였다.

Keywords

Acknowledgement

This paper is a basic research project conducted with the support of the Korean Research Foundation with the funding of the government (Ministry of Education) in 2021. (No. NRF2021R1I1A1A01047914)

References

  1. S. Russell and T. Abdelzaher, "The Internet of Battlefield Things: The Next Generation of Command Control, Communications and Intelligence (C3I) Decision-Making," IEEE Military Communications Conference, Los Angeles: CA, USA, pp. 29-31, 2018.
  2. L. Zhu and S. Majumdar, "An invisible warfare with the internet of battlefield things: A literature review," Human Behavior and Emerging Technologies, vol. 3, no. 2, pp. 255-260, Nov. 2020.
  3. A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979. https://doi.org/10.1145/359168.359176
  4. D. Reed, J. Law, D. Hardman, and M. Lodder, "DKMS (Decentralized Key Management System) Designand Archite cture V3," U.S. Department of Homeland Security Science & Technology Directorate, Apr. 2018.
  5. T. -Y. Yoon and J. -S. Moon, "Private Key Backup and Recovery Framework in Blockchain-based Service Environment," Journal of Digital Contents Society, vol. 20, no. 12, pp. 2485-2493, Dec. 2019. https://doi.org/10.9728/dcs.2019.20.12.2485
  6. G. Li, L. You, G. Hu, and H. Liqin, "Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing," KSII Transactions on Internet And Information System, vol. 15, no. 8, pp. 2865-2878, Aug. 2021.
  7. T. Noguchi, M. Nakagawa, M. Yoshida, A. G. Ramonet, "A Secure Secret Key-Sharing System for Resource-Constrained IoT Devices using MQTT," in Proceedings of International Conference on Advanced Communications Technology(ICACT), PyeongChang, Korea, pp. 147-153, 2022.
  8. A. Koubaa, B. Qureshi, M. -F. Sriti, A. Allouch, Y. Javed, M. Alajlan, O. Cheikhrouhou, M. Khalgui, and E. Tovar, "Dronemap Planner: A service-oriented cloud-based management system for the Internet-of-Drones," Ad Hoc Networks, vol. 86, pp. 46-62, Apr. 2019. https://doi.org/10.1016/j.adhoc.2018.09.013
  9. Y. M. Kwon, J. Yu, B. M. Cho, Y. Eun, and K. -J. Park, "Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles," IEEE Access, vol. 6, pp. 43203-43212, Aug. 2018. https://doi.org/10.1109/access.2018.2863237
  10. M. Shin and S. Kim, "A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks," Journal of Korea Multimedia Society, vol. 21, no. 8, pp. 897-908, Aug. 2018. https://doi.org/10.9717/KMMS.2018.21.8.897
  11. T. -W. Kim, S. -Y. Lee, S. W. Jung, H. Wi, and O. Yi, "A Research on the Security of Drone Control Data Using Quantum Entropy-Based Random Number Genera," Journal of The Korea Institute of Information Security & Cryptology, vol. 31, no. 2, pp. 133-144, Apr. 2021. https://doi.org/10.13089/JKIISC.2021.31.2.133