IoT 보안 기술 동향

  • 서화정 (부산대학교 정보컴퓨터공학부) ;
  • 이동건 (부산대학교 정보컴퓨터공학부) ;
  • 최종석 (부산대학교 정보컴퓨터공학부) ;
  • 김호원 (부산대학교 정보컴퓨터공학부)
  • Published : 2013.07.31

Abstract

Keywords

References

  1. M2M/IoT 포럼, "http://www.m2miot.or.kr"
  2. CERP-IoT, "Internet of things - Strategic research roadmap", Sep. 2009.
  3. A. Wright, "Cyber security for the power grid: cyber security issues & Securing control systems", ACM CCS, Nov. 2009.
  4. J. Daemen, V. Rijmen, "AES proposal: Rijndael", NIST AES Proposal, 1998.
  5. NIST, FIPS PUB 46-3 Data Encryption Standard (DES), 1999.
  6. NIST, FIPS PUB 180-4 Secure Hash Standard, 2012.
  7. IETF, RFC-1321 The MD5 Message-Digest Algorithm, 1992.
  8. Guido Bertoni, Joan Daemen, Micahel Peeters, and Gilles Van Assche, "The Keccak reference", http:// keccak.noekeon.org, 2011.
  9. R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. https://doi.org/10.1145/359340.359342
  10. ITU-T, "Framework of Web of Things", 2012.
  11. A. Bogdanov, L. R. Knudsen, G. Le, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, "Present: An ultra-lightweight block cipher", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 07), pp. 405-466, 2007.
  12. C. Canniere, O. Dunkelman, M. Knezevic, Katan, and Ktantan - "A family of small and efficient hardware-oriented block ciphers", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 09), pp. 272-288, 2009.
  13. D. Engels, M. J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm", In Proceedings of the 7th International Conference on RFID Security and Privacy(RFIDSec'11), pp. 19-31, 2011.
  14. D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim, and S. Chee, "Hight: a new block cipher suitable for low-resource device", In Proceedings of the International Conference on Cryptographic Hardware and Embedded Systems(CHES 06), pp.46-59, 2006.
  15. 국가보안기술연구소, "LEA", 2013.
  16. J. P. Aumasson, L. Henzen, W. Meier, and M. N. Plasencia, "QUARK: a lightweight hash", http:// 131002.net/quark, 2012.
  17. M. Hell, T. Johansson, A. Maximov, and W. MeIer, "A stream cipher proposal: Grain-128", In IEEE International Symposium on Information Theory (ISIT 2006), 2006.
  18. J. Guo, T. Peyrin, and A. Poschmann, "The photon family of lightweight hash functions", in Crypto 2011, Lncs, vol. 6841, pp. 222-239, 2011.
  19. A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, I. Verbauwhede, and Spongent: "The design space of lightweight cryptographic hashing", http:// sites.google.com/site/spongenthash, 2012.
  20. N. Koblitz, "Elliptic curve cryptosystems", Mathematics of Computation, vol. 48, no. 77, pp. 203- 209, 1987. https://doi.org/10.1090/S0025-5718-1987-0866109-5
  21. Wi-Fi Alliance, http://www.wi-fi.org
  22. ZigBee Alliance, http://www.zigbee.org
  23. DASH7 Alliance, http://www.dash7.org
  24. Bluetooth, http://www.bluetooth.org
  25. O. Savry, F. Vacherand, "Security and privacy protection of contactless devices", In The Internet of Things, pp. 409-419, 2010.
  26. P. de Leusse, P. Periorellis, T. Dimitrakos, and S. K. Nair, "Self managed security cell, a security model for the internet of things and services", In Advances in Future Internet, 2009 First International Conference on, pp. 47-52, 2009.
  27. J. Zhang, M. Liang, "A new architecture for convertged internet of things", In Internet Technology and Applications, International Conference on, pp. 1-4, 2010.
  28. B. Zhang, X. X. Ma, and Zhi-Guang Qin, "Security architecture on the trusting internet of things", Journal of Elecrtonic Science and Technology, 2011.
  29. L. Hongpei, "What is trusted network architecture", Network & Computer Security, no. 2, pp. 36-38, 2005.
  30. Z. Yanwe, W. U. Zhenqiang, and Y. E. Jiangca, "Study of new trusted network framework", Computer Application, vol. 29, no. 9, pp. 2535-2565, Sep. 2009.
  31. OASIS, Web Services Security: SOAP Message Security 1.0(WS-Security 2004), http://docs.oasisopen. org/wss/2004/01/oasis-200401-wss-soap-mess age-security-1.0.pdf, Mar. 2004.
  32. J. Reagle, "IETF RFC2807 XML Signature Requiremets", Jul. 2000.
  33. W3C, XML-Signature Syntax and Processing, http:// www.w3.org/TR/xmldsig-core, Feb. 2002.
  34. W3C, XML Encryption Syntax and Processing, http://www.w3.org/TR/xmlenccore, Dec. 2002.
  35. W3C, Decryption Transform for XML Signature, http://www.w3.org/TR/xmlencdecrypt, Dec. 2002.
  36. W3C, XML Key Management Specification (XKMS) Ver 2.0-Candidate Recommendation, http:// www.w3.org/TR/xkms2, Apr. 2004.
  37. W3C, SOAP Security Extensions: Digital Signature, http://www.w3.org/TR/2001/NOTE-SOAPdsig- 20010206, Feb. 2001.
  38. OASIS, Web Services Security: SAML Token Profile - working drafts, http://www.oasis-open.org/committees/ download. php/7837/WSS-SAML-15.pdf, Jul. 2004.
  39. OASIS, Security Assertion Markup Language (SAML), http://www.oasis-open.org/committees /security, Jul. 2004.
  40. OASIS, eXtensible Access Control Markup Language( XACML) Version 1.0 - Standards, Feb. 2003.
  41. Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol(coap)", 2013.
  42. E. Rescorla, N. Modadugu, "Datagram transport layer security", 2006.
  43. K. Cameron, The Laws of Identity, http://www. identityblog.com/?page_id=354, May 2005.
  44. D. Recordon, B. Fitzpatrick, OpenID Authentication 1.1, http://www.openid.net/specs/openidauthentication- 1_1.txt, May 2006.
  45. D. Recordon, D. Reed, "OpenID 2.0: a platform for user-centric identity management", In Proceedings of the Second ACM Workshop on Digital Identity Management, pp. 11-16. ACM, 2006.
  46. T. Wason, "Liberty ID-FF architecture overview", Liberty Alliance Project, 2004. http://www.projectliberty. org/specs
  47. 조영섭, 진승헌, 문필주, 정교일, "ID 연계 기반 의 인터넷 ID Management System: e-IDMS", 전자공학회논문지, 43, 2006년.
  48. 김호원, 제 4회 스마트그리드 보안 워크샵, 2013 년 7월.