DOI QR코드

DOI QR Code

Verifying a Safe P2P Security Protocol in M2M Communication Environment

M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증

  • Han, Kun-Hee (Dept. of Information and Communication, Baekseok University) ;
  • Bae, Woo-Sik (Dept. of AIS Center, Ajou Motor College)
  • Received : 2015.03.01
  • Accepted : 2015.05.20
  • Published : 2015.05.28

Abstract

In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

최근 정보통신 기술의 발전과 함께 M2M(Machine-to-Machine) 산업분야의 시스템이 다기능 고성능화 되고 있으며 IoT(Internet of Things), IoE(Internet of Everything)기술 등과 함께 많은 발전해가고 있다. 통신상 보안적인 서비스를 제공하기 위해서는 인증, 기밀성, 익명성, 부인방지, 데이터신뢰성, 비연결성, 추적성 등이 충족 되어야 한다. 그러나 통신방식이 무선 전송구간에서는 공격자의 공격에 노출되어 있다. M2M 무선통신 프로토콜에서 보안상 문제가 생기면 시스템오류, 정보유출, 프라이버시문제 등의 심각한 상황이 발생할 수 있다. 따라서 프로토콜 설계는 상호인증과 보안이 필수적인 요소이며, 최근 보안통신프로토콜에 대한 분야가 매우 중요한 부분으로 연구되고 있다. 본 논문에서는 안전한 통신프로토콜을 위해 해시함수, 난수, 비밀키 및 세션키를 적용하여 설계하였다. 제안 프로토콜이 공격자의 각종공격에 안전함을 증명하기 위해 프로토콜 정형검증도구인 Casper/FDR 도구를 이용하여 실험하였다. 실험결과 제안프로토콜은 안전성을 충족했으며 문제없이 종료됨을 확인하였다.

Keywords

References

  1. Kyoung-nam Kim, Lee, Jae Moon, MyounJae Lee, Sunghyuck Hong, Convergent Secure Wireless Sensor Network Routing Algorithm. Journal of the Korea Convergence Society, Vol. 6, No. 1, pp. 65-70, 2015. https://doi.org/10.15207/JKCS.2015.6.1.065
  2. Yang, M. H., and Hu, H. Y., Protocol for ownership transfer across authorities: with the ability to assign transfer target, Security and Communication Networks, vol .5, pp. 164-177, 2012. https://doi.org/10.1002/sec.300
  3. G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. D. Johnson, M2M: from mobile to embedded internet., IEEE Communications Magazine, vol. 49, no. 4, pp. 36-43, 2011. https://doi.org/10.1109/MCOM.2011.5741144
  4. S. Y. Lien, K. C. Chen, and Y. Lin, Toward ubiquitous massive accesses in 3GPP machineto- machine communications. IEEE Communications Magazine, vol. 49, no. 4, pp. 66-74, 2011. https://doi.org/10.1109/MCOM.2011.5741148
  5. W. S. Bae, Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code. Wireless Personal Communications An International Journal, Vol.79, No.4, pp.2295-1609, 2014.
  6. M. S. Han, W. S. Bae, Security Verification of a Communication Authentication Protocol in Vehicular Security System. Journal of Digital Convergence, Vol. 12, No. 8, pp. 229-234, 2014. https://doi.org/10.14400/JDC.2014.12.8.229
  7. W. S. Bae, Inter-device Mutual authentication and Formal Verification in M2M Environment. Journal of Digital Convergence, Vol. 12, No. 9, pp. 219-223, 2014. https://doi.org/10.14400/JDC.2014.12.9.219
  8. Bo-Kyung Lee, A Study on Security of Virtualization in Cloud Computing Environment for Convergence Services. Journal of the Korea Convergence Society, Vol. 5, No. 4, pp. 93-99, 2014. https://doi.org/10.15207/JKCS.2014.5.4.093
  9. Keun-Ho Lee, A Study of Security Requirement in Wireless Charging. Journal of the Korea Convergence Society, Vol. 5, No. 3, pp. 23-27, 2014. https://doi.org/10.15207/JKCS.2014.5.3.023
  10. Eui-Seok Nahm, Design of Computer Hardware Fault Detector using ROM BIOS. Journal of the Korea Convergence Society, Vol. 4, No. 3, pp. 21-26, 2013. https://doi.org/10.15207/JKCS.2013.4.3.021
  11. G. Lowe., Casper:A compiler for the analysis of security protocols. User Manual and Tutorial. Version 1.12, 2009.
  12. C. Kraetzer, Modelling Watermark Communication Protocols using the CASPER Modelling Language. Proceedings of the 12th ACM workshop on Multimedia and security. pp. 107-116, 2010.
  13. Oxford University Computing Laboratory. FDR2 User Manual, 19th, October, 2010.
  14. Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica, Formal Verification of G-PAKE Using Casper/FDR2-Securing a Group PAKE Protocol Using Casper/FDR2. SECRYPT 2010: pp. 299-303, 2010.
  15. ETSI, Machine to Machine Communications (M2M); M2M functional architecture. ETSI, TS 102 690, DEC, 2011.
  16. Yu Tian-tian, Feng Quan-yuan, A Security RFID Authentication Protocol Based on Hash Function. IEEC09, pp. 804-807, 2009.