공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation

  • 황득영 (강원대학교 삼척캠퍼스 / 컴퓨터공학과) ;
  • 김진묵 (선문대학교 / IT교육학부)
  • 투고 : 2016.10.01
  • 심사 : 2016.12.27
  • 발행 : 2016.12.31

초록

국내에서 공장자동화에 대한 관심이 증가하고 있으며, 이에 관한 개발이 활발하게 시도되고 있다. 특히, '제조업 혁신 3.0 전략'에 따라 중소기업의 제조 공장들에 대한 스마트화에 대한 관심이 급격히 증가하고 있다. 뿐만 아니라, 스마트 공장을 구축하기 위한 정책적, 기술적, 전략적 접근 방법을 모색하고 있다. 하지만 이와 같은 스마트 공장 또는 공장 자동화 시스템을 도입하기 위해서는 제조 공장이 갖는 보안 취약점과 개인정보 보호 문제는 반드시 선결해야만 한다. 그러므로 우리는 공장 자동화를 위해서 가장 많이 도입되고 있는 무선 통신 기술인 RFID 통신 프로토콜에 적용 가능한 경량 암호 프로토콜을 제안한다. 본 논문에서 제안한 경량 암호 프로토콜은 기존의 공개키 기반 시스템이나 대칭키 암호 알고리즘과 비교해서 연산 횟수가 적고 처리 속도가 빠르다. 뿐만 아니라 낮은 전력 소비량과 저장 공간을 소비하도록 설계하였다.

There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.

키워드

참고문헌

  1. Dong Chen, Guiran Chang, A Survey on Security Issues of M2M Communications in Cyber-Physical Systems, KSII Transactions on Internet and Information(TIIS), Vol. 6, No. 1, pp.24-45, 2012. 1.
  2. Jiafu Wan, Hehua Yan, Hui Suo, Fang Li, Advances in Cyber-Physical System Research, KSII Transactions on Internet and Information(TIIS), Vol. 5, No. 11, pp.1891-1908, 2011. 11.
  3. Dae-Geun Kim, Man-Gon Park, Horizontal Integration between Cyber Physical System Based on Industry 4.0 and Manufacture Execution Systems through Middleware Building, Journal of Korea Multimedia Society, Vol. 17, No. 12, pp.1484-1493, 2014. 12. https://doi.org/10.9717/kmms.2014.17.12.1484
  4. Young-Sik Kim, Cyber-Physical System Security Technology Trend in IoT era, The Magazine of the IEEE, Vol. 42, No. 8, pp.16-25, 2015. 8.
  5. Jae-Hyun Lim, German, Again Industry 4.0, Journal of Korea Association of Machinery Industry, Vol. 45, No. 7, Total-vol. 457, pp.34-39, 2015. 7.
  6. Armin Puhringer, Impact on the existing industrial communication on the IoT and Industry 4.0, Monthly ICN, Total Vol. 105, pp 22-27, 2015. 11.
  7. Ray Y. Zhong, Huajun Gong, Chen Xu, and Shaoping Lu, Physical Internet-Enabled Manufactureing Execution System for Intelligent Workshop Production, International Journal of Signal Processing, Image Processing and Pattern Recofnition, Vol. 9, No. 6, pp.121-132, 2016.
  8. Ok-Jae Lee, A Design of Automatic Management System in Manufacturing Process of Semiconductor Package Elements by Using RFID, The Jorunal of The Korean Institute of Communication Science, Vol. 33, No. 8, pp.313-320, 2008. 8.
  9. Zhixin Yang, Pengbo Zhang, Lei Chen, RFID-enabled indoor positioning method for a real-time manufacturing execution system using OS-ELM,
  10. Francisco Almada-Lobo, The Industry 4.0 revolution and the future of Manufacturing Execution System(MES), Journal of Innovation Management, Vol. 3, No. 4, pp16-21, 2015.
  11. Kwangyong Park, Youjin Song, Attribute-based Encryption Technique, REVIEW OF KIISC, Vol.20. No.2, 85-92, 2010.4
  12. Jongho Moon, Younsung Choi, Dongho Won, A Secure Attribute-based Authentication Scheme for Cloud Computing, KIISE Transactions on Computing Practices, Vol. 22, No. 8, pp. 345-350, 2016. 8. https://doi.org/10.5626/KTCP.2016.22.8.345
  13. Hye-Joung Yoo, Attribute-Based Authenentication for Secure Cloud Computing, Journal of KIIT, No.13, No.1, pp.59-69, 2015. 1.
  14. Soomi Yang, An Efficient Attribute Certficate Management Technique for Highly Distributed Environment, Jouranl of Information and Security, Vol. 5, No.1, pp.85-92, 2005.3.
  15. Si-Choon Noh, A Study of DES Property, Diagnosis and How to Apply Enhanced Symmetric Key Encryption Algorithm, Jouranl of Information and Security, Vol. 12, No.4, pp.85-90, 2012. 9.