DOI QR코드

DOI QR Code

Enhanced Secure Transaction Protocol for IoT Devices via LTE Network

LTE 네트워크에서의 IoT 장치를 위한 향상된 보안 거래

  • Received : 2017.11.10
  • Accepted : 2017.11.26
  • Published : 2017.12.01

Abstract

Internet of Thing (IoT) and NFC (Near Field Communication) have got a good adaptable structure that it can be easily combined with any wireless network. Since IoT/NFC can be used to communicate wirelessly with all the transactions that can be done remotely without any physical connections. In this paper, we propose an enhanced secure IoT/NFC protocol based on LTE network that enhances the original security level provided by the LTE. Our approach is new in a sense that it covers LTE in contrast to old networks like GSM and 3G, which substantially treated in the literature. Moreover, both GSM and 3G have several drawbacks when they are combined with the NFC technology, which has potential weakness in confidentiality, integrity, and authentication. Hence our new approach will resolve the security of the new LTE system. We expect that our protocol will result in new secure applications for the smart phone markets.

Keywords

References

  1. Al Alkeem, E., Yeun, C.Y., Baek, J.S.: Secure NFC Authentication Protocol Based on LTE Network. Lecture Notes in Electrical Engineering, Springer, vol. 280, pp. 363-371. (2014)
  2. Lo, N.W, Yeh, K.H., Yeun, C.Y.: New Mutual Agreement Protocol to Secure Mobile RFID-Enabled Devices. Information Security Technical Report, Elsevier, vol. 13, 3, pp. 151-157, (2008). https://doi.org/10.1016/j.istr.2008.09.002
  3. Chen, W.D., Hancke, G.P., Mayes, K.E., Lien, Y., Chiu, J.H.: Using 3G Network Components to Enable NFC Mobile Transactions and Authentication. Progress in Informatics and Computing (2010)
  4. Massoth, M., Bingel, T.: "Performance of Different Mobile Payment Service Concepts Compared with a NFC-Based Solution," iciw, 2009 Fourth International Conference on Internet and Web Applications and Services, pp. 205-210. (2009)
  5. ISO/IEC 18092 (ECMA-340): Information technology - Telecommunications and information exchange between systems - Near Field Communication - Interface and Protocol (NFCIP-1).
  6. ISO/IEC 14443: Identification cards - Contactless integrated circuit cards- Proximity cards.
  7. NFC Forum: White paper on 'smart posters. Tech. Rep. (2011)
  8. NFC Forum: White paper on essentials for successful NFC mobile ecosystem. Tech. Rep., (2008)
  9. NFC Forum: White paper on 'the keys to truly interoperable communications. Tech. Rep., (2007)
  10. Han, C.K., Choi, H.K, Baek, J.W.: Evaluation of Authentication Signaling Loads in 3GPP LTE/SAE Networks. IEEE 34th Conference on Local Computer Networks. pp. 37-44. (2009)
  11. 3GPP. TS 36.331 V9.1.0, 3rd Generation Partnership Project: Technical Specificaion Group Radio Access Netword; Evolved Universal Terrestrial Radio Access (E-UTRA), Radio Resource Control (RRC) Protocol Specification
  12. 3GPP. TS 33.102 V9.2.0, 3rd Generation Partnership Project: Technical Specification Group Services and System Aspects; 3G Security ; Security architecture protocol specification
  13. 3GPP. TS 24.301 V9.3.0, 3 rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Non Access Stratum (NAS) protocol for Evolved Packet System (EPS): Stage 3 protocol Specification.
  14. Communications Fraud Control Association (CFCA): www.cfca.org
  15. Dastani, M., van Riemsdijk, M.B., Dignum, F., Meyer, J.C.: A programming language for cognitive agents: goal directed 3APL. Programming multiagent systems, first international workshop (Pro-MAS' 03), vol.3067 of LNCS, Berlin, 2004, pp. 111-130. (2004)
  16. Bordini, R.H., Hubner, J.F.: BDI agent programming in AgentSpeak using jason (tutorial paper). In Computational Logic in Multi-Agent Systems VI (CLIMA), vol. 3900 of Lecture Notes in Artificial Intelligence, Heidelberg, Germany, pp. 143-164. (2006)
  17. Rinard, M.C., Scales, D.J., Lam, M.S.: Jade: a high-level, machine-independent language for parallel programming. IEEE Computer Society, vol. 26, 6, pp. 28 -38. (1993)
  18. Zhang, Z., Zhang, X., Sandhu, R.; ROBAC: Scalable Role and Organization Based Access Control Models. International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 1-9. (2006).
  19. Abadi, M., Fournet, C.; Mobile Values, New Names, and Secure Communication. Proc. of the 28th ACM Symposium on Principles of Programming Languages (POPL' 01), pp.104--115. (2001)
  20. Blanchet, B, Chaudhuri, A.: Automated Formal Analysis of a Protocol forSecure File Sharing on Untrusted Storage. IEEE Symposium on Security and Privacy, pp. 417-431. (2008)
  21. Blanchet, B, Smyth, B.: ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial: http://www.proverif.ens.fr/manual.pdf, (2011)
  22. Yeun, C.Y., Farnham, T., "Secure m-commerce with WPKI," In proceedings of 1st International Workshop for Asian PKI, October 2001. (This is a reference for e-payment)
  23. Shehada, D., Yeun, C.Y., Zemerly, M.J., Al Qutayri, M., Al Hammadi, Y., Damiani, E., Hu, J., "BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications," Security and Communication Networks, Vol. 2017, 3606424, 2017. (This is a reference for e-payment
  24. Lo, N.W., Yeh, K.H., Yeun, C.Y., "New mutual agreement protocol to secure mobile RFID-enabled devices," Information Security Technical Report, Vol. 13, No. 3, pp. 151-157, 2008. (This is a reference for RFID/IoT/NFC) https://doi.org/10.1016/j.istr.2008.09.002
  25. Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J., Mubarak, K., "A novel hybrid cellular automata based cipher system for internet of things," In Future information technology, Springer, pp. 269-276, 2014. (This is a reference for RFID/IoT/NFC)
  26. Al Alkeem, E., Yeun, C.Y., Zemerly, M.J., "Security and privacy framework for ubiquitous healthcare IoT devices" In proceeding of 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 70-75, December 2015. (This is a reference for RFID/IoT/NFC)
  27. Al Alkeem, E., Shehada, D., Yeun, C.Y., Zemerly, M.J., Hu, J., "New secure healthcare system using cloud of things," Cluster Computing, Vol. 2, No. 3, pp. 2211-2229, 2017. (This is a reference for RFID/IoT/NFC)