DOI QR코드

DOI QR Code

The research on Diffie-Hellman-based IoT Sensor Node key management

Diffie-Hellman 기반 사물인터넷 센서노드 키 관리 연구

  • Hong, Sunghyuck (Div. of Information Communication, Baekseok University) ;
  • Yu, Jina (Div. of Information Communication, Baekseok University)
  • 홍성혁 (백석대학교 정보통신학부) ;
  • 유진아 (백석대학교 정보통신학부)
  • Received : 2017.09.18
  • Accepted : 2017.12.20
  • Published : 2017.12.28

Abstract

Recently, the Internet of Things are developing in accordance with the technology of implementation in low-cost, small-size, low power consumption and smart sensor that can communicate using the internet. Especially, key management researches for secure information transmission based on the Internet of Things (IoT) are actively performing. But, Internet of Things(IoT) are uses sensor. Therefore low-power consumption and small-memory are restrictive condition. As a result, managing the key is difficult as a general security measure. However, The problem of secure key management is an essential challenge For the continuous development of the Internet of things. In this paper, we propose a key distribution and management technique in secure Internet of things. In the key generation and management stage, it satisfies the conditions and without physically constrained for IoT based communication.

최근 저가격의 소형화, 저전력 기술과 인터넷을 이용하여 통신이 가능한 스마트 센서의 기술의 발달에 힘입어 사물인터넷이 발전하고 있다. 특히 사물인터넷 (Internet of Things : IoT) 기반에서의 안전한 정보 전송을 위한 키 관리 관련 연구가 활발히 진행되고 있다. 그러나 사물인터넷은 센서를 이용한다. 그렇기 때문에 저전력과 저용량 등의 제약이 심하며, 결과적으로 일반적인 보안의 방법으로 키를 관리하기 어렵다. 그러나 사물인터넷의 지속적 발전을 위해서는 안전한 키 관리의 문제는 필수적 해결과제이다. Diffi-Hellman 키 교환방식은 센서노드에 적합하지 않아 본 논문에서는 효율적인 키 관리하는 것을 제안한다. 따라서 본 논문에서는 IoT기반에서 통신을 위한 키 생성을 통해 물리적 제약받지 않고 사물간 안전한 통신 기술을 제안한다.

Keywords

References

  1. I. Nakagawa and S. Shimojo, "IoT Agent Platform Mechanism with Transparent Cloud Computing Framework for Improving IoT Security.", 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, pp. 684-689, 2017.
  2. M. Ge, J. B. Hong, H. Alzaid and D. S. Kim, "Security Modeling and Analysis of Cross-Protocol IoT Devices," 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, pp. 1043-1048, 2017.
  3. S. Hong, H. Shin, "Analysis of the Vulnerability of the IoT by the Scenario" Journal of the Korea Convergence Society, Vol. 8, No. 9, pp. 1-7, 2017. https://doi.org/10.15207/JKCS.2017.8.9.001
  4. S. Y. Lee, "Secure Group Key Agreement for IoT Environment", Journal of convergence security, Vol. 16, No. 7, pp. 122-126, 2016. 12.
  5. M. B. Alaya, K. Drira and G. Gharbi, "Semantic-Aware IoT Platforms," 2017 IEEE International Conference on AI & Mobile Services (AIMS), Honolulu, HI, USA, pp. 8-13, 2017.
  6. S. K. Park, "An Efficient Key management for Wireless Sensor Network", Journal of Digital Contents Society, Vol. 13, No. 1, pp. 129-139, 2012. https://doi.org/10.9728/dcs.2012.13.1.129
  7. Y. Jin, M. Tomoishi and N. Yamai, "A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS," 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, pp, 282-283, 2017.
  8. K. Fujikawa, V. P. Kafle, P. Martinez-Julia, A. H. A. Muktadir and H. Harai, "Automatic Construction of Name-Bound Virtual Networks for IoT," 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, pp. 529-537, 2017.
  9. U. Lee, S. Kim, "A Study on the Smart Home Life Style for Single households - Focusing on the 20s and 30s -" Journal of the Korea Convergence Society, Vol. 8, No. 8, pp. 231-237, 2017. https://doi.org/10.15207/JKCS.2017.8.8.231
  10. Y. Zhang, L. Duan, C. A. Sun, B. Cheng and J. Chen, "A Cross-Layer Security Solution for Publish/Subscribe-Based IoT Services Communication Infrastructure," 2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA, pp. 580-587, 2017.
  11. M. S. Park, K. H. Lee, J. H. Kim, Y. T. Shin, "The Comparison analysis of a key management for security in Sensor Network", Journal of KOREA INFORMATION SCIENCE SOCIETY 36(1D), pp. 29-33, 2008.
  12. R. Jain and S. Tata, "Cloud to Edge: Distributed Deployment of Process-Aware IoT Applications," 2017 IEEE International Conference on Edge Computing (EDGE), Honolulu, HI, USA, pp. 182-189, 2017.
  13. M. Hemmatpour, M. Ghazivakili, B. Montrucchio and M. Rebaudengo, "DIIG: A Distributed Industrial IoT Gateway," 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, pp. 755-759, 2017.
  14. V. M. George and Q. H. Mahmoud, "Claimsware: A Claims-Based Middleware for Securing IoT Services," 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, Italy, pp. 649-654, 2017.
  15. B. Liu, X. L. Yu, S. Chen, X. Xu and L. Zhu, "Blockchain Based Data Integrity Service Framework for IoT Data," 2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA, pp. 468-475, 2017.
  16. H. Yu, B. Ng and W. K. G. Seah, "On-demand Probabilistic Polling for Nanonetworks under Dynamic IoT Backhaul Network Conditions," in IEEE Internet of Things Journal, Vol. PP, No. 99, p. 1, 2017. https://doi.org/10.1109/JIOT.2017.2751524
  17. Y. J. Han, "Patenting Trend of Internet of Things(IoT) in China.", Journal of the Korea Convergence Society, Vol. 8, No. 8, pp. 1-8, 2017. 8. https://doi.org/10.15207/JKCS.2017.8.8.001
  18. U. J. Lee, S. I. Kim, "A Study on the Smart Home Life Style for Single households - Focusing on the 20s and 30s -.", Journal of the Korea Convergence Society, Vol. 8. No. 8, pp. 231-237, 2017 https://doi.org/10.15207/JKCS.2017.8.8.231