DOI QR코드

DOI QR Code

Hash-chain-based IoT authentication scheme suitable for small and medium enterprises

중소기업 환경에 적합한 해쉬 체인 기반의 IoT 인증 기법

  • Jeong, Yoon-Su (Dept. of information Communication Convergence Engineering, Mokwon University) ;
  • Yon, Yong-Ho (Dept. of information Communication Convergence Engineering, Mokwon University) ;
  • Ku, Jin-Hee (Dept. of information Communication Convergence Engineering, Mokwon University)
  • 정윤수 (목원대학교 정보통신융합공학부) ;
  • 연용호 (목원대학교 정보통신융합공학부) ;
  • 구진희 (목원대학교 정보통신융합공학부)
  • Received : 2017.07.04
  • Accepted : 2017.08.20
  • Published : 2017.08.31

Abstract

With the emergence of the fourth industrial revolution, more and more attempts have been made to apply IoT technology to the manufacturing process and launch the product. In this paper, we propose IoT authentication scheme based on hash chain which can easily apply IoT device to small and medium enterprises in Korea. In the proposed method, the companies that installed IoT devices suitable for the manufacturing environment are selected to maintain the linkage between IoT devices so that product information and release information can be efficiently collected and managed during the entire manufacturing process. In addition, the proposed scheme is characterized in that it does not require an additional encryption / decryption algorithm because the authentication information of the IoT device is constructed based on a hash chain. As a result of the performance evaluation, the efficiency of the manufacturing process was improved by 18.5% and the processing of the manufacturing process with the IoT device was shortened by 20.1% on the average according to the application of the IoT device. In addition, the labor cost reduction costs in the manufacturing process decreased by an average of 30.7%.

4차 산업 혁명이 대두되면서 IoT 기술을 제조 공정에 적용하여 제품을 출시하려는 시도가 증가하고 있다. 본 논문에서는 우리나라 중소기업 중 제조업을 중심으로 IoT 장치를 손쉽게 적용하여 사용할 수 있는 해쉬 체인기반의 IoT 인증 기법을 제안한다. 제안 기법에서는 제조업 환경에 적합한 IoT 장치를 설치한 업체를 선별하여 전체 제조 공정 중 제품 정보와 출시 정보를 효율적으로 수집 보관 관리 처리 할 수 있도록 IoT 장치 간 연계를 유지하는 것을 목적으로 한다. 또한, 제안 기법은 IoT 장치의 인증 정보를 해쉬 체인을 기반으로 구축하였기 때문에 추가적인 암 복호 암호 알고리즘이 필요없는 것이 특징이다. 성능평가 결과, 제안 기법은 IoT 장치를 적용 유 무에따라 제조 프로세스의 효율성이 18.5% 향상되었고, IoT 장치를 부착한 제조 공정의 업무 처리가 평균 20.1% 단축되었다. 또한, 제조 공정에 투입된 인력 감축 비용이 평균 30.7% 감소되는 것으로 나타났다.

Keywords

References

  1. POSCOICT. (2016). What is Smart Factory?. POSCOICT. http://smartfuture-poscoict.co.kr/306
  2. Y. S. Jeong. (2011). A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing. Journal of Convergence Soceity for SMB, 1(1), 29-37.
  3. K. I. Kim. (2014). An Exploratory Study IMS Performance Mdodeling Using Information Systems Success Model. Journal of Digital Convergence, 12(3), 127-140. DOI : 10.14400/jdc.2014.12.3.127
  4. K. I. Kim. (2015). The Effects on Improvement of IMS Through Corrective Actions. Journal of the Convergence Society for SMB, 5(4), 1-4.
  5. K. I. Kim. (2012). Causes Analysis of Increasing Revocation for IMS Certification in small and Medium-size Enterprises. Journal of the Convergence Society for SMB, 2(2), 7-12.
  6. N. J. Allen & J. P. Meyer. (1990). The measurement and antecedents of affective, continuance and normaltive commitment to the organization. Journal of Occupational and Organizational Psychology, 63(1), 1-18. DOI : 10.1111/j.2044-8325.1990.tb00506.x
  7. R. N. Kanungo. (1982). Measurement of job and work involvement. Journal of Applied Psychology, 67(3), 341-349. DOI : 10.1037//0021-9010.67.3.341
  8. B. J. Babin & J. S. Boles. (1996). The effects of perceived co-worker involvement and supervisor support on service provider role stress, performance and job satisfaction. Journal of retailing, 72(1), 57-75. DOI : 10.1016/s0022-4359(96)90005-6
  9. S. S. Shin, Y. S. Jeong & Y. J. An. (2015). A Study of Analysis and Response and Plan for National and International Security Practices using Fin-Tech Technologies. Journal of Convergence Soceity for SMB, 5(3), 1-7.
  10. Y. S. Jeong. (2016). A Study of An Efficient Clustering Processing Scheme of Patient Disease Information for Cloud Computing Environment. Journal of Convergence Soceity for SMB, 6(1), 33-38. DOI : 10.22156/cs4smb.2016.6.1.033
  11. D. Ilic, S. Karnouskos, P. Silva & S. Detzler. (2014). A system for enabling facility management to achieve deterministic energy behaviour in the smart grid era. International Conference on Smart Grids and Green IT systems (pp. 170-178). Barelona : Smart Greens. DOI : 10.5220/0004861101700178
  12. C. F. Lai, Y. X. Lai, L. T. Yang & H. C. Chao. (2012). Integration of IoT Energy Management System with Appliance and Activity Recognition. Besancon : 2012 IEEE International Conference on Green Computing and Communications (pp. 66-71). Besancon : IEEE. DOI : 10.1109/greencom.2012.20
  13. D. Ilic, S. Karnouskos & M. Wilhelm. (2013). A comparative analysis of smart metering data aggregation performance. 2013 11th IEEE International Conference on Industrial Informatics (pp. 434-439). Bochum : IEEE. DOI : 10.1109/indin.2013.6622924
  14. Y. S. Jeong. (2010). An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP. Journal of Digital Convergence, 13(4), 227-234. DOI : 10.14400/jdc.2015.13.4.227
  15. Y. S. Jeong. (2016). Design of Prevention Model according to a Dysfunctional of Corporate Information. Journal of Convergence Soceity for SMB, 6(2), 11-17. DOI : 10.22156/cs4smb.2016.6.2.011
  16. L. Raymond. (1985). Organizational Characteristics and MIS success in the Context of Small Business. MIS Quarterly, 9(1), 37-52. DOI : 10.2307/249272
  17. Y. S. Jeong. (2014). Tracking Analysis of User Privacy Damage using Smartphone. Journal of Convergence Society for SMB, 4(4), 13-18.
  18. Y. S. Jeong. (2012). Design of Security Model for Service of Company Information. Journal of Convergence Soceity for SMB, 2(2), 43-49.