DOI QR코드

DOI QR Code

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin (Department of Computer Science and Engineering, Soonchunhyang University) ;
  • Lee, Im-Yeong (Department of Computer Software and Engineering, Soonchunhyang University)
  • Received : 2017.09.30
  • Accepted : 2017.12.28
  • Published : 2018.02.28

Abstract

In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.

Keywords

References

  1. T.Mendes, R. Godina, E. Rodrigues, Matias. M, Catalao. J. C, &, J. P, "Smart home communication technologies and applications," Wireless protocol assessment for home area network resources. Energies, pp. 7279-7311, 2015.
  2. M. Schukat, & P. Cortijo, "Public key infrastructures and digital certificates for the Internet of things," in Proc. of Signals and Systems Conference (ISSC), pp. 1-5, 2015.
  3. S. M. Kim, H. S. Choi, & W. S. Rhee, "IoT home gateway for auto-configuration and management of MQTT devices. In Wireless Sensors (ICWiSe)," in Proc. of IEEE Conference on, pp. 12-17, 2015.
  4. Zhang, X., Hsiao, H. C., Hasker, G., Chan, H., Perrig, A., & Andersen, D. G., "SCION: Scalability, control, and isolation on next-generation networks," in Proc. of Security and Privacy (SP), IEEE Symposium on, pp. 212-227, 2011.
  5. B.W. Jin, J.O. Park and M.S. Jeon, "A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment," Journal of IIBC, Vol.16, No.6, pp.25-31, 2016.
  6. A.Buldas, A.Kroonmaa, & R.Laanoja, "Keyless signatures' infrastructure: How to build global distributed hash-trees," in Proc. of Nordic Conference on Secure IT Systems, pp. 313-320, 2013.
  7. G.J. Ra, Y.H. Park, & I.Y. Lee, "A Study on Secure Home System using KSI," in Proc. of Asia Pacific International Conference on Information Science and Technology, 2017.
  8. A.Dorri, S. Kanhere, R.Jurdak, & P.Gauravaram, "Blockchain for IoT security and privacy: The case study of a smart home," in Proc. of Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on IEEE, pp. 618-623, 2017.
  9. C. Jamthagen, and M. Hell, "Blockchain-based publishing layer for the Keyless Signing Infrastructure," in Proc. of 13th IEEE International Conference on Advanced and Trusted Computing, IEEE--Institute of Electrical and Electronics Engineers Inc, 2016.
  10. M. Bellare, & P. Rogaway, "Collision-resistant hashing: Towards making UOWHFs practical," in Proc. of Advances in Cryptology-CRYPTO'97: 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1997. Proceedings, pp. 470, 1997.
  11. E.Dahmen, K.Okeya, T.Takagi, & C. Vuillaume, "Digital Signatures Out of Second-Preimage Resistant Hash Functions," PQCrypto5299, pp. 109-123, 2008.
  12. J. Buchmann, E. Dahmen and A. Hulsing, "XMSS-a practical forward secure signature scheme based on minimal security assumptions," in Proc. of Post-Quantum Cryptography: 4th International Workshop, pp. 117-129, 2011.

Cited by

  1. Anomaly Detection in Smart Homes Using Bayesian Networks vol.14, pp.4, 2018, https://doi.org/10.3837/tiis.2020.04.021