DOI QR코드

DOI QR Code

스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment

  • Kim, Jeong-Ho (Dept. of Computer Science and Engineering, Soongsil University) ;
  • Heo, Jae-Wook (Dept. of Computer Science and Engineering, Soongsil University) ;
  • Jun, Moon-Seog (Dept. of Computer Science and Engineering, Soongsil University)
  • 투고 : 2019.02.27
  • 심사 : 2019.05.03
  • 발행 : 2019.05.31

초록

사물인터넷 환경에 대한 규모가 날이 갈수록 커지고 발전함에 따라서 사물인터넷 디바이스를 통해 수집하고 공유되는 정보들은 점점 다양해지고 더 많아지게 되었다. 하지만 사물인터넷 디바이스들은 소형화된 크기에 따라 연산능력의 한계점과 낮은 전력량을 가지고 있어 이전의 인터넷 환경에서 적용되어왔던 암호화, 인증 등의 보안 기술들을 사물인터넷에 직접적으로 적용하기 힘들어 취약점과 보안위협이 매우 크다. 이러한 문제점으로 인해 안전하고 정확하게 전달되어야 하는 필요성이 있는 중요한 정보들이 데이터 위변조나 개인정보 유출 및 침해 등 악의적으로 정보를 탈취하려는 위협들에 노출되었다. 이 위협을 극복하기 위해서 현재 사물인터넷 환경의 디바이스에 대하여 취약점들을 보완하고자 다양한 보안연구가 활발히 진행되고 있다. 특히 사물인터넷 환경에서 다양한 디바이스들이 상호동작하며 수집된 정보들을 공유하고 전달하기 때문에 각각의 디바이스들이 신뢰성을 가지고 통신할 수 있어야 한다. 이에 따라 디바이스 인증을 위한 다양한 기법의 연구들이 진행이 되었는데, 본 연구에서는 기존의 사물인터넷 디바이스들을 인증하기 위해 연구되어 왔던 인증 기법에 대하여 한계 및 문제점을 알아보고 이를 해결하여 사물인터넷 환경에서 신뢰된 디바이스 간의 안전하게 통신을 할 수 있도록 사물인터넷 디바이스를 인증할 수 있는 기술을 제안한다.

As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

키워드

SHGSCZ_2019_v20n5_550_f0001.png 이미지

Fig. 1. Smart Home Environment

SHGSCZ_2019_v20n5_550_f0002.png 이미지

Fig. 2. Blockchain Model

SHGSCZ_2019_v20n5_550_f0003.png 이미지

Fig. 3. ECC Based Device Authentication

SHGSCZ_2019_v20n5_550_f0004.png 이미지

Fig. 4. SDN Based Device Authentication

SHGSCZ_2019_v20n5_550_f0005.png 이미지

Fig. 5. Proposed Model

SHGSCZ_2019_v20n5_550_f0006.png 이미지

Fig. 6. Proposed Device Authentication Protocol

Table 1. Blockchain Species

SHGSCZ_2019_v20n5_550_t0001.png 이미지

Table 2. IoT Devices Authentication Comparison

SHGSCZ_2019_v20n5_550_t0002.png 이미지

Table 3. Proposed Protocol Symbol

SHGSCZ_2019_v20n5_550_t0003.png 이미지

Table 4. Comparison by Blockchain Types

SHGSCZ_2019_v20n5_550_t0004.png 이미지

참고문헌

  1. Zhang, Zhi-Kai, "IoT security: ongoing challenges and research opportunities", Service-Oriented Computing and Applications(SOCA) , 2014 IEEE 7th International Conference on. IEEE, pp. 230-234. 2014. DOI: https://doi.org/10.1109/soca.2014.58
  2. Seokung Yoon, Haeryong Park, HyeongSeon Yoo, "Security issues on Smarthome in IoT environment", Computer science and its applications, Springer, Berlin, Heidelberg, pp.691-696, 2015. DOI: https://doi.org/10.1007/978-3-662-45402-2_97
  3. Sivaraman Vijay, "Network-level security and privacy control for smart-home IoT devices", Wireless and Mobile Computing, Networking and Communications (WiMob) , 2015 IEEE 11th International Conference on. IEEE, pp.163-167, 2015. DOI: https://doi.org/10.1109/wimob.2015.7347956
  4. Konstantinos Christidis, Michael Devetsikiotis, "Blockchains and Smart Contracts for the Internet of Things", IEEE Access , IEEE, pp.2292-2303, 2016 DOI: https://doi.org/10.1109/ACCESS.2016.2566339
  5. Chul-Jin Kim, "A Static and Dynamic Design Technique of Smart Contract based on BlockChain" Korea Academy Industrial Cooperation Society, vol. 19, no. 6, pp. 110-119, Jun. 2018 DOI: https://doi.org/10.5762/KAIS.2018.19.6.110
  6. Atwady Yahya, Hammoudeh Mohammed, "A survey on authentication techniques for the internet of things", Proceedings of the International Conference on Future Networks and Distributed Systems, ACM, NY, USA, p. 8, 2017. DOI: https://doi.org/10.1145/3102304.3102312
  7. X. Yao, X. Han, X. Du, X. Zhou, "A lightweight multicast authentication mechanism for small scale IoT applications", IEEE Sensors Journal, vol 13, no. 10, pp.3693-3701, Oct, 2013. DOI: https://doi.org/10.1109/JSEN.2013.2266116
  8. P. Porambage, C. Schmitt, P. Kumar, A. Gurtov and M. Ylianttila, "Two-phase Authentication Protocol for Wireless Sensor Networks in Distributed IoT Applications", 2014 IEEE Wireless Communications and Networking Conference(WCNC), Istanbul, Turkey, pp. 2728-2733, Apr. 2014. DOI: https://doi.org/10.1109/WCNC.2014.6952860
  9. Thomas Kothmayr, Corinna Schmitt, Wen Hu, Michael Brunig and Georg Carle,. "DTLS based security and two-way authentication for the Internet of Things", AD Hoc Networks, vol. 11, issue 8, pp. 2710-2723, Nov. 2013. DOI: https://doi.org/10.1016/j.adhoc.2013.05.003
  10. N. Mahalle, B. Anggorojati, N. R. Prasad and R. Prasad, "Identity Authentication and Capability Based Access Control(IACAC) for the Internet of Things". Journal of Cyber Security and Mobility , vol. 1, no. 4, pp. 309-348, Mar. 2013.
  11. Deuk-hun Kim, Jin Kwak, "Design of Improved Authentication Protocol for Sensor Networks in IoT Environment" Journal of the Korea Institute of Information Security & Cryptology , vol. 25, no. 2, pp. 467-478, April, 2015. DOI: https://doi.org/10.13089/JKIISC.2015.25.2.467
  12. O. Flauzac, C. Gonzalez, A. Hachani and F. Nolot, "SDN based architecture for IoT and improvement of the security", 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangju, p. 688-693, 2015. DOI: https://doi.org/10.1109/WAINA.2015.110
  13. V. L. Shivraj, M. A. Rajan, M. Singh and P. Balamuralidha, "One time password authentication scheme based on elliptic curves for Internet of Things (IoT)", 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), IEEE, Riyadh, p. 1-6, 2015. DOI: https://doi.org/10.1109/NSITNSW.2015.7176384
  14. Castro Miguel, "Practical Byzantine fault tolerance", Appears in the Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI), p. 173-186, 1999.
  15. H. Sukhwani, J. M. Martinez, X. Chang, K. S. Trivedi and A. Rindos, "Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)", 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, p. 253-255, 2017. DOI: https://doi.org/10.1109/SRDS.2017.36