DOI QR코드

DOI QR Code

Blockchain-based Lightweight Mutual Authentication Protocol for IoT Systems

  • Choi, Wonseok (School of Computer Science and Engineering, Kyungpook National University) ;
  • Kim, Sungsoo (Department of Aeronautical Software Engineering, Kyungwoon University) ;
  • Han, Kijun (School of Computer Science and Engineering, Kyungpook National University)
  • 투고 : 2019.11.18
  • 심사 : 2020.01.14
  • 발행 : 2020.01.31

초록

IoT 네트워크 환경에서는 서버 등의 고성능 장치부터 각종 센서, 수동형 RFID 등 저사양 장치까지 다수의 여러 장치들이 연결되어 있다. 그렇기에 불법적인 공격에 노출되어 있으며 데이터를 암호화하여 통신을 수행하여야 한다. 암호화 알고리즘으로 대칭키, 공개키 암호화 및 해시 기법 등을 사용할 수 있으나 저성능 IoT 디바이스는 암호화 프로세스를 처리하기에는 적합하지 않는 하드웨어 성능을 가지고 있어 이러한 방법을 채택할 수 없는 경우가 발생한다. 본 논문에서는 블록체인 시스템과 연동한 경량 상호 인증 프로토콜을 적용하여 IoT 환경에서 저성능 단말장치의 안전한 통신을 보장하는 인증 기법을 제안한다.

Various devices, which are powerful computer and low-performance sensors, is connected to IoT network. Accordingly, applying mutual authentication for devices and data encryption method are essential since illegal attacks are existing on the network. But cryptographic methods such as symmetric key and public key algorithms, hash function are not appropriate to low-performance devices. Therefore, this paper proposes blockchain-based lightweight IoT mutual authentication protocol for the low-performance devices.

키워드

참고문헌

  1. M. T. Hammi, B. Hammi, P. Bellot, and A. Serhrouchni, "Bubbles of Trust: A decentralized blockchain-based authentication system for IoT," Computers & Security, Vol. 78, Sep. 2018.
  2. S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," www.bitcoin.org, 2008.
  3. B. Park, T. Lee, and J. Kwak, "Blockchain-Based IoT Device Authentication Scheme," Journal of The Korea Institute of Information of Information Security & Cryptology, Vol. 27, No. 2, Apr. 2017.
  4. P. Porambage, C. Schmitt, P. Kumar, A. Gurtov, and M. Ylianttila, "PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications," International Journal of Distributed Sensor Networks, Vol. 14, 2014.
  5. A. Moinet, B. Darties, and J. L. Baril, "Blockchain based trust & authentication for decentralized sensor networks," arXiv preprint arXiv:1706.01730, 2017.
  6. D. Kim, and J. Kwak, "Design of Improved Authentication Protocol for Sensor Networks in IoT Environment," Journal of The Korea Institute of Information Security & Cryptology, Vol. 25, No. 2, Apr. 2015.
  7. W. Choi, S. Kim, Y. Kim, Y. Park, and K. Ahn, "PUF-based encryption processor for the RFID systems," 2010 IEEE 10th International Conference on Computer and Information Technology, pp. 2323-2328, United Kingdom, Jun.-Jul. 2010.
  8. J. Park, S. Shin, and N. Kang, "Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things," The Journal of Korean of Communications and Information Sciences, Vol. 38B, No. 09, 2013.
  9. L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks," Proceedings of Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, 2006.
  10. A. A. Omar, M. S. Rahman, A. Basu, and S. Kiyomoto, "MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data," International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, Springer, 2018.
  11. D. Duc, and K. Kim, "Defending RFID authentication protocols and against DoS attacks," Computer Communications, Journal of Computer Communications, 2011.
  12. W. Choi, S. Kim, Y. Kim, T. Yun, K. Ahn, and K. Han, "Design of PUF-based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication," The Journal of Korean Institute of Communications and Information Sciences, Vol. 39B, No. 12, Dec. 2014.
  13. M. Stamp, Information Security Textbook(Principles and Practice) 1st Ed., NY: John Willey & Sons Inc., 2005.
  14. P. Gope, J. Lee, and T. Quek, "Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, Vol. 13, No. 11, Nov. 2018.
  15. J. Lee, "BIDaas: Blockchain Based ID As a Service," IEEE Access, Vol. 6, 2018.
  16. E. Buchman, "Tendermint: Byzantine fault tolerance in the age of blockchains," M.Sc. Thesis, University of Guelph, Canada, June 2016.
  17. V. Buterin, "A next-generation smart contract and decentralized application platform," White paper, 2014.
  18. C. Shannon, "Communication theory of secrecy systems," Bell System Technical Journal, 1949.