DOI QR코드

DOI QR Code

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value

키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계

  • Yim, Geo-Su (Dept. of AI.Electrical Engineering, PaiChai University)
  • 임거수 (배재대학교 AI.전기공학과)
  • Received : 2020.09.20
  • Accepted : 2020.10.15
  • Published : 2020.10.31

Abstract

The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

사물인터넷은 장소나 시간에 제약 없이 센서와 통신 기능이 내장된 사물이 사람과 사물에 상호 작용이 가능하도록 구성된 사물 공간 연결망을 말한다. IoT는 인간의 편의를 위한 서비스 목적으로 개발된 연결망이지만 현재는 전력전송, 에너지관리, 공장자동화와 같은 산업 전반에 그 사용범위가 확대되고 있는 상태이다. 그러나 IoT의 통신프로토콜인 MQTT는 푸시 기술 기반의 경량 메시지 전송 프로토콜로 보안에 취약함을 갖고 있고 이것은 개인정보 침해나 산업정보 유출 같은 위험성이 내재되어 있다고 할 수 있다. 우리는 이런 문제점을 해결하기 위해 경량 메시지전송 MQTT 프로토콜에 서로 다른 혼돈계가 임의의 값으로 동기화되는 특성을 이용하여 보안 채널을 생성하는 동기화 MQTT 보안 채널을 설계하였다. 우리가 설계한 통신 채널은 혼돈 신호의 난수 유사성, 초기치 민감성, 신호의 재생산성과 같은 특성을 이용한 방법으로 잡음 채널에 정보를 전송하는 방법이라고 할 수 있다. 우리가 제시한 킷값으로 동기화된 암호화 방법은 경량 메시지 전송 프로토콜에 최적화된 방법으로 IoT의 MQTT에 적용된다면 보안 채널 생성에 효과적이라고 할 수 있다.

Keywords

References

  1. S. H. Oh, S. K. Ko, S. C. Son, B. T. Lee, and Y. S. Kim, "IoT Device Management Standard Protocol Trends in Mobile Communications," Electronics and Telecommunications Trends, Trans. Aerospace and Electronic Systems, vol. 30, no. 1, 2015, pp. 94-101.
  2. Y. H. Jeon, "A Study on the Security Modeling of Internet of Things(IoT)," J. of Korean Institute of Information Technology, vol. 15, no. 12, December. 2017, pp. 17-27. https://doi.org/10.14801/jkiit.2017.15.12.17
  3. J. Y. Ko. So. G. Lee, J. W. Kim, and C. H. Lee, "Technologies Analysis based on IoT Security Requirements and Secure Operation System," j. of The Korea Contents Association, vol. 18, no. 4, March 2018, pp. 164-177. https://doi.org/10.5392/JKCA.2018.18.04.164
  4. N. H. Kim, and C. S. Hong, "Lightweight Cryptography Algorithm basd Secure MQTT Protocol," j. of The Korean Institute of Information Scientists and Engineers, vol. 16, no. 12, December 2016, pp. 757-759.
  5. N. H. Kim, and C. S. Hong, "Secure MQTT Protocol based on Attribute-Based Encryption Scheme," j. of The Korean Institute of Information Scientists and Engineers, vol. 45, no. 3, December 2018, pp. 195-199.
  6. G. L. Baker, and J. P. Gollub, Chaotic Dynamics an Introduction. Cambridge University Press, 1996.
  7. H. G. Schuster, Deterministic Chaos: An Introduction 2nd editionl. Wiley-VCH, 1997.
  8. E. Ott, Chaose in Dynamical Systems Second Edition. Cambridge University Press, 2002.
  9. G. -S. Yim, and H. -S. Kim "Chaos-based Image Encryption Scheme using Noise-induced Synchronizaiton," j. of The Korea Society of Computer and Information, vol. 13, no. 5, September 2008, pp. 155-162.
  10. H. -S. Kim, and G. -S. Yim "Design of a digigal photo frame for close-range security using the chaotic signals synchronization," j. of The Korea Society of Computer and Information, vol. 16, no. 2, February 2011, pp. 201-206. https://doi.org/10.9708/jksci.2011.16.2.201
  11. G. -S. Yim "IoT MQTT Security Protocaol Design Using Chaotic Signals," j. of The Korea Institute of Information & Electronic Communication Technology, vol. 11, no. 6, December 2018, pp. 778-782. https://doi.org/10.17661/JKIIECT.2018.11.6.778
  12. G. -S. Yim "RFID Security Protocol Design Using Noise Synchronization of Chaotic Signal," j. of Korean Institute of Information Technology, vol. 16, no. 10, October 2018, pp. 119-123. https://doi.org/10.14801/jkiit.2018.16.10.119