• Title/Summary/Keyword: IoT Standard Protocol

Search Result 59, Processing Time 0.019 seconds

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

Adaptive Power Saving Mechanism of Low Power Wake-up Receivers against Battery Draining Attack (배터리 소모 공격에 대응하는 저전력 웨이크업 리시버의 적응형 파워 세이빙 메커니즘)

  • So-Yeon Kim;Seong-Won Yoon;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.393-401
    • /
    • 2024
  • Recently, the Internet of Things (IoT) has been widely used in industries and daily life that directly affect human safety, life, and assets. However, IoT devices, which need to meet low-cost, lightweight, and low-power requirements, face a significant problem of shortened battery lifetime due to battery draining attacks and interference. To solve this problem, the 802.11ba standard for the Wake-up Receiver (WuR) has emerged, this feature is playing a crucial role in minimizing energy consumption. However, the WuR protocol did not consider security mechanisms in order to reduce latency and overhead. Therefore, in this study, anAdaptive Power Saving Mechanism (APSM) is proposed for low-power WuR to counter battery draining attacks. APSM can minimize abnormally occurring power consumption by exponentially increasing power-saving time in environments prone to attacks. According to experimental results, the proposed APSM improved energy consumption efficiency by a minimum of 13.77% compared to the traditional Legacy Power Saving Mechanism (LPSM) when attack traffic ratio is 10% or more of the total traffic.

Secure 6LoWPAN Neighbor Discovery Address Registration Protocol (안전한 6LoWPAN Neighbor Discovery 주소 등록 프로토콜)

  • Han, Sang-woo;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.17-28
    • /
    • 2019
  • 6LoWPAN based on IEEE 802.15.4 is a realistic standard platform for various Internet of Things (IoT) applications. To bootstrap the LoWPAN (Low-power Wireless Personal Area Network), each device must perform 6LoWPAN-ND address registration to assign a unique IPv6 address. Without adequate security mechanisms, 6LoWPAN-ND is vulnerable to a variety of security attacks including corrupted node attacks. Several security mechanisms have been proposed as a supplement to the vulnerability, but the vulnerability exists because it relies solely on IEEE 802.15.4 hop-by-hop security. In this paper, we propose and analyze a vulnerability of 6LoWPAN-ND address registration and a new security mechanism suitable for preventing the attack of damaged node. It also shows that the proposed security mechanism is compatible with the Internet Engineering Task Force (IETF) standard and is more efficient than the mechanism proposed in the IETF 6 lo WG.

Implementation of MACsec Adapter for Layer 2 Security (레이어 2 보안을 위한 MACsec 어댑터 구현)

  • Jeong, Nahk-Ju;Park, Byung-Don;Park, Han-Su;Seo, Jong-Kyoun;Han, Ki-Cheon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.972-978
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2, the international standard defined in the IEEE 802.1AE. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly, and is exposed to the risk of a variety of Internet attacks. Traditional network security technologies were often made in Layer 3, such as IPsec. However, to be increased as rapidly as the current traffic situation is complicated, and became interested in the security function of protecting the entire traffic instead of for a specific application or protocol. It appeared as these technologies is technology MACsec technology to protect all traffic in Layer 2. In this paper, we propose a Layer 2 security technology adapter MACsec MACsec a technology that allows you to simply and easily add them to the existing Layer 2 networks.

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.

Smart meter data transmission device and power IT system using LTE and IoT technologies (LTE와 IoT 기술을 이용한 스마트미터 데이터 전송장치와 전력 IT 시스템)

  • Kang, Ki-Beom;Kim, Hong-Su;Jwa, Jeong-Woo;Kim, Ho-Chan;Kang, Min-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.117-124
    • /
    • 2017
  • A Smart Grid is a system that can efficiently use energy by exchanging real-time information in both directions between a consumer and a power supplier using ICT technology on an existing power network. DR(Demand response) is an arrangement in which electricity users can sell the electricity they save to the electricity market when the price of electricity is high or the power system is crisis. In this study, we developed a power meter data transmission device and power IT system that measure the demand information in real-time using a smart meter and transmit it to a cloud server. The power meter data transmission device developed in this study uses alight sensor connected to a Raspberry Pi 3 to measure the number of blinking lamps on the KEPCO meter per unit of power, in order to provide reliable data without any measurement errors with respect to the KEPCO power data. The power measurement data transmission device uses the standard communication protocol, OpenADR 2.0b. The measured data is transmitted to the power IT system, which consists of the VEN, VTN, and calculation program, via the LTE WiFi communication network and stored in its MySQL DB. The developed power measurement data transmission device issues a power supply instruction and performs a peak reduction DR when a power system crisis occurs. The developed power meter data transmission device has the advantage of allowing the user to adjust it every 1 minute, where as the existing smart metering time is fixed at once every 15 minutes.

Real-time Water Monitoring System for Small Water Supply Facility using High Reliable Wireless Sensor Network (고신뢰 무선센서네트워크를 이용한 실시간 수질 모니터링 시스템)

  • Kang, Hoyong;Jang, Youn-Seon
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.5
    • /
    • pp.331-341
    • /
    • 2015
  • In this paper, real-time water quality monitoring system of small water supply facilities based on IEEE 802.15.4e-2012 DSME MAC and IEEE 802.15.4g-2012 PHY standard is presented, which is capable to acquire for highly reliable water quality information in the wide outdoor areas for effective water quality management of small water quality facilities is distributed in the long distance and remote areas. Previously, Long distance transmission is difficult in most water quality sensor module is using RS-485 protocol. But with this system, even in harsh outdoor environment, it is possible to establish a radio wave sensor in a wide area network, and not only water quality sensor shall be connected to the wireless system, but also wireless integrated management system shall provide more effective way of management of the numerous small water supply facilities spread throughout the community, so that the administrator can remotely monitor the data of water turbidity, pH, residual chlorine in the water-supply, water-level, and generate alarm to cope with risks. The management of small water facilities is done by residents will be very effective to notice water quality information of small water facilities to residents.

TDMA-based MAC Protocol for Implementation of Ultra-low latency in Vehicular networks (차량 네트워크에서 Ultra-low latency 구현을 위한 TDMA 기반 MAC 프로토콜)

  • Park, Hye-bin;Joung, Jinoo;Choe, Byeongseog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.33-39
    • /
    • 2017
  • In mission-critical applications such as vehicular networks, distributed robotics, and other cyber-physical systems, the requirements for latency are more stringent than traditional applications. Among them, autonomous V2V communication is a rapidly emerging domain of applications with a few milliseconds' latency requirements. Today's systems utilizing 802.11p or LTE-direct standards are not primarily designed for ultra-low latency. Because the medium access function contributes to a significant portion of the total latency, it is necessary to modify Layer2 in order to solve the problem. Focusing on MAC layer, we developed a scalable and latency-guaranteed MAC by devising Autonomous TDMA (ATDMA) in which autonomous joining/leaving is allowed without scheduling by coordinator. We also evaluated the performance of the algorithm by comparing with the WAVE protocol.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.