• Title/Summary/Keyword: M2M gateway

Search Result 72, Processing Time 0.023 seconds

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

M2M Technology based Global Heathcare Platform (M2M 기반의 글로벌 헬스케어 시스템 플랫폼)

  • Jung, Sang-Joong;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.145-146
    • /
    • 2010
  • This paper proposed a new concept of global healthcare system based on M2M technology with the combination of networks by using IPv6 techniques. The proposed system consists of 6LoWPAN based wearable sensors, gateway for the connection of different networks, and server program offering health information. Thus our approach presents an intelligent system which allows direct exchange of information between machines without human assistance with the epoch-making extension of measurement environment in healthcare areas appropriately.

  • PDF

Study on Construction of IoT environments oneM2M standards utilizing the KETI Mobius platform and LoRa (KETI의 Mobius플랫폼과 LoRa를 활용한 oneM2M규격의 IoT 환경 구축에 관한 연구)

  • Lee, So-Haeng;Song, Bub-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.285-289
    • /
    • 2016
  • In recent domestic new growth model based on the IoT it has been proposed by the industry and national authorities. As applied to these Internet-based IoT convergence center of the field is expected to be realized, including the improvement and increase of efficiency of various economic values. In this paper, using KETI ( Korea Electronics Technology Institute ) developed distribution being oneM2M standards-based platform from Mobius and Gateway Platforms & Cube, and low power, capable of long-range RF communication LoRa communication module is proposed to build the site applicable environment.

  • PDF

Device Objectification and Orchestration Mechanism for IoT Intelligent Service (IoT 서비스 지능화를 위한 디바이스 오브젝트화 및 오케스트레이션 메커니즘)

  • Kim, Youngjun;Jeon, Yongkeun;Chong, Ilyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.19-32
    • /
    • 2013
  • This paper suggests smart gateway structure and functionalities that provide device web service which can be used by user using objectified devices. The smart gateway objectify a physical device in other to provide the device web service in IoT intelligent service. And the paper suggests a mechanism that provide orchestrated service of various devices to user using a concept of service overlay network. and also suggests a interface that provide device web services and the orchestrated service between the smart gateway and a web service platform. In the paper, the objectified devices can be combined with web service objects and device contexts based on the service overlay network, furthermore the objectified devices can provide intelligence and dynamic service in the IoT environment.

Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment (M2M 통신 환경에서 트랩도어 충돌 해쉬를 이용한 그룹키 생성 및 교환 기법)

  • Kim, Sung-Soo;Jun, Moon-Seog;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.9-17
    • /
    • 2015
  • The development of wireless communication technology and change in the ICT market has led to the development of the M2M service and technology. Under these circumstances, the M2M environment has been the focus of communication environment construction between machines without control or direct intervention of human being. With characteristics of wireless communication environment, the possibility of being exposed to numerous security threats and safe communication security technology have becoming an issue an important requirements for problems such as data exposure, forgery, modulation, deletion, and privacy. This research analyzes requirements of trapdoor collision hash, generates keys between groups under the M2M environment by using the specificity of trapdoor, and suggests technology to exchange keys with session keys. Further, it also suggests techniques to confirm authentication of device and gateway in accordance with group key generation. The techniques herein suggested are confirmed as safe methods in that they have attack resistance such as Masquerade Attack, Man-in-the-Middle Attack, and Replay Attack in the group communication block by using the speciality of collision message and collision hash.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

IoT-enabled Solutions for Tour Photography Services

  • Jeong, Isu;Baek, Seungwoo;An, Eunsol;Kim, Yujin;Choi, Jiwoo;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.127-135
    • /
    • 2020
  • In this paper, we propose an IoT-enabled solution for tour photography services with small-size investment and resources in the travel and tourism industries, being able to impact on economic, social, and cultural values. An IoT-enabled camera is developed based on an open hardware and software platform complying with oneM2M, which can make traditional embedded systems oneM2M-compliant devices due to a middleware solution called TAS (thing adaptation software). IoT cameras deployed around photo zones in a tour site could be remotely controlled via an IoT gateway with a Web-based application on a smartphone. Users would perform a pan and tilt camera control if they want and then take and download a perfect photo picture (even though they are away from the tour site). We expect that the proposed solution will promote the deployment IoT-enabled technologies in tour and travel industries which are important parts of the tertiary sector.

M2M Technology based Global Heathcare Platform (M2M 기반의 글로벌 헬스케어 시스템 플랫폼)

  • Jung, Sang-Joong;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2435-2441
    • /
    • 2010
  • A global healthcare system based on M2M technology is proposed to support a good mobility, flexibility and scalability to the patients in 6LoWPAN. Sensor nodes integrated with wearable sensors are linked to gateway with IEEE 802.15.4 protocol and 6LoWPAN protocol for data acquisition and transmission purpose via external network. In the server, heart rate variability signals are obtained by signal processing and used for time and frequency domain performance analysis to evaluate the patient's health status. Our approach for global healthcare system with non-invasive and continuous IP-based communication is managed to process large amount of biomedical signals in the large scale of service range accurately.

Design and implementation of Mobile Electronic Payment Gateway System based on M-Commerce Security Platform (M-Commerce 보안 플랫폼상의 무선 전자지불시스템 설계 및 구현)

  • 김성한;이강찬;민재홍
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.35-50
    • /
    • 2002
  • Recently, payment method is one of the most hot issues for transaction of contents in mobile and internet markets. Many kinds of mobile contents services are rapidly growing with the combination of internet application services. Payment method algorithms are demanded for the stable transaction between producer and consumer. Security protocol algorithms are widely adapted for mobile Platform terminals. In this Paper, we described security mechanism for the current wireless internet services and compared with the performance result. There are security protocols that based on java machine platform or WAP protocols. The system is based on J2ME technology for the java mobile platform. Based on this technology, a security system is proposed for the service of mobile commerce electronic payment. The system is designed for the stability of transaction so that it enables to apply into many kinds of internet payment system.

  • PDF

The context-aware service system development of the M2M base for the quick crime scene trace (신속한 범행현장 추적을 위한 M2M 기반의 상황인지 서비스 시스템 개발)

  • Lee, Jong-sung;Jeon, Min-ho;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.659-662
    • /
    • 2012
  • In this paper, the service system the urgent of the danger area or the managed object region is proposed whether the system is autonomously the police or situation where it informs through the police car and it can convey the contextual information or not. In case the nodes location is continuously confirmed from the gateway and it queues and the event is generated in the server of system whether it is the situation, or not the system to be proposed transmits the event triggered message and system transmitting the video message to the nearby which the event is generated node. As a result of the test, in case the event was generated in the server whether it was the situation, or not it confirmed to transmit the video message as the route where it is stored in the server.

  • PDF