DOI QR코드

DOI QR Code

Mutual Authentication and Key Agreement Scheme between Lightweight Devices in Internet of Things

사물 인터넷 환경에서 경량화 장치 간 상호 인증 및 세션키 합의 기술

  • 박지예 (덕성여자대학교 컴퓨터공학부) ;
  • 신새미 (덕성여자대학교 컴퓨터공학부) ;
  • 강남희 (덕성여자대학교 디지털미디어학과)
  • Received : 2013.07.09
  • Accepted : 2013.09.02
  • Published : 2013.09.30

Abstract

IoT, which can be regarded as an enhanced version of M2M communication technology, was proposed to realize intelligent thing to thing communications by utilizing Internet connectivity. Things in IoT are generally heterogeneous and resource constrained. Also such things are connected with each other over LLN(low power and lossy Network). Confidentiality, mutual authentication and message origin authentication are required to make a secure service in IoT. Security protocols used in traditional IP Networks cannot be directly adopted to resource constrained devices in IoT. Under the respect, a IETF standard group proposes to use lightweight version of DTLS protocol for supporting security services in IoT environments. However, the protocol can not cover up all of very constrained devices. To solve the problem, we propose a scheme which tends to support mutual authentication and session key agreement between devices that contain only a single crypto primitive module such as hash function or cipher function because of resource constrained property. The proposed scheme enhances performance by pre-computing a session key and is able to defend various attacks.

사물인터넷(IoT) 기술은 M2M 통신의 확장 기술로 구성 장치(사물)들을 인터넷에 연결시켜 사물지능통신을 실체화하기 위해 제안되었다. IoT를 구성하는 다양한 사물들은 일반적으로 자원이 제한적이고, 이기종 장치들은 저용량 네트워크로 상호 연결된다. 이러한 IoT 환경에서 보안 서비스를 제공하기 위해서는 기밀성, 상호인증, 메시지 송신 인증 등이 제공되어야 한다. 그러나 자원이 제한적인 환경 특성상 기존 인터넷 환경에 적용했던 보안 기술들을 그대로 적용하기에는 무리가 있다. IETF 표준화 그룹에서는 안전한 IoT 서비스를 위해 경량화된 DTLS(Datagram TLS) 프로토콜의 적용을 제안하고 있지만 초경량 장치까지 모든 장치를 수용할 수는 없다. 이를 해결하기 위해 본 논문에서는 자원 제약의 이유로 해쉬 함수 혹은 암호 함수와 같은 단일 보안 모듈만을 탑재할 수 있는 경량화 장치들이 상호 인증하고 세션키를 합의할 수 있는 방안을 제안한다. 제안 기술은 세션키 생성 시 사전 계산 방식을 통해 성능을 향상시킬 수 있고 다양한 보안 공격에 대응 할 수 있다.

Keywords

References

  1. J. Park and N. Kang, "Entity authentication scheme for secure WEB of Things applications," J. KICS, vol. 38B, no. 5, pp. 394-400, May 2013. https://doi.org/10.7840/kics.2013.38B.5.394
  2. H. Tschofenig, J. Arkko, "Report from the smart object workshop(2012)," Retrieved June, 29, 2013, from http://tools.ietf.org/html/rfc6574.
  3. C. Bormann, M. Ersue, and A. Keranen, "Terminology for constrained node networks(2013)," Retrieved June, 30, 2013, from http://tools.ietf.org/html/draft-ietf-lwig-terminology-03.
  4. Z. Shelby, K. Hartke, and C. Bormann, "Constrained application protocol (CoAP)(2013)," Retrieved June, 1, 2013, from http://tools.ietf.org/html/draft-ietf-core-coap-17.
  5. H. Tschofenig, "Smart Object Security: Considerations for Transport Layer Security Implementations," in Proc, Smart Object Security Workshop, pp. 3, Paris, France, Mar. 2012.
  6. W.S Juang, "Efficient user authentication and key agreement in wireless sensor networks," Lecture Notes Comput. Sci., vol. 4298, pp. 15-29, 8 2006.
  7. K. Oh, T. Kim, and H. Kim, "Implementation of publickey-based key distribution in wireless sensor network," in Proc. KOSBE, pp. 95-98, Seoul, Korea, Feb. 2008.
  8. T. Heer, O. Garcia-Morchon, R. Hummen, S. Keoh, S. Kumar, and K. Wehrle, "Security challenges in the IP-based Internet of Things," Wireless Personal Commun., vol. 61, no. 3, pp. 527-542, Dec. 2011. https://doi.org/10.1007/s11277-011-0385-5
  9. R. Hummen, J. H. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, "Towards viable certificate-based authentication for the Internet of Things," in Proc, ACM HotWiSec '13, pp. 37-42, Budapest, Hungary, Apr. 2013.
  10. S. Raza, D. Trabalza, and T. Voigt, "6LoWPAN compressed DTLS for CoAP," in Proc. IEEE DCOSS, pp. 287-289, Hangzhou, China, May 2012.
  11. S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," in Proc. IEEE DCOSS, pp. 1-8, Barcelona, Spain, June 2011.
  12. Arduino Forum, MD5 Hash function, Retrieved 6, 3, 2013, from http://forum.arduino.cc/.

Cited by

  1. Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle vol.16, pp.1, 2015, https://doi.org/10.3390/s16010020
  2. Design of a Shipboard Outside Communication Network and Its Testbed Using PLC: For Safety Management during the Ship Building Process vol.6, pp.6, 2018, https://doi.org/10.3390/pr6060067