DOI QR코드

DOI QR Code

Mutual Authentication and Key Establishment Mechanism for Secure Data Sharing in M2M Environment

M2M 환경에서 안전한 데이터 공유를 위한 상호인증 및 키 교환 기법

  • 박중오 (동양미래대학교 전기전자통신공학부) ;
  • 김상근 (성결대학교 컴퓨터공학부)
  • Received : 2015.06.18
  • Accepted : 2015.08.07
  • Published : 2015.08.31

Abstract

With rapid rise of virtualization technology from diverse types of cloud computing service, security problems such as data safety and reliability are the issues at stake. Since damage in virtualization layer of cloud service can cause damage on all host (user) tasks, Hypervisor that provides an environment for multiple virtual operating systems can be a target of attackers. This paper propose a security structure for protecting Hypervisor from hacking and malware infection.

기계간의 통신을 지칭하는 M2M(Machine to Machine) 환경은 최근 융합 서비스의 등장과 동시에, 수많은 장치의 활용으로 인한 전반적인 보안 요구사항이 증가하고 있으며, 관련 각 표준화단체는 이러한 장치간의 보안요구사항을 충족하기 위해 각 영역별 보안기술에 대해 표준화를 진행 중에 있다. 본 논문에서는 다수의 M2M 장치들 간에 상호인증을 위한 키 관리 방법에 대해 제안한다. 본 논문에서 제안하는 방법은 M2M 디바이스와 서버 간에 상호인증을 기반으로 서비스 영역이 다른 디바이스 간에 안전한 데이터 공유를 수행한다. 제안하는 기법은 현재 M2M 표준의 보안 요구사항에 따른 안전성을 충족하고, 기존 연구에서 제안된 인증기술보다 성능이 향상된 타원곡선 알고리즘 기반 프로토콜을 사용하여 효율성을 강화하였다.

Keywords

References

  1. TTA, "Mobile networks based M2M and International Standards Report", Electronics and Telecommunications Research Institute, Electronic and Telecommunications Trends, Vol 26 No.2, 2011
  2. ETRI, "Trends of Converging Smart Devices with IoT Technology", Electronic Communication Trends Analysis, 2013.
  3. Machina Research, "GSMA & Machina Research", 2011
  4. Machina Research, "M2M Cummunication in sectors", 2011
  5. Machina Research, "M2M Communication in CE 2010-2020", 2011
  6. ITU-T, "http://www.itu.int/en/ITU-T/focusgroups/m2m/Pages/default.aspx", 2013
  7. 3GPP, "Study on security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements", 2O14
  8. ETSI, "TS 102 689 - V2.1.1 - Machine-to-Ma chine communications", 2013
  9. Z. Shelby, K. Hartke, and C. Borman, "Constrained Application Protocol (CoAP)," draft-ietf-core-coap-18 (work in progress), IETF, June 2013
  10. Tien-Dung Nguyen, Eui-Nam Huh, "A Dynamic ID-based Authentication Scheme for M2M Communication of healthcare Systems", The International Arab Journal of Information Technology, Vol 9, No 6, 2012
  11. Jie-Ren Shih, "Securing M2M With Post-Quantum Public-Key Cryptography", Emerging and Selected Topics in Circuits and Systems, IEEE Journal on Volume:3 , Issue: 1
  12. Eun Seon Gi, "Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments", Korean Institute of Information Security, Vol 20. No.1, 2010.2, 73-83 (11 pages)
  13. Mui Van Nguyen, Al-Saffar, A. ; Eui-Nam Huh, "A dynamic ID-based authentication scheme", Networked Computing and Advanced Information Management (NCM), 2010 Sixth International Conference on, 2010
  14. ETSI TS 102 921 V1.1.1, "Machine-to-Machine communications (M2M); mIa, dIa and mId interfaces", 2012
  15. Dennis Fu, "CCF M2M Certification: Demystifying the testing for M2M devices", CDMA Certification Forum, 2012
  16. VerSign, "VeriSign Cable Modem Authentication Service", http://www.verisign.com/stellent/groups/public/documents/data_sheet/005349.pdf, 2005
  17. Z. Shelby, "Constrained Application Protocol (CoAP)draft-ietf-core-coap-18", IETF", 2013
  18. ETSI TS 102 689 v1.1.1, 'Machine-to-Machine communications(M2M); M2M service requirements', 2010
  19. C. Bormann, "CoRE Roadmap and ImplementationGuide", draft-bormann-core-roadmap-05", IETF, 2013
  20. Z. Shelby, "Constrained Application Protocol (CoAP)", draft-ietf-core-coap-18, IETF, 2013

Cited by

  1. A design on Light-Weight Key Exchange and Mutual Authentication Routing Protocol in Sensor Network Environments vol.16, pp.11, 2015, https://doi.org/10.5762/KAIS.2015.16.11.7541
  2. Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment vol.15, pp.5, 2015, https://doi.org/10.7236/JIIBC.2015.15.5.9