DOI QR코드

DOI QR Code

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone

스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계

  • 진병욱 (숭실대학교 컴퓨터학과) ;
  • 안희학 (가톨릭관동대학교 컴퓨터공학과) ;
  • 전문석 (숭실대학교 컴퓨터학부)
  • Received : 2017.01.19
  • Accepted : 2017.03.06
  • Published : 2017.03.30

Abstract

As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Keywords

References

  1. TTA, "Functional Requirements for Wireless Device Identification in WLAN," 2013. 12.
  2. 서승현, 전길수, "스마트폰 보안 위협 및 대응전략," TTA 저널, 통권 제132호, 2010, pp. 44-48.
  3. 고정길, 홍상기, 이병복, 김내수, "스마트 디바이스와 사물인터넷 (IoT)융합 기술 동향," ETRI, 2013.
  4. Young-Do Joo, "Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks," The Journal of The Institute of Webcasting, Internet Television and Telecommunication, Vol. 14, No. 1, 2014, pp. 147-153.
  5. Kwansik Yoon, "A Mechanism for Controlling Accesses Dynamically in Smartwork Environment," Vol. 19, No. 2, 2012. 11, pp. 877-880.
  6. 진병욱, 정동욱, 차시호, 전문석, "Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments," 디지털산업정보학회 논문지, Vol. 12, No. 1, 2016, pp. 35-41.
  7. 진병욱, 김종화, 차시호, 전문석, "Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments," 디지털산업정보학회 논문지, Vol. 12, No. 1, 2016, pp. 81-87.
  8. 최도현, 박중오, "M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법," Vol. 13, No. 10, 2015, pp. 343-351. https://doi.org/10.14400/JDC.2015.13.10.343
  9. 강동호 외 6명, "스마트폰 보안 위협 및 대응 기술," ETRI, Vol. 25, No. 3, 2010. 6.

Cited by

  1. 사용자 단말 태깅 기반 승하선 관리시스템의 설계 및 구현 vol.16, pp.3, 2020, https://doi.org/10.17662/ksdim.2020.16.3.001