DOI QR코드

DOI QR Code

Biometric Information and OTP based on Authentication Mechanism using Blockchain

블록체인을 이용한 생체정보와 OTP 기반의 안전한 인증 기법

  • Mun, Hyung-Jin (Department of Information & Communication Engineering, Sungkyul University)
  • 문형진 (성결대학교 정보통신공학부)
  • Received : 2018.05.30
  • Accepted : 2018.06.20
  • Published : 2018.06.30

Abstract

Blockchain technology provides distributed trust structure; with this, we can implement a system that cannot be forged and make Smart Contract possible. With blockchain technology emerging as next generation security technology, there have been studies on authentication and security services that ensure integrity. Although Internet-based services have been going with user authentication with password, the information can be stolen through a client and a network and the server is exposed to hacking. For the reason, we suggest blockchain technology and OTP based authentication mechanism to ensure integrity. In particular, the Two-Factor Authentication is able to ensure secure authentication by combining OTP authentication and biometric authentication without using password. As the suggested authentication applies multiple hash functions and generates transactions to be placed in blocks in order for biometric information not to be identified, it is protected from server attacks by being separate from the server.

블록체인 기술은 분산된 신뢰구조를 제공하고, 위변조가 불가능한 시스템 구현이 가능하고, Smart Contract 등 이 가능하면서 인터넷 차세대 보안 기술로 발전하고 있다. 블록체인 기술이 차세대 보안기술로 부각되면서 무결성 뿐만 아니라 인증을 비롯하여 다양한 보안 서비스에 대한 연구가 진행되고 있다. 인터넷 기반의 다양한 서비스는 패스워드 기반의 사용자 인증으로 이루어지고 있지만 클라이언트나 네트워크에서 가로채기가 가능하고, 패스워드 정보가 저장된 서버가 해킹의 위험에 노출되어 있다. 따라서 무결성을 보장할 수 있는 블록체인 기반 기술과 OTP 기반의 안전한 인증 기법을 제안한다. 특히, 이중 인증(Two-Factor Authentication) 은 OTP 기반의 인증과 사용자가 가지고 있는 생체인증의 결합으로 패스워드 없이 안전한 인증이 가능하다. 제안기법은 인증에 필요한 생체정보를 식별할 수 없도록 다중 해시함수를 적용하여 트랜잭션을 생성하여 블록에 담기 때문에 서버로부터 분리되어 서버 공격에 안전하다.

Keywords

References

  1. J. H. Yang. (2018). A Study on the Effect of Block Chain Application and Legal Issue in Logistics Industry. Journal of Convergence for Information Technology, 8(1), 187-199. DOI : 10.22156/CS4SMB.2018.8.1.187
  2. D. Y. Lee, J. W. Park, J. H. Lee, S. R. Lee & S. Y. Park. (2017). Blockchain Core Technology and Domestic and Foreign Trends. Communications of the Korean Institute of Information Scientists and Engineers, 35(6), 22-28.
  3. H. J. Mun & S. Oh. (2016). Injecting subject policy into access control for strengthening the protection of personal information. Wireless Personal Communications, 89(3), 715-728. DOI : 10.1007/s11277-015-3094-7
  4. H. J. Mun, S. H. Hong & J. P. Shin. (2017). A novel secure and efficient hash function with extra padding against rainbow table attacks. Cluster Computing, 1-13. DOI : 10.1007/s10586-017-0886-4
  5. S. H. Hong & S. H. Park. (2017). The Research on Blockchain-based Secure IoT Authentication. Journal of the Korea Convergence Society, 8(11), 57-62. DOI : 10.15207/JKCS.2017.8.11.057
  6. H. J. Mun & K. Y. Jin, (2017) Empowering Information Subject to Control Information Use to Protect Personal Information, Indian Journal of Forensic Medicine & Toxicology. 11(2), 530-534. DOI : 10.5958/0973-9130.2017.00181.5
  7. W. Stallings (1988). Cryptography and Network Security. UK : Pearson Education
  8. C. T. Li, C. Y. Weng & C. Fan. (2012). Two-Factor User Authentication in Multi-Server Networks. International Journal of Security and Its Applications, 6(2), 261-268.
  9. Namu. (2018). OTP. Namu. https://namu.wiki/w/OTP
  10. Y. S. Jeong, S. H. Han & S. S. Shin. (2012). A Study on Mobile OTP Generation Model. Journal of Digital Convergence, 10(2), 183-191. https://doi.org/10.14400/JDPM.2012.10.2.183
  11. W. J. Jang & H. W. Lee. (2010). Biometric One-Time Password Generation Mechanism and its Application on SIP Authentication. Journal of the Korea Convergence Society, 1(1), 93-100.
  12. K. H. Lee. (2013). A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices. Journal of Digital Convergence, 11(11), 795-801. DOI : 10.14400/jdpm.2013.11.11.795
  13. S. H. Yun. (2017). The Biometric Authentication Scheme Capable of Multilevel Security Control. Journal of the Korea Convergence Society, 8(2), 9-14. DOI : 10.15207/JKCS.2017.8.2.009