DOI QR코드

DOI QR Code

USN Secure Communication Design Using Chaotic System Feedback Synchronization

혼돈계의 피드백 동기화를 이용한 USN 보안통신 설계

  • Yim, Geo-Su (Dept. Electrical Engineering, Paichai University)
  • 임거수 (배재대학교 전기공학과)
  • Received : 2018.10.01
  • Accepted : 2018.10.15
  • Published : 2018.10.31

Abstract

Ubiquitous services for the convenience and safety of human beings along with the development of society are being realized through RFID technology and sensor network, and its application range of fields is also broaden. However, since the USN contains all the information of individuals and things, all of its private spaces can be attacked by external attacks; so, that the problem of security continues to arise. We designed a one-way chaotic feedback synchronization method as a secure communication method to fit the USN composed of one sync node and n number of sensor nodes. We designed the method by which the sensor node is synchronized in one direction of the sync node. This method solves the problem that all sensor nodes need to be resynchronized when the sync node is changed, which is shown in bidirectional synchronization. This is a security method that can be effectively applied to 1:n communication such as USN.

사회의 발전과 더불어 인간의 편리성과 안전성을 도모하기 위한 유비쿼터스 서비스는 RFID 기술과 센서 네트워크를 통해 현실화되고 있고 그 적용 분야 또한 광범위하다고 할 수 있다. 그러나 USN에는 개인의 모든 정보 및 사물에 대한 정보가 담겨 있으므로 외부의 공격에 개인의 모든 사적인 공간이 공격 대상이 될 수 있어 보안에 대한 문제가 계속 대두되고 있다. 우리는 1개의 싱크노드와 n개의 센서 노드로 구성된 USN에 적합한 보안 통신 방법으로 혼돈계의 단방향 피드백 동기화 방법을 설계하였다. 우리가 설계한 방법은 센서 노드가 싱크노드에 단방향으로 동기화되는 방법으로 양방향 동기화에서 보이는 싱크노드가 변경되었을 때 모든 센서 노드가 재 동기화되어야 하는 문제점을 해결한 방법으로 USN과 같이 1:n 통신에 효과적으로 적용될 수 있는 보안 방법이라고 할 수 있다.

Keywords

References

  1. K. Kim, K. Ban, N. Ryu, M. Jang, and E. Kim, "Design of RFID/USN Middleware for Poly-Context Process," J. of the Korea Institute of Electronic Communication Sciences, vol. 4, no. 2, June 2009, pp. 101-107.
  2. N. Ryu, K. Ban, S. Song, and E. Kim, "Design and Implementation of 3D Visualization Information System with RFID Tag Data," J. of the Korea Institute of Electronic Communication Sciences, vol. 2, no. 4, Dec. 2007, pp. 223-228.
  3. K. Kim, K. Ban, S. Heo, and E. Kim, "Design and Implementation of System for Sensing Data Collection in RFID/USN," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 2, Mar. 2010, pp. 221-226.
  4. J. Suk, K. Sun, and I. Ryoo, "An Enhanced System Security Structure for USN Environment," J. of Knowledge Information Technology and Systems, vol. 11, no. 5, Oct. 2016, pp. 489-497.
  5. J. Oh, H. Kim, and J. Choi, "Vulnerability analysis and Design of RFID Security Protocols," J. of Korea Information Science Society, vol. 33, no. 2(C), Oct. 2006, pp. 497-502.
  6. S. Kim, S. Park, J. Ku, and N. Kim, "A Trend Analysis of RFID/USN Industry," Electronics and telecommunications trends, vol. 20, no. 3, June 2005, pp. 43-55.
  7. S. Hong and C. Lin, "A Multi-Protocol Gateway Middleware Design on Ubiquitous Sensor Networks," The J. of the korean Institute of communication and information sciences, vol. 38, no. 11, Nov. 2013, pp. 895-901.
  8. H. Schuster, Deterministic Chaos: an Introduction: 2nd edition. Weinheim: WILEY-VCH, 2005.
  9. A. Nayfeh, Applied Nonlinear Dynamics. New York: A Wiley-Interscience Publication, 1995.
  10. E. Ott, Chaos in Dynamical Systems second edition. Maryland: Cambridge University Press, 2002.
  11. G. Yim and H. Kim, "Chaos-based Image Encryption Scheme using Noise-included Synchronization," J. of the Korea Society of Computer and Information, vol. 13, no. 5, Sep. 2008, pp. 155-162.
  12. G. Yim, "Design and Implementation of Image Encryption Method for Multi-Parameter Chaotic System," J. of Korea Information Assurance Society, vol. 8, no. 3, Sept. 2008, pp. 57-64.
  13. H. Kim and G. Yim, "Design of digital photo frame for close-range security using the chaotic signals synchronization,"J. of the Korea Society of Computer and Information, vol. 16, no. 2, Feb. 2011, pp. 201-206. https://doi.org/10.9708/jksci.2011.16.2.201
  14. G. Yim, "Design of USN Communication Protocol Using Individual Chaotic Systems," J. of Korea Information Electron Communication Technology, vol. 8, no. 6, Dec. 2015, pp. 528-533.