All Issue

2020 Vol.8, Issue 3 Preview Page

Research Article

30 September 2020. pp. 37-44
Abstract
빅 데이터 환경에서 IoT 장치들은 다양한 분야에서 사용되고 있으며 IoT 장치에서 수집되는 정보 또한 다양하게 활용되고 있다. 그러나, IoT 정보는 사용하는 분야에 따라 유·무선 상에 발생하는 보안 문제를 해결해야 한다. 본 논문은 IoT 정보를 256 비트내 크기로 벡터화하여 크로마 키를 이용한 IoT 정보 인증 기법을 제안한다. 제안 기법에서는 크로마 키를 동기화된 IoT장치에서 송·수신되는 임의의 정보에 대한 안전성을 보장받도록 하였다. 제안기법에서 사용되는 크로마 키는 IoT 정보의 우선 순위에 따라 기존 암·복호 및 속성 정보와도 연계 사용이 가능하다. 또한, 제안 기법은 송·수신되는 IoT 정보의 안전성을 보장받도록 3차원 공간의 임의의 벡터 g를 근사화하였고, 블라인드 인식자 BIDi를 통해 IoT 장치들을 파악하였다.
In the big data environment, IoT devices are used in various fields, and information collected from IoT devices is also used in various ways. However, IoT information should solve security problems that occur on both wired and wireless depending on the area of use. In this paper, the IoT information authentication technique using chroma key is proposed by vectoring the IoT information to size within 256 bits. In the proposed technique, chroma keys are used as a way to ensure the safety of arbitrary information sent and received from synchronized IoT devices. Chroma keys, which are used in the proposed technique, can be used in conjunction with existing cancer, protection, and property information according to the priority of IoT information. In addition, the proposed technique approximates arbitrary vectors g in three-dimensional space to ensure the safety of IoT information sent and received, and then identifies IoT devices through blind identifiers BIDi.
References
  1. Y. S. Jeong and S. H. Lee “A User Privacy Protection Scheme based on Password through User Information Vir tuality in Cloud Computing”, Journal of IT Convergence Society for SMB, Vol. 1, No. 1, pp. 29-37, Nov. 2011.
  2. S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy and N. Memon “PassPoints: Desing and logigudinal evaluation of a graphical password system”, International Journal of Human-Computer Studies Vol. 63, No. 1, pp. 102-127, 2005.10.1016/j.ijhcs.2005.04.010
  3. J. E. Lee and S. G. NAh “An Emprircal Study of Usr Perrceptions on EMR Standardization Leading Medical & IT Convergence”, Journal of Digital Convergence, Vol. 13, No. 5, pp. 111-118, 2015.10.14400/JDC.2015.13.5.111
  4. A. T. Barth, M. a. Hanson, H. C. Powell, and J. Lach “TEMPO 3.1: A body area sensor network platform for continuous movement assessment", Proc. - 2009 6th Int. Work. Wearable Implant. Body Sens. Networks, BSN 2009, pp. 71-76, June. 2009.10.1109/BSN.2009.39
  5. S. Leonardo and J. C. Birget “Graphical passwords”, The Rutgers Scholar, an electronic Bulletin for undergraduate research 4, 2002.
  6. S. Balaji “Authentication techniques for engendering session passwords with colors and text”, Advances in Computer Science and its Applications 1.3, pp. 189-195, 2012.
  7. M. Sreelatha, M. Shashi, M. Anirudh, MD S. Ahamer and V. M. Kumar “Authentication schemes for session passwords using color and images”, International Journal of Netow가 Security & Its Applications 3.3, pp. 111-119, 2011.10.5121/ijnsa.2011.3308
  8. C. Wanpeng and B. Wei “Adaptive and dynamic mobile phone data encryption method”, Chian Communications, Vol. 11, Issue. 1, pp. 103-109, Jan. 2014..10.1109/CC.2014.6821312
  9. C. Wanpeng and B. Wei “Adaptive and dynamic mobile phone data encryption method”, Chian Communications, Vol. 11, Issue. 1, pp. 103-109, Jan. 2014..10.1109/CC.2014.6821312
  10. R. Madhusudhan, M. Hegde “Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card”, 2016 International conference on Computer and Communication Engineering (ICCCE), pp. 84-89, 2016.10.1109/ICCCE.2016.30
  11. C. Chen, Y. Wang, H. Yu, x. H. Qiang “The RFID mutual authentication scheme based on ECC and OTP authentication”, 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1-4, 2016.10.1109/ICUWB.2016.7790568
  12. G. Yu, Y. Shen, G. Zhang, Y. Yang “A Chaos-based Color Image Encryption Algorithm”, 2013 Sixth International Symposium on Computational Intelligence and Design, pp. 92-95, 2013.
  13. S. Som, A. Kotal, A. Chatterjee, S. Dey, S. Palit “A colour image encryption based on DNA coding and chaotic sequences”, 2013 1st International Conference on Emerging Trends and Applications in Computer Science, pp. 108-114, 2013.10.1109/ICETACS.2013.6691405
Information
  • Publisher :The Society of Convergence Knowledge
  • Publisher(Ko) :융복합지식학회
  • Journal Title :The Society of Convergence Knowledge Transactions
  • Journal Title(Ko) :융복합지식학회논문지
  • Volume : 8
  • No :3
  • Pages :37-44