Visible to the public Secure IoT Device Authentication Scheme using Key Hiding Technology

TitleSecure IoT Device Authentication Scheme using Key Hiding Technology
Publication TypeConference Paper
Year of Publication2020
AuthorsKim, Byoungkoo, Yoon, Seoungyong, Kang, Yousung, Choi, Dooho
Conference Name2020 International Conference on Information and Communication Technology Convergence (ICTC)
Date PublishedOct. 2020
PublisherIEEE
ISBN Number978-1-7281-6758-9
Keywordsauthentication, composability, device authentication, Hardware, Human Behavior, information and communication technology, IoT device, IoT security, Market research, Metrics, pubcrawl, PUF, resilience, Resiliency, security, Software, software reliability, WBC
AbstractAs the amount of information distributed and processed through IoT(Internet of Things) devices is absolutely increased, various security issues are also emerging. Above all, since IoT technology is directly applied to our real life, there is a growing concern that the dangers of the existing cyberspace can be expanded into the real world. In particular, leaks of keys necessary for authentication and data protection of IoT devices are causing economic and industrial losses through illegal copying and data leakage. Therefore, this paper introduces the research trend of hardware and software based key hiding technology to respond to these security threats, and proposes IoT device authentication techniques using them. The proposed method fundamentally prevents the threat of exposure of the authentication key due to various security vulnerabilities by properly integrating hardware and software based key hiding technologies. That is, this paper provides a more reliable IoT device authentication scheme by using key hiding technology for authentication key management.
URLhttps://ieeexplore.ieee.org/document/9289309
DOI10.1109/ICTC49870.2020.9289309
Citation Keykim_secure_2020