Title | Secure IoT Device Authentication Scheme using Key Hiding Technology |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Kim, Byoungkoo, Yoon, Seoungyong, Kang, Yousung, Choi, Dooho |
Conference Name | 2020 International Conference on Information and Communication Technology Convergence (ICTC) |
Date Published | Oct. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6758-9 |
Keywords | authentication, composability, device authentication, Hardware, Human Behavior, information and communication technology, IoT device, IoT security, Market research, Metrics, pubcrawl, PUF, resilience, Resiliency, security, Software, software reliability, WBC |
Abstract | As the amount of information distributed and processed through IoT(Internet of Things) devices is absolutely increased, various security issues are also emerging. Above all, since IoT technology is directly applied to our real life, there is a growing concern that the dangers of the existing cyberspace can be expanded into the real world. In particular, leaks of keys necessary for authentication and data protection of IoT devices are causing economic and industrial losses through illegal copying and data leakage. Therefore, this paper introduces the research trend of hardware and software based key hiding technology to respond to these security threats, and proposes IoT device authentication techniques using them. The proposed method fundamentally prevents the threat of exposure of the authentication key due to various security vulnerabilities by properly integrating hardware and software based key hiding technologies. That is, this paper provides a more reliable IoT device authentication scheme by using key hiding technology for authentication key management. |
URL | https://ieeexplore.ieee.org/document/9289309 |
DOI | 10.1109/ICTC49870.2020.9289309 |
Citation Key | kim_secure_2020 |