208 0

Full metadata record

DC FieldValueLanguage
dc.contributor.author서승현-
dc.date.accessioned2019-11-19T05:22:22Z-
dc.date.available2019-11-19T05:22:22Z-
dc.date.issued2019-02-
dc.identifier.citationIEEE INTERNET OF THINGS JOURNAL, v. 6, No. 1, Page. 335-348en_US
dc.identifier.issn2327-4662-
dc.identifier.urihttps://ieeexplore.ieee.org/document/8360476-
dc.identifier.urihttps://repository.hanyang.ac.kr/handle/20.500.11754/112266-
dc.description.abstractTo create an environment for IoT devices, securely, it is necessary to establish a cryptographic key for those devices. Conventionally, this key has been stored on the actual device, but this leaves the key vulnerable to physical attacks in the IoT environment. To solve this problem, several research studies have been conducted on how best to conceal the cryptographic key. Recently, these studies have most often focused on generating the key dynamically from noisy data using a fuzzy extractor or providing secure storage using a fuzzy commitment. Thus, far, all of these studies use only one type of noisy source data, such as biometric data or physical unclonable function (PUF). However, since most IoT devices are operated in unmanned environments, where biometric data is unavailable, the method using biometric data cannot be utilized for unmanned IoT devices. Although the method using PUF is applied to these unmanned devices, these are still vulnerable against physical attacks including unintended move or theft. In this paper, we present a novel way to use the fuzzy commitment on such devices, called two-factor fuzzy commitment scheme. The proposed method utilizes two noisy factors from the inside and outside of the IoT device. Therefore, although an attacker acquiring the IoT device can access the internal noisy source, the attacker cannot extract the right key from that information only. We also give a prototype implementation for ensuring the feasibility of our two-factor fuzzy commitment concept by utilizing the image data and PUF data for two noisy factors.en_US
dc.description.sponsorshipThis work was supported in part by the Institute for Information and Communications Technology Promotion through the Study on Secure Key Hiding Technology for IoT Devices (KeyHAS Project) under Grant 2016-0-00399 and in part by the National Research Foundation of Korea through the Korea Government under Grant 2018R1A2B6006903.en_US
dc.language.isoen_USen_US
dc.publisherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCen_US
dc.subjectError correcting codesen_US
dc.subjectfuzzy commitmenten_US
dc.subjectnoisy source dataen_US
dc.subjectphysical unclonable function (PUF)en_US
dc.titleTwo-Factor Fuzzy Commitment for Unmanned IoT Devices Securityen_US
dc.typeArticleen_US
dc.relation.no1-
dc.relation.volume6-
dc.identifier.doi10.1109/JIOT.2018.2837751-
dc.relation.page335-348-
dc.relation.journalIEEE INTERNET OF THINGS JOURNAL-
dc.contributor.googleauthorChoi, D.-
dc.contributor.googleauthorSeo, S.-
dc.contributor.googleauthorOh, Y.-
dc.contributor.googleauthorKang, Y.-
dc.relation.code2019041743-
dc.sector.campusE-
dc.sector.daehakCOLLEGE OF ENGINEERING SCIENCES[E]-
dc.sector.departmentDIVISION OF ELECTRICAL ENGINEERING-
dc.identifier.pidseosh77-
Appears in Collections:
COLLEGE OF ENGINEERING SCIENCES[E](공학대학) > ELECTRICAL ENGINEERING(전자공학부) > Articles
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

BROWSE