Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0373 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2021-12-08 | ÃÑÆäÀÌÁö | 24 |
ÇѱÛÇ¥Áظí | »ç¹°ÀÎÅͳÝÀ» À§ÇÑ Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ | ||
¿µ¹®Ç¥Áظí | Cross-Layer Authentication Protocol for the Internet of Things | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ ¸ðµ¨À» Á¦½ÃÇÑ´Ù. º» Ç¥ÁØÀÇ Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ ¸ðµ¨¿¡¼, ¾ÏÈ£ÇÐ ±â¹Ý ÀÎÁõ ±â¼úÀº ¹°¸®°èÃþ ÀÎÁõ(physical layer authentication, PLA)ÀÇ Åë°èÀû °¡¼³ °ËÁõÀÇ °á°ú¿¡ µû¶ó ¼±ÅÃÀûÀ¸·Î ¼öÇàµÈ´Ù. À̸¦ À§ÇÏ¿©, ¹°¸®°èÃþ ÀÎÁõ´Ü°è¿¡¼´Â ¹Ì°ËÃâ ¹× ¿À°æº¸ È®·üÀ» ¼³Á¤ÇÏ¿© Åë°èÀû °¡¼³ °ËÁ¤À» ¼öÇàÇÒ ¼ö ÀÖ´Ù. ºÎ¼Ó¼¿¡´Â LTE IoT ȯ°æÀ» ´ë»óÀ¸·Î º» Ç¥ÁØÀÇ Àû¿ë ¿¹½Ã¸¦ ¼³¸íÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard presents a model of a cross-layer authentication protocol. In the cross-layer authentication protocol, cryptography based authentication is selectively conducted by the results of statistical measures employed in the physical layer authentication (PLA). To this end, target miss detection and false alarm probabilities are considered in the PLA process. The appendix explains an example of when the standard is applied to a LTE cellular IoT system. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0373.pdf |