Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0092 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2008-12-19 ÃÑÆäÀÌÁö 20
ÇѱÛÇ¥Áظí USN¿¡¼­ÀÇ ¼¾¼­ ³ëµå °£ ÀÎÁõ ¹× Å° ºÐ¹è ÇÁ·ÎÅäÄÝ
¿µ¹®Ç¥Áظí USN Sensor Node Authentication and Key Distribution Protocol
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº USN ½Ã½ºÅÛ¿¡ »ç¿ëµÇ´Â ¼¾¼­ ³ëµå °£ »óÈ£ ÀÎÁõ ¹× Å° ºÐ¹è¸¦ ÅëÇÏ¿© º¸¾È ¼¼¼ÇÀ» ¼ö¸³ÇÏ´Â ÇÁ·ÎÅäÄÝÀ» Á¤ÀÇÇÏ´Â °ÍÀ¸·Î, ÇÑ ³ëµå°¡ ÀÌ¿ôÇÑ ³ëµå¸¦ ÀÎÁöÇÏ°í º¸¾È Åë½Å Á¢¼ÓÀ» À§ÇÑ °úÁ¤À» ½ÃÀÛÇϸé, °ø°³Å°¸¦ »ç¿ëÇÑ ¹æ½Ä, »çÀü ´ëĪŰ ÁöÁ¤ ¹æ½Ä µîÀÇ ´Ù¾çÇÑ ¹æ¹ýÀ¸·Î µÎ ³ëµå°¡ °øÀ¯ÇÏ´Â ¸¶½ºÅÍÅ°¸¦ »ý¼ºÇÑ ÈÄ, ¸¶½ºÅÍÅ°·ÎºÎÅÍ Åë½Å µ¥ÀÌÅÍ ¾Ïȣȭ¿¡ »ç¿ëµÉ ¼¼¼ÇÅ°¸¦ »ý¼ºÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à To protect the security of USN communications, each node should authenticate neighbor nodes and generate keys to encrypt the communication. And also, the various characteristics of USN applications and devices require selective choice of the functions of security protocols to satisfy the requirements.
When a node recognizes a neighbor node and starts the security protocol, it generates the master key from various methods such as public-key based or pre-assigned methods. And then, they generate the session key from the master key. They encrypt the data communication with the session key.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0092.pdf

ÀÌÀü
½º¸¶Æ®Ä«µå ±â¹ÝÀÇ ÁöÁ¤¸Æ ÀÎÁõ ¹æ¹ý·Ð
´ÙÀ½
CAS¿Í DRM °£ÀÇ »óÈ£¿¬µ¿À» À§ÇÑ ÀÎÅÍÆäÀ̽º