Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | [ÆóÁö] TTAK.KO-12.0092 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2008-12-19 | ÃÑÆäÀÌÁö | 20 |
ÇѱÛÇ¥Áظí | USN¿¡¼ÀÇ ¼¾¼ ³ëµå °£ ÀÎÁõ ¹× Å° ºÐ¹è ÇÁ·ÎÅäÄÝ | ||
¿µ¹®Ç¥Áظí | USN Sensor Node Authentication and Key Distribution Protocol | ||
Çѱ۳»¿ë¿ä¾à | º» Ç¥ÁØÀº USN ½Ã½ºÅÛ¿¡ »ç¿ëµÇ´Â ¼¾¼ ³ëµå °£ »óÈ£ ÀÎÁõ ¹× Å° ºÐ¹è¸¦ ÅëÇÏ¿© º¸¾È ¼¼¼ÇÀ» ¼ö¸³ÇÏ´Â ÇÁ·ÎÅäÄÝÀ» Á¤ÀÇÇÏ´Â °ÍÀ¸·Î, ÇÑ ³ëµå°¡ ÀÌ¿ôÇÑ ³ëµå¸¦ ÀÎÁöÇÏ°í º¸¾È Åë½Å Á¢¼ÓÀ» À§ÇÑ °úÁ¤À» ½ÃÀÛÇϸé, °ø°³Å°¸¦ »ç¿ëÇÑ ¹æ½Ä, »çÀü ´ëĪŰ ÁöÁ¤ ¹æ½Ä µîÀÇ ´Ù¾çÇÑ ¹æ¹ýÀ¸·Î µÎ ³ëµå°¡ °øÀ¯ÇÏ´Â ¸¶½ºÅÍÅ°¸¦ »ý¼ºÇÑ ÈÄ, ¸¶½ºÅÍÅ°·ÎºÎÅÍ Åë½Å µ¥ÀÌÅÍ ¾Ïȣȿ¡ »ç¿ëµÉ ¼¼¼ÇÅ°¸¦ »ý¼ºÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | To protect the security of USN communications, each node should authenticate neighbor nodes and generate keys to encrypt the communication. And also, the various characteristics of USN applications and devices require selective choice of the functions of security protocols to satisfy the requirements.
When a node recognizes a neighbor node and starts the security protocol, it generates the master key from various methods such as public-key based or pre-assigned methods. And then, they generate the session key from the master key. They encrypt the data communication with the session key. |
||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0092.pdf |