ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ [ÆóÁö] TTAK.KO-12.0092 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2008-12-19 ÃÑ ÆäÀÌÁö 20
ÇÑ±Û Ç¥Áظí USN¿¡¼­ÀÇ ¼¾¼­ ³ëµå °£ ÀÎÁõ ¹× Å° ºÐ¹è ÇÁ·ÎÅäÄÝ
¿µ¹® Ç¥Áظí USN Sensor Node Authentication and Key Distribution Protocol
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº USN ½Ã½ºÅÛ¿¡ »ç¿ëµÇ´Â ¼¾¼­ ³ëµå °£ »óÈ£ ÀÎÁõ ¹× Å° ºÐ¹è¸¦ ÅëÇÏ¿© º¸¾È ¼¼¼ÇÀ» ¼ö¸³ÇÏ´Â ÇÁ·ÎÅäÄÝÀ» Á¤ÀÇÇÏ´Â °ÍÀ¸·Î, ÇÑ ³ëµå°¡ ÀÌ¿ôÇÑ ³ëµå¸¦ ÀÎÁöÇÏ°í º¸¾È Åë½Å Á¢¼ÓÀ» À§ÇÑ °úÁ¤À» ½ÃÀÛÇϸé, °ø°³Å°¸¦ »ç¿ëÇÑ ¹æ½Ä, »çÀü ´ëĪŰ ÁöÁ¤ ¹æ½Ä µîÀÇ ´Ù¾çÇÑ ¹æ¹ýÀ¸·Î µÎ ³ëµå°¡ °øÀ¯ÇÏ´Â ¸¶½ºÅÍÅ°¸¦ »ý¼ºÇÑ ÈÄ, ¸¶½ºÅÍÅ°·ÎºÎÅÍ Åë½Å µ¥ÀÌÅÍ ¾Ïȣȭ¿¡ »ç¿ëµÉ ¼¼¼ÇÅ°¸¦ »ý¼ºÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à To protect the security of USN communications, each node should authenticate neighbor nodes and generate keys to encrypt the communication. And also, the various characteristics of USN applications and devices require selective choice of the functions of security protocols to satisfy the requirements.
When a node recognizes a neighbor node and starts the security protocol, it generates the master key from various methods such as public-key based or pre-assigned methods. And then, they generate the session key from the master key. They encrypt the data communication with the session key.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
ÆóÁöÀÏ 2021-12-08
ÆóÁö»çÀ¯ »ê¾÷ ÇöÀå¿¡¼­ È°¿ëµÇÁö ¾Ê¾Æ¼­ ÆóÁö
°ü·ÃÆÄÀÏ  TTAK.KO-12.0092.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
USN¿¡¼­ÀÇ ¼¾¼­ ³ëµå °£ ÀÎÁõ ¹× Å° ºÐ¹è ÇÁ·ÎÅäÄÝ TTAK.KO-12.0092 2008-12-19 Á¦Á¤ ÆóÁö ¾øÀ½
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2017-06-09 °³Á¤ ÂüÁ¶ ±¹¿Ü Ç¥ÁصéÀÇ °³Á¤¿¡ µû¸¥ ÇöÇàÈ­ ÇÊ¿ä