ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0373 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2021-12-08 ÃÑ ÆäÀÌÁö 24
ÇÑ±Û Ç¥ÁØ¸í »ç¹°ÀÎÅͳÝÀ» À§ÇÑ Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ
¿µ¹® Ç¥Áظí Cross-Layer Authentication Protocol for the Internet of Things
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØÀº Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ ¸ðµ¨À» Á¦½ÃÇÑ´Ù. º» Ç¥ÁØÀÇ Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ ¸ðµ¨¿¡¼­, ¾ÏÈ£ÇÐ ±â¹Ý ÀÎÁõ ±â¼úÀº ¹°¸®°èÃþ ÀÎÁõ(physical layer authentication, PLA)ÀÇ Åë°èÀû °¡¼³ °ËÁõÀÇ °á°ú¿¡ µû¶ó ¼±ÅÃÀûÀ¸·Î ¼öÇàµÈ´Ù. À̸¦ À§ÇÏ¿©, ¹°¸®°èÃþ ÀÎÁõ´Ü°è¿¡¼­´Â ¹Ì°ËÃâ ¹× ¿À°æº¸ È®·üÀ» ¼³Á¤ÇÏ¿© Åë°èÀû °¡¼³ °ËÁ¤À» ¼öÇàÇÒ ¼ö ÀÖ´Ù. ºÎ¼Ó¼­¿¡´Â LTE IoT ȯ°æÀ» ´ë»óÀ¸·Î º» Ç¥ÁØÀÇ Àû¿ë ¿¹½Ã¸¦ ¼³¸íÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard presents a model of a cross-layer authentication protocol. In the cross-layer authentication protocol, cryptography based authentication is selectively conducted by the results of statistical measures employed in the physical layer authentication (PLA). To this end, target miss detection and false alarm probabilities are considered in the PLA process. The appendix explains an example of when the standard is applied to a LTE cellular IoT system.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0373.pdf TTAK.KO-12.0373.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
»ç¹°ÀÎÅͳÝÀ» À§ÇÑ Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ TTAK.KO-12.0373 2021-12-08 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0373.pdf