Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0373 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2021-12-08 ÃÑÆäÀÌÁö 24
ÇѱÛÇ¥ÁØ¸í »ç¹°ÀÎÅͳÝÀ» À§ÇÑ Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ
¿µ¹®Ç¥Áظí Cross-Layer Authentication Protocol for the Internet of Things
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØÀº Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ ¸ðµ¨À» Á¦½ÃÇÑ´Ù. º» Ç¥ÁØÀÇ Å©·Î½º ·¹À̾î ÀÎÁõ ÇÁ·ÎÅäÄÝ ¸ðµ¨¿¡¼­, ¾ÏÈ£ÇÐ ±â¹Ý ÀÎÁõ ±â¼úÀº ¹°¸®°èÃþ ÀÎÁõ(physical layer authentication, PLA)ÀÇ Åë°èÀû °¡¼³ °ËÁõÀÇ °á°ú¿¡ µû¶ó ¼±ÅÃÀûÀ¸·Î ¼öÇàµÈ´Ù. À̸¦ À§ÇÏ¿©, ¹°¸®°èÃþ ÀÎÁõ´Ü°è¿¡¼­´Â ¹Ì°ËÃâ ¹× ¿À°æº¸ È®·üÀ» ¼³Á¤ÇÏ¿© Åë°èÀû °¡¼³ °ËÁ¤À» ¼öÇàÇÒ ¼ö ÀÖ´Ù. ºÎ¼Ó¼­¿¡´Â LTE IoT ȯ°æÀ» ´ë»óÀ¸·Î º» Ç¥ÁØÀÇ Àû¿ë ¿¹½Ã¸¦ ¼³¸íÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard presents a model of a cross-layer authentication protocol. In the cross-layer authentication protocol, cryptography based authentication is selectively conducted by the results of statistical measures employed in the physical layer authentication (PLA). To this end, target miss detection and false alarm probabilities are considered in the PLA process. The appendix explains an example of when the standard is applied to a LTE cellular IoT system.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0373.pdf TTAK.KO-12.0373.pdf            

ÀÌÀü
ECIF ÇÁ·¹ÀÓ¿öÅ©¿Í Ÿ ÇÁ·¹ÀÓ¿öÅ©°£ ÀÎÅÍÆäÀ̽º Á¤ÀǼ­
´ÙÀ½
¹«¼± ÀüÀÚ¼­¸í ÀÎÁõ¼­ È¿·ÂÁ¤Áö ¹× ÆóÁö ¸ñ·Ï ÇÁ·ÎÆÄÀÏ Ç¥ÁØ