DOI QR코드

DOI QR Code

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments

스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계

  • 박중오 (성결대학교 파이데이아학부)
  • Received : 2024.01.15
  • Accepted : 2024.04.20
  • Published : 2024.04.28

Abstract

Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

스마트 팩토리는 최신 정보통신기술과 제조공정이 결합된 생산시설로, 급속한 발전과 글로벌 제조업의 변화를 반영하고 있다. 로보틱스 및 자동화, 사물인터넷의 통합, 인공지능 융합기술을 활용하여 다양한 제조환경의 생산 효율성을 극대하고 있다. 하지만 스마트 팩토리 환경에서 다양한 공격기법으로 인해 보안위협 및 취약점이 발생하고 있다. 스마트 팩토리 환경에서 보안위협이 발생하면 금전적인 손해, 기업이미지하락, 인명피해가 발생하여 이에 따른 보안대응이 필요하다. 따라서 본 논문에서는 스마트 팩토리 환경에서 안전한 통신을 수행하기 위한 보안 인증 메커니즘을 제안하였다. 제안한 인증 메커니즘에 대한 구성요소에서는 스마트 디바이스, 내부 운영관리 시스템, 인증 시스템, 클라우드 스토리지 서버가 있다. 스마트 기기 등록과정, 인증 절차. 이상징후 및 갱신절차를 세부적으로 설계히였다. 그리고 제안한 인증 메커니즘의 안전성을 분석하였고, 기존 인증 메커니즘과의 성능분석을 통해 대략 8%의 효율성을 확인하였다. 그리고 제안한 기술을 적용하기 위한 경량화 프로토콜 및 보안정잭에 대한 연구방향을 제시하여 보안성 향상에 도움을 주고자 한다.

Keywords

References

  1. J. H. Han. (2016). Security Requirements for a Smart Home Service, TTAK.KO-10.0963. TTA.
  2. D. H. Kim & J. Kwak. (2015). Design of Improved Authentication Protocol for Sensor Networks in IoT Environment. Journal of the Korea Institute of Information Security & Cryptology, 25(2), 467-478,
  3. V. Sivaraman et al. (2015, October). Network-level security and privacy control for smart-home IoT devices. In 2015 IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob) (pp. 163-167). IEEE. DOI : 10.1109/WiMOB.2015.7347956
  4. B. Jin, D.Jung, S. Cha & M. Jun. (2016). Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments. Journal of the Korea Society of Digital Industry and Information Management, 12(1), 35-41. DOI : 10.17662/ksdim.2016.12.1.035
  5. N. Komninos, E. Philippou & A. Pitsillides. (2014). Survey in smart grid and smart home security: Issues, challenges and countermeasures. IEEE Communications Surveys & Tutorials, 16(4), 1933-1954. DOI : 10.1109/COMST.2014.2320093
  6. C. C. Wu, W. B. Lee & W. J. Tsaur. (2008). A secure authentication scheme with anonymity for wireless communications. IEEE Communications Letters, 12(10), 722-723. DOI : 10.1109/LCOMM.2008.080283
  7. Z. N. Rashid, S. R. Zeebaree & A. Shengul, (2019). Design and analysis of proposed remote controlling distributed parallel computing system over the cloud. In 2019 International Conference on Advanced Science and Engineering (ICOASE) (pp. 118-123). IEEE.
  8. S, J. Oh. (2015). A Study on Organizations Adopting Convergence-based Smart Work for Overcoming Constraints and Achieving Performance. Journal of Digital Convergence, 13(6), 113-124. DOI : 10.14400/JDC.2015.13.6.113
  9. Y. J, Park. (2015). Development of a ICT Convergence Business Model based on Smart Phone. Journal of Digital Convergence, 13(6), 81-89. DOI : 10.14400/JDC.2015.13.6.81
  10. Y. S. Jung. (2019). An IoT Information Security Model for Securing Bigdata Information for IoT Users. Journal of Convergence for Information Technology, 9(11), 8-14. DOI : 10.22156/CS4SMB.2019.9.11.008
  11. D. J. Choi. (2019. 9. 18). Next Generation IoT Security in the 5G Era. ITFIND, pp1-15.
  12. I. K. Park & J. Kwak. (2018). Permission Management System for Secure IoT Devices in Android-Based IoT Environment. KIPS Transactions on Computer and Communication Systems, 7(2), 59-66. DOI : 10.3745/KTCCS.2018.7.2.59
  13. NIST, "Framework for Improving Critical Infrastruct ure Cybersecurity Version 1.1," 2018. 4
  14. Homeland Security, "Recommended Practice: Improving Industrial Control System Cyber-security with Defense-in-Depth Strategies," 2016. 9.
  15. NIST, "NIST SPECIAL PUBLICATION 800-82 REVISION 2- GUIDE TO INDUSTRIAL CONTROL SYSTEMS(ICS) SECURITY," 2015. 5.