KR20170037270A - Method for registering device and setting secret key using two factor communacation channel - Google Patents

Method for registering device and setting secret key using two factor communacation channel Download PDF

Info

Publication number
KR20170037270A
KR20170037270A KR1020150136640A KR20150136640A KR20170037270A KR 20170037270 A KR20170037270 A KR 20170037270A KR 1020150136640 A KR1020150136640 A KR 1020150136640A KR 20150136640 A KR20150136640 A KR 20150136640A KR 20170037270 A KR20170037270 A KR 20170037270A
Authority
KR
South Korea
Prior art keywords
random number
psk
management server
object device
user terminal
Prior art date
Application number
KR1020150136640A
Other languages
Korean (ko)
Other versions
KR101762013B1 (en
Inventor
강남희
김정인
반효진
Original Assignee
덕성여자대학교 산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 덕성여자대학교 산학협력단 filed Critical 덕성여자대학교 산학협력단
Priority to KR1020150136640A priority Critical patent/KR101762013B1/en
Publication of KR20170037270A publication Critical patent/KR20170037270A/en
Application granted granted Critical
Publication of KR101762013B1 publication Critical patent/KR101762013B1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0806Configuration setting for initial configuration or provisioning, e.g. plug-and-play
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method of registering and setting a secret key using a TWO FACTOR communication channel according to the present invention is a method of registering and setting a secret key using a TWO FACTOR communication channel in which an object device operating in an Internet of Things (IOT) The method comprising: transmitting a first random number to a user terminal using noncontact local area communication; generating a 1-1 encryption message by encrypting the identification value and the first random number with a security key shared by the user terminal with the management server, A PSK (Pre Shared Key) is generated by calculating a first random number acquired from the 1-1 encryption message and a second random number generated by the management server by the management server, and the PSK Generating a 1-2 enciphering message in which the second random number is encrypted and transmitting the enciphering message to the user terminal, transmitting the PSK to the object device using the non-contact short distance communication, The server transmits a second encryption message encrypted with the identification value and the first random number to the object device using the Internet socket communication, and the object device decrypts the second encrypted message with the PSK to generate the identification value and the first random number And authenticating the management server by comparing the obtained identification value and the first random number with the transmitted identification value and the first random number.

Description

METHOD FOR REGISTERING DEVICE AND SETTING SECRET KEY USING TWO FACTOR COMMUNICATION CHANNEL BACKGROUND OF THE INVENTION [0001]

More particularly, the present invention relates to a method and apparatus for registering a secret key using a TWO FACTOR communication channel.

The Internet of Things (IoT) technology is a technology that interconnects everything in life, from communication between people, people, people and objects that are mainstream in existing communications. In recent years, there has been a growing interest in Internet technology for objects that can connect and communicate with small-sized lightweight devices such as sensors and actuators directly to the Internet.

In the Internet environment, the reliability of security must be ensured because the security can be directly linked to the life of the person beyond the level of information security according to the application environment. However, it is not easy to develop appropriate security technologies because the Internet environment of objects has heterogeneous devices and heterogeneous network technologies. Therefore, it is necessary to lighten the security technology.

Communication based on PSK (Pre Shared Key) is applied to various security systems due to advantages of calculation time and resource use. In particular, the PSK method is widely used because it is considered to be suitable for the object internet environment composed of lightweight devices because a security session can be constructed at a lower cost than a method of sharing a security key based on a public key algorithm.

However, the object Internet environment to which the conventional PSK scheme is applied has the following problems.

Specifically, since a lightweight device such as a sensor or an actuator that operates in a conventional object Internet environment does not include an input device or an output device, it is not easy to directly set the PSK. Therefore, The PSK was initially set up in such a manner that the installer who installed the lightweight device or installed the PSK set the PSK and transmitted it to the management server. A system including a lightweight device and a management server has been designed assuming that the PSK is securely set.

However, many manufacturers and installers may be involved depending on the Internet environment of the objects or the application services. However, there is a problem that it is practically impossible to trust all of them.

In order to solve this problem, it is desirable for the general user to set the PSK directly when the lightweight device is first registered in the object internet environment. However, since the general user does not have expertise in security, it is easy to set the complex security function value or to set the PSK There has been a growing need for a technique for registering a lightweight device such as a object device in the object's internet environment and setting a secret key without a user's operation.

BACKGROUND ART [0002] The technology that provides the background of the present invention is disclosed in Korean Patent Laid-Open Publication No. 10-2014-0045829 (entitled " Authentication method for Internet of objects and device and authentication device therefor, published on Apr. 17, 2014).

SUMMARY OF THE INVENTION The present invention has been made to solve the above problems, and it is an object of the present invention to provide an apparatus and method for registering an object apparatus in a management server through a user terminal while minimizing a direct involvement of a user, And sets the PSK and the network information to be used for the PSK.

In addition, the present invention uses a noncontact short-distance communication method such as NFC capable of transmitting and receiving data only within a communication radius of 10 cm or less by communicating between the object device and the user terminal with limited computing resources, thereby preventing a malicious attacker from intercepting The aim is to be able to respond to attacks.

It is another object of the present invention to reduce calculation time and resource usage for performing encryption by preventing the object device corresponding to the lightweight device from performing encryption.

According to an aspect of the present invention, there is provided a method for registering and setting a secret key using a TWO FACTOR communication channel, the method comprising: Transmitting an identification value of the device and a first random number generated by the object device to the user terminal; Generating a 1-1 encryption message in which the user terminal has encrypted the identification value and the first random number with a security key shared with the management server, and transmitting the 1-1 encryption message to the management server; The management server generates a PSK (Pre Shared Key) by calculating the first random number acquired from the 1-1 encryption message and a second random number generated by the management server with a predetermined operator, and transmits the PSK Generating a second encryption message by encrypting the second random number and transmitting the second encryption message to the user terminal; Transmitting the PSK to the object device; Transmitting, by the management server, a second encryption message encrypted with the identification value and the first random number to the PSK; And the object device decrypts the second encrypted message with the PSK to obtain the identification value and the first random number, compares the obtained identification value and the first random number with the transmitted identification value and the first random number, And authenticating the management server.

A method for registering and setting a secret key using a TWO FACTOR communication channel according to another aspect of the present invention is a method for registering and setting a secret key using a TWO FACTOR communication channel in which an object device operating in an Internet of Things (IOT) Transmitting a first random number generated by the object device to the user terminal; Receiving the PSK (Pre Shared Key) from the user terminal; Receiving an encryption message encrypted with the identification value and the first random number from the management server with the PSK; And authenticating the management server by decrypting the encrypted message with the PSK to obtain the identification value and the first random number, comparing the obtained identification value and the first random number with the transmitted identification value and the first random number, .

A method for registering and setting a secret key using a TWO FACTOR communication channel according to another aspect of the present invention is a method for registering and setting a secret key of a secret key in a user terminal from an object device operating in an Internet of Things (IOT) Value and a first random number generated by the object device; Generating a 1-1 encryption message in which the user terminal encrypts the identification value and the first random number with a security key shared with the management server, and transmitting the 1-1 encryption message to the management server; Receiving from the management server a PSK (Pre-Shared Key) and a 1-2 ciphering message obtained by encrypting a second random number generated by the management server; And transmitting the PSK to the object device.

According to the present invention, when the object device is registered in the object Internet environment for the first time, the PSK is set or updated so that the object device and the management server share the highly reliable PSK, thereby improving the security performance.

In addition, an initial setting process of an object device in which the installation of an input device such as a keyboard and an output device such as a display is restricted is automatically performed by software, so that it can be set safely while minimizing burden on the user.

In addition, according to the present invention, in the process of setting the PSK, operations requiring relatively more resources such as handshaking can be performed through the user terminal and the management server, thereby improving the performance of the object Internet environment.

In addition, according to the present invention, there is no need for the object device to transmit many messages of handshaking required for establishing a secure communication, so that the power required for data transmission is reduced, so that the object device relying on the battery can efficiently use power It is effective.

FIG. 1 is a schematic view showing a configuration of a registration and secret key setting system of an object apparatus using a TWO FACTOR communication channel according to an embodiment of the present invention.
FIG. 2 is a flow chart schematically illustrating an implementation procedure of a registration and a secret key setting method of an object device using a TWO FACTOR communication channel according to an embodiment of the present invention.
FIG. 3 is a flowchart showing details of the implementation process of FIG. 2 in terms of an object device, a user terminal, and a management server.
4 is a flowchart illustrating a handshaking process between the user terminal and the management server in FIG.

It should be noted that, in the specification of the present invention, the same reference numerals as in the drawings denote the same elements, but they are numbered as much as possible even if they are shown in different drawings.

Meanwhile, the meaning of the terms described in the present specification should be understood as follows.

The word " first, "" second," and the like, used to distinguish one element from another, are to be understood to include plural representations unless the context clearly dictates otherwise. The scope of the right should not be limited by these terms.

It should be understood that the terms "comprises" or "having" does not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or combinations thereof.

It should be understood that the term "at least one" includes all possible combinations from one or more related items. For example, the meaning of "at least one of the first item, the second item and the third item" means not only the first item, the second item, or the third item, but also the first item, the second item, Means a combination of all items that can be presented from two or more of them.

Hereinafter, embodiments of the present invention will be described with reference to the accompanying drawings.

FIG. 1 is a diagram schematically showing a configuration of an initial registration and secret key setting system of a subject apparatus for providing a secure object Internet service according to an embodiment of the present invention. Referring to FIG.

1, an initial registration and secret key setting system for providing a secure object Internet service according to an embodiment of the present invention includes an object device 100, a user terminal 200, and a management server 300, .

Specifically, the network of the object Internet environment is largely divided into a low-power and lossy network (LLN) domain and an Internet (I) domain. In order to provide a secure object Internet service according to the present embodiment, The setting system comprises a object device 100 corresponding to a lightening device operating in the LLN area, a 6LowPAN gateway 10 for connecting the object device 100 to the Internet in cooperation with the LLN environment and the Internet (I) environment, And a gateway 20 and 30 for connecting the user terminal 200 and the management server 300 to the Internet, respectively.

The object apparatus 100 is a lightweight apparatus that operates in the object-internet environment, and may be a sensor, an actuator, or a small apparatus having a plurality of sensors and actuators.

In particular, the object apparatus 100 includes a first random number generation unit 110, an LLN communication module 120, and an NFC communication module 130. In an embodiment of the present invention, the LLN communication module may be a low power communication module such as IEEE 802.15.4 (Zigbee), but is not limited thereto.

The first random number generator 110 generates a first random number used for generating a PSK (Pre Shared Key) in the management server 300. In the embodiment of the present invention, the first random number may be a 128-bit random number, but is not limited thereto.

The LLN communication module 120 communicates with the management server 300 using the lightweight PSK generated through the management server 300 by accessing the Internet I through the 6 LowPAN gateway 10.

The NFC communication module 130 communicates with the NFC communication module 210 of the user terminal 200 which plays a role of an arbiter for the initial setting of the object device 100 by a noncontact local communication method such as NFC, And the first random number generated by the first random number generation unit 110 to the user terminal 200. [

Near Field Communication (NFC) is a non-contact type short distance communication method using a frequency band of 13.56 MHz or one of RFID, and provides a communication mode in which various data can be exchanged within a distance of 10 cm or less.

As described above, in the present invention, in order to solve the problem that the object device and the management server may not be secure, the secret key shared by the object device and the management server at the time of shipment or initial setting of the installer, To be set or reset.

However, since it is not possible to perform an operation of sharing a new PSK through the object device 100 having a limited resource, in the embodiment of the present invention, as the information required for PSK generation through the noncontact type short distance communication such as NFC, And a first random number.

Particularly, in the embodiment of the present invention, the object device 100 and the user terminal 200 operate in the P2P (peer to peer) mode of the NFC, so that the object device 100 and the user terminal 200 transmit and receive the respective messages .

At this time, since the user can transmit the identification value and the first random number by positioning the user terminal 200 within a predetermined distance that enables NFC communication from the object device 100, the presence or absence of a man in the middle attack The reliability of NFC communication can be assured.

The user terminal 200 is capable of communicating with the object device 100 and the management server 300 through communication with the management server 300 and can transmit information necessary for PSK setting to the object device 100 The configuration can include anything. In particular, it may include a smart phone or a smart pad equipped with an NFC communication module that is free to move in contrast to the case of carrying out NFC communication with the object device 100 which is fixedly installed.

In particular, the user terminal 200 includes an NFC communication module 210, an internet communication module 220, and a network configuration information allocation module 230.

The NFC communication module 210 communicates with the NFC communication module 130 of the object device 100 through a noncontact local communication method such as an NFC to receive the identification value and the first random number of the object device 100, 300 transmits the generated PSK to the object apparatus 100.

As described above, in the embodiment of the present invention, since the object device 100 and the user terminal 200 communicate by the NFC method, transmission is possible without encryption for the identification value and the first random number or the PSK.

The Internet communication module 220 transmits an end-to-end encrypted message of a communication subject in an Internet environment in which there is little resource limitation compared with the LLN environment and transmits the encrypted message to a standard protocol such as Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) Can be used.

The network configuration information allocation module 230 allocates network configuration information so that the object device 100 and the management server 300 can be directly connected through the Internet. The network configuration information means socket information including an IP address and a port number. That is, in order to be connected to each other in the Internet domain, one of the socket information needs to be known. Since the object device 100 is currently registering with the management server 300, there is no allocated socket information. Accordingly, in the embodiment of the present invention, the network configuration information assignment module 230 allocates socket information including the IP address and the port number to the object device 100, and transmits the socket information to the object device 100 and the management server 200. [ (300), respectively, so that Internet connection is made possible using the socket information.

Specifically, the network configuration information assigning module 230 allocates network configuration information from an AP (Access Point) in the home through a Dynamic Host Configuration Protocol (DHCP) and delivers the network configuration information to the object device 100 Socket information including the IP address and the port number for the IP address can be assigned.

The management server 300 obtains the identification value and the first random number of the object device 100 through the encrypted communication with the user terminal 200 and transmits the identification value and the first random number to the object device 100 for encrypted communication with the object device 100 PSK is generated and shared with the user terminal 200.

Then, the management server 300 registers the object device 100 by performing encrypted communication using the PSK through the Internet connection with the object device 100. A more specific implementation process of registering the object apparatus 100 will be described later.

In particular, the management server 300 includes an Internet communication module 310, a second random number generator 320, and a PSK generator 330.

The Internet communication module 310 performs end-to-end encrypted message transmission in the Internet environment through a standard protocol such as TLS or DTLS, in the same manner as the Internet communication module 220 of the user terminal 200.

The second random number generator 320 generates a second random number used to generate the PSK. In the embodiment of the present invention, the second random number may be a 128-bit random number, but is not limited thereto.

The PSK generator 330 generates a PSK by computing a first random number generated by the object device 100 and a second random number of the management server 300 using a predetermined operator. At this time, the object device 100 and the management server 300 are designed so that the predetermined operator is known to each other, and the object device 100 can verify the PSK received through the user terminal 200 using the operator have.

In particular, in the present exemplary embodiment, the PSK generator 330 may generate the PSK by calculating the first random number and the second random number using an exclusive OR (XOR) OR operator, but the operator is not limited thereto Various operators are available.

As described above, in the initial registration and secret key setting system for providing the secure object Internet service according to the embodiment of the present invention, in the state where intrusion is prevented from the outside through the non-contact short distance communication method such as NFC, And transmits the encrypted message including the information to the management server 300 to allow the object device 100 and the management server 300 to transmit the encrypted information to the user terminal 200, PSK for communication can be shared.

That is, the object apparatus 100, whose computing resources are restricted, transmits information necessary for PSK generation to the user terminal 200 in an NFC scheme without performing a separate encryption process, Can securely register the object device 100 in the management server 300 by forming an encrypted channel with the management server 300, sharing the PSK, and transmitting the PSK to the object device 100.

Hereinafter, a method of registering a secret key and setting a secret key using a TWO FACTOR communication channel according to an embodiment of the present invention will be described in more detail.

FIG. 2 is a flow chart schematically illustrating an implementation procedure of a registration and a secret key setting method of an object device using a TWO FACTOR communication channel according to an embodiment of the present invention.

FIG. 3 is a flowchart showing details of the implementation process of FIG. 2 in terms of an object device, a user terminal, and a management server.

4 is a flowchart illustrating a handshaking process between the user terminal and the management server in FIG.

2, the user terminal 200 and the management server 300 include an identification value of the object device 100 operating in the object Internet environment and a first encryption value obtained by encrypting the first random number of the object device 100, And the PSK for encrypted communication between the object device 100 and the management server 300 is shared (S100).

3, the user operation of the object device 100 is input (S11), and the communication between the object device 100 and the user terminal 200 is concatenated (S100) (S12), and the object device 100 transmits the identification value and the first random number to the user terminal 200 using NFC communication (S20).

That is, the object apparatus 100 may include a simple input unit (not shown) in the form of a button. When the user wants to register a new object apparatus 100 in the management server 300, only the button of the object apparatus 100 Simply operate it. Accordingly, when the operation of the user is input, the object device 100 enters a communication waiting state with the user terminal 200. [

In step S12, the object device 100 and the user terminal 200 communicate using a non-contact short distance communication method such as NFC. Specifically, when a Wi-fi or Bluetooth-based communication has a relatively large communication radius, an attacker who is outside the user's view can intercept a message being transmitted. It is necessary to encrypt and transmit the message of the object device 100 in order to transmit and receive a secure message.

However, since the object device 100, which has limited computing resources, can not perform the process of setting a security key to be used for communication by using the public key algorithm, the object device 100 uses the NFC method in the embodiment of the present invention So that information necessary for PSK setting can be securely transmitted to the user terminal 200.

That is, the communication radius of the NFC method is only a few centimeters, and the user visually confirms whether there is an access by the attacker after the user terminal 200 is contacted to the object device 100, and when an access by the attacker occurs The contact between the object device 100 and the user terminal 200 can be canceled, that is, the NFC communication connection can be disconnected, so that the security for information transmission necessary for PSK setting can be secured.

The step S100 includes a step S30 in which the user terminal 200 and the management server 300 authenticate each other through handshaking of a TLS or DTLS protocol and share a security key do.

That is, in order to establish a secure communication for establishing the PSK, a process of generating and sharing an authentication and a security key for a partner to be communicated through handshaking must be performed. Since this operation requires a lot of computing resources, The user terminal 200 connected to the object device 100 shares the secret key by carrying out handshaking in place of the object device 100 through step S12.

In an embodiment of the present invention, the user terminal 200 and the management server 300 can use either a symmetric key algorithm or an asymmetric key algorithm to set the security key. However, when a security key is generated by a symmetric key algorithm, it is possible to use an authentication-encryption technique (eg, CCM of AES) that can perform not only a simple cryptographic technique but also a password, data integrity, and one- It would be appropriate to verify the transmission of the message.

Referring to FIG. 4, the user terminal 200 and the management server 300 perform handshaking through the DTLS protocol. In the handshaking through the DTLS protocol, the user terminal 200 and the management server 300 6 flights (S31 to S36) are exchanged.

That is, the user terminal 200 and the management server 300 may transmit a first hello message for confirming whether or not the other party can communicate, a verification request message for a first hello message for responding to a denial of service attack, A first authentication message including a response to the secondary hello message including the verification data and the secondary hello message, and a certificate or public key of the user terminal 200 and the management server 300, and a second authentication message including the certificate or the public key Handshaking is performed through transmission / reception of a second authentication message including encrypted key information and an encryption initiation message indicating that encryption is performed using a negotiated security method.

The user terminal 200 requests handshaking from the management server 300 to the management server 300 because the user terminal 200 requests handshaking to the management server 300 in order to register the object device 100. [ The control server 300 transmits a first hello message to the management server 300 to confirm whether or not the communication is possible in step S31. (HelloVerifyRequest) (S32).

Then, the user terminal 200 transmits a second hello message including verification data for the first hello message to the management server 300 (S33), and the management server 300 transmits a response to the second hello message (Management Server Hello) message for confirming whether or not the user terminal 200 can communicate with the mobile terminal 200 (S34-1).

The management server 300 transmits a certificate to the user terminal 200 in order to enable the authentication of the management server 300 in step S34-2. The management server 300 transmits a management server key exchange (management server KeyExchange) message to the user terminal 200 (S34-3), and transmits the management server key exchange message to the user terminal 200 (Certificate Request) of the user terminal 200 (S34-4) in order to confirm that the user is a trustworthy entity.

Then, the management server 300 transmits a management server hello completion (management server HelloDone) message indicating that message transmission is completed (S34-5).

Next, the user terminal 200 selects one of the certificates stored at the request of the management server 300 and transmits the selected certificate to the management server 300 (S35-1) (User Terminal KeyExchange) to be used for the key exchange (S35-2), and transmits the signature value (CertificateVerify) signed by the signature private key of the user terminal 200 to the management server 300 (S35-3).

Then, the user terminal 200 informs that the negotiated security method will be applied from the next message transmission (ChangeCipherSpec, Finished) (S35-4, S35-5), and the management server 300 adds And verifies the user terminal 200 by decrypting the signature value of the user terminal 200 using the public key of the user terminal 200. If it is determined that the user terminal 200 is legitimate, (ChangeCipherSpec, Finished) (S36-1, S36-2).

The above process is performed using the DTLS protocol and the embodiment of the present invention is not limited thereto. Therefore, when the user terminal 200 and the management server 300 perform handshaking through the TLS protocol, steps S31 and S32 of FIG. It is possible to perform mutual authentication and security key generation through four omitted flights.

3, in step S100, the user terminal 200 generates a 1-1 encryption message by encrypting the identification value of the object device 100 and the first random number using the shared key (S40 , The network configuration information is allocated and transmitted to the object device 100 (S52), and the 1-1 encryption message is transmitted to the management server 300 (S54).

In step S40, the user terminal 200 can perform initial setting for a plurality of object devices 100, so that a transaction ID (TID), a replay (ID) for distinguishing a transaction from each object device 100, A time stamp (TS) for preventing an attack (Replay Attack), and socket information including IP (Internet Protocol) address and port information as network configuration information, Can be generated.

Since the user terminal 200 encrypts the information together with the identification value and the first random number and transmits the encrypted information, the management server 300 can determine whether the corresponding encrypted message corresponds to the current transaction through the transaction ID , It is possible to prevent the replay attack of the attacker by confirming the time of transmission of the 1-1 encryption message through the time information and confirm the network information to be connected to the object device 100 through the Internet based on the network configuration information .

Since the user terminal 200 transmits the socket information including the IP address and the port information to the object device 100 in step S52, the object device 100 transmits the socket information including the IP address and the port information to the management server 300 Network information to be connected to the Internet can be set.

That is, since the object device 100 is currently in the process of initially registering with the management server 300, there is no allocated socket information. Therefore, in the embodiment of the present invention, the user terminal 200 allocates the socket information in the same manner as the dynamic host configuration protocol and transmits the socket information to the object device 100 so that the object device 100 and the management server 300 directly connect It is possible to set up a network environment in which the network can be established.

Then, the management server 300 decrypts the 1-1 encryption message to acquire the identification value, the first random number, the transaction ID, the time information, and the network configuration information of the object device 100, generates the second random number and the PSK (S61), generates a 1-2 encryption message in which the second random number and the PSK are encrypted with the security key (S62), and transmits the generated 1-2 encryption message to the user terminal 200 (S70).

Specifically, in step S61, the management server 300 generates an arbitrary second random number, and generates a PSK by computing a first random number and a second random number using a predetermined operator. In particular, in the present embodiment, the operator may be an exclusive OR (XOR) operator, but not limited thereto, various operators may be used.

In step S62, the management server 300 may further generate the 1-2 encryption message including the transaction ID and the time information.

Accordingly, the user terminal 200 compares the transaction ID included in the first encryption message with the transaction ID included in the first encryption message transmitted in step S54, and determines whether the corresponding encryption message corresponds to the current transaction And the attacker's replay attack can be prevented through time information.

In particular, in the embodiment of the present invention, the user terminal 200 and the management server 300 may generate an encryption message by adding a serial number after the time information.

That is, the attacker can perform the replay attack in a short period of time when the user terminal 200 and the management server 300 transmit and receive the encrypted message. In this case, the user terminal 200 transmits the encryption message due to the replay attack as normal It can be judged. Therefore, in the embodiment of the present invention, the user terminal 200 generates the 1-1 encryption message by adding the serial number after the time information, and the management server 300 increases the serial number, Thereby enabling the user terminal 200 to verify the 1-2 encrypted message.

Then, the user terminal 200 decrypts the 1-2 encryption message with the security key to obtain the transaction ID, the time information, the second random number, and the PSK (S80).

In this manner, the user terminal 200 and the management server 300 share the PSK for communication between the object device 100 and the management server 300 through the above-described step S100, and through the S52 and the S54, The device 100 and the management server 300 share network configuration information that can be connected through the Internet.

Referring back to FIG. 2 and FIG. 3, the user terminal 200 transmits the second random number and the PSK obtained through S80 to the object device 100 (S200).

At this time, the user terminal 200 can transmit the second random number and the PSK without any additional encryption by communicating using the non-contact short distance communication method such as NFC as in the step S20.

The object apparatus 100 can also verify the PSK based on the received second random number and PSK. Specifically, since the object device 100 and the management server 300 know an operator set in advance for calculating the PSK, the object device 100 verifies the PSK by calculating the second random number and the PSK through the corresponding operator .

In particular, in the embodiment of the present invention, the pre-set operator may be an exclusive-OR operator. In this case, the PSK is a value obtained by calculating the first random number and the second random number by the exclusive-OR operator, The first random number must be generated when performing the operation. Therefore, the object apparatus 100 can verify the PSK based on the result of comparing the second random number and the first random number with a value obtained by calculating the PSK with the exclusive-OR operator.

Then, the management server 300 generates a second encryption message by encrypting the identification value of the object device 100 and the first random number with the PSK (S310), and transmits the second encryption message to the object device 100 ( S320).

In step S310, the management server 300 may generate a second encryption message including a valid period (VT) of the corresponding PSK.

In step S320, the management server 300 directly transmits the second encryption message to the object device 100 based on the socket information included in the first encryption message transmitted in step S54.

That is, since the user terminal 200 has transmitted the socket information allocated through the step S100 to the object device 100, the object device 100 can be in the message reception waiting state based on the socket information, 300 can access the socket information and transmit the second encryption message.

Then, the object apparatus 100 decrypts and decrypts the second encryption message with the PSK received in step S200, and authenticates the management server 300 based on the obtained message (S400).

Specifically, the object apparatus 100 decrypts the second encrypted message with the PSK to obtain the identification value and the first random number, and transmits the obtained identification value and the first random number to the user terminal 200 in step S20, The management server 300 can be authenticated in a manner of comparing with the first random number.

If the obtained identification value and the first random number are equal to the transmitted identification value and the first random number, the object device 100 determines that the PSK is normally received, A third encryption message encrypted with the second random number is generated (S500), and the third encryption message is transmitted to the management server 300 (S600).

In step S600, the object device 100 is connected to the management server 300 on the basis of the allocated socket information as in step S320, and can transmit the third encryption message.

Then, the management server 300 decrypts the third encrypted message with the PSK to obtain the identification value and the second random number. If the second random number is equal to the second random number generated directly in step S61, It is determined that the message has been transmitted and the object apparatus 100 is registered with the identification value (S700).

As described above, in the embodiment of the present invention, the object device 100 and the management server 300 are connected to each other through two channels in which the channel between the object device 100 and the user terminal 200 and the channel between the object device 100 and the management server 300 are separated. ) And the PSK setting are performed. That is, a message is transmitted and received using NFC communication in the channel between the object device 100 and the user terminal 200, and a TCP / IP-based Internet socket communication is used in the channel between the object device 100 and the management server 300 And the message is transmitted and received. The user terminal 200 plays a role of an arbitration device to help registration and PSK setting between the object device 100 and the management server 300 using both NFC and Internet socket communication.

In the embodiment of the present invention, the object device 100 transmits the identification value and the first random number to the user terminal 200 in step S20. However, since the present invention is not limited to this, It is also possible to transmit the temporary PSK to the user terminal 200 together.

That is, since the temporary PSK may be set at the time of shipment from the factory, the present invention transfers the temporary PSK to the management server 300 in step S54. In step S62, the management server 300 encrypts the generated PSK with the temporary PSK, and transmits the encrypted message, which is the encryption message again encrypted with the security key shared with the user terminal 200, to the user terminal 200. [ Then, the object apparatus 100 receives the PSK and decodes it into the temporary PSK to acquire the PSK, and it is also possible to update the temporary PSK to the acquired PSK.

It will be understood by those skilled in the art that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.

It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.

100: Object device 110: First random number generator
120: LLN communication module 130, 210: NFC communication module
200: user terminal 220, 310: internet communication module
230: Network configuration information allocation module 300: Management server
320: second random number generator 330: PSK generator

Claims (11)

The object apparatus operating in the Internet of Things (IoT) environment transmits the identification value of the object apparatus and the first random number generated by the object apparatus to the user terminal using the non-contact short distance communication;
Generating a 1-1 encryption message in which the user terminal has encrypted the identification value and the first random number with a security key shared with the management server, and transmitting the 1-1 encryption message to the management server;
The management server generates a PSK (Pre Shared Key) by calculating the first random number acquired from the 1-1 encryption message and a second random number generated by the management server with a predetermined operator, and transmits the PSK And transmitting the second encryption message to the user terminal;
Transmitting the PSK to the object device using the non-contact short distance communication;
Transmitting, by the management server, a second encryption message encrypted with the identification value and the first random number to the PSK using the Internet socket communication; And
The object device decrypts the second encrypted message with the PSK to obtain the identification value and the first random number, compares the obtained identification value and the first random number with the transmitted identification value and the first random number, A method of registration and secret key establishment of an object device using a TWO FACTOR communication channel including a step of authenticating a server.
The method according to claim 1,
Wherein the management server transmits the second random number to the user terminal,
Wherein the user terminal further transmits the second random number to the object device using the non-contact short distance communication,
Further comprising the step of calculating the PSK and the second random number with the operator set in advance and verifying the PSK by comparing the operation result with the first random number. How to register the object device and set the secret key.
Transmitting an identification value of the object device and a first random number generated by the object device to the user terminal using noncontact local area communication, the object device operating in an Internet of Things (IoT) environment;
Receiving the PSK (Pre Shared Key) for communication with the management server from the user terminal using the non-contact short distance communication;
Receiving an encryption message by encrypting the identification value and the first random number from the management server using the PSK using the Internet socket communication; And
Authenticating the management server by decrypting the encrypted message with the PSK to obtain the identification value and the first random number, and comparing the obtained identification value and the first random number with the transmitted identification value and the first random number, Method of registration and secret key setting of object device using TWO FACTOR communication channel.
The method according to claim 1 or 3,
Wherein the object device further comprises receiving network configuration information, which is socket information including an IP address and a port number of the object device allocated by the user terminal, prior to the step of receiving the PSK and,
Wherein the encryption message is transmitted to the object device using Internet socket communication based on the network configuration information. ≪ RTI ID = 0.0 > 15. < / RTI >
The method according to claim 1 or 3,
If the authentication of the management server is successful, generating a third encryption message decrypting the identification value and the second random number with the PSK, and transmitting the generated third encryption message to the management server. A method of registration and secret key setting of an object device using a communication channel.
The method of claim 3,
In the step of receiving the PSK, the object device further receives a second random number generated by the management server,
Further comprising the step of calculating the PSK and the second random number with a predetermined operator and verifying the PSK by comparing the calculation result with the first random number. How to register the device and set the secret key.
The method comprising the steps of: receiving from the object device operating in an Internet of Things (IoT) environment, the identification value of the object device and the first random number generated by the object device using non-contact local area communication;
Generating a 1-1 encryption message in which the user terminal encrypts the identification value and the first random number with a security key shared with the management server, and transmitting the 1-1 encryption message to the management server;
Receiving a 1-2 encryption message in which the user terminal encrypts a PSK (Pre Shared Key) from the management server; And
And transmitting the PSK to the object device using the non-contact short distance communication.
The method according to any one of claims 1, 3, and 7,
Wherein the non-contact short-range communication is NFC (Near Field Communication).
8. The method of claim 1 or 7,
Further comprising the step of receiving the network configuration information, which is socket information including an IP address and a port number of the object device, and transmitting the allocated network configuration information to the object device and the management server. FACTOR A method of registering a secret key and setting a secret key using a communication channel.
10. The method of claim 9,
The 1-1 encryption message further includes a transaction ID (TID) for distinguishing a transaction, a time stamp (TS) for preventing a replay attack, and the network configuration information, Wherein the TWO FACTOR communication channel is used for registering and setting a secret key.
11. The method of claim 10,
And the 1-2 encryption message is an encrypted message further including the transaction ID and the time information. The method of claim 1, further comprising:
KR1020150136640A 2015-09-25 2015-09-25 Method for registering device and setting secret key using two factor communacation channel KR101762013B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150136640A KR101762013B1 (en) 2015-09-25 2015-09-25 Method for registering device and setting secret key using two factor communacation channel

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150136640A KR101762013B1 (en) 2015-09-25 2015-09-25 Method for registering device and setting secret key using two factor communacation channel

Publications (2)

Publication Number Publication Date
KR20170037270A true KR20170037270A (en) 2017-04-04
KR101762013B1 KR101762013B1 (en) 2017-07-26

Family

ID=58588543

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150136640A KR101762013B1 (en) 2015-09-25 2015-09-25 Method for registering device and setting secret key using two factor communacation channel

Country Status (1)

Country Link
KR (1) KR101762013B1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108964912A (en) * 2018-10-18 2018-12-07 深信服科技股份有限公司 PSK generation method, device, user equipment, server and storage medium
KR20190018909A (en) * 2017-08-16 2019-02-26 덕성여자대학교 산학협력단 Method for setting secure key based on secure strength of out-of-band channel between devices in internet of things environment
KR20190019441A (en) * 2017-08-17 2019-02-27 덕성여자대학교 산학협력단 Method for setting secure key between devices using different out-of-band channel in internet of things environment
KR20190021022A (en) * 2017-08-22 2019-03-05 덕성여자대학교 산학협력단 Method for setting secure key between lightweight devices in internet of things using different secure strength and different out-of-band channel
KR20200075099A (en) * 2018-12-11 2020-06-26 (주)드림시큐리티 Apparatus for issuing cryptographic key of internet of things device using 2-step authentication and method thereof
KR102161647B1 (en) * 2020-03-06 2020-10-05 주식회사그린존시큐리티 Apparatus and method for securing data transmission of IoT device using location information
US10986677B2 (en) 2019-03-05 2021-04-20 Dialog Semiconductor Korea Inc. Method and apparatus for connecting to access point in WLAN network
CN114172724A (en) * 2021-12-07 2022-03-11 深圳供电局有限公司 Dual encryption method and system based on low-cost Internet of things intelligent equipment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20230001836A (en) * 2021-06-29 2023-01-05 삼성전자주식회사 Home appliance device, method for controlling the same, and method for controlling mobile device communicating with the home appliance device
KR20230018946A (en) * 2021-07-30 2023-02-07 삼성전자주식회사 The home appliance device and the method for operating the same

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101483187B1 (en) * 2008-12-16 2015-01-16 주식회사 케이티 Conditional access system and method exchanging randon value

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190018909A (en) * 2017-08-16 2019-02-26 덕성여자대학교 산학협력단 Method for setting secure key based on secure strength of out-of-band channel between devices in internet of things environment
KR20190019441A (en) * 2017-08-17 2019-02-27 덕성여자대학교 산학협력단 Method for setting secure key between devices using different out-of-band channel in internet of things environment
KR20190021022A (en) * 2017-08-22 2019-03-05 덕성여자대학교 산학협력단 Method for setting secure key between lightweight devices in internet of things using different secure strength and different out-of-band channel
CN108964912A (en) * 2018-10-18 2018-12-07 深信服科技股份有限公司 PSK generation method, device, user equipment, server and storage medium
KR20200075099A (en) * 2018-12-11 2020-06-26 (주)드림시큐리티 Apparatus for issuing cryptographic key of internet of things device using 2-step authentication and method thereof
US10986677B2 (en) 2019-03-05 2021-04-20 Dialog Semiconductor Korea Inc. Method and apparatus for connecting to access point in WLAN network
KR102161647B1 (en) * 2020-03-06 2020-10-05 주식회사그린존시큐리티 Apparatus and method for securing data transmission of IoT device using location information
WO2021177504A1 (en) * 2020-03-06 2021-09-10 주식회사그린존시큐리티 Device for securing data transmission of iot device, and method therefor
CN114172724A (en) * 2021-12-07 2022-03-11 深圳供电局有限公司 Dual encryption method and system based on low-cost Internet of things intelligent equipment

Also Published As

Publication number Publication date
KR101762013B1 (en) 2017-07-26

Similar Documents

Publication Publication Date Title
KR101762013B1 (en) Method for registering device and setting secret key using two factor communacation channel
US11765172B2 (en) Network system for secure communication
US8694782B2 (en) Wireless authentication using beacon messages
KR102021213B1 (en) End-to-end service layer authentication
US10567165B2 (en) Secure key transmission protocol without certificates or pre-shared symmetrical keys
CN107659406B (en) Resource operation method and device
US8327143B2 (en) Techniques to provide access point authentication for wireless network
CN102726080B (en) The Station To Station security association that individual's basic service is concentrated
KR102062162B1 (en) Security authentication method, configuration method and related devices
US10516654B2 (en) System, apparatus and method for key provisioning delegation
US10009760B2 (en) Providing network credentials
CN104980928A (en) Method, equipment and system used for establishing secure connection
TW201921890A (en) Method, device, and computer program product for enrollment of a client device with a network
CN111527762A (en) System and method for end-to-end secure communication in a device-to-device communication network
KR20070067734A (en) Method and apparatus for authentication of mobile device
KR20160058491A (en) Method and apparatus for providing services based on identifier of user device
WO2014127751A1 (en) Wireless terminal configuration method, apparatus and wireless terminal
Suomalainen Smartphone assisted security pairings for the Internet of Things
WO2017091987A1 (en) Method and apparatus for secure interaction between terminals
KR102322605B1 (en) Method for setting secret key and authenticating mutual device of internet of things environment
CN109995723B (en) Method, device and system for DNS information interaction of domain name resolution system
JP2009104509A (en) Terminal authentication system and terminal authentication method
KR20080050290A (en) Security method of mobile internet protocol version 6 based server
KR101878713B1 (en) Method and System For Connecting User Equipment with Network
KR20140118380A (en) Method for configuring access point connection information and terminal device for the same

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant