This thesis defines an optimized security method to effectively defend against MITM (Man-In-The-Middle) attacks and sniffing attacks in low-performance IoT healthcare devices. To prevent MITM attacks, the optimized security method uses ECDSA (Elliptic-Curve Digital Signature Algorithm) and a new...
This thesis defines an optimized security method to effectively defend against MITM (Man-In-The-Middle) attacks and sniffing attacks in low-performance IoT healthcare devices. To prevent MITM attacks, the optimized security method uses ECDSA (Elliptic-Curve Digital Signature Algorithm) and a newly defined digital certificate based on ECDSA. For ECDSA optimization, secp256k1 was applied as domain parameters, and as a result, the execution speed was up to 12.73% faster than that of ECDSA with secp256r1 in low-performance MCUs. In addition, by using the optimized digital certificate defined in this thesis, the size of a certificate can be reduced to 1/10 or less compared to the X.509 standard certificate, and the number of certificate verification on the IoT healthcare device side can be reduced to one. This thesis also adjusted the number of rounds of the ChaCha algorithm for efficient encryption and decryption, and as a result, 8 rounds ChaCha, aka ChaCha8 was running faster than or equal to AES-128 under all conditions on low-performance MCUs. In addition, similar to ECDSA, the execution speed of ECDH(Elliptic-Curve Diffie–Hellman) key exchange algorithm with secp256k1 was up to 15.19% faster than that of ECDH with secp256r1. Therefore, the optimized security method adopted ChaCha8 and ECDH with sec256k1, respectively, as an optimized symmetric key algorithm and an optimized key exchange algorithm to protect IoT healthcare devices from sniffing attacks. In addition, this thesis integrates optimized security algorithms and the newly defined digital certificate by defining security algorithm execution procedures and transmission messages between IoT healthcare devices and gateways. As a result, the optimized security method safely protects IoT healthcare devices from MITM and sniffing attacks, while requiring less system resources than DTLS(Datagram Transmission Layer Security), and is not restricted by I/O devices unlike Bluetooth's Security Manager Protocol(SMP).
This thesis defines an optimized security method to effectively defend against MITM (Man-In-The-Middle) attacks and sniffing attacks in low-performance IoT healthcare devices. To prevent MITM attacks, the optimized security method uses ECDSA (Elliptic-Curve Digital Signature Algorithm) and a newly defined digital certificate based on ECDSA. For ECDSA optimization, secp256k1 was applied as domain parameters, and as a result, the execution speed was up to 12.73% faster than that of ECDSA with secp256r1 in low-performance MCUs. In addition, by using the optimized digital certificate defined in this thesis, the size of a certificate can be reduced to 1/10 or less compared to the X.509 standard certificate, and the number of certificate verification on the IoT healthcare device side can be reduced to one. This thesis also adjusted the number of rounds of the ChaCha algorithm for efficient encryption and decryption, and as a result, 8 rounds ChaCha, aka ChaCha8 was running faster than or equal to AES-128 under all conditions on low-performance MCUs. In addition, similar to ECDSA, the execution speed of ECDH(Elliptic-Curve Diffie–Hellman) key exchange algorithm with secp256k1 was up to 15.19% faster than that of ECDH with secp256r1. Therefore, the optimized security method adopted ChaCha8 and ECDH with sec256k1, respectively, as an optimized symmetric key algorithm and an optimized key exchange algorithm to protect IoT healthcare devices from sniffing attacks. In addition, this thesis integrates optimized security algorithms and the newly defined digital certificate by defining security algorithm execution procedures and transmission messages between IoT healthcare devices and gateways. As a result, the optimized security method safely protects IoT healthcare devices from MITM and sniffing attacks, while requiring less system resources than DTLS(Datagram Transmission Layer Security), and is not restricted by I/O devices unlike Bluetooth's Security Manager Protocol(SMP).
※ AI-Helper는 부적절한 답변을 할 수 있습니다.