| Literature DB >> 35062539 |
Na-Eun Park1, So-Hyun Park1, Ye-Sol Oh2, Jung-Hyun Moon2, Il-Gu Lee1,2.
Abstract
Considering the increasing scale and severity of damage from recent cybersecurity incidents, the need for fundamental solutions to external security threats has increased. Hence, network separation technology has been designed to stop the leakage of information by separating business computing networks from the Internet. However, security accidents have been continuously occurring, owing to the degradation of data transmission latency performance between the networks, decreasing the convenience and usability of the work environment. In a conventional centralized network connection concept, a problem occurs because if either usability or security is strengthened, the other is weakened. In this study, we proposed a distributed authentication mechanism for secure network connectivity (DAM4SNC) technology in a distributed network environment that requires security and latency performance simultaneously to overcome the trade-off limitations of existing technology. By communicating with separated networks based on the authentication between distributed nodes, the inefficiency of conventional centralized network connection solutions is overcome. Moreover, the security is enhanced through periodic authentication of the distributed nodes and differentiation of the certification levels. As a result of the experiment, the relative efficiency of the proposed scheme (REP) was about 420% or more in all cases.Entities:
Keywords: decentralized authentication; distributed network; frame structure; n-factor authentication; network separation; trust level
Mesh:
Year: 2022 PMID: 35062539 PMCID: PMC8778972 DOI: 10.3390/s22020579
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Frame aggregation.
Figure 2Structure of DAM4SNC.
Figure 3Operation of trust level.
Figure 4Structure of transmitted frame in DAM4SNC.
Figure 5Comparison between the DAM4SNC and CON models.
Figure 6Latency based on TAL: (a) CON and (b) DAM4SNC models.
Figure 7Achievable maximum TAL for the required latency conditions for each model.