Distributed Authentication Model for Secure Network Connectivity in Network Separation Technology
Author:
Park Na-Eun,
Park So-Hyun,
Oh Ye-Sol,
Moon Jung-Hyun,
Lee Il-GuORCID
Abstract
Considering the increasing scale and severity of damage from recent cybersecurity incidents, the need for fundamental solutions to external security threats has increased. Hence, network separation technology has been designed to stop the leakage of information by separating business computing networks from the Internet. However, security accidents have been continuously occurring, owing to the degradation of data transmission latency performance between the networks, decreasing the convenience and usability of the work environment. In a conventional centralized network connection concept, a problem occurs because if either usability or security is strengthened, the other is weakened. In this study, we proposed a distributed authentication mechanism for secure network connectivity (DAM4SNC) technology in a distributed network environment that requires security and latency performance simultaneously to overcome the trade-off limitations of existing technology. By communicating with separated networks based on the authentication between distributed nodes, the inefficiency of conventional centralized network connection solutions is overcome. Moreover, the security is enhanced through periodic authentication of the distributed nodes and differentiation of the certification levels. As a result of the experiment, the relative efficiency of the proposed scheme (REP) was about 420% or more in all cases.
Funder
National Research Foundation of Korea
Korea Institute for Advancement of Technology
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference40 articles.
1. Secure file transfer method and forensic readiness by converting file format in network segmentation environment;Jaehyeok;J. Inf. Secur. Cryptogr.,2019
2. Turing Machine-Based Cross-Network Isolation and Data Exchange Theory Model