{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T00:37:39Z","timestamp":1760402259241,"version":"build-2065373602"},"reference-count":40,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T00:00:00Z","timestamp":1641945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2020R1F1A1061107"],"award-info":[{"award-number":["NRF-2020R1F1A1061107"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003661","name":"Korea Institute for Advancement of Technology","doi-asserted-by":"publisher","award":["P0008703"],"award-info":[{"award-number":["P0008703"]}],"id":[{"id":"10.13039\/501100003661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Considering the increasing scale and severity of damage from recent cybersecurity incidents, the need for fundamental solutions to external security threats has increased. Hence, network separation technology has been designed to stop the leakage of information by separating business computing networks from the Internet. However, security accidents have been continuously occurring, owing to the degradation of data transmission latency performance between the networks, decreasing the convenience and usability of the work environment. In a conventional centralized network connection concept, a problem occurs because if either usability or security is strengthened, the other is weakened. In this study, we proposed a distributed authentication mechanism for secure network connectivity (DAM4SNC) technology in a distributed network environment that requires security and latency performance simultaneously to overcome the trade-off limitations of existing technology. By communicating with separated networks based on the authentication between distributed nodes, the inefficiency of conventional centralized network connection solutions is overcome. Moreover, the security is enhanced through periodic authentication of the distributed nodes and differentiation of the certification levels. As a result of the experiment, the relative efficiency of the proposed scheme (REP) was about 420% or more in all cases.<\/jats:p>","DOI":"10.3390\/s22020579","type":"journal-article","created":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T09:10:36Z","timestamp":1641978636000},"page":"579","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Authentication Model for Secure Network Connectivity in Network Separation Technology"],"prefix":"10.3390","volume":"22","author":[{"given":"Na-Eun","family":"Park","sequence":"first","affiliation":[{"name":"Department of Future Convergence Technology Engineering, Sungshin Women\u2019s University, Seoul 02844, Korea"}]},{"given":"So-Hyun","family":"Park","sequence":"additional","affiliation":[{"name":"Department of Future Convergence Technology Engineering, Sungshin Women\u2019s University, Seoul 02844, Korea"}]},{"given":"Ye-Sol","family":"Oh","sequence":"additional","affiliation":[{"name":"Department of Convergence Security Engineering, Sungshin Women\u2019s University, Seoul 02844, Korea"}]},{"given":"Jung-Hyun","family":"Moon","sequence":"additional","affiliation":[{"name":"Department of Convergence Security Engineering, Sungshin Women\u2019s University, Seoul 02844, Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5777-4029","authenticated-orcid":false,"given":"Il-Gu","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Future Convergence Technology Engineering, Sungshin Women\u2019s University, Seoul 02844, Korea"},{"name":"Department of Convergence Security Engineering, Sungshin Women\u2019s University, Seoul 02844, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,12]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Alqahtani, H., Sarker, I.H., Kalim, A., Minhaz Hossain, S.M., Ikhlaq, S., and Hossain, S. (2020, January 26\u201327). Cyber Intrusion Detection Using Machine Learning Classification Techniques. Proceedings of the International Conference on Computing Science, Coummunication and Security, Gujarat, India.","DOI":"10.1007\/978-981-15-6648-6_10"},{"key":"ref_2","first-page":"859","article-title":"Secure file transfer method and forensic readiness by converting file format in network segmentation environment","volume":"29","author":"Jaehyeok","year":"2019","journal-title":"J. Inf. Secur. Cryptogr."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"125732","DOI":"10.1109\/ACCESS.2019.2924539","article-title":"Turing Machine-based cross-network isolation and data exchange theory model","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Hou, Y., Such, J., and Rashid, A. (2019, January 28). Understanding security requirements for industrial control system supply chains. Proceedings of the 2019 IEEE\/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS), Montreal, QC, Canada.","DOI":"10.1109\/SEsCPS.2019.00016"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Lin, Y., and Lin, L. (2019, January 5\u20137). Design and realization of a computer security control circuit for local area network. Proceedings of the 2019 International Conference on Communications, Information System and Computer Engineering (CISCE), Haikou, China.","DOI":"10.1109\/CISCE.2019.00010"},{"key":"ref_6","unstructured":"Sunil, C., Anil, K., Ned, S., and David, M.W. (2020). Conceptualizing the Secure Internet of Things. Demystifying Internet of Things Security, Apress."},{"key":"ref_7","unstructured":"Weijia, J., and Wanlei, Z. (2004). Distributed Network Systems: From Concepts to Implementations, Springer."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Jacomme, C., and Kremer, S. (2018, January 9\u201312). An extensive formal analysis of multi-factor authentication protocols. Proceedings of the 2018 IEEE 31st Computer Security Foundations Symposium (CSF), Oxford, UK.","DOI":"10.1109\/CSF.2018.00008"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1016\/j.infsof.2017.09.012","article-title":"Authentication schemes and methods: A systematic literature review","volume":"94","author":"Ignacio","year":"2018","journal-title":"Inf. Softw. Technol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MNET.2019.1800240","article-title":"Challenges of multi-factor authentication for securing advanced IoT applications","volume":"33","author":"Ometov","year":"2019","journal-title":"IEEE Netw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Nag, A.K., Roy, A., and Dasgupta, D. (2015, January 7\u201310). An adaptive approach towards the selection of multi-factor authentication. Proceedings of the 2015 IEEE Symposium Series on Computational Intelligence, Cape Town, South Africa.","DOI":"10.1109\/SSCI.2015.75"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2835","DOI":"10.1109\/TMC.2018.2826554","article-title":"Optimal packet aggregation scheduling in wireless networks","volume":"17","author":"Akyurek","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Taguchi, Y., Kawashima, R., Nakayama, H., Hayashi, T., and Matsuo, H. (2017, January 11\u201314). PA-Flow: Gradual packet aggregation at virtual network I\/O for efficient service chaining. Proceedings of the 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Hong Kong, China.","DOI":"10.1109\/CloudCom.2017.54"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Wang, P., and Petrova, M. (2016, January 23\u201327). Cross talk MAC: A directional MAC scheme for enhancing frame aggregation in mm-wave wireless personal area networks. Proceedings of the 2016 IEEE International Conference on Communications Workshops (ICC), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICCW.2016.7503853"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1109\/COMST.2017.2745052","article-title":"Impact of IEEE 802.11n\/ac PHY\/MAC high throughput enhancements on transport and application protocols-A survey","volume":"19","author":"Karmakar","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Rahman, H., Ahmed, N., and Hussain, I. (2016, January 23\u201325). Comparison of data aggregation techniques in Internet of Things (IoT). Proceedings of the 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India.","DOI":"10.1109\/WiSPNET.2016.7566346"},{"key":"ref_17","first-page":"855","article-title":"AFLAS: An adaptive frame length aggregation scheme for vehicular networks","volume":"66","author":"Zhou","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., and Hahn, A. (2015). Guide to Industrial Control Systems (ICS) Security (NIST Special Publication 800-82 Rev. 2), National Institute of Standards and Technology.","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref_19","unstructured":"Federal Financial Institutions Examination Council (2016). FFIEC Information Technology Examination Handbook Information Security, Federal Financial Institutions Examination Council."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"81969","DOI":"10.1109\/ACCESS.2019.2924497","article-title":"Directly and indirectly synchronous communication mechanisms for client-server systems using event-based asynchronous communication framework","volume":"7","author":"Lim","year":"2019","journal-title":"IEEE Access"},{"key":"ref_21","unstructured":"Mundada, Y., Ramachandran, A., and Feamster, N. (2011, January 14\u201315). SilverLine: Data and network isolation for cloud services. Proceedings of the 3rd HotCloud, Portland, OR, USA."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Qi, Z., Wu, Y., Hang, F., Xie, L., and He, Y. (2020, January 7\u20139). A Secure Real-time Internal and External Network Data Exchange Method Based on Web Service Protocol. Proceedings of the 2020 International Symposium on Computer Engineering and Intelligent Communications (ISCEIC), Guangdong, China.","DOI":"10.1109\/ISCEIC51027.2020.00046"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"012037","DOI":"10.1088\/1742-6596\/1693\/1\/012037","article-title":"Research on Cross-network Exchange Method of Enterprise Application Business Process Data","volume":"1693","author":"Feng","year":"2020","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"De Freitas, M.B., Rosa, L., Cruz, T., and Sim\u00f5es, P. (2018). SDN-Enabled Virtual Data Diode. Computer Security, Springer. Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-030-12786-2_7"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1109\/JIOT.2018.2846803","article-title":"Fast authentication and data transfer scheme for massive NB-IoT devices in 3GPP 5G network","volume":"6","author":"Cao","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Mahalle, P.N., Shinde, G., and Shafi, P.M. (2020). Rethinking Decentralised Identifiers and Verifiable Credentials for the Internet of Things. Internet of Things, Smart Computing and Technology: A Roadmap Ahead, Springer.","DOI":"10.1007\/978-3-030-39047-1_16"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"106382","DOI":"10.1016\/j.ymssp.2019.106382","article-title":"Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges","volume":"135","author":"Mistry","year":"2020","journal-title":"Mech. Syst. Signal Process."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Nguyen, H., Marendy, P., and Engelke, U. (2016, January 22\u201325). Collaborative framework design for immersive analytics. Proceedings of the 2016 Big Data Visual Analytics (BDVA), Sydney, Australia.","DOI":"10.1109\/BDVA.2016.7787044"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Idris, M.Y., Stiawan, D., Habibullah, N.M., Fikri, A.H., Abd, R.M.R., and Dasuki, M. (2017, January 19\u201321). IoT smart device for e-leaming content sharing on hybrid cloud environment. Proceedings of the 2017 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), Yogyakarta, Indonesia.","DOI":"10.1109\/EECSI.2017.8239078"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Kawato, T., Higashino, M., Takahashi, K., and Kawamura, T. (2019, January 22\u201325). Proposal of e-learning system integrated P2P model with client-server model. Proceedings of the 2019 International Conference on Electronics, Information, and Communication (ICEIC), Auckland, New Zealand.","DOI":"10.23919\/ELINFOCOM.2019.8706472"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Shi, C., Zhang, Y., and He, R. (2016, January 10\u201311). Design and implementation of a P2P resource sharing system based on metadata catalog. Proceedings of the 2016 9th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, China.","DOI":"10.1109\/ISCID.2016.1026"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"37518","DOI":"10.1109\/ACCESS.2020.2975920","article-title":"Blockchain-based distributed firmware update architecture for IoT devices","volume":"8","author":"Choi","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Atlam, H.F., Azad, M.A., Alzahrani, A.G., and Wills, G. (2020). A Review of Blockchain in Internet of Things and AI. Big Data Cogn. Comput., 4.","DOI":"10.3390\/bdcc4040028"},{"key":"ref_34","first-page":"102686","article-title":"Blockchain-empowered cloud architecture based on secret sharing for smart city","volume":"57","author":"Cha","year":"2021","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1007\/s11107-018-00819-7","article-title":"Centralized vs. distributed algorithms for resilient 5G access networks","volume":"37","author":"Khorsandi","year":"2019","journal-title":"Photon. Netw. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"De As\u00eds L\u00f3pez-Fuentes, F. (2019). Decentralized Online Social Network Architectures. Social Networks and Surveillance for Society, Springer.","DOI":"10.1007\/978-3-319-78256-0_5"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2146","DOI":"10.1109\/JBHI.2020.2969648","article-title":"Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain","volume":"24","author":"Yazdinejad","year":"2020","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Sihite, A.B., and Susanti, B.H. (2016, January 23\u201324). Second preimage attack method on various MAC constructions and its application with AES-128. Proceedings of the 2016 1st International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia.","DOI":"10.1109\/ICITISEE.2016.7803044"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.1109\/TITS.2016.2517603","article-title":"An efficient anonymous batch authentication scheme based on HMAC for VANETs","volume":"17","author":"Jiang","year":"2016","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"105521","DOI":"10.1109\/ACCESS.2020.2999817","article-title":"Comparing Admission Control Architectures for Real-Time Ethernet","volume":"8","author":"Moutinho","year":"2020","journal-title":"IEEE Access"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/2\/579\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T13:27:26Z","timestamp":1760362046000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/2\/579"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,12]]},"references-count":40,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["s22020579"],"URL":"https:\/\/doi.org\/10.3390\/s22020579","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2022,1,12]]}}}