• Title, Summary, Keyword: 무결성

Search Result 1,181, Processing Time 0.044 seconds

Redesign and Performance Analysis of RTP(Real-time Transport Protocol) for Encryption of VoIP Media Information between Different Communication Networks (이종의 통신망 간에 VoIP 미디어 암호화를 위한 RTP(Real-time Transport Protocol)의 재설계 및 성능 분석)

  • Oh, Hyung-Jun;Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.4
    • /
    • pp.87-96
    • /
    • 2013
  • In this paper, we suggest redesigned RTP protocol that is able to perform encryption of VoIP media information for single private network and between the different private networks. And we conduct a test for performance analysis. Such as SRTP or ZRTP methods have been used for VoIP media encryption. But, the existing encryption techniques have problem that can not perform end-to-end encryption between different private networks. In order to solve this problem, in this paper, we redesign RTP protocol. Redesigned RTP includes all information for encryption of VoIP media. Therefore the encryption is not affected by modification of SIP and SDP information that occurred in gateway. Also, redesigned RTP includes code for whether or not to apply encryption. By using the code, modification of RTP header from gateway prevents. As a result, redesigned RTP maintain the integrity and the RTP is able to perform encryption between the different private networks. Also, we conduct a test for performance analysis of SRTP, ZRTP and redesigned RTP.

Design and Performance Evaluation of the Secure Transmission Module for Three-dimensional Medical Image System based on Web PACS (3차원 의료영상시스템을 위한 웹 PACS 기반 보안전송모듈의 설계 및 성능평가)

  • Kim, Jungchae;Yoo, Sun Kook
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.179-186
    • /
    • 2013
  • PACS is a medical system for digital medical images, and PACS expand to web-based service using public network, DICOM files should be protected from the man-in-the-middle attack because they have personal medical record. To solve the problem, we designed flexible secure transmission system using IPSec and adopted to a web-based three-dimensional medical image system. And next, we performed the performance evaluation changing integrity and encryption algorithm using DICOM volume dataset. At that time, combinations of the algorithm was 'DES-MD5', 'DES-SHA1', '3DES-MD5', and '3DES-SHA1, and the experiment was performed on our test-bed. In experimental result, the overall performance was affected by encryption algorithms than integrity algorithms, DES was approximately 50% of throughput degradation and 3DES was about to 65% of throughput degradation. Also when DICOM volume dataset was transmitted using secure transmission system, the network performance degradation had shown because of increased packet overhead. As a result, server and network performance degradation occurs for secure transmission system by ensuring the secure exchange of messages. Thus, if the secure transmission system adopted to the medical images that should be protected, it could solve server performance gradation and compose secure web PACS.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

Conceptual Design Analysis of Satellite Communication System for KASS (KASS 위성통신시스템 개념설계 분석)

  • Sin, Cheon Sig;You, Moonhee;Hyoung, Chang-Hee;Lee, Sanguk
    • The Journal of Advanced Navigation Technology
    • /
    • v.20 no.1
    • /
    • pp.8-14
    • /
    • 2016
  • High-level conceptual design analysis results of satellite communication system for Korea augmentation satellite system (KASS) satellite communication system, which is a part of KASS and consisted of KASS uplink Stations and two leased GEO is presented in this paper. We present major functions such as receiving correction and integrity message from central processing system, taking forward error correction for the message, modulating and up converting signal and conceptual design analysis for concepts for design process, GEO precise orbit determination for GEO ranging that is additional function, and clock steering for synchronization of clocks between GEO and GPS satellites. In addition to these, KASS requires 2.2 MHz for SBAS Augmentation service and 18.5 MHz for Geo-ranging service as minimum bandwidths as a results of service performance analysis of GEO ranging with respect to navigation payload(transponder) RF bandwidth is presented. These analysis results will be fed into KASS communication system design by carrying out final analysis after determining two GEOs and sites of KASS uplink stations.

Evaluation of Access Control Function of the Standard Records Management System (표준기록관리시스템 기능 평가 접근관리 기능을 중심으로)

  • Park, Min-Yung
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.3-35
    • /
    • 2013
  • The physical access or control of records with material entities is relatively easy. However, in the case of electronic records, due to its heightened applicative aspect that allows anyone with the authority to have access over the data, it requires an appropriate standard and stability to ensure the authenticity and integrity of electronic records. This study performed functional evaluation by extracting the minimum critical items from the national functional requirements documents and standards to explore the access control function that play an important role for the standard records management system to maintain quality requirements of electronic records. Based on this checklist, it evaluates whether the standard records management system properly carries out the access control function and investigates the current condition of application to practical records management work. Records managers generally do not use access control function, which may be because they do not feel the necessity, since the application of records management system is not yet actively promoted. In order for the standard records management system to be developed to become a more active system, it requires system improvement as well as considerations for below factors: First, although the necessity of establishing access control conditions is already recognized, it requires a clear stipulation of the regulation. Second, measures must be taken to implement access control in the records management system through document security solution. Third, it requires self-reflection of records manager, who utilizes the records management system. Instead of placing all responsibility on the National Archives, which established the system, professionals must further develop the system through continuous evaluation and improvement. Finally, a general discussion is required to publicize the issue of functional improvement of records management system. Although there is a bulletin board already created for this purpose, its users are extremely limited and it only deals with current problems. A space in online as well as in offline is required to solve the fundamental problems and exchange opinions.

A Study on Preservation Metadata for Long Term Preservation of Electronic Records (전자기록의 장기적 보존을 위한 보존메타데이터 요소 분석)

  • Lee, Kyung-Nam
    • The Korean Journal of Archival Studies
    • /
    • no.14
    • /
    • pp.191-240
    • /
    • 2006
  • For long-term preservation of electronic records, the information on the whole processes of management from the time of creation of the electronic information should be captured and managed together. Such information is supported by preservation metadata thus the implementation of preservation metadata is important for preservation of electronic records maintaining the record-ness. Preservation metadata is the information that supports the process of digital preservation and functions th maintain long-term viability, renderability, understandability, authenticity and identity of digital resources. Preservation metadata should be developed applying the international standard Reference Model for an Open Archival Information System(OAIS) to have international interoperability for exchange and reuse. Initial international preservation metadata schemas were developed standardizing the OAIS Reference Model. But the preservation metadata schema of Victorian Electronic Records Strategy(VERS) and recently published Data Dictionary of PREMIS Working Group were developed in advanced types that are different from the existing framework. Those were advanced th practical ones from conceptual one. Comparing these two cases, proposed the elements of integral preservation metadata for long-term preservation of electronic records. This thesis has the significance that it has suggested the direction for future development of the elements of preservation metadata by setting the past discussions related to preservation metadata in order and proposing integral preservation metadata elements for long-term preservation of electronic records.

An Experiment for Surface Reflectance Image Generation of KOMPSAT 3A Image Data by Open Source Implementation (오픈소스 기반 다목적실용위성 3A호 영상자료의 지표면 반사도 영상 제작 실험)

  • Lee, Kiwon;Kim, Kwangseob
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_4
    • /
    • pp.1327-1339
    • /
    • 2019
  • Surface reflectance obtained by absolute atmospheric correction from satellite images is useful for scientific land applications and analysis ready data (ARD). For Landsat and Sentinel-2 images, many types of radiometric processing methods have been developed, and these images are supported by most commercial and open-source software. However, in the case of KOMPSAT 3/3A images, there are currently no tools or open source resources for obtaining the reflectance at the top-of-atmosphere (TOA) and top-of-canopy (TOC). In this study, the atmospheric correction module of KOMPSAT 3/3A images is newly implemented to the optical calibration algorithm supported in the Orfeo ToolBox (OTB), a remote sensing open-source tool. This module contains the sensor model and spectral response data of KOMPSAT 3A. Aerosol measurement properties, such as AERONET data, can be used to generate TOC reflectance image. Using this module, an experiment was conducted, and the reflection products for TOA and TOC with and without AERONET data were obtained. This approach can be used for building the ARD database for surface reflection by absolute atmospheric correction derived from KOMPSAT 3/3A satellite images.

An Environmental Analysis of Candidate SBAS Reference Station (위성기반 보강시스템 기준국 후보지의 환경 분석)

  • Han, Younghoon;Park, Sul Gee;Lee, Sangheon;Park, Sang Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.685-688
    • /
    • 2016
  • SBAS(Satellite Based Augmentation System) broadcasts the correction message based on satellite communication to improve the positioning accuracy of GNSS user. For this reason, SBAS is actively being utilized on navigation part. To apply SBAS to navigation part, it should satisfy not only accuracy but also integrity, continuity, availability, coverage requirements and so on. Since SBAS reference station is the base infrastructure of SBAS, it is the main factor to determine the environment, position, and geometry of reference stations to achieve SBAS service performance. Therefore, a site environmental analysis should be performed prior to the selection of SBAS reference station. In this paper, it performs the environmental analysis of NDGPS(Nationwide Differential GPS) reference station sites on the premise that SBAS reference station will be co-operated in the same site of NDGPS operated by MOF(Ministry of Oceans and Fisheries). The environmental analysis is conducted as carrying out the visibility analysis of GPS satellite and interference analysis. This paper also presents the brief procedures and requirements for site survey of SBAS reference station.

  • PDF

A Proposal for Mobile Gallery Auction Method Using NFC-based FIDO and 2 Factor Technology and Permission-type Distributed Director Block-chain (NFC 기반 FIDO(Fast IDentity Online) 및 2 Factor 기술과 허가형 분산원장 블록체인을 이용한 모바일 갤러리 경매 방안 제안)

  • Noh, Sun-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, studies have been conducted to improve the m-commerce process in the NFC-based mobile environment and the increase of the number of smart phones built in NFC. Since authentication is important in mobile electronic payment, FIDO(Fast IDentity Online) and 2 Factor electronic payment system are applied. In addition, block-chains using distributed raw materials have emerged as a representative technology of the fourth industry. In this study, for the mobile gallery auction of the traders using NFC embedded terminal (smartphone) in a small gallery auction in which an unspecified minority participates, password-based authentication and biometric authentication technology (fingerprint) were applied to record transaction details and ownership transfer of the auction participants in electronic payment. And, for the cost reduction and data integrity related to gallery auction, the private distributed director block chain was constructed and used. In addition, domestic and foreign cases applying block chain in the auction field were investigated and compared. In the future, the study will also study the implementation of block chain networks and smart contract and the integration of block chain and artificial intelligence to apply the proposed method.

Research Trends of SCADA Digital Forensics and Future Research Proposal (SCADA 디지털포렌식 동향과 향후 연구 제안)

  • Shin, Jiho;Seo, Jungtaek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1351-1364
    • /
    • 2019
  • When SCADA is exposed to cyber threats and attacks, serious disasters can occur throughout society. This is because various security threats have not been considered when building SCADA. The bigger problem is that it is difficult to patch vulnerabilities quickly because of its availability. Digital forensics procedures and techniques need to be used to analyze and investigate vulnerabilities in SCADA systems in order to respond quickly against cyber threats and to prevent incidents. This paper addresses SCADA forensics taxonomy and research trends for effective digital forensics investigation on SCADA system. As a result, we have not been able to find any research that goes far beyond traditional digital forensics on procedures and methodologies. But it is meaningful to develop an approach methodology using the characteristics of the SCADA system, or an exclusive tool for SCADA. Analysis techniques mainly focused on PLC and SCADA network protocol. It is because the cyber threats and attacks targeting SCADA are mostly related to PLC or network protocol. Such research seems to continue in the future. Unfortunately, there is lack of discussion about the 'Evidence Capability' such as the preservation or integrity of the evidence extracting from SCADA system in the past researches.