• Title, Summary, Keyword: Casper

Search Result 32, Processing Time 0.038 seconds

Deriving Personalized Context-aware Services from Activities of Daily Living (생활 데이터 분석을 통한 개인화된 상황인식서비스 생성)

  • Park, Jeong-Kyu;Lee, Keung-Hae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.525-530
    • /
    • 2010
  • Currently, most context-aware services are built by developers. Some researchers argued that services should be defined by end users, who understand their own needs best. We view that the significance of enabling the user to define his/her personalized services will multiply as our living spaces grow smarter. This paper introduces a novel method called CASPER, which is capable of deriving personalized services from the log of user's activities of daily living. CASPER can generate useful services that even the user may not perceive, mining causality of events in the log. We present the algorithm of CASPER in detail and discuss the result of an experiment which we conducted as a proof of concept.

Analysis of VANET Authentication Protocol using Casper in the Formal Verification (정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.

The Security Analysis of SSH protocol using Casper, FDR (Casper, FDR를 이용한 SSH 프로토콜의 안전성 분석)

  • 김일곤;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • /
    • pp.442-444
    • /
    • 2002
  • 인터넷의 비약적인 발전과 더불어, 인터넷을 활용한 각종 온라인 서비스가 활성화되어 가고 있는 추세이다. 온라인 쇼핑몰, 온라인 뱅킹과 같은 전자 상거래 서비스는 이용자와 서비스 제공자간의 상호 신뢰를 기반으로 동작해야만 하는 서비스이다. 해당 서비스에 대한 적합한 사용자를 인증하고 인가하기 위한 다양한 인증 프로토콜(EKE, S/KEY, Kerberos 등)에 대한 다양한 연구가 진행되어 오고 있다. 본 논문에서는 FDR, Casper과 같은 보안 프로토콜 분석 및 검증 도구를 이용하여 SSH 프로토콜의 위험성을 분석하여 보안 프로토콜의 안전성을 향상시키고자 한다.

  • PDF

The Vulnerability Analysis and Modification of SSH Protocol using Casper, FDR (Casper, FDR을 이용한 SSH 프로토콜의 취약성 분석 및 수정)

  • 김일곤;최진영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • /
    • pp.288-291
    • /
    • 2002
  • 보안 프로토콜을 이용하여 사용자 상호 간의 정보의 비밀성, 무결성, 부인방지를 보장하는 일은 반드시 필요한 과제가 되었다. 이에 따라 해당 서비스에 대해 적합한 사용자를 인증하고 인가하기 위해 다양한 보안 프로토콜(EKE, S/KEY, Kerberos등)이 사용되고 있으며, 이와 더불어 보안 프로토콜을 정형적으로 명세하고 검증하기 위한 다양한 방법들이 연구되고 있다. 본 논문에서는 Casper와 FDR을 이용하여 SSH 프로토콜의 취약성을 분석하고, 수정하여 SSH 프로토콜의 안전성을 향상시키고자 하였다.

  • PDF

A Key Distribution Protocol Specification using Casper (Casper를 이용한 키 분배 프로토콜 명세)

  • Lee, Sung-Min;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • /
    • pp.1163-1165
    • /
    • 2000
  • 최근 보안 프로토콜의 안전성을 검증하는 연구가 활발히 진행되고 있다. 이러한 연구 중 대표적인 방법이 CSP[1]와 FDR[2]과 같은 정형 기법을 이용하여 프로토콜을 분석하는 것이다. 이 방법은 매우 성공적으로 프로토콜의 문제점을 발견하고 안전성을 검증할 수 있었다. 하지만 CSP를 이용하여 프로토콜을 명세하는 것은 숙달된 전문가에게만 적합하고 시간이 오래 걸린다는 문제점을 갖는다. 이러한 문제점을 해결하여 좀 더 쉽게 프로토콜을 명세하여 CSP 코드를 생성해주는 캐스퍼(Casper)[3]가 제안되었다. 본 논문에서는 세 개의 메시지 교환을 통해서 키를 분배하는 키 분배 프로토콜을 제안하고 캐스퍼를 이용하여 제안한 프로토콜에 대한 정형 명세를 한다. 명세된 스크립트는 캐스퍼를 이용하여 FDR의 입력 파일이 되는 667 라인의 CSP 코드를 생성하였다. 캐스퍼를 이용한 정형 명세는 좀 더 편리하게 프로토콜을 명세할 수 있고 명세 시 발생할 수 있는 에러를 줄임으로써 신뢰성을 높일 수 있다.

  • PDF

Formal Methodology for Safety Analysis of Security Protocols (보안 프로토콜의 안전성 분석을 위한 정형적 방법론)

  • Kim Il-Gon;Jeon Chul-Wuk;Kim Hyun-Seok;Choi Jin-Young;Kang In-Hye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.17-27
    • /
    • 2005
  • With the development of wire and wireless based networks, a various security protocols have been proposed to protect important resources and user information against attackers. However, many security protocols have found oかy to be later vulnerable to attacks. In this Paper, we introduce the formal methodology to verify the safety of security protocols in the design phase, and we take advantage of the formal methodology which uses Casper/CSP and FDR tools by introducing the verification example of EKE protocol and BCY protocol. Lastly, we propose a new BCY protocol after verifying it's safety.

An RFID Mutual Authentication Protocol Using Tag's ID (태그 ID를 이용한 RFID 상호인증 프로토콜)

  • Oh, Sejin;Yun, Taejin
    • Journal of Security Engineering
    • /
    • v.14 no.4
    • /
    • pp.281-292
    • /
    • 2017
  • The RFID(Radio Frequency Identification) System is data transmission technology using by radio frequency and used in various areas of IoT(Internet of Things). However, It has security problems because it transfer data using radio frequency between reader and tags. In this paper, we proposed AES(Advanced Encryption Standard) algorithm-based RFID mutual authentication protocol for passive RFID tags. The proposed protocol resolve fixed secret key of symmetric key based-RFID protocol using by tag's ID because Tag's ID is used as ecryption and decryption key in mutual authentication process. In addition, our scheme resolve various attacks to verify random number of reader and tags in RFID environment. We described our protocol and formally verified security using by Casper/FDR tool.

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks

  • Obaidat, Mohammad S.;Dhurandher, Sanjay K.;Diwakar, Khushboo
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.241-260
    • /
    • 2011
  • In earlier days, most of the data carried on communication networks was textual data requiring limited bandwidth. With the rise of multimedia and network technologies, the bandwidth requirements of data have increased considerably. If a network link at any time is not able to meet the minimum bandwidth requirement of data, data transmission at that path becomes difficult, which leads to network congestion. This causes delay in data transmission and might also lead to packet drops in the network. The retransmission of these lost packets would aggravate the situation and jam the network. In this paper, we aim at providing a solution to the problem of network congestion in mobile ad hoc networks [1, 2] by designing a protocol that performs routing intelligently and minimizes the delay in data transmission. Our Objective is to move the traffic away from the shortest path obtained by a suitable shortest path calculation algorithm to a less congested path so as to minimize the number of packet drops during data transmission and to avoid unnecessary delay. For this we have proposed a protocol named as Congestion Aware Selection Of Path With Efficient Routing (CASPER). Here, a router runs the shortest path algorithm after pruning those links that violate a given set of constraints. The proposed protocol has been compared with two link state protocols namely, OSPF [3, 4] and OLSR [5, 6, 7, 8].The results achieved show that our protocol performs better in terms of network throughput and transmission delay in case of bulky data transmission.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.