• Title/Summary/Keyword: 모바일 키

Search Result 258, Processing Time 0.03 seconds

User Authentication and Key Distribution on Open IPTV System (개방형 IPTV 환경에서의 사용자 인증 및 키 분배 메커니즘)

  • Jung, Ji-Yeon;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.227-236
    • /
    • 2011
  • IPTV(Internet Protocol Television) is one of the typical businesses which are the convergence of Broadcast and Communication. It provides broadcasting service using IP networks. Recently, IPTV service is developed to Mobile IPTV or Open IPTV. Especially, Open IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such as Open IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the delay of user authentication on Open IPTV system compared to other authentication mechanisms. We also compare our proposal and other mechanisms in various aspects, and analyze efficiency and safety of proposed mechanism. As a result, we insist that this mechanism satisfies the security requirements for IPTV.

Secure Mobile-in-Vehicle System with CBC-MAC authentication (CBC-MAC 방식을 적용한 보안 모바일기기 제어시스템)

  • Hwang, Jae-Young;Choi, Dong-Wook;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2657-2662
    • /
    • 2010
  • Demand on information security in mobile devices based control system grows rapidly with a view to counteracting information hacking and leakage. Among these techniques, encryption and authentication are most common. This paper presents CBC-MAC (Cipher Block Chaining-Message Authentication Code) based mobile devices control system. The system is termed as Secure Mobile in Vehicle (SMIV)We use CBC-MAC that is one of the most efficient authentication modes to protect information against any malicious attacks. By sharing the secret key of CBC-MAC between the transmitter and receiver, it asserts authentic information. The proposed system is verified in such a way that we develop mobile devices control system, apply the CBC-MAC algorithm to the control system and validate the received data. Unlike conventional systems where the development of control mechanism in mobile devices based control systems is main concern, this proposed system offers a secure communication link of the data in mobile devices control system and therefore would be useful to the design and implementation of various mobile devices based control systems.

Formal Specification and Analysis of Mobile E-commerce protocol (모바일 전자상거래 프로토콜의 정형명세 및 분석)

  • Noh Jung Hyun;Kim Il-Gon;Choi Jin-Ghoo;Kim Hyun-Seok;Choi Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.124-126
    • /
    • 2005
  • 무선 인터넷을 이용한 전자상거래가 증가함에 따라 모바일 환경에서 전자상거래를 보다 안전하고 효율적으로 사용할 수 있도록 SET/A (Secure Electronic Transaction Agent) 프로토콜이 제안되었다. 본 논문에서는 키 노출에 따른 보안 취약점을 분석이 아닌 프로토콜의 행위적 관점에서 SET/A를 정형 명세하고 무선망 접속 불량이나 에이전트 동작 실패와 같은 오류 상황에 의해 교착 상태에 빠지지 않는지 정형 검증하였다. 그 결과 SET/A가 교착 상태에 빠질 수 있음을 확인하였고 확장된 SET/A 프로토콜을 제안하고 검증하였다.

  • PDF

Analysis of Effect on Wireless Security Communication System based on Java (자바 기반의 효율적인 무선 보안통신 시스템 분석)

  • Chae, Cheol-Joo;Kim, Ji-Hyen;Lee, Seoung-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1063-1066
    • /
    • 2005
  • 본 논문에서는 모바일 인터넷에서 보안에 대해 논의한다. 무선 인터넷 사용자나 프로그램 및 네트워크 기술들이 지난 몇 년간 눈부시게 발전했다. 단말기의 제약사항으로 인하여 모바일 인터넷은 유선의 인터넷과 몇 가지 다른 구조를 가지고 있다. 단말기의 제약사항으로 인해 무선중계 보안 시스템 설계 시 그 기반이 될 수 있는 무선 인터넷 프로토콜(WAP, I-mode, ME) 중에서 전세계적으로 가장 표준으로 알려진 WAP에 대해서 살펴보고 무선 통신에서 보안 서비스를 위해 사용되는 WTLS와 이를 위한 공개키 기반 구조(WPKI)에서 요구사항을 살펴본다. 실질적으로 무선 인터넷 서비스를 제공하는 자바 보안 기법에 대해서 논의한다.

  • PDF

A Study of Ad-Hoc network Security for Group Management support of Multicast (ad-hoc 네트워크에서 상호 인증을 위한 메커니즘)

  • Kim, Jeong-Beom;Park, Nam-Seop;Kim, Tai-Yun;Lee, Yun-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1643-1646
    • /
    • 2002
  • Ad-Hoc 네트워크는 모바일 호스트를 위한 새로운 무선 네트워크 패러다임이다. 전형적인 모바일 네트워크와는 다르게 ad-Hoc 네트워크는 어떠한 인프라스트럭처에 의존하지 않는다. 대신에 호스트들은 연결 유지를 위해 서로간에 의존한다. 이러한 특성을 지닌 ad-Hoc 네트워크의 보안은 주요 이슈라고 할 수 있다. Ad-Hoc 네트워크에서는 네트워크 Topology가 자주 번하기 때문에 이러한 특성에 맞는 확장성 있는 분산 그룹 키 분배를 제안한다.

  • PDF

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

The Biometric Authentication based Dynamic Group Signature Scheme (바이오메트릭 인증 기반의 동적 그룹 서명 기법)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.1
    • /
    • pp.49-55
    • /
    • 2016
  • In a delegate authentication, a user can lend his/her own authentication data to the third parties to let them be authenticated instead of himself/herself. The user authentication schemes based on the memory of unique data such as password, are vulnerable to this type of attack. Biometric authentication could minimize the risk of delegate authentication since it uses the biometric data unique by each person. Group authentication scheme is used to prove that each group member belongs to the corresponding group. For applications such as an electronic voting or a mobile meeting where the number of group members is changing dynamically, a new group authentication method is needed to reflect the status of group in real time. In this paper, we propose biometric authentication based dynamic group signature scheme. The proposed scheme is composed of biometric key generation, group public key creation, group signature generation, group signature verification and member update protocols. The proposed member update protocol is secure against colluding attacks of existing members and could reflect group status in real time.

Mobile Interaction in a Usable-Unified-Ubiquitous (U3) Web Service for Real-time Social Networking Service (실시간 소셜 네트워크 서비스를 위한 사용 가능한-통합적-유비쿼터스 (U3) 웹 서비스에서의 모바일 상호작용)

  • Kim, Yung-Bok;Kim, Chul-Su
    • The KIPS Transactions:PartB
    • /
    • v.15B no.3
    • /
    • pp.219-228
    • /
    • 2008
  • For real-time social networking service, mobile interaction in a usable-unified-ubiquitous (U3) web service was studied. Both as a convenient mobile HCI for real-time social networks and as indexing keys to metadata information in ubiquitous web service, the multi-lingual single-character domain names (e.g. 김.net, 이.net, 가.net, ㄱ.net, ㄴ.net, ㅎ.net, ㅏ.net, ㅔ.net, ㄱ.com, ㅎ.com) are convenient mobile interfaces when searching for social information and registering information. We introduce the sketched design goals and experience of mobile interaction in Korea, Japan and China, with the implementation of real-time social networking service as an example of U3 Web service. We also introduce the possibility of extending the application to the metadata directory service in IP-USN (IP-based Ubiquitous Sensor Network) for a unified information management in the service of social networking and sensor networking.

MS64: A Fast Stream Cipher for Mobile Devices (모바일 단말에 적합한 고속 스트림 암호 MS64)

  • Kim, Yoon-Do;Kim, Gil-Ho;Cho, Gyeong-Yeon;Seo, Kyung-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.6
    • /
    • pp.759-765
    • /
    • 2011
  • In this paper, we proposed fast stream cipher MS64 for use mobile that it is secure, fast, and easy to implement software. The proposed algorithm use the fast operating 213-bit arithmetic shift register(ASR) to generate a binary sequence and produce 64-bit stream cipher by using simple logical operation in non linear transform. MS64 supports 128-bit key in encryption algorithm and satisfy with the safety requirement in modern encryption algorithm. In simulation result shows that MS64 is faster than a 32-bit stream cipher SSC2 in the speed of operation with small usage of memory thus MS64 can be used for mobile devices with fast ciphering.

An Efficient Security Protocol for Transaction in Mobile Data Network (모바일 데이터 망에서의 거래를 위한 효율적인 보안 프로토콜)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.43-51
    • /
    • 2006
  • The existing electronic transaction protocol uses a cryptography algorithm that is not suitable for mobile environment because of limited memory and process ability. In this paper, we propose an efficient transaction protocol suitable for mobile embedded system. The proposed protocol reduces computation and process time by using ID-based cryptography algorithm and ECC (elliptic curve cryptosystem). It uses vendor authentication only in the first transaction, and from the second transaction, it requires transaction after authentication with session created by applying ECC technique. Therefore, the creation number of authentication for the vendor can be reduced from n to one. And it reduces process time because it provides the same security with 160 bits as with 1024 bits of RSA.

  • PDF