• Title/Summary/Keyword: 상호 인증 프로토콜

Search Result 311, Processing Time 0.032 seconds

WiMAX Security Mechanism for Minimizing Performance load of Base Station (베이스 스테이션의 성능부하를 최소화하기 위한 WiMAX 보안 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1875-1882
    • /
    • 2008
  • Nowadays, usage of mobile unit which has a characteristic of low cost and high efficiency is being generalized because of frequent use of internet-based variable service and application in IEEE 802.16 WiMAX. A study for handling a security problem of high speed internet service is rising while the use of a mobile is being generalized. This paper suggests a security mechanism which provides safety from certification load of SS and a security attack as well as a basic function which is provided from IEEE 802.16e standard to satisfy security demand of IEEE802.16 WiMAX. The proposed mechanism exchangeskey material information for TEK and data code by using 난수(?) and secret value created by SS and BS, also reduces capacity load of BS not to perform an additional certificate procedure of BS by using the early certification information and certificate of SS.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

A Comparative Analysis of Library Portal User Interface Systems (도서관 포털 통합 유저인터페이스 시스템 비교.분석)

  • Kim Seong-Hee;Lee Jeong-Soo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.2
    • /
    • pp.175-194
    • /
    • 2006
  • A common user interface system, a subset of library portal software products was evaluated in terms of eight broader categories; searching, user interaction; customization; authentication; design; database communication protocols; after sale support; and software platforms supported. As a result, Muse search ENCompass, MetaLib were the three highest scoring common user interface software products. and KDB metasearch in domestic area was the highest scoring products.

RFID Anonymization Mechanism for Privacy Protection (프라이버시 보호를 위한 RFID 익명화 메커니즘)

  • Lee Dong-Hyeok;Song You-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.574-578
    • /
    • 2006
  • 유비쿼터스 컴퓨팅 환경에서는 센서를 통하여 실시간의 상황인식 서비스를 제공하며, 이를 위해 사용자의 위치 정보 수집이 필요하다. NTT에서는 RFID에 대한 익명화를 통한 프라이버시보호 메커니즘을 제안하였다. 그러나, 불법적으로 접근하는 리더가 존재할 경우 i값의 비동기화를 통한 태그에 대한 Random Tampering공격이 가능하다. 본 논문에서는 NTT 연구소의 RFID 익명화 방법을 개선하여 태그의 Random Tampering 공격 방지가 가능하고, 태그와 리더 상호간 인증이 가능하며, 연산 과정을 절감시킨 새로운 RFID 익명화 프로토콜을 제안한다. 제안한 방법을 통하여 보다 안전하고 효율적으로 RFID기반 센서 네트워크 환경에서 사용자의 프라이버시를 보호할 수 있다.

  • PDF

안전한 웹 서비스를 위한 SOAP 메시지 보안기술 연구

  • 박배효;이재일
    • Review of KIISC
    • /
    • v.14 no.4
    • /
    • pp.10-18
    • /
    • 2004
  • 상호운영성, 유연성, P2P(피어투피어), 역동성, 확장성 등 웹 서비스가 지닌 다양한 특성으로 인하여 웹 서비스 보안은 안전한 웹 서비스 운영을 위한 핵심요소라 할 수 있다. 웹 서비스의 기본 구성은 서비스 수요자와 제공자, 검색소로 구성되며 WSDL(Web Service Definition Language), UDDI(University Discovery and Integration of Business for Web), SOAP(Smple Object Access Protocol)등 세 개의 표준으로 서비스는 이루어진다. 이 중에서 특히 메시지 교환을 담당하는 통신 프로토콜인 SOAP는 웹 서비스 보안의 중심에 있으며, 웹 서비스 보안은 SOAP 메시지의 사용자 인증과 무결성, 기밀성을 보장하는 것으로 정의할 수 있다. SOAP는 HTTP를 통해 일반적으로 전송되므로 HTTP 상의 모든 위협을 가지게 되며 전송계층에 기반을 둔 보안을 생각할 수 있지만, 사실상 웹 서비스는 다수의 중간 중개자를 가질 수 있는 구조이기 때문에 단대단 보안(메시지 레벨의 보안)이 반드시 필요하다. 또한, 웹 서비스 상에서 단대단 보안을 보장하기 위해서는 각 객체와 키와의 연결이 중요하며 특정 객체에게 발행한 보안토큰의 신뢰성 화보를 위한 메카니즘을 필요로 한다. 본 논문에서는 이러한 보안 요구사항을 만족하기 위하여 XML 메시지 보안을 위한 전자서명 및 암호화 표준과 SOAP을 위한 W3C, OASIS의 통합표준을 중심으로 SOAP 메시지 보안기술을 분석하고자 한다.

A Lightweight Mutual Authentication Protocol based Hash Chain for Low-power RFID Systems (저전력 RFID 시스템을 위한 해시 체인 기반의 경량화 된 상호 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.560-566
    • /
    • 2009
  • A low-power Radio Frequency Identification (RFID) system is an auto-identification technology that reads and writes an information of things without physical contacts using radio frequency. It is unescapable against unlawful modification, eavesdropping, tracking, or privacy of individuals because RFID systems use the radio frequency and RFID tags. Therefore we create a key using hash chain between database and tag and this process can prevent above attacks. Also we support the efficiency of proposed protocol using hash function to abate computation.

Analysis of NFC-SEC for NFC Security (NFC 보안을 위한 NFC-SEC 분석)

  • Kim, Dong-Min;Kim, Hee-Youl
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.251-253
    • /
    • 2012
  • 최근 스마트폰에 탑재된 NFC를 통한 결제 서비스의 시장이 각광을 받고 있다. 사용자는 자신의 신용카드 정보와 같은 지불 수단을 스마트폰에 탑재된 NFC 장치에 기록하여 리더기에 그 정보를 보냄으로써 간편하게 결제를 할 수 있게 되었다. 하지만 무선 신호의 특성상 사용자의 정보가 외부로 노출될 가능성도 배제할 수 없으며, NFC 데이터를 읽는 리더기가 신뢰 가능한 리더기인지 알 수 없는 보안 취약성이 존재한다. 본 논문에서는 NFC를 통해 안전하게 데이터 통신을 할 수 있도록 정의된 NFC-SEC 표준에 대해서 살펴보고, NFC-SEC 프로토콜에서 피어 간의 상호 인증의 필요성에 대해서 말한다.

Chameleon Hash-Based Mutual Authentication Protocol for Secure Communications in OneM2M Environments (OneM2M 환경에서 안전한 통신을 위한 카멜레온 해쉬 기반의 상호인증 프로토콜)

  • Kim, Sung-soo;Jun, Moon-seog;Choi, Do-hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1958-1968
    • /
    • 2015
  • Things intelligence communication (M2M or IoT) service activation and global company of OneM2M-related business on aggressive investing and has led to the acceleration of change in the ICT market. But a variety of hacking security technology because of the possibility of secure communication (data exposure, theft, modification, deletion, etc.) has been issued as an important requirement. In this paper, we propose a mutual authentication protocol for secure communications chameleon hash based on the M2M environment. The results of performance analysis efficiency is encryption and decryption an average of 0.7%, calculated rate showed good results as compared to the target algorithm, equivalent to a 3%(Average 0.003 seconds) difference, mutual authentication and encryption region by using the key update advantage of ECC(Elliptic Curve Cryptography)based Chameleon hash function is signed of the operational efficiency, using a collision message verifiable properties demonstrated strong security of the communication section.

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment (스마트 홈 환경에서 디바이스 상호 인증 및 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.661-667
    • /
    • 2018
  • Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.