• Title/Summary/Keyword: 스마트 단말 보안

Search Result 95, Processing Time 0.03 seconds

Blockchain-based Smart Meter Authentication Protocol in Smart Grid Environment (스마트 그리드 환경에서 블록체인 기반 스마트 미터 인증 프로토콜)

  • Jonghyun Kim;Myeonghyun Kim;Youngho Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.5
    • /
    • pp.41-54
    • /
    • 2023
  • Smart grid that supports efficient energy production and management is used in various fields and industries. However, because of the environment in which services are provided through open networks, it is essential to resolve trust issues regarding security vulnerabilities and privacy preservation. In particular, the identification information of smart meter is managed by a centralized server, which makes it vulnerable to security attacks such as device stolen, data forgery, alteration, and deletion. To solve these problems, this paper proposes a blockchain based authentication protocol for a smart meter. The proposed scheme issues an unique decentralized identifiers (DIDs) for individual smart meter through blockchain and utilizes a random values based on physical unclonable function (PUF) to strengthen the integrity and reliability of data. In addition, we analyze the security of the proposed scheme using informal security analysis and AVISPA simulation, and show the efficiency of the proposed scheme by comparing with related work.

Analysis of Threats and Countermeasures on Mobile Smartphone (스마트폰 보안위협과 대응기술 분석)

  • Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.153-163
    • /
    • 2011
  • Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.

Risk Analysis on Various Contextual Situations and Progressive Authentication Method based on Contextual-Situation-based Risk Degree on Android Devices (안드로이드 단말에서의 상황별 위험도 분석 및 상황별 위험도 기반 지속인증 기법)

  • Kim, Jihwan;Kim, SeungHyun;Kim, Soo-Hyung;Lee, Younho
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1154-1164
    • /
    • 2016
  • To prevent the use of one's smartphone by another user, the authentication checks the owner in several ways. However, whenever the owner does use his/her smartphone, this authentication requires an unnecessary action, and sometimes he/she finally decides not to use an authentication method. This can cause a fatal problem in the smartphone's security. We propose a sustainable android platform-based authentication mode to solve this security issue and to facilitate secure authentication. In the proposed model, a smartphone identifies the current situation and then performs the authentication. In order to define the risk of the situation, we conducted a survey and analyzed the survey results by age, location, behavior, etc. Finally, a demonstration program was implemented to show the relationship between risk and security authentication methods.

The Design of an Authentication System using Smart Card and Fingerprint (스마트 카드와 지문을 이용한 인증 시스템 설계)

  • 손인구;민경진;류은경;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.500-502
    • /
    • 2003
  • 본 논문에서는 다양한 응용 분야에 이용되는 스마트 카드의 보안성을 높이기 위하여 스마트 카드와 무선 단말기, 무선 단말기와 사용자간의 인증을 구분하여 설계하였다. 기존의 스마트 카드와 지문을 이용한 인증 시스템은 스마트 카드내의 지운 정보의 유출이나 스마트 카드 상에서 지문 매칭시 현실적인 문제뿐 안 아니라 카드와 단말기 양측을 모두 인증하는데 어려움이 있었다. 그래서 본 논문은 기존의 스마트 카드와 단말기의 양방향 인증 등을 이용하지 않고, 스마트 카드가 무선 단말기를 인증한 다음. 우선 단말기에 부착된 지문 센서를 이용해 입력된 사용자의 지문 정보로 단말기가 사용자 인증을 하도록 하였다. 제안된 인증 시스템은 스마트 카드 및 지문을 이용하여 사용자측(스마트 카드와 카드 소유자)과 단말기간의 상호인증을 제공한다. 이러한 이중 인증 메카니즘을 무선 인터넷 환경에서 보다 안전한 인증 시스템을 제공할 수 있을 것이다.

  • PDF

Individual users based SmartPhone Remote Management System Design and Implementation (개인사용자 기반 스마트폰 원격관리 시스템 설계 및 구현)

  • Kang, Sung-Tae;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2675-2681
    • /
    • 2012
  • By increasing of the population that uses smartphones, problems such as the leakage of private and confidential information due to portable and easy to store and movement of diverse contents occur for a variety of security threats. In this report, it provides helpful information to customers in order to respond various security threat by implementing and designing an remote administration system with using Mobile Device Management (MDM), technology. As a result, customers themselves can prevent information spill by managing remotely from WEB due to the lost and stolen. It is also possible to use control and monitoring.

The Design of an Adaptive service that is adoptable in smart CEs embedded thin client module using hybrid home-cloud (경량 스마트 가전에 적용 가능한 하이브리드 홈 클라우드 기반 적응형 서비스 설계)

  • Jung, Jong-Jin;Lim, Tae-Beom;Lee, Suk-Pil
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.210-212
    • /
    • 2012
  • 하이브리드 스마트 홈 클라우드 플랫폼/서비스 기술은 가정 내 외 클라우드와 연계하여 실시간으로 수정되는 다양한 콘텐츠, 응용 프로그램, 스마트 가전, 개인 생활 정보들을 융합 관리 함으로써 멀티미디어, 어플리케이션, 스마트 가전 등을 통하여 다양한 스마트 융복합 서비스를 제공해 줄 수 있는 기술이다. 이에 본 논문은 데이터의 프라이버시, 안정성, 보안성, 종속화등 Public Cloud에 대한 거부반응을 해소하기 위해 개인 또는 흠단위로 스마트 콘텐츠를 서로 공유할수 있는 댁내 Private 클라우드와 다양한 스마트 홈 서비스를 제공하는 사업자 및 소셜 그룹간의 공유가 가능한 댁 외 Public 클라우드와 연계하여, 실시간으로 수집되는 다양한 콘텐츠, 용용 프로그램, 스마트 가전, 개인 생활 정보들을 통합 관리하고, 서비스 가상화 기술을 이용하여 다양한 경량화 스마트 가전(Thin/Zero Client)에 동시 적용 가능한 "하이브리드 홈 클라우드 단말 서버 플랫폼 기술을 연구하였다.

  • PDF

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Implement IoT device Authentication System (IoT 단말 인증 시스템 구현)

  • Kang, Dong-Yeon;Jeon, Ji-Soo;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.344-345
    • /
    • 2022
  • ogy is being used in many fields, such as smart farms, smart oceans, smart homes, and smart energy. Various IoT terminals are used for these IoT services. Here, IoT devices are physically installed in various places. A malicious attacker can access the IoT service using an unauthorized IoT device, access unauthorized important information, and then modify it. In this study, to solve these problems, we propose an authentication system for IoT devices used in IoT services. The IoT device authentication system proposed in this study consists of an authentication module mounted on the IoT device and an authentication module of the IoT server. If the IoT device authentication system proposed in this study is used, only authorized IoT devices can access the service and access of unauthorized IoT devices can be denied. Since this study proposes only the basic IoT device authentication mechanism, additional research on additional IoT device authentication functions according to the security strength is required.IoT technol

  • PDF

Embedded-based Power Monitoring Security Module Design (임베디드 전력 모니터링 보안 모듈 설계)

  • Yoon, Chan-Ho;Kim, Gwang-Jun;Jang, Chang-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1485-1490
    • /
    • 2013
  • The demonstration project of the electrical grid for Smart grid is progressed, the smart digital appliances AV technology, Smart home energy management technology charging the management function of complex energy for the automation management of air conditioning and heating, humidity and air, the health care technology charging the design of housing for the elderly and disabled and the measurement of individual bio information, and the Smart home security technology dealing with the biometric security and motion sensors, etc. have been studied. The power monitoring terminal which uses a variety of wired and wireless networks and protocol is the target additionally to be considered in addition to the security vulnerabilities that was occurred in the existing terminal. In this research paper, the author analyzes the cryptographic techniques corresponding to the smart meter occurred by the problems that are exposed on the outside which are vulnerable to physical attacks, and intends to propose the design of the security systems for the Smart meter terminal being able to maximize the efficiency of the terminal.

Security Vulnerabilities in Android Applications (안드로이드 어플리케이션 보안 취약점에 관한 연구)

  • Han, Chan-Kyu;Kang, Seong-Yong;Jang, Hak-Beom;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.854-857
    • /
    • 2011
  • 최근 안드로이드가 오픈 소스 및 오픈 서비스를 기반으로 출시되었으나, 성장률에 비하여 보안성이 검증된 사례가 미미하여, 보안대책 마련이 시급한 실정이다. 따라서 본 논문에서는 안드로이드보안 아키텍쳐 및 안드로이드 어플리케이션 보안에 관하여 연구하였다. 또한 안드로이드 프레임워크 상에서 개인정보(단말의 위치정보 및 외부 계정정보)가 유출되는 보안 취약점을 실험연구를 통해 발견하였고, 이에 대한 보안대책을 제안하여, 안전한 스마트폰 환경을 제공하고자 한다.