• Title/Summary/Keyword: 안전인증

Search Result 2,790, Processing Time 0.029 seconds

A Distribution Key Management Protocol for improving Security of Inner Attack in WiMAX Environment (WiMAX 환경에서 내부 공격의 안전성을 향상시킨 분산 키 관리 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.107-115
    • /
    • 2009
  • The cryptological key which is used in WiMAX environment is used at regular intervals by mobile nodes (laptop computer, PDA, cell-phone) which is in the range of base station coverage. But it is very weak at local attack like man-in-the-middle when the mobile node is off the range of base station or enters into the range to communicate with base station because the communication section is activated wirelessly. This paper proposes a distribution key building protocol which can reuse security key used by nodes to reduce cryptological security attack danger and communication overhead which occurs when mobile node tries to communicate with base station. The proposed distribution key establishing protocol can reduce overhead which occurs between base station and mobile node through key reusing which occurs during the communication process and also, makes security better than IEEE 802.16 standard by creating shared key which is required for inter-certification through the random number which node itself creates.

Proposed Improvements for Type Approval and Inspection Systems of Marine Pollution Prevention Materials and Chemicals (해양오염방제 자재·약제 형식승인 및 검정 개선방안에 대한 연구)

  • Pankil Jang;YeongGu Song;Heejin Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.1
    • /
    • pp.15-23
    • /
    • 2023
  • Through the revision of the Framework Act on Administrative Regulations (July 17, 2019), the government minimized regulations and applied the comprehensive negative regulation principle to enhance economic vitality. However, a legally mandatory certification system has been applied to marine pollution prevention materials and chemicals, and inspection is conducted every time a product is sold, suppressing the autonomy of manufacturers. In addition, the majority of manufacturers of marine pollution prevention materials and chemicals are small businesses; therefore, they take the approach of producing small quantities of products whenever a buyer requests an order. Consequently, the need for deregulation was raised to ensure autonomy of the market and industry, and improve efficiency in accordance with the current trend of approval, performance test, and inspection systems for marine pollution prevention materials and chemicals. In this study, problems within the current system were identified and improvement plans are proposed through comparison and analysis of domestic and foreign systems.

A study of aviation leisure sport demand creation strategy (항공레저스포츠 시장창출 전략 연구)

  • Park, Jin-seo;Sim, Ga-ram;Sung, yeun-young;Kim, Mee-sook
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.181-206
    • /
    • 2015
  • Due to the increased leisure time, national income levels, and increasing the desire for new experience, interest causes increasing demand for recent aviation leisure sport. This leads to the need for a competitive foundation of the expansion of aviation leisure sports market potential. In 2014, the MOLIT(Ministry of Land, Infrastructure and Transport) created definition of sport and recreational aviation industry in the Aviation Act. The most significant change in Aviation Act related to sport and recreational aviation, it allows easier access for those wishing to participate in the joy of flight and also creating a sport and recreational aviation business market expansion. Therefore, in this paper, by analyzing the trend of foreign policy trends and domestic policies that sport and recreational aviation has been enabled, it is trying to present the activation policy proposals of sport and recreational aviation that is suitable for Korea.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Differenciation Test on Food Safety Factor′s for Purchasing Rice (식품의 안전성요인이 쌀 구매에 미치는 차별성 검정)

  • 이순석;오상헌;이상용;박주섭;김용희
    • Food Science and Preservation
    • /
    • v.11 no.1
    • /
    • pp.122-125
    • /
    • 2004
  • Factor analysis is estimated using housewives's intention data in Seoul province. Rice consumers considered safety, high nutritive value, shape and cultivation region as important factors in buying rice. The factors of food safety are brand and quality certification mark. The differences of two housewife groups on safety factor are caused by residence type, employment existence and residence region. The marketing strategies for rice containing food safety target housewives living in apartment, Gang Nam region. Also selling extension for target consumers housewives should be employed.

Proposal and Analysis of Primality and Safe Primality test using Sieve of Euler (오일러체를 적용한 소수와 안전소수의 생성법 제안과 분석)

  • Jo, Hosung;Lee, Jiho;Park, Heejin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.438-447
    • /
    • 2019
  • As the IoT-based hyper-connected society grows, public-key cryptosystem such as RSA is frequently used for encryption, authentication, and digital signature. Public-key cryptosystem use very large (safe) prime numbers to ensure security against malicious attacks. Even though the performance of the device has greatly improved, the generation of a large (safe)prime is time-consuming or memory-intensive. In this paper, we propose ET-MR and ET-MR-MR using Euler sieve so it runs faster while using less memory. We present a running time prediction model by probabilistic analysis and compare time and memory of our method with conventional methods. Experimental results show that the difference between the expected running time and the measured running time is less than 4%. In addition, the fastest running time of ET-MR is 36% faster than that of TD-MR, 8.5% faster than that of DT-MR and the fastest running time of ET-MR-MR is 65.3% faster than that of TD-MR-MR and similar to that of DT-MR-MR. When k=12,381, the memory usage of ET-MR is 2.7 times more than that of DT-MR but 98.5% less than that of TD-MR and when k=65,536, the memory usage of ET-MR-MR is 98.48% less than that of TD-MR-MR and 92.8% less than that of DT-MR-MR.

Analysis on Handicaps of Automated Vehicle and Their Causes using IPA and FGI (IPA 및 FGI 분석을 통한 자율주행차량 핸디캡과 발생원인 분석)

  • Jeon, Hyeonmyeong;Kim, Jisoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.3
    • /
    • pp.34-46
    • /
    • 2021
  • In order to accelerate the commercialization of self-driving cars, it is necessary to accurately identify the causes of deteriorating the driving safety of the current self-driving cars and try to improve them. This study conducted a questionnaire survey of experts studying autonomous driving in Korea to identify the causes of problems in the driving safety of autonomous vehicles and the level of autonomous driving technology in Korea. As a result of the survey, the construction section, heavy rain/heavy snow conditions, fine dust conditions, and the presence of potholes were less satisfied with the current technology level than their importance, and thus priority research and development was required. Among them, the failure of road/road facilities and the performance of the sensor itself in the construction section and the porthole, and the performance of the sensor and the absence of an algorithm were the most responsible for the situation connected to the weather. In order to realize safe autonomous driving as soon as possible, it is necessary to continuously identify and resolve the causes that hinder the driving safety of autonomous vehicles.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.