• Title/Summary/Keyword: 안전채널

Search Result 324, Processing Time 0.03 seconds

철도 정보전송을 위한 프로토콜 엔지니어링 기술

  • 황종규;이재호
    • Journal of the Korean Society for Railway
    • /
    • v.7 no.2
    • /
    • pp.12-17
    • /
    • 2004
  • 철도 신호제어장치들은 각자 고유기능을 수행함으로써 철도시스템의 안전운행을 도모하고 있다. 따라서 대부분의 신호장치는 바이탈한 제어장치로서 안전측 동작(Fail-safe)을 보장하기 위하여 기존에는 기계적 또는 전기적인 계전기 로직에 의해 각 장치 고유의 기능을 수행하였다. 그러나 최근에 들어 전자, 컴퓨터, 통신 기술의 발달에 따라 철도신호제어장치들도 전자화된 장치들로 대체되어가고 있는 추세이다. 이처럼 신호제어장치들이 전자화되어감에 따라 각 장치간 인터페이스를 위한 링크도 디지털 통신채널로 대체되어가고 있다. 따라서 이러한 각 장치간 인터페이스를 위한 통신링크에 대한 중요성이 증대되고 있다. (중략)

User Authentication based on SMS and OTP (SMS와 OTP 개념을 이용한 사용자 인증)

  • 김우경;이경현
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.433-435
    • /
    • 2004
  • 인터넷을 통한 자동화된 업무를 위하여, 공공 컴퓨터들에 대한 의존도가 높아지고 있다. 그러나 오늘날 웹 메일이나 옥션, 인터넷 뱅킹 흑은 휴대폰 결제 등을 위한 원격 서비스들은 사용자의 신원을 증명하기 위해 반드시 사용자의 아이디와 패스워드 또는 주민등록번호를 요구한다. 하지만 안전하지 못한 채널로 전송되는 사용자의 패스워드는 공격자에 의해서 도청되어, 재사용 될 가능성이 매우 높다. 본 논문에서는 위와 같이 보안이 취약한 환경에서 안전한 사용자 인증이 성공적으로 이루어 질 수 있는 새로운 시스템을 제안하고자 한다. 제안 시스템은 현대의 일반 사용자들이 항상 소지하는 휴대폰의 SMS(Simple Message Service)와 일회용 패스워드(OTP : One Time Password)를 기반으로 한다.

  • PDF

A Media Multi-channel for Food Safety Services (식품 안전 서비스를 위한 미디어 다중채널)

  • Ko, Eung-Nam
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1491-1493
    • /
    • 2010
  • 제안하는 연구는 식품 안전 서비스를 위한 멀티미디어 응용 개발 프레임워크에서 다채널 방식을 사용한다. 그러나 이러한 다채널 방식에서는 미디어간 동기화 문제를 유발 시키는데 수신 측에서는 새로 발생된 데이터의 시작 시점을 서로 맞춤으로서 미디어간 동기화를 실현하였다. 새로운 미디어의 시작 시 항상 제어 데이터를 먼저 전송하여 새로운 미디어 데이터의 생성을 모든 참여자 프로세스에 알린다.

The Determinants of Switching On·Off-Line Channels for Consumers (소비자의 온·오프라인 채널이동 유형의 결정요인에 대한 연구)

  • Jun, Sangmin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.245-256
    • /
    • 2013
  • This study illustrates factors that determine consumer types based on ways in which they alternate between online and offline channels for searching and eventually buying their desired products. This study conducted an online survey targeting 1,040 consumers. As per the study, consumer types fall into five groups: 1) on-on type(online search${\rightarrow}$online buying), 2) off-off type(offline search${\rightarrow}$offline buying), 3) on-off type(online search${\rightarrow}$offline buying), 4) off-on type(offline search${\rightarrow}$online buying), and, 5) on-off-on type(online search${\rightarrow}$ offline search${\rightarrow}$nline buying). The primary factors that determine how the different consumer types switch between online and offline channels are price orientation, convenience orientation,, risk-aversion orientation, and channel familiarity. Although they feel cross-channel shopping can be cumbersome, the findings show that cross-channel consumers would gladly switch channels to buy cheaper and proven products. The findings of this study will be useful for businesses that have both online and offline channels and point out the theoretical aspects of the decision-making process as consumers switch between channels.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

The Secure Hybrid Authentication message protocol (안전한 하이브리드 인증 메시지 프로토콜)

  • Yang, Hyung-Kyu;Choi, Jong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.77-85
    • /
    • 2007
  • Asecure channel provides protection against interception, while an authentication system is created to protect the client and the server from fabrication attacks. This paper proposes a hybrid authentication algorithm, which fixes the lapses problem encountered in the SSL authentication. Also, the Proposed hybrid authentication system has been created to protect the client and the server from modification and fabrication attacks. By using a modified three-way authentication there is no need for a timeserver. thus timestamps are not needed.

  • PDF

Detecting a Relay Attack with a Background Noise (소리를 이용한 릴레이 공격 공격의 탐지)

  • Kim, Jonguk;Kang, Sukin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.617-627
    • /
    • 2013
  • Wireless communication technology such as NFC and RFID makes the data transfer between devices much easier. Instead of the irksome typing of passwords, users are able to simply authenticate themselves with their smart cards or smartphones. Relay attack, however, threatens the security of token-based, something-you-have authentication recently. It efficiently attacks the authentication system even if the system has secure channels, and moreover it is easy to deploy. Distance bounding or localization of two devices has been proposed to detect relay attacks. We describe the disadvantages and weakness of existing methods and propose a new way to detect relay attacks by recording a background noise.

WAVE based Multi-Channel MAC(MCM) Technology for Reliable Vehicle Safety Message Service (신뢰성 높은 차량 안전 서비스를 위한 WAVE 기반 Multi-Channel MAC 기술)

  • Park, Jong-Min;Oh, Hyun-Seo;Cho, Sung-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.78-85
    • /
    • 2011
  • In vehicle ad-hoc network (VANET) environments, traffic related information such as accident information, emergency information and real time traffic condition have to be delivered to on-board-unit (OBU) or/and road-side-equipment (RSE) for preventing traffic accidents in advance. In this paper, we introduce a Multi-Channel MAC (MCM) since the existing single channel operation may cause packet transmission delay and unexpected communication failure. To offer a seamless safety message transmission during the various services, it is necessary to manage the MAC scheduler in wireless access in vehicular environments (WAVE) systems. The MCM consists of MAC softwares and MAC hardwares where the former and the later ones are implemented with real time operation system based C language and FPGA module with VHDL language, respectively. The performance and QoS are verified by practical measurements and compared with the scheme using single channel operation.

A Multi-Channel Security Card based on Cryptographically Secure Pseudo-Random Number Generator (난수생성기를 이용한 멀티채널 보안카드 설계)

  • Seo, Hwa-jeong;Seok, Seon-hee;Kim, Kyoung-hoon;Kim, Ho-won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.501-507
    • /
    • 2015
  • The online banking service handles a banking business over the internet, it is necessary to ensure that all financial transactions are processed securely. So, there are various authentication technique for e-banking service : a certificate, a personal identification number(PIN), a security card and a one-time password(OTP). Especially, the security card is most important means including secret information. If the secret information of card is leaked, it means not only loss of security but also easy to attack because security card is a difficult method to get. In this paper, we propose that a multi-channel security card saves an secret information in distributed channel. Proposed multi-channel security card reduces vulnerability of the exposed and has a function to prevent phishing attacks through decreasing the amount of information displayed and generating secret number randomly.

Development of Analysis Program for Geographical Separation of Radio Navigation Aids (항행안전무선시설의 지리적분리간격 분석 프로그램 개발)

  • Choi, Jae-Myeong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.30-35
    • /
    • 2017
  • Radio navigation aids are very important elements to provide information necessary for safe navigation using radio waves. Recently, the number of radio equipment using radio waves is increasing, and the air frequency interference by adjacent channels is very high. In addition, the use of irregular jamming that threatening radio navigation aids and satellite navigation system frequency is rapidly increasing. Therefore, it is urgent to ensure the safety of air waves. In this paper, we investigated the characteristics and frequency of the domestic navigation system. And we were analyzed the geographical separation standard for implementation of analysis program. Also, we implemented a program for the geographical separation distance analysis that applying international standards and recommended practices.