• Title/Summary/Keyword: 안전한 그룹 통신

Search Result 222, Processing Time 0.027 seconds

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF

An Improved One Round Authenticated Group Key Agreement (개선된 원 라운드 인증 그룹 키 합의 프로토콜)

  • Kim, Ho-Hee;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.3-10
    • /
    • 2013
  • Several identity-based and authenticated key agreement protocols have been proposed. It remains at issue to design secure identity based and authenticated key agreement protocols. In this paper, we propose a one round authenticated group key agreement protocol which uses one more key pair as well as the public key and private key of typical IBE(Identity-Based Encryption) system. The proposed protocol modified Shi et al.'s protocol and He et al.'s protocol. The public and private keys and the signature process of our protocol are simpler than them of their protocols. Our protocol is secure and more efficient than their protocols in communication and computation costs.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

A Study on Ticket-Based AAA Protocol for Mobile User Authentication (모바일 사용자 인증을 위한 티켓기반 AAA 프로토콜에 관한 연구)

  • Moon Jong-Sik;Lee Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.987-990
    • /
    • 2006
  • AAA(Authentication, Authorization, Accounting) 프로토콜은 기존의 유선망 뿐만 아니라 비약적으로 발전하고 있는 무선망에서 VoIP, Mobile IP 등과 같은 다양한 서비스 및 프로토콜 상에서 안전하고 신뢰성 있는 사용자 인증, 인가, 과금 기능을 체계적으로 제공하는 정보보호 기술이다. 그러나 현재 무선망은 유선망에 비해 외부로부터의 공격에 매우 취약하고 통신에 있어서 많은 제약사항이 뒤따르고 있다. 현재 IETF AAA 워킹그룹에서도 무선망에서의 안전한 AAA 프로토콜에 관하여 중요하게 다루고 있으며, 모바일 노드의 이동성에 따른 안전한 인증을 제공하는 방안에 대해서 활발히 연구 중이다. 따라서 본 연구에서는 모바일 노드가 홈 인증 서버로부터 인증을 받고 난 후에 외부 네트워크로 이동하더라도 홈 인증 서버로부터 발급받은 티켓을 이용하여 홈 인증 서버로 접근을 하지 않고 외부 네트워크에서의 인증을 제공하여 서비스를 받을 수 있게 한다. 본 방식은 티켓을 사용함으로써 교환되는 메시지 및 지연을 줄이고 지속적인 서비스를 제공받을 수 있어 효율성을 높일 수 있다.

  • PDF

Key Management Protocol using Dynamic Grouping in Multicast Environment (멀티캐스트 환경에서 Dynamic Grouping을 이용한 키 관리 프로토콜)

  • Moon, Jong Sik;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1200-1201
    • /
    • 2010
  • 인터넷 및 서비스 환경의 발전으로 인해 컴퓨터 통신의 환경이 변함에 따라 기존의 유니캐스트 전송방식에서 멀티캐스트 전송 방식을 이용한 그룹 통신이 증가하고 있다. 그러나 멀티캐스트 전송 방식의 취약점 및 키 관리의 어려움으로 인해 많은 문제점이 발생하면서 멀티캐스트 환경에서 안전하고 효율적인 키 관리 방법에 대한 연구의 필요성이 대두되고 있다. 따라서 본 연구에서는 멀티캐스트 환경에서 dynamic grouping을 이용한 키 관리 프로토콜을 제안하여 안전성과 효율성을 제공하고자 한다.

A Private Cloud with Private HW(DONO) (개인용 하드웨어를 이용한 클라우드 시스템)

  • Shin, Sam-Il;Park, Jae-kyung;Lee, Hyung-Su
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.679-680
    • /
    • 2021
  • 본 논문에서는 개인용 하드웨어를 통해 인증을 강화하고 이를 활용하여 개인 클라우드를 제공할 수 있는 개인용 보안장비인 DONO를 제안한다. 또한 DONO를 활용하여 보다 규모가 확장된 클라우드 서비스를 제안하고 이를 활용하여 실제 서비스가 가능함을 보여주도록 한다. DONO가 사용하는 환경은 기존의 네트워크 시스템을 따르는 대신 콘텐츠 중심의 통신을 통해 면역 기반 보안 시스템을 구축한다. 데이터 전송은 CCN(Content Centric Network)을 통해 이루어지며 CCNx 그룹이 검증한 프로토콜을 활용한다. DONO에 의해 보호되는 영역은 일반적인 네트워크 통신을 사용하지 않고 CCN 프로토콜에 따라서 운영하며 이를 통해 기존의 보안 공격과 추가적으로 알 수 없는 공격으로부터 시스템을 보호할 수 있다. 이러한 새로운 방식을 활용해 클라우드 시스템을 제공하며 보다 안전한 서비스를 활용할 수 있음을 보이도록 한다.

  • PDF

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.

Reduced RSU-dependency Authentication Protocol to Enhance Vehicle Privacy in VANET (VANET에서 RSU의 의존성을 줄이고 차량의 프라이버시를 강화한 인증 프로토콜)

  • Rhim, Won-Woo;Kim, Jong-Sik;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.21-34
    • /
    • 2011
  • VANET offers variety of services to allow safe and comfortable driving through V2V and V2I communications in transportation systems. To use these services, safe and reliable V2V and V2I communications must be guaranteed. In this regards, many RSU-based studies have been carried out to meet certain issues such as: efficiency of frequent communication between RSU and vehicles, security of stored information in RSU, and invasion on vehicle's privacy. In this paper, a scheme is proposed to reduce the dependency on RSU and to enhance the vehicle privacy by using signature-based authentication protocol. The proposed protocol is more efficient than existing protocol with group signature, and satisfies all the requirements of VANET.

Development of Sailing Algorithm for Ship Group Navigation System (선박 그룹항해시스템의 항법 알고리즘 개발)

  • Wonjin, Choi;Seung-Hwan, Jun
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.554-561
    • /
    • 2022
  • Technology development related to maritime autonomous surface ships (MASS) is actively progressing around the world. However, since there are still many technically unresolved problems such as communication, cybersecurity, and emergency response capabilities, it is expected that it will take a lot of time for MASS to be commercialized. In this study, we proposed a ship group navigation system in which one leader ship and several follower ship are grouped into one group. In this system, when the leader ship begins to navigate, the follower ship autonomously follows the path of the leader ship. For path following, PD (proportional-derivative) control is applied. In addition, each ship navigates in a straight line shape while maintaining a safe distance to prevent collisions. Speed control was implemented to maintain a safe distance between ships. Simulations were performed to verify the ship group navigation system. The ship used in the simulation is the L-7 model of KVLCC2, which has related data disclosed. And the MMG (Maneuvering Modeling Group) standard method proposed by the Japan Society of Naval Architects and Ocean Engineering (JASNAOE) was used as a model of ship maneuvering motion. As a result of the simulation, the leader ship navigated along a predetermined route, and the follower ship navigated along the leader ship's path. During the simulation, it was found that the three ships maintained a straight line shape and a safe distance between them. The ship group navigation system is expected to be used as a navigation system to solve the problems of MASS.

The research on Diffie-Hellman-based IoT Sensor Node key management (Diffie-Hellman 기반 사물인터넷 센서노드 키 관리 연구)

  • Hong, Sunghyuck;Yu, Jina
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.9-14
    • /
    • 2017
  • Recently, the Internet of Things are developing in accordance with the technology of implementation in low-cost, small-size, low power consumption and smart sensor that can communicate using the internet. Especially, key management researches for secure information transmission based on the Internet of Things (IoT) are actively performing. But, Internet of Things(IoT) are uses sensor. Therefore low-power consumption and small-memory are restrictive condition. As a result, managing the key is difficult as a general security measure. However, The problem of secure key management is an essential challenge For the continuous development of the Internet of things. In this paper, we propose a key distribution and management technique in secure Internet of things. In the key generation and management stage, it satisfies the conditions and without physically constrained for IoT based communication.