• Title/Summary/Keyword: 인증서비스응용

Search Result 213, Processing Time 0.024 seconds

Designing Reliable P2P Transmission Mechanism Against MITM Attack (MITM 공격에 안전한 P2P 신뢰전송 메커니즘의 설계)

  • Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.103-109
    • /
    • 2008
  • Many Internet application provide the PKI(public key infrastructure)-based service to provide authentication and message integrity. Several researchers proposed PKI-based p2p network framework. However, in the real world, the use of PKI is not suitable for peer to peer network, because the peer-to-peer network is an open and dynamic network. Moreover, currently there is no nation-to-nation interoperable certificate. In this paper, we designed reliable p2p file sharing application without public key infrastructure. To do this we propose reliable public key distribution mechanism to distribute public key safely without PKI infrastructure for two-tier super-peer architecture. In our system, each peer generates and distributes its public/private key pairs, and the public key is securely distributed without PKI. The proposed mechanism is safe against MITM attack. This mechanism can be applied various P2P applications such as file sharing, IPTV, distributed resource sharing and so on

Authority Delegation Scheme for Secure Social Community Creation in Community-Based Ubiquitous Networks (커뮤니티 기반의 유비쿼터스 네트워크 환경에서 안전한 커뮤니티 생성 권한 위임 방안)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.91-98
    • /
    • 2010
  • This paper proposes authority delegation for secure social community creation and mutual authentication scheme between the community members using proxy signature in community-based ubiquitous networks. In community-based ubiquitous network, User's context-awareness information is collected and used to provide context-awareness network service and application service for someone who need it. For the many reason, i.e. study, game, information sharing, business and conference, social community could be created by members of a social group. However, in community-based ubiquitous network, this kind of the context-awareness information could be abused and created by a malicious nodes for attack the community. Also, forgery community could be built up to attack the community members. The proposed scheme using the proxy signature provides a mutual authentication and secure secret key exchange between community members, and supports secure authority delegation that can creates social community. Also, when delegation of signing authority and mutual authentication, this scheme reduces total computation time compared to the RSA signature scheme.

A Study of Mobile Collaboration Environment based on Distributed Object Group Framework and Its application (분산객체그룹프레임워크 기반 모바일 협업 환경 및 적용에 관한 연구)

  • Kim, Dong-Seok;Jeong, Chang-Won;Joo, Su-Chong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.847-856
    • /
    • 2006
  • In this paper, we suggested a mobile collaboration framework for supporting mobile services among mobile devices, and designed and implemented on this environment. The suggested framework has three elements; groups of sensors and mobile devices(Fixed and Moving-typed PDAs) and a home server. We designed interfaces for interactions with each other in collaboration environment with three elements described above. The information collected by sensors can be share and exchanged by mobile devices or a home server in accordance with Push and Pull methods. This framework is based on the distributed object group framework(DOGF) we implemented before. Therefore the DOGF provides functions of object group management, storing information and security services to our mobile collaboration framework via application interfaces defined. The information collected by sensors is arranged according to user's security 'demands. And user profile information is used for checking authority of each service object. Each component for executing functions of mobile devices and a home server is implemented by TMO scheme. And we used the TMOSM for interactions between distributed components. Finally, we showed via GUI the executablity of a given healthcare application scenario on our mobile collaboration framework.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Anonymous Ad Hoc Routing Protocol based on Group Signature (그룹서명에 기반한 익명성을 제공하는 애드 혹 라우팅 프로토콜)

  • Paik, Jung-Ha;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.15-25
    • /
    • 2007
  • According to augmentation about interesting and demanding of privacy over the rest few years, researches that provide anonymity have been conducted in a number of applications. The ad hoc routing with providing anonymity protects privacy of nodes and also restricts collecting network information to malicious one. Until recently, quite a number of anonymous routing protocols have been proposed, many of them, however, do not make allowance for authentication. Thus, they should be able to have vulnerabilities which are not only modifying packet data illegally but also DoS(denial of service) attack. In this paper, we propose routing protocol with providing both anonymity and authentication in the mobile ad hoc network such as MANET, VANET, and more. This scheme supports all of the anonymity properties which should be provided in Ad Hoc network. In addition, based on the group signature, authentication is also provided for nodes and packets during route discovery phase. Finally, route discovery includes key-agreement between source and destination in order to transfer data securely.

Application Basics of Korean Web Content Accessibility Guidelines 2.1 to Web Visualization of Geo-based Information (한국형 웹 콘텐츠 접근성 지침(KWCAG) 2.1의 공간정보 웹 시각화 적용 기초)

  • Park, Hansaem;Kim, Kwangseob;Lee, Kiwon
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.123-135
    • /
    • 2016
  • Recently, geo-based application services such as location-based commerce or personal navigation are recognized as a kind of common tool on smart-phone, and demands with respect to advanced functions of online map editing linked to value-added contents are increasing. However, the disabled people have severe difficulties to equally use those geo-based services, compared to the normal people's uses. Of course, this situation is almost same to other application fields besides geo-based applications. Web accessibility basically means necessary guideline handling web-based contents for equal uses of web services for all people. W3C has developed and distributed a generalized web content accessibility guideline, and Korean web content accessibility guideline version 2.1 referred it. As well, there is a certificate system operated by public agencies. In spite of this situation, geo-based application field is globally on the very early stage for web accessibility. This work first summarized the concept of web accessibility and Korean guideline, and then presented some practical schemes for the further geo-based applications, focused on web visualization of geo-based contents among numerous implementable application services.

A Trend to Next-Generation Wireless LAN with a Data Rate over 1 Gbps (Gigabit 차세대무선랜 무선전송 기술동향)

  • Cheong, M.H.;Lee, S.K.;Chung, H.K.
    • Electronics and Telecommunications Trends
    • /
    • v.24 no.3
    • /
    • pp.54-60
    • /
    • 2009
  • 2007년 3월부터 WFA에서 시작된 "Wi-Fi $CERTIFIED^{TM}$ 802.11n draft 2.0" 인증을 통해 현재까지 180가지가 넘는 제품이 출시되고 있는 가운데 이러한 시장의 상황을 반영하듯 여러 매체를 통해 IEEE 802.11n이 핫이슈로 등장하였다. 예를 들어 $1820{\times}1080$ pixels, 24 bits/pixel, 초당 60 프레임 정도의 1080p급 비디오를 전송하려면 Gbps 이상의 전송속도를 필요로 한다. 이를 위하여 최근에 Gbps 이상의 차세대 무선랜 서비스를 위한 새로운 국제규격을 정의하려는 움직임이 IEEE 802.11 내에서 활발해지고 있다. 본 고에서는 이러한 IEEE 802.11에서의 표준화 활동을 중심으로 차세대무선랜에 대한 응용분야, 관련기술, 표준화 작업 내용에 대해 살펴보고자 한다.

Development of Ka-band Transponder for Communications & Broadcasting Satellite (통신방송위성 Ka 대역 중계기 개발)

  • 신동환;이호재;박종흥;우형제;이성팔
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.330-333
    • /
    • 2003
  • 본 논문에서는 조립/제작, 시험과정을 통하여 개발된 통신방송위성용 Ka 대역 통신위성 중계기의 구조 및 성능에 대하여 기술한다. 개발된 중계기는 전체 400MHz 대역 내에 100 MHz 대역폭을 갖는 3 개의 통신채널을 수용하여 광대역 멀티미디어 서비스를 지원할 수 있도록 설계되었으며 국내 기술로 제작되어 우주인증을 거친 IFA, RxDC, IMUX, CH-AMP 등의 부품으로 구성되어 있다. 중계기에 대한 성능시험은 EGSE를 이용해 자동으로 수행되었으며, 성능시험결과 대부분의 성능 항목이 요구사항과 부합됨을 확인하였다. 제작된 Ka 대역 중계기에 적용된 위성 중계기 및 부품의 제작 및 시험 기술은 향후 통신해양기상위성에 탑재될 중계기의 개발에 직접 응용이 가능하다.

  • PDF

A Study on Design of Structure and Construction of Application for USIM in IMT 2000 (IMT 2000에서의 USIM을 위한 구조 설계 및 응용 프로그램 구축에 관한 연구)

  • Ha, Nam-Su;Hong, In-Sik
    • Annual Conference of KIPS
    • /
    • 2001.04b
    • /
    • pp.627-630
    • /
    • 2001
  • 제 3세대 이동통신인 IMT2000에서 단말기는 기존의 통신수단으로서의 역할과 함께 인증, 지불, 로열티 등 다양한 어플리케이션을 이용한 서비스를 가능하게 하는 수단이 될 것이다. 이것을 가능하게 하는 핵심요인은 USIM이라는 IC 카드가 단말기에 내장되기 때문이다. 본 논문에서는 USIM의 구조에 대한 관련 기술과 단말기와 USIM 사이의 프로토콜 형식 및 안전한 지불을 위한 Off-Line 결제 모델을 제안하였다. 제안한 모델은 하드웨어 자체의 제약으로 인해 적절한 크기의 어플리케이션 설계와 효율적인 프로토콜의 설계가 필요하다. 유효성을 입증하기 위해 관련표준을 고찰하였고 썬마이크로 시스템의 Java card 2.1.1 툴킷을 이용하여 시뮬레이션하였다.

  • PDF

Secure VPN Performance in TP Layers (IP계층에서의 VPN 전송성능에 관한 연구)

  • Lim, Hyung-Jin;Chung, Tai-M.
    • Annual Conference of KIPS
    • /
    • 2001.04b
    • /
    • pp.717-720
    • /
    • 2001
  • 본 논문에서는 IPSec을 리눅스에서 구현하여 AH, ESP 프로토콜 사용시 노드간 성능을 측정하여 네트웍에서의 보안성능대 처리성능에 대하여 분석하였다. IPSec VPN은 노드간 호스트간 정보보호와 안전한 응용에 대하여 IP계층에서 구현된 보호서비스를 이용할 수 있게 하지만 IPSec에서 사용하는 AH와 ESP에서의 인증데이터의 계산 및 비교, 암호화와 복호화에 의하여 IP프로토콜의 처리비용 및 통신에 대한 잠재비용이 증가하게 된다. 이에 각 프로토콜에서 전송데이타 크기의 점진적 변경에 따라 커널에서 IPSec모듈내 처리 시간과 전체 데이터의 처리시간을 측정하여 보았다. 데이터 전송 크기가 증가함에 따라 Non IPSec 전송에 비하여 IPSsec 전송시 처리지연 시간의 차는 증대되었다. 본 논문에서는 이러한 성능차이를 야기하는 인자들을 평가하여 향후 기존 네트웍에 VPN도입시 성능대 보안에서의 정책 결정의 기반이 될 수 있는 분석을 제시하고 있다.

  • PDF