• Title/Summary/Keyword: 재인증

Search Result 49, Processing Time 0.026 seconds

A Handover Mechanism for Authenticate Subscriber between inter-network in Mobile WiMAX Environment (Mobile WiMAX 환경에서 인터 네트워크간 가입자를 인증하기 위한 핸드오버 메커니즘)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Kim, Jae-Hong;Park, Gil-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.181-188
    • /
    • 2008
  • Nowadays, WiMAX which provides internet service with a middle and low speed serves more function and is wider than Wi-Fi. While they solve the security risks as subscribers do handover by subscriber's re-certification procedure as the Network range is getting wider, there are more security problems making the problems of electric-power consumption and delay. This paper suggests a handover mechanism which simplify the subscriber's re-certification procedure and prevents a security problem as doing handover for solving the problem of delay and the rate of processing. The mechanism can cooperate with PKI structure to increase flexibility and security and minimize network re-entry procedure or re-certification procedure by providing continual service. As a result. the mechanism's throughput as the number of subscribers is lower than IEEE 802.16e and the mechanism proves that it is secure from the attack of man-in-the-middle and reply as doing handover.

  • PDF

An efficient and security/enhanced Re-authentication and Key exchange protocol for IEEE 802.11 Wireless LANs using Re-authentication Period (재인증주기를 통한 IEEE 802.11 무선랜 환경에서의 안전하고 효율적인 재인증과 키교환 프로토콜)

  • 김세진;안재영;박세현
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.221-224
    • /
    • 2000
  • In this paper, we introduce an efficient and security-enhanced re-authentication and key exchange protocol for IEEE 802.11 Wireless LANs using Re-authentication Period. We introduce a low computational complexity re-authentication and key exchange procedure that provides robustness in face of cryptographic attacks. This procedure accounts for the wireless media limitations, e.g. limited bandwidth and noise. We introduce the Re-authentication Period that reflects the frequency that the re-authentication procedure should be executed. We provide the user with suitable guidelines that will help in the determination of the re-authentication period.

  • PDF

A Study on USIM-based Authentication Testbed for UMTS-WLAN Handover (UMTS-WLAN간 핸드오버를 위한 USIM 기반의 인증 테스트베드에 관한 연구)

  • Ro, Kwang-Hyun;Kwon, Hye-Yeon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.1
    • /
    • pp.66-71
    • /
    • 2009
  • In view of mutual complementary feature of wide coverage and high data rate, the interworking between 3G cellular network and WLAN is a global trend of wireless communications. This paper introduces the analytic result of an authentication mechanism for 3GPP-WLAN seamless mobility under the USIM-based authentication test-bed. In a handover process between heterogeneous networks, authentication is the main factor of handover delay. So authentication processing time should be firstly reduced. This paper describes an USTM-based EAP-AKA test-bed implemented for handover in UMTS and WLAN interworking systems. Experimental result has shown that the fast re-authentication mechanism during handover has reduced the handover delay by about 48.6%.

  • PDF

Needs for the Improvement of Green Building Re-certification System (녹색건축 재인증제도의 개선방안에 관한 연구)

  • Wang, Jeong Joon;Kim, Jung Hyun;Kim, Byung Seon
    • KIEAE Journal
    • /
    • v.13 no.6
    • /
    • pp.67-75
    • /
    • 2013
  • The present duration of 5 years in the Korea Green Building Certification(G-SEED) should be re-set taking into account with the needs for renewal of re-certification criteria. This study methods is to analyze the differences between the characteristics of the certification system of green building of domestic and foreign and to seek the improvement to derive the problem of detailed evaluation items of the examination. The purpose of this study is to identify some problems of re-certification criteria in the G-SEED System and to propose the renewal of certification system. Analysis of the rating criteria with a few re-certified examples of office buildings have been made. Some measures to improve the re-certification have been suggested as follows; (1) it is strongly suggested to establish re-certification rating systems that is not yet made, (2) the new criteria of re-certification bring into focus on whether buildings maintain the environmental performances of the initial status certified, and (3) thus the effective duration of re-certification needs to re-set flexibly in a way to confirm to the initial environmental performances and maintenance conditions certified.

Study on key generation in EAP-AKA for 3GPP-WLAN interworking (3GPP-WLAN 연동을 위한 EAP-AKA에서의 키 생성에 관한 연구)

  • 박미애;김용희;김창범;이옥연
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.351-355
    • /
    • 2003
  • 본 논문에서는 3GPP-WLAN 연동 보안에 필수인 EAP-AKA를 기반으로 한 인증/재인증의 개요와 인증 진행 부분에서 협상되는 마스터 세션 키 생성과 EAP AKA 패킷을 보호하기 위해 사용되는 키 생성에 관하여 설명하고, EAP-AKA 과정에서 생성되는 키의 안전성을 분석하고, EAP-AKA를 사용하는 3GPP-WLAN 연동의 효율성 및 고려사항에 대하여 고찰하였다.

  • PDF

A Comparative Study on Management Evaluation and Re-certification System of G-SEED, BREEAM, LEED (국내외 녹색건축인증제의 유지관리 및 재인증 제도에 대한 비교 연구)

  • Hyun, Eun Mi;Kim, Yong Sik
    • KIEAE Journal
    • /
    • v.14 no.1
    • /
    • pp.121-129
    • /
    • 2014
  • As time passes, the aging of the plant building, the building's energy performance degradation than the initial plan does not express a situation could arise. This year, the certification of buildings certified in 2009 has expired for measures such as the situation required. In this study, management of national and international green building certification and re-certification was compared in two ways. First, the evaluation of green building certification system management assessments were compared. Second, the green building certification system for the re-certification analysis. As a result, G-SEED was not reflected life-cycle of building in management assessment and the commissioning of G-SEED is the UK and the U.S and other concepts of evaluation. In addition, the re-certification system is insufficient about substantial energy consumption of buildings. In this study, the revised the management assessments in conjunction with the re-certification system to manage the building is proposed to improve. In addition, the current evaluation of the existing building certification "existing building" and "building the first certified" as it is more efficient to separate the information into assessment was judged. Green building certification system to meet the purpose of management and operation, and disposal phases of the building to promote energy conservation and sustainability in order to the management a systematic and detailed evaluation and re-certification system developed for the revision of the specific items required and future research want to continue.

Detecting CSRF through Analysis of Web Site Structure and Web Usage Patterns (웹사이트 구조와 사용패턴 분석을 통한 CSRF 공격 탐지)

  • Choi, Jae-Yeong;Lee, Hyuk-Jun;Min, Byung-Jun
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.9-15
    • /
    • 2011
  • It is difficult to identify attack requests from normal ones when those attacks are based on CSRF which enables an attacker transmit fabricated requests of a trusted user to the website. For the protection against the CSRF, there have been a lot of research efforts including secret token, custom header, proxy, policy model, CAPTCHA, and user reauthentication. There remains, however, incapacitating means and CAPTCHA and user reauthentication incur user inconvenience. In this paper, we propose a method to detect CSRF attacks by analyzing the structure of websites and the usage patterns. Potential victim candidates are selected and website usage patterns according to the structure and usage logs are analyzed. CSRF attacks can be detected by identifying normal usage patterns. Also, the proposed method does not damage users' convenience not like CAPTCHA by requiring user intervention only in case of detecting abnormal requests.

Handoff Method Supporting LBS Information in Mobile Clouding Computing (이동 클라우딩 환경에서 LBS 지원 핸드오프 기법)

  • Kim, Ki-Young;Kim, Sun-Jib
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.89-97
    • /
    • 2015
  • In this paper, we propose a handoff method supporting LBS (Location Based Services) Information in mobile clouding environment. In mobile clouding computing, handoff delay and re-authentication is occurred. A mobile node needs re-authentication procedure from cloud server whenever it arrives new AP. But Using of location information of node enables to reduce delay time due to re-authentication. To reduce re-authentication delay time, proposed method stores location information of APs on WiFi based location server to complement. GPS-based technology which can't receive satellite signal in indoor and then node collects location information of AP at handoff time. And also enables to process LBS without increasing handoff delay by splitting the process of handoff from process of requesting location information. For analysis of proposed method, We analyze handoff delay and location information process time and have compared previous handoff method in cloud environment. We confirmed that proposed method shows lower delay time without increasing LBS process time than previous method because node receives location information from location information server when handoff is occurred.

IoT Multi-Phase Authentication System Using Token Based Blockchain (블록체인 기반의 토큰을 이용한 IoT 다단계 인증 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.139-150
    • /
    • 2019
  • IoT(Internet of Things) security is becoming increasingly important because IoT potentially has a variety of security threats, including limited hardware specifications and physical attacks. This paper is a study on the certification technology suitable for the lightened IoT environment, and we propose a system in which many gateways share authentication information and issue authentication tokens for mutual authentication using blockchain. The IoT node can be issued an authentication token from one gateway to continuously perform authentication with a gateway in the block-chain network using an existing issued token without performing re-authentication from another gateway participating in the block-chain network. Since we do not perform re-authentication for other devices in a blockchain network with only one authentication, we proposed multi phase authentication consisting of device authentication and message authentication in order to enhance the authentication function. By sharing the authentication information on the blockchain network, it is possible to guarantee the integrity and reliability of the authentication token.

Cognitive Neruopsychological Assessment and fMRl Study in an Acquired Dyslexic Patient : A case study (후천성 난독증에 대한 인지신경심리학적 언어행동평가와 대뇌 활성화 양상 : 단일사례연구)

  • Sohn, Hyo-Jeong;Pyun, Sung-Bom;Nam, Ki-Chun
    • Annual Conference on Human and Language Technology
    • /
    • 2004.10d
    • /
    • pp.270-272
    • /
    • 2004
  • 본 논문에서는 뇌손상으로 인하여 난독증을 보이는 환자를 대상으로 시각적 단어 재인과정에 대한 평가와 기능적 자기공명영상기법을 통한 언어처리과정의 대뇌활성 양상을 살펴봄으로써 난독증의 특성을 알아보고자 한다. 인지신경심리학적 언어행동평가를 통해 환자 JYM는 자소-음소 변환(grapheme-phoneme conversion)경로와 직접 경로(direct route) 모두가 손상된 심층성 난독증(deep dyslexia)으로 보이며. 기능적 자기공명영상촬영 결과 언어처리과정에서 특정한 언어관련영역보다 등외측전전두영역과 시각피질의 활성이 증가되는 양상을 나타냈다.

  • PDF