• Title/Summary/Keyword: 키 설립

Search Result 44, Processing Time 0.024 seconds

Simplified ANonymous Dynamic Source Routing Scheme for Ad-hoc Networks (SANDSR) (애드혹 네트워크에서의 간소화된 익명성 DSR 기법)

  • Kong, Chun-Um;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1102-1103
    • /
    • 2007
  • 적대적이고 급변하는 애드혹 네트워크에서 각 노드들은 항상 적대적인 공격자들로부터 위조나 변조의 공격을 받을 수 있어서 통신 내용과 경로의 보안성이 필요하다. AnonDSR 기법은 보안성을 유지하면서 익명성을 효율적으로 보장하는 것으로 알려져 있지만 기존 기법에 비해 암호키를 설립하는 추가적인 절차를 수행하므로 통신 수행시간이 길어지는 문제가 발생한다. 제안 기법에서는 암호키 설립 단계와 통신경로를 설정하는 단계를 동시 수행하고 데이터 전송시에는 공유키로 암호화를 추가적으로 수행해서 보안 강도를 높인다. 결과적으로 제안기법은 AnonDSR 에 비해 매번 통신 수행시간이 최대 31% 향상되고 보안성도 강화된다.

감정평가법인의 설립기준조정

  • 한국주택협회
    • 주택과사람들
    • /
    • s.11
    • /
    • pp.84-87
    • /
    • 1991
  • [ $\circ$] 건설부는 지가공시 및 토지 등의 평가에 관한 법률 제19조의 규정에 의한 감정평가법인의 설립이 ''91.7.1부터 가능해짐에 따라 감정평가업계가 법인형태로 재편되도록 유도해 나갈 계획이다. $\cdot$ 이에 법인설립인가 기준인 감정평가사인 사원의 수를 조정하여 평가법인의 대형화$\cdot$전문화를 도모함으로써 평가업무의 전문성과 책임성을 확보하는 동시에 $\cdot$ 지방의 감정평가업 육성과 지방분산을 도모하기 위하여 수도권과 기타 지방 지역을 차등하여 기준을 설정키로 하였다. - 서울, 인천, 경기: 40인 이상, -기타 지역: 30인 이상.

  • PDF

Efficient Transmission Structure and Key Management Mechanism Using Key Provisioning on Medical Sensor Networks (의료 센서 네트워크에서의 효율적인 전송 구조 및 Key Provisioning을 사용한 키 관리 기법 연구)

  • Seo, Jae-Won;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.285-298
    • /
    • 2009
  • According to the development of ubiquitous technologies, sensor networks is used in various area. In particular, medical field is one of the significant application areas using sensor networks, and recently it has come to be more important according to standardization of the body sensor networks technology. There are special characteristics of their own for medical sensor networks, which are different from the one of sensor networks for general application or environment. In this paper, we propose a hierarchical medical sensor networks structure considering own properties of medical applications, and also introduce transmission mechanism based on hierarchical structure. Our mechanism uses the priority and threshold value for medical sensor nodes considering patient's needs and health condition. Through this way Cluster head can transmit emergency data to the Base station rapidly. We also present the new key establishment mechanism based on key management mechanism which is proposed by L. Eschenauer and V. Gligor for our proposed structure and transmission mechanism. We use key provisioning for emergency nodes that have high priority based on patients' health condition. This mechanism guarantees the emergency nodes to establish the key and transmit the urgent message to the new cluster head more rapidly through preparing key establishment with key provisioning. We analyze the efficiency of our mechanism through comparing the amount of traffic and energy consumption with analysis and simulation with QualNet simulator. We also implemented our key management mechanism on TmoteSKY sensor board using TinyOS 2.0 and through this experiments we proved that the new mechanism could be actually utilized in network design.

A Study on Authentication ID using Identifier in Ad-hoc Network (Ad-hoc 네트워크에서 식별자를 이용한 인증 아이디에 관한 연구)

  • Moon, Jong-Sik;Byeon, Sang-Gu;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1202-1211
    • /
    • 2010
  • The connection between devices in Ad-hoc network a network based on trust. Because a temporary device frequently join or leave, the authentication and security technology should be prepared for malicious device of a third-party attacks. The authentication scheme with the existing certification and ID, and the security technology using symmetric key and the public key is used. Therefore, in this paper we proposed two devices not having shared information use to generate each other's authentication ID. The use of authentication ID can establish the mutual trust and, provide security and efficiency for communication uses to generate a symmetric key.

IETF PKIX 작업반(Working Group)의 공개키 기반구조 표준화 동향

  • Lee, Seung-Woo;Kwak, Jin;Chung, Chan-Joo;Won, Dong-Ho
    • Review of KIISC
    • /
    • v.12 no.5
    • /
    • pp.76-89
    • /
    • 2002
  • 최근 인터넷을 통한 전자상거래와 금융서비스가 널리 확산됨에 따라 인터넷 상에서 전송되는 정보의 안전과 신뢰성 확보에 필요한 정보보호 기술의 표준화 요구가 높아지고 있다. 이러한 인터넷 정보보호 기술의 표준화는 인터넷의 통일성과 표준을 유지하기 위해 설립된 IETF에 의해 수행되고 있으며, 공개키 기반구조(Public Key Infrastructure)에 관한 기술은 PKIX(Public Key Infrastructure X.509) 작업반에서 그 표준화를 담당하고 있다. 본 고에서는 IETF PKIX 작업반의 공개키 기반구조 관련 표준을 조사하였으며 최근의 표준화 활동을 분석한다.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

A Key Management Scheme for Commodity Sensor Networks (소모형 센서 네트워크 환경에 적합한 키 관리 스킴)

  • Kim Young-Ho;Lee Hwa-Seong;Lee Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.71-80
    • /
    • 2006
  • To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, a simple key distribution scheme has been proposed for pair-wise key establishment in sensor networks by Anderson, Chan, and Perrig. They defined a practical attack model for non-critical commodity sensor networks. Unfortunately, the scheme is vulnerable under their attack model. In this paper, we describe the vulnerability in their scheme and propose a modified one. Our scheme is secure under their attack model and the security of our scheme is proved. Furthermore, our scheme does not require additional communication overhead nor additional infrastructure to load potential keys into sensor nodes.

정보화사회초대석-홍동수(한국통신 정보통신사업본부 사업계획국장)

  • Korean Associaton of Information & Telecommunication
    • 정보화사회
    • /
    • s.43
    • /
    • pp.22-23
    • /
    • 1991
  • 국내 업체에서 생산된 각종 소프트웨어가 한곳에 진열, 판매되는 S/W유통센터가 연내 용산전자상가에 설치된다. 한국통신은 지난 연말 이 S/W유통센터를 컴퓨터업체들이 밀집해 있는 용산전자상가 내에 설립키로 하고 나진산업(대표 이문희)측과 계약을 체결, 나진빌딩 지하 1층에 이미 공간을 확보해 두고 있다. 이번호 정보화사회초대석에는 국내 소프트웨어산업을 육성.발전시킨다는 목표아래 유통센터 설립의 지휘봉을 잡은 한국통신 정보통신사업본부 사업계획국 홍동수 국장을 초대한다.

  • PDF

Efficient Authentication Establishment Scheme between IoT Device based on Pascal Triangle Theory (파스칼 삼각 이론 기반의 IoT 장치간 효율적인 인증 설립 기법)

  • Han, Kun-Hee;Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.15-21
    • /
    • 2017
  • Recently, users' interest in IoT related products is increasing as the 4th industrial revolution has become social. The types and functions of sensors used in IoT devices are becoming increasingly diverse, and mutual authentication technology of IoT devices is required. In this paper, we propose an efficient double signature authentication scheme using Pascal's triangle theory so that different types of IoT devices can operate smoothly with each other. The proposed scheme divides the authentication path between IoT devices into two (main path and auxiliary path) to guarantee authentication and integrity of the IoT device. In addition, the proposed scheme is suitable for IoT devices that require a small capacity because they generate keys so that additional encryption algorithms are unnecessary when authenticating IoT devices. As a result of the performance evaluation, the delay time of the IoT device is improved by 6.9% and the overhead is 11.1% lower than that of the existing technique. The throughput of IoT devices was improved by an average of 12.5% over the existing techniques.