• Title/Summary/Keyword: Authenticate

Search Result 289, Processing Time 0.024 seconds

An Optimized Authentication Method between Mobile Node and Home Agent using AAA in Mobile IPv6 (Mobile IPv6에서 AAA를 이용한 이동노드와 홈 에이전트간의 최적화된 인증 방안)

  • 김미영;문영성
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.714-719
    • /
    • 2003
  • A Mobile IPv6 services exposes its vulnerability when a mobile node is roaming the subnets belonging to the different domains. The AAA infrastructure is strongly recommended when the ISPs need to authenticate the mobile user comes from the different domains. In addition to the basic requirements for the AAA service, the authentication latency and AAA message overhead should be minimized for the continuity of the mobile service. This paper considers the roaming service with AAA infrastructure in Mobile IPv6 and proposes an authentication scheme using delegation to authenticate the mobile node with effective manner. The effectiveness of the proposed scheme is confirmed using the cost analysis. The result shows at least 50% of performance enhancement when the MN is roaming fast under the control of the delegation.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

A Study on the Localized Key Management Using AAA in Mobile IPv6 (Mobile IPv6 상에서 AAA 기반의 지역화된 키 관리 기법에 관한 연구)

  • Kim Mi-Young;Mun Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.19-25
    • /
    • 2003
  • Mobile IPv6 services exposes its vulnerability when a mobile node is roaming across the subnets which belongs to the different domains. The AAA Infrastructure Is strongly recommended when the ISPs need to authenticate the mobile user come from the different domains. In addition to the basic requirements for AAA service, the authentication latency and AAA message overhead should be minimized for contiguity of the service. This paper considers the roaming service with AAA infra structure in Mobile IPv6 and proposes the key distribution method to authenticate the mobile node with secure manner by reducing and optimizing the exchanged messages for AAA entities.

  • PDF

Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms

  • Salem, Asma;Sharieh, Ahmad;Sleit, Azzam;Jabri, Riad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4076-4092
    • /
    • 2019
  • Nowadays, most users access internet through mobile applications. The common way to authenticate users through websites forms is using passwords; while they are efficient procedures, they are subject to guessed or forgotten and many other problems. Additional multi modal authentication procedures are needed to improve the security. Behavioral authentication is a way to authenticate people based on their typing behavior. It is used as a second factor authentication technique beside the passwords that will strength the authentication effectively. Keystroke dynamic rhythm is one of these behavioral authentication methods. Keystroke dynamics relies on a combination of features that are extracted and processed from typing behavior of users on the touched screen and smart mobile users. This Research presents a novel analysis in the keystroke dynamic authentication field using two features categories: timing and no timing combined features. The proposed model achieved lower error rate of false acceptance rate with 0.1%, false rejection rate with 0.8%, and equal error rate with 0.45%. A comparison in the performance measures is also given for multiple datasets collected in purpose to this research.

Authenticated Quantum Secret Sharing using GHZ state swapping (GHZ 상태 교환을 이용한 인증된 양자 비밀 공유)

  • Lee, Duk-Jin;Lee, Hwa-Yean;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.123-134
    • /
    • 2006
  • We propose a quantum secret sharing protocol which can authenticate more than half of members using GHZ state swapping. The Trusted Third Party, Trent can authenticate all members using previously shared ID among Trent distributing his message and the members wanting to reconstruct the message. Authenticated members can reconstruct a secret message through GHZ swapping. Moreover, this protocol is efficient to expand the number of members to arbitrary number n, so it is a close quantum secret sharing protocol to classical secret sharing protocol.

Secure GSM User Authentication Protocol For User Privacy (사용자 프라이버시를 위한 안전한 GSM 사용자인증 프로토콜)

  • Park, Mi-Og;Kim, Chang-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.157-161
    • /
    • 2006
  • GSM(Global System for Mobile communications) that is the most popular standard for mobile phones, has more than 70% users in the world and the number of users increase continuously. However GSM system has the problem that cannot normally authenticate a user by the exposure of IMSI that is able to uniquely authenticate MS? during the user authentication procedure. In this paper? we provide security enhancement and user privacy by adopting a temporary id and an encryption scheme. Moreover we provide fast user authentication via architecture modification of the conventional GSM user authentication protocol.

Implementation of crypto key-based IoT network security system (암호키 기반 IoT 네트워크 보안 시스템 구현)

  • Jeon, Ji-Soo;Kang, Dong-Yeon;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.349-350
    • /
    • 2022
  • As research on IT convergence continues, the scope of IoT (Internet of Things) services continues to expand. The IoT service uses a device suitable for the purpose. These IoT devices require an authentication function. In addition, in IoT services that handle important information such as personal information, security of transmission data is required. In this study, we implement a crypto key-based IoT network security system that can authenticate devices for IoT services and securely transmit data between devices. Through this study, IoT service can authenticate the device itself and maintain the confidentiality of transmitted data. However, since it is an IoT service, additional research on the application efficiency of the encryption algorithm is required.

  • PDF

Development of Molecular Marker for the authentication of Patriniae Radix by the analysis of DNA barcodes (DNA 바코드 분석을 통한 패장 기원종 감별용 분자 마커 개발)

  • Kim, Wook Jin;Ji, Yunui;Lee, Young Mi;Kang, Young Min;Choi, Goya;Kim, Ho Kyoung;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.29 no.6
    • /
    • pp.45-53
    • /
    • 2014
  • Objectives : Due to the morphological similarity of in the roots of herbal medicine, the official herbal medicine is very difficult to authenticate between the original plants of Patriniae Radix and two adulterant Patrinia species. Therefore, we introduced DNA barcode analysis to establish a powerful tool for the authentication of Patriniae Radix from its adulterants. Methods : To analyze DNA barcode regions, genomic DNA was extracted from twenty-nine specimens of Patrinia scabiosaefolia, Patrinia villosa, Patrinia saniculifolia, and Patrinia rupestris, and internal transcribed spacer 2(ITS2), matK and rbcL genes were amplified. For identification of species specific sequences, a comparative analysis was performed by the ClastalW based on entire sequences of ITS2, matK and rbcL genes, respectively. Results : In comparison of three DNA barcode sequences, we identified 22, 22, and 12 species-specific nucleotides enough to distinguish each four species from ITS2, matK and rbcL gene, respectively. The sequence differences at the corresponding positions were available genetic marker nucleotides to discriminate the correct species among analyzed four species. These results indicated that comparative analysis of ITS2, matK and rbcL genes were useful genetic markers to authenticate Patriniae Radix. Conclusions : The marker nucleotides enough to distinguish P. scabiosaefolia, P. villosa, P. saniculifolia, and P. rupestris, were obtained at 22 SNP marker nucleotides from ITS2 and matK DNA barcode sequences, but they were confirmed at 12 SNP marker nucleotides from rbcL. These differences could be used to authenticate Patriniae Radix from its adulterants as well as discriminating each four species.

Development of Molecular Markers for the authentication of Zanthoxyli Pericarpium by the analysis of rDNA-ITS DNA barcode regions (rDNA-ITS DNA 바코드 부위 분석을 통한 산초(山椒) 기원종 감별용 유전자 마커 개발)

  • Kim, Wook Jin;Ji, Yunui;Lee, Young Mi;Kang, Young Min;Choi, Goya;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.30 no.3
    • /
    • pp.41-47
    • /
    • 2015
  • Objectives : Due to the morphological similarity of the pericarp and description of multi-species in National Pharmacopoeia of Korea and China, the Zanthoxylum Pericarpium is difficult to authenticate adulterant in species levels. Therefore, we introduced the sequence analysis of DNA barcode and identification of single nucleotide polymorphism(SNP) to establish a reliable tool for the distinction of Zanthoxylum Pericarpium from its adulterants. Methods : To analyze DNA barcode region, genomic DNA was extracted from twenty-four specimens of authentic Zanthoxylum species and inauthentic adulterant and the individual internal transcribed spacer regions (rDNA-ITS and ITS2) of nuclear ribosomal RNA gene were amplified using ITS1, ITS2-S2F, and ITS4 primer. For identification of species-specific sequences, a comparative analysis was performed using entire DNA barcode sequences. Results : In comparison of four Zanthoxylum ITS2 sequences, we identified 16, 4, 6, and 4 distinct species-specific nucleotides enough to distinguish Z. schinifolium, Z. bungeanum, Z. piperitum, and Z. simulans, respectively. The sequence differences were available genetic marker to discriminate four species. Futhermore, phylogenetic relationship revealed a clear classification between different Zanthoxylum species showing 4 different clusters. These results indicated that comparative analysis of ITS2 DNA barcode was an useful genetic marker to authenticate Zanthoxylum Pericarpium in species levels. Conclusions : The marker nucleotides, enough to distinguish Z. schinifolium, Z. piperitum, Z. bungeanum, and Z. simulans, were obtained at 30 SNP marker nucleotides from ITS2 sequences. These differences could be used to authenticate official Zanthoxylum Pericarpium from its adulterants as well as discriminating each four species.

Routing Protocol using One-Way Hash Functions for Mobile Ad Hoc Networks

  • Park, Young-Ho
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.26-31
    • /
    • 2007
  • An ad hoc network is a collection of mobile nodes without any Infrastructure. However, ad hoc networks are vulnerable to attacks such as routing disruption and resource consumption; thus, routing protocol security is needed This paper proposes a secure and efficient routing protocol for mobile ad hoc networks, where only one-way hash function are used to authenticate nodes in the ROUTE REQUEST, while additional public-key cryptography is used to guard against active attackers disguising a node in the ROUTE REPLY.

  • PDF