• Title/Summary/Keyword: Authenticate

Search Result 289, Processing Time 0.021 seconds

A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks (VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜)

  • Kim, Sung-Hoon;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.115-124
    • /
    • 2008
  • In vehicular networks, vehicles should be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. however, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies the several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonym and MAC (Message Authentication Code) chain. And also by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

Efficient authenticate protocol for very Low-Cost RFID (저가형 RFID 시스템을 위한 효율적인 인증 프로토콜)

  • Choi Eun Young;Choi Dong Hee;Lim Jong In;Lee Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.59-71
    • /
    • 2005
  • A RFID (Radio Frequency Identification) system receives attention as the technology which can realize the ubiquitous computing environment. However, the feature of the RFID tags may bring about new threats to the security and privacy of individuals. Recently, Juels proposed the minimalist cryptography for very low-cost RFID tags, which is secure. but only under the impractical assumption such that an adversary is allowed to eavesdrop only the pre-defined number of sessions. In this paper, we propose a scheme to protect privacy for very low-cost RFID systems. The proposed protocol uses only bit-wise operations without my costly cryptographic function such as hashing, encryption which is secure which is secure against an adversary who is allowed to eavesdrop transmitted message in every session any impractical assumption. The proposed scheme also is more efficient since our scheme requires less datas as well as few number of computations than Juels's scheme.

Strong Yoking-Proof Protocol using Light-Weighted MAC (경량화된 MAC을 이용한 강력한 Yoking-Proof 프로토콜)

  • Cho, Chang-Hyun;Lee, Jae-Sik;Kim, Jae-Woo;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.83-92
    • /
    • 2009
  • Ari Juels proposed Yoking-Proof protocol for authenticating multiple tags simultaneously using RFID system. Because common Yoking-Proof methods authenticate by using MAC (Message Authentication Code), it is difficult to apply them to inexpensive tags. It is also difficult to implement common hash functions such as MD5 in inexpensive tags. So, Ari Juels also proposed a lightweighted Yoking-Proof method with only 1 authentication. However, Minimalist MAC, which is a lightweighted MAC used in the proposed method is for single-use, and the proposed structure is vulnerable to replay attacks. Therefore, in this study, the minimalist MAC using Lamport's digital signature scheme was adopted, and a new type of Yoking-Proof protocol was proposed where it uses tags that are safe from replay attacks while being able to save multiple key values.

Mutual Identification and Key Exchange Scheme in Secure Vehicular Communications based on Group Signature (그룹 서명 기반의 차량 네트워크에서 상호 신분 확인 및 세션키 교환 기법)

  • Kim, Dai-Hoon;Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.41-50
    • /
    • 2010
  • This paper proposes a mutual identification and session key exchange scheme in secure vehicular communication based on the group signature. In VANETs, security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality are required to satisfy various vehicular applications. However, existing VANET security methods based on the group signature do not support a mutual identification and session key exchange for data confidentiality. The proposed scheme allows only one credential to authenticate ephemeral Diffie-Hellman parameters generated every key exchange session. Our scheme provides a robust key exchange and reduces storage and communication overhead. The proposed scheme also satisfies security requirements for various application services in VANETs.

Development and Validation of Multiplex PCR Method for the Identification of Pagrus major and Sciaenops ocellatus (참돔과 홍민어 판별을 위한 Multiplex PCR 검사법의 개발과 검증)

  • Choi, Iseul;Shin, Jiyoung;Yang, Ji-young
    • Journal of Food Hygiene and Safety
    • /
    • v.35 no.6
    • /
    • pp.561-566
    • /
    • 2020
  • Nowadays, with increase of seafood consumption, there have been increasing reports of defective seafood products. There have been incidents of red drum (Sciaenops ocellatus) being sold as red seabream (Pagrus major). In this study, we sought to develop and validate species-specific PCRs to differentiate between P. major and S. ocellatus to prevent the sale of S. ocellatus as P. major. Primers for P. major were designed to bind 12s rRNA and those for S. ocellatus were designed to bind 16s rRNA. Multiplex PCR showed a 468 bp amplicon for P. major and a 181 bp amplicon for S. ocellatus. The limit of detection of P. major and S. ocellatus was present at 1 ng each. The developed primers were validated with 19 P. major samples of food items purchased through the internet. Using this monitoring method, the experimental results and tested species were in agreement. Hence, the developed multiplex PCR method is considered reliable to authenticate P. major and S. ocellatus.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Development SCAR marker for the rapid authenticaton of Sinomeni Caulis et Rhizoma based on ITS Sequences (ITS 염기서열 기반 방기 신속 감별용 SCAR marker 개발)

  • Kim, Wook Jin;Noh, Sumin;Choi, Goya;Moon, Byeong Cheol
    • The Korea Journal of Herbology
    • /
    • v.37 no.4
    • /
    • pp.9-16
    • /
    • 2022
  • Objectives : In the Korean Pharmacopoeia 12th edition (KP 12) and the Korean Herbal Pharmacopoeia (KHP), two authentic herbal medicines are described, namely Bang-gi (Cheong-pung-deung) and Mok-bang-gi, respectively. In China, Bun-bang-gi is also used as herbal medicine. This study was conducted to develop a molecular authentication tool for distinguishing the three herbal medicine used as Bang-gi, which are Sinomeni Caulis et Rhizoma (Rhizome of Sinomenium acutum), Stephaniae Tetrandrae Radix (Root of Stephania terandra), and Cocculi Radix (Root of Cocculus trilobus). Methods : Twelve samples of three species (four samples of S. acutum, five samples of S. tetrandra, and three samples of C. trilobus) were collected from different habitats. The sequences of internal transcribed spacer (ITS) regions were obtained and comparatively analyzed to design the species-specific sequence characterized amplified region (SCAR) primers. The specificity of each pair of SCAR primers that amplified species-specific amplicon was evaluated for establishing the singleplex and multiplex PCR assay tools. Results : The singleplex SCAR markers show discriminability in C. acutum, S. tetrandra, and C. trilobus. These SCAR markers were also efficiently authenticated three species in the multiplex SCAR amplification using single PCR reaction. Furthermore, these PCR assay methods were applicable to authenticate dried herbal medicines distributed in the markets. Conclusions : The SCAR markers and PCR assay tools help discriminate the three herbal medicines used as Bang-gi at the species levels and provide a reliable genetic method to prevent the inauthentic distribution of these herbal medicines.

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.

FinDID : A DID service supporting the standard service scheme for the financial sector

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.127-138
    • /
    • 2022
  • In this paper, we present FinDID (Financial Decentralized IDentity), a blockchain-based DID(Decentralized IDentity) service that can flexibly control personal information or credentials through a systematic verification method while complying with the standard service scheme of decentralized identity for the financial sector. DID is an identity management system used in a decentralized environment without a specific certification authority, and as a technology that allows users to control their own information, it can realize self-sovereignty over users' own personal information. Through FinDID, users receive credentials that authenticate their various personal information from the issuer, select only the claims required by the target financial service using their personal electronic wallet, create presentations from credentials. Then they submit it to the financial service, leading to their qualification from the service. FinDID consists of electronic wallet, credential issuer, credential storage, DID service including DID management contract and credential management contract, and financial services using this service scheme. The DID service manages each user's DID and supports all verification processes of the associated identity management scheme.

Molecular Authentication and Phylogenetic Analysis of Plant Species for Breeae and Cirsii Herba based on DNA barcodes (DNA 바코드 분석을 통한 소계(小薊) 및 대계(大薊) 기원식물 감별과 종간 유연관계 분석)

  • Moon, Byeong Cheol;Lee, Young Mi;Ji, Yunui;Choi, Goya;Chun, Jin Mi;Kim, Ho Kyoung
    • The Korea Journal of Herbology
    • /
    • v.28 no.3
    • /
    • pp.75-84
    • /
    • 2013
  • Objectives : The origin of Breeae Herba (So-gye) and Cirsii Herba (Dae-gye) is differently prescribed in Korean and Chinese modern pharmacopoeia. Since the similar morphological characteristics and chaotic plant names, moreover, the aerial part of Carduus crispus have been used as the Cirsii Herba. To develop a reliable method for correct identification of these herbal medicines and to evaluate the genetic relationship of these closely related plant species, we analyzed sequences of DNA barcode regions. Methods : Thirty-one samples of 6 medicinal plants (B. segeta, B. setosa, C. japonicum var. maackii, C. setidens, C. chanroenicum, and C. crispus) were collected from different habitate and nucleotide sequences of DNA barcode regions (rDNA-ITS, matK, and rbcL) were analyzed after amplification using appropriate primers reported in previous studies. The nucleotides of species-specific authentic marker and phylogenetic relations were estimated based on the entire sequences of DNA barcodes by the analysis of ClastalW and UPGMA, respectively. Results : In comparative analysis of DNA barcode sequences, we obtained specific nucleotides to discriminate the medicinal plant of Breeae/Cirsii Herba in species level and evaluated the phylogenetic relationship of these species. Futhermore, we identified distinct marker nucleotides enough to authenticate respective species. These sequence differences at corresponding positions were avaliable genetic markers to determine the botanical origins of Breeae Herbal as well as Cirsii Herba. Conclusions : These marker nucleotides would be useful to identify the official herbal medicines by providing of definitive information that can identify each plant species and distinguish from unauthentic adulterants and substitutes.