• Title/Summary/Keyword: Authentication and Access

Search Result 685, Processing Time 0.023 seconds

Study on Technical trend of physical security and future service (물리보안의 기술동향과 미래 서비스에 대한연구)

  • Shin, Byoung-Kon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.159-166
    • /
    • 2010
  • From public insecurity, access of wealth, alteration of population structure, and changes of security recognition, physical security has been continuously developed and changed. In these days, typical systems for physical security are unmanned security system using telephone network and security equipment, image recognition system using DVR and camera, and access control system by finger print recognition and RFID cards. However, physical security system is broadening its domain towards ICT based convergence with networked camera, biometrics, individual authentication, and LBS services. This paper proposes main technical trends and various security convergences for future physical security services by classifying the security categories into 3 parts; Individual security for personal protection, IT Convergence for large buildings, and Homeland Security for omni-directional security.

Design and Implementation of Secure Vehicle Communication Protocols for WAVE Communication Systems (WAVE 통신 시스템을 위한 차량 보안 통신 프로토콜의 설계 및 구현)

  • Park, Seung-Peom;Ahn, Jae-Won;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.841-847
    • /
    • 2015
  • The WAVE(Wireless Access in Vehicular Environments) communication system supports wireless communication environments between vehicles. As the utilization of wireless communication has been increased, attack methods have been varied. There is a high risk on packet manipulations conducted by third party. In this paper, we have designed a secure communication protocol between CA and vehicles. Our designed protocol uses a ECIES(Elliptic Curve Integrated Encryption Scheme) for vehicle authentication and AES(Advanced Encryption Standard) algorithm for protecting packet integrity and confidentiality.

A study on the smart band, technologies, and case studies for the vulnerable group. - The Digital Age and the Fourth Industrial Revolution.

  • YU, Kyoungsung;SHIN, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.182-187
    • /
    • 2022
  • This study aims to study non-rechargeable wrist-type smart bands for those vulnerable to the digital environment. The transition to the digital age means improving the efficiency of human life and the convenience of management. In the digital age, it can be a very convenient infrastructure for the digital generation, but otherwise, it can cause inconvenience. COVID-19 is spreading non-face-to-face culture. The reality is that the vulnerable are complaining of discomfort in non-face-to-face culture. The core of the digital environment is smartphones. Digital life is spreading around smartphones. Technology that drives the digital environment is the core technology of the Fourth Industrial Revolution. The technologies are lot, big data, Blockchain, Smart Mobility, and AI. Related technologies based on these technologies include digital ID cards, digital keys, and nfc technologies. Non-rechargeable wrist-type smart bands based on related technologies can be conceptualized. Through these technologies, blind people can easily access books and manage their ID cards conveniently and efficiently. In particular, access authentication is required wherever you go due to COVID-19, which can be used as a useful tool for the elderly who feel uncomfortable using smartphones. It can also eliminate the inconvenience of the elderly finding or losing their keys.

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

A Study on Improvement of Mechanism for Secure Handoff in Wireless Networks (무선랜 환경에서 안전한 핸드오프를 위한 메커니즘 개선에 관한 연구)

  • Cho, Ji-Hoon;Jeon, Joon-Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1047-1055
    • /
    • 2005
  • One of major characteristics in wireless LAN is terminal's frequent mobility, so it makes many overheads in the process of authentications repeatedly at each handoffs. So I propose IAPP(Inter Access Point Protocol) of IEEE 802.11f, modified context block and 4 way handshake of IEEE 802.11i, in order to implement secure and rapid handoff. The context block. I proposed, doesn't makes any communication with RADIUS server at handoff period. Therefore, it guarantee higher efficiency than existing handoff mechanisms. Also it can improve security vulnerability by padding authentication field in the context block for providing in advance against Replay and DoS(Denial of Service) attacks.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Design and Implementation of File Access Control System using Java Card (자바카드를 이용한 파일 접근제어 시스템의 설계 및 구현)

  • Koo, Eun-Bee;Woo, Chan-Il
    • 전자공학회논문지 IE
    • /
    • v.43 no.1
    • /
    • pp.46-51
    • /
    • 2006
  • Recently, smart card system which is known as easy to portable and also safe from physical, electrical, and software attack is observed to manage information that becomes the target of security in safety. And java card graft upon java technology to smart card platform is having very good advantage with object-oriented techniques and also, java card have the open type OS that can show the same action in different hardware characteristic which allows various application programs. In this paper, we introduced independent execution characteristic of java platform because being set to each smart card was uncomfortable till now and we designed access control member card that allows several administrators in different access privilege by single card using java card. Several administrators can approach to various information of file type that is included on issued card to user by using different PIN. In the proposed method, confirmation of personal information, administration contents update, demand by contents, is possible by single card. At this moment, wish to do safer user certification that improve security limitation which is from PIN, used for user certification, and signature data. In the proposed method, as design and implementation of utilization technology of java card, biometrics, user certification which uses multi PIN, provide that more safety and conveniently.

Prospects For The Development Of Distance Educational Learning Technologies During The Training Of Students Of Higher Education

  • Rohach, Oksana;Pryhalinska, Tetiana;Kvasnytsya, Iryna;Pohorielov, Mykhailo;Rudnichenko, Mykola;Lastochkina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.353-357
    • /
    • 2022
  • This article identifies the problems and substantiates the directions for the development of distance learning technologies in the training of personnel. An example of using digital media to create a remote access laboratory is given. The article is devoted to the definition of the main aspects of the organization of distance education. Rapid digitization, economic, political and social changes taking place in Ukraine necessitate the reform of the education system. First of all, it concerns meeting the educational needs of citizens throughout their lives, providing access to educational and professional training for all who have the necessary abilities and adequate training. The most effective solution to the above-mentioned problems is facilitated by distance learning. The article analyzes the essence and methods of distance learning organization, reveals the features of the use of electronic platforms for the organization of this form of education in different countries of the world. The positive characteristics of distance learning are identified, namely: extraterritoriality; savings on transport costs; the interest of modern youth in the use of information tools in everyday life; increase in the number of students; simplicity and accessibility of training; convenient consultation system; democratic relations between the student and the teacher; convenience for organizations in training their employees without interrupting their regular work; low level of payment for distance education compared to traditional education; individual learning pace; new teacher status. Among the negative features of online education, the author refers to the following problems: authentication of users during knowledge verification, calculation of the teacher's methodological load and copyright of educational materials; the high labor intensity of developing high-quality educational content and the high cost of distance learning equipment; the need to provide users with a personal computer and access to the Internet; the need to find and use effective motivation mechanisms for education seekers.

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.