• Title/Summary/Keyword: CASPER

Search Result 33, Processing Time 0.03 seconds

Deriving Personalized Context-aware Services from Activities of Daily Living (생활 데이터 분석을 통한 개인화된 상황인식서비스 생성)

  • Park, Jeong-Kyu;Lee, Keung-Hae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.525-530
    • /
    • 2010
  • Currently, most context-aware services are built by developers. Some researchers argued that services should be defined by end users, who understand their own needs best. We view that the significance of enabling the user to define his/her personalized services will multiply as our living spaces grow smarter. This paper introduces a novel method called CASPER, which is capable of deriving personalized services from the log of user's activities of daily living. CASPER can generate useful services that even the user may not perceive, mining causality of events in the log. We present the algorithm of CASPER in detail and discuss the result of an experiment which we conducted as a proof of concept.

Analysis of VANET Authentication Protocol using Casper in the Formal Verification (정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.

The Vulnerability Analysis and Modification of SSH Protocol using Casper, FDR (Casper, FDR을 이용한 SSH 프로토콜의 취약성 분석 및 수정)

  • 김일곤;최진영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.288-291
    • /
    • 2002
  • 보안 프로토콜을 이용하여 사용자 상호 간의 정보의 비밀성, 무결성, 부인방지를 보장하는 일은 반드시 필요한 과제가 되었다. 이에 따라 해당 서비스에 대해 적합한 사용자를 인증하고 인가하기 위해 다양한 보안 프로토콜(EKE, S/KEY, Kerberos등)이 사용되고 있으며, 이와 더불어 보안 프로토콜을 정형적으로 명세하고 검증하기 위한 다양한 방법들이 연구되고 있다. 본 논문에서는 Casper와 FDR을 이용하여 SSH 프로토콜의 취약성을 분석하고, 수정하여 SSH 프로토콜의 안전성을 향상시키고자 하였다.

  • PDF

The Security Analysis of SSH protocol using Casper, FDR (Casper, FDR를 이용한 SSH 프로토콜의 안전성 분석)

  • 김일곤;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.442-444
    • /
    • 2002
  • 인터넷의 비약적인 발전과 더불어, 인터넷을 활용한 각종 온라인 서비스가 활성화되어 가고 있는 추세이다. 온라인 쇼핑몰, 온라인 뱅킹과 같은 전자 상거래 서비스는 이용자와 서비스 제공자간의 상호 신뢰를 기반으로 동작해야만 하는 서비스이다. 해당 서비스에 대한 적합한 사용자를 인증하고 인가하기 위한 다양한 인증 프로토콜(EKE, S/KEY, Kerberos 등)에 대한 다양한 연구가 진행되어 오고 있다. 본 논문에서는 FDR, Casper과 같은 보안 프로토콜 분석 및 검증 도구를 이용하여 SSH 프로토콜의 위험성을 분석하여 보안 프로토콜의 안전성을 향상시키고자 한다.

  • PDF

A Key Distribution Protocol Specification using Casper (Casper를 이용한 키 분배 프로토콜 명세)

  • Lee, Sung-Min;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.1163-1165
    • /
    • 2000
  • 최근 보안 프로토콜의 안전성을 검증하는 연구가 활발히 진행되고 있다. 이러한 연구 중 대표적인 방법이 CSP[1]와 FDR[2]과 같은 정형 기법을 이용하여 프로토콜을 분석하는 것이다. 이 방법은 매우 성공적으로 프로토콜의 문제점을 발견하고 안전성을 검증할 수 있었다. 하지만 CSP를 이용하여 프로토콜을 명세하는 것은 숙달된 전문가에게만 적합하고 시간이 오래 걸린다는 문제점을 갖는다. 이러한 문제점을 해결하여 좀 더 쉽게 프로토콜을 명세하여 CSP 코드를 생성해주는 캐스퍼(Casper)[3]가 제안되었다. 본 논문에서는 세 개의 메시지 교환을 통해서 키를 분배하는 키 분배 프로토콜을 제안하고 캐스퍼를 이용하여 제안한 프로토콜에 대한 정형 명세를 한다. 명세된 스크립트는 캐스퍼를 이용하여 FDR의 입력 파일이 되는 667 라인의 CSP 코드를 생성하였다. 캐스퍼를 이용한 정형 명세는 좀 더 편리하게 프로토콜을 명세할 수 있고 명세 시 발생할 수 있는 에러를 줄임으로써 신뢰성을 높일 수 있다.

  • PDF

Formal Methodology for Safety Analysis of Security Protocols (보안 프로토콜의 안전성 분석을 위한 정형적 방법론)

  • Kim Il-Gon;Jeon Chul-Wuk;Kim Hyun-Seok;Choi Jin-Young;Kang In-Hye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.17-27
    • /
    • 2005
  • With the development of wire and wireless based networks, a various security protocols have been proposed to protect important resources and user information against attackers. However, many security protocols have found oかy to be later vulnerable to attacks. In this Paper, we introduce the formal methodology to verify the safety of security protocols in the design phase, and we take advantage of the formal methodology which uses Casper/CSP and FDR tools by introducing the verification example of EKE protocol and BCY protocol. Lastly, we propose a new BCY protocol after verifying it's safety.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.

Security Verification of a Communication Authentication Protocol in Vehicular Security System (자동차 보안시스템에서 통신 인증프로토콜의 보안성 검증)

  • Han, Myoungseok;Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.229-234
    • /
    • 2014
  • Vehicular electronic communication system has continued to develop in favor of high performance and user convenience with the evolution of auto industry. Yet, due to the nature of communication system, concerns over intruder attacks in transmission sections have been raised with a need for safe and secure communication being valued. Any successful intruder attacks on vehicular operation and control systems as well as on visual equipment could result in serious safety and privacy problems. Thus, research has focused on hardware-based security and secure communication protocols. This paper proposed a safe and secure vehicular communication protocol, used the formal verification tool, Casper/FDR to test the security of the proposed protocol against different types of intruder attacks, and verified that the proposed protocol was secure and ended without problems.

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks

  • Obaidat, Mohammad S.;Dhurandher, Sanjay K.;Diwakar, Khushboo
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.241-260
    • /
    • 2011
  • In earlier days, most of the data carried on communication networks was textual data requiring limited bandwidth. With the rise of multimedia and network technologies, the bandwidth requirements of data have increased considerably. If a network link at any time is not able to meet the minimum bandwidth requirement of data, data transmission at that path becomes difficult, which leads to network congestion. This causes delay in data transmission and might also lead to packet drops in the network. The retransmission of these lost packets would aggravate the situation and jam the network. In this paper, we aim at providing a solution to the problem of network congestion in mobile ad hoc networks [1, 2] by designing a protocol that performs routing intelligently and minimizes the delay in data transmission. Our Objective is to move the traffic away from the shortest path obtained by a suitable shortest path calculation algorithm to a less congested path so as to minimize the number of packet drops during data transmission and to avoid unnecessary delay. For this we have proposed a protocol named as Congestion Aware Selection Of Path With Efficient Routing (CASPER). Here, a router runs the shortest path algorithm after pruning those links that violate a given set of constraints. The proposed protocol has been compared with two link state protocols namely, OSPF [3, 4] and OLSR [5, 6, 7, 8].The results achieved show that our protocol performs better in terms of network throughput and transmission delay in case of bulky data transmission.

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.