• Title/Summary/Keyword: Certification scheme

Search Result 143, Processing Time 0.026 seconds

Weighted Voting Game and Stochastic Learning Based Certificate Revocation for the Mobile Ad-hoc Network (이동 애드 혹 네트워크 환경에서 가중투표게임과 확률러닝을 이용한 악의적인 노드의 인증서 폐지 기법)

  • Kim, Min Jung;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.7
    • /
    • pp.315-320
    • /
    • 2017
  • In this paper, I design a new scheme that is immune to malicious attack based on the weighted voting game. By using stochastic learning, the proposed scheme can revoke the certification of malicious node. Through the revocation process, the proposed scheme can effectively adapt the dynamic Mobile Ad hoc network situation. Simulation results clearly indicate that the developed scheme has better performance than other existing schemes under widely diverse network environments.

Survey and Improvement Scheme for Safety Certification System of Temporary Equipment and Materials (가설기자재 관련 안전인증제도 실태조사 및 개선방안)

  • Won, Bang-Hee;Yoon, Kyeong-Won;Jeon, Sang-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.92-102
    • /
    • 2016
  • In this study, the systems and standards for temporary equipment and materials established in domestic and foreign countries are examined to provide improvement schemes and to insure their safety. Statistical analyses of the data obtained from the internet and/or field visit surveys of employees working in manufacturing, leasing, and construction companies related to temporary equipment and materials and improvement schemes were conducted to evaluate the implementation of a safety certification system for currently used temporary equipment and materials. This safety certification system has been enforced since 2009, but the number of accidents at construction sites, which are reported by the 'serious accident cases and measures in construction sites' group of the Korea Occupational Safety & Health Agency (KOSHA), has increased. The respondents' answers regarding the suitability of the items, which are required for the safety certification of the equipment and materials, were 'yes (36%)', 'no (30%)', and 'unknown (35%)'. Less than half of the answers regarding the current system were positive and most of the respondents answered that the current system does not reflect the evolution of the construction environment. A system is needed to approve items certified in foreign countries and newly developed materials and items, in addition to the (automatic) registration for the reuse of temporary equipment and materials, and improvements are needed in their safety. In this study, after examining the size and practicability of the items requiring approval from the current system, the certification methods are reevaluated and improvement schemes are provided for the system.

Efficient Authentication Protocol for Vehicular Ad-hoc Networks

  • Jung Chae-Duk;Sur Chul;Rhee Kyung-Hyune
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.176-180
    • /
    • 2006
  • In this paper, we propose an efficient authentication protocol based on certificateless signature scheme, which does not need any infrastructure to deal with certification of public keys, among the vehicles in Vehicular Ad-hoc Networks. Moreover, the proposed protocol introduces the concept of interval signature key for efficiently solving the problem of certificate revocation.

  • PDF

A study on the Foreign Information Security Evaluation and Certification Scheme($) (외국의 정보보호 체계 분석($))

  • 강창구;윤이중;김대호;이대기
    • Review of KIISC
    • /
    • v.5 no.1
    • /
    • pp.73-84
    • /
    • 1995
  • 본 논문에서는 국내 정보보호 체계를 수립하기 위하여 외국에서의 정보보호 체계분석의 일환으로 영국의 정보보호 시스템 평사승인 체계에 대하여 분석하였다. 먼저 영국에서의 정보기관 구조를 소개하고, 정보보호 체계와 관련한 조직의 구성 및 임무에 대하여 기술하였다. 또한 영국의 정보보호 시스템 평가승인 절차를 분석하였으며 영국의 암호 알고리즘과 평가 기준서인ITSEC에 대해 분석하였다.

  • PDF

A Study on the Foreign Information Security Evaluation and Certification Scheme(I) (외국의 정보보호 체계 분석 (I))

  • 강창구;윤이중;김대호;이대기
    • Review of KIISC
    • /
    • v.5 no.1
    • /
    • pp.61-72
    • /
    • 1995
  • 본 연구에서는 국내 정보보호 체계를 수립하기 위하여 외국정보보호 체계분석의 일환으로 미국의 정보보호 체계를 분석하였다. 본 논문에서는 먼저 미국의 정보보호 체계의 주요 기구인NCSC와 NIST의 역할을 알라보고, 미국의 컴퓨터 보안 프로그램으로서 TPEP, 네트워크 제품평가 및 DBMS평가방법에 대해서 분석하였으며 또한 통신 보안 프로그램으로 CCEP, 정부 승인 DES 제품 프로그램, EFT 인증 프로그램, PNSL, OLSL및 암호 제품의 판매 제한정책에 대하여 기술하였다.

  • PDF

An effective operating strategy for ISO quality system (ISO 품질시스템의 효율적인 운영전략)

  • 김원중;김재중
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.21 no.45
    • /
    • pp.215-224
    • /
    • 1998
  • Nowadays most companies are required to acquire the quality assurance system from domestic or foreign Certification Institute. However, There are many problems in interpreting the requirements and procedures. This study presents an effective operation scheme by addressing the inherent limits of the system, potential problems in operation, relationship with internal standardization of the company, and the functions of Quality Management that lack or are not considered enough in the ISO 9000 series.

  • PDF

Investigation of Secure Wireless Multihop Ad hoc Network (안전한 무선 Multihop Ad hoc 네트워크를 위한 연구)

  • Lee, Sang-Duck;Park, Jong-An;Han, Seung-Jo;Pyun, Jae-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.118-126
    • /
    • 2007
  • An ad hoc network is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies allowing people and devices to internetwork without any preexisting communication infrastructure. Although ad hoc network is attractive solution, there are still some major flaws that prevent commercial growth. Security is one of these main barriers; ad hoc networks are known to be particularly vulnerable to security attack. It is difficult to establish a centralized key distribution center and a trusted certification authority to provide cryptographic keys and digital certificates to nodes. To prevent attacks in ad hoc routing protocols, many algorithms have been used. In this paper, we have depicted a secure framework for multipath routing in wireless multihop network, which is comprehensive solution for secure data forwarding in wireless multihop networks. With the simulation results, the proposed scheme is compared with existing source routing scheme.

  • PDF

Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment (U-Health환경에서 안전한 개인정보 관리를 위한 통합 인증스키마 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3865-3871
    • /
    • 2014
  • The U-health service provides medical services with patients anytime or anywhere and is defined as the service that combines information and communication technology with health and medical service. However, it causes some troubles, such as the disclosure of patients' medical information or data spills (personal information extrusion). Moreover, it has the weak point of the security threats associated with data based on existing wire-wireless systems because it conducts data transmission and reception through the network. Therefore, this paper suggests a safe personal information management system by designing integrated certification schema that will help compensate for the weaknesses of the U-health service. In the proposal, the protocols for user information, certification between medical institution and users, data communication encryption & decryption, and user information disuse were designed by applying the ID-Based Encryption, and analyzed such existing systems and PKI Based-based communication process, securely and safely.

Efficient Authentication for Mobile Nodes in Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 이동 노드에 대한 효율적인 인증 메커니즘)

  • Lee Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.27-34
    • /
    • 2005
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In this paper, we address the problem of efficient authentication of distributed mobile users in geographically large networks. In particular, we propose a new authentication scheme for this case of MANETs. The proposed scheme exploits Randomized Groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority (CA). We then evaluate the performance of authentication using Randomized Groups.

Trustworthy authentication and key management for NSDR ad-hoc network (안정적인 동적 복합 ad-hoc 네트워크와 이에 대한 신뢰성 있는 키 인증과 키 관리)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.49-55
    • /
    • 2012
  • In this paper, we consider the limit of the previous works for ad-hoc network, then propose a dynamic routing scheme which employs a 2-tier hierarchical structure. We adopt the advantages of proactive and reactive routing scheme for efficient network management. We define this method as NSDR(New Secure Dynamic Routing) scheme. We also propose a trustworthy authentication and key management for the proposed ad-hoc network. We currently study the possibility that ad-hoc networks can provide a service such as key management and authentication for the next generation mobile network.