• Title/Summary/Keyword: Device Security

Search Result 1,224, Processing Time 0.023 seconds

Quantum Key Distribution System integrated with IPSec (양자키분배와 IPSec을 결합한 네트워크 보안 장치 연구)

  • Lee, Eunjoo;Sohn, Ilkwon;Shim, Kyuseok;Lee, Wonhyuk
    • Convergence Security Journal
    • /
    • v.21 no.3
    • /
    • pp.3-11
    • /
    • 2021
  • Most of the internet security protocols rely on classical algorithms based on the mathematical complexity of the integer factorization problem, which becomes vulnerable to a quantum computer. Recent progresses of quantum computing technologies have highlighted the need for applying quantum key distribution (QKD) on existing network protocols. We report the development and integration of a plug & play QKD device with a commercial IPSec device by replacing the session keys used in IPSec protocol with the quantum ones. We expect that this work paves the way for enhancing security of the star-type networks by implementing QKD with the end-to-end IP communication.

Domain Key Based Efficient Redistribution Mechanism of Scalable Contents (도메인 키 기반의 효율적인 스케일러블 콘텐츠 재분배 메커니즘)

  • Park, Su-Wan;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.129-134
    • /
    • 2010
  • In this paper, we propose a redistribution mechanism of the content that is adapted to devices, which may have different display size and computing capabilities, in home network. The proposed system introduces a mechanism that the encrypted content compressed by H.264/SVC(Scalable Video Coding) scheme which has been standardized recently is provided to the device into a level of content suitable to each device capability. To efficiently superdistribute SVC content, this paper defines three requirements and proposes redistribution mechanism which satisfies these requirements using another licence that it is called 'Ticket'. Our system allows devices to redistribute the content freely in the domain using domain key.

Hybrid PKI Public Certificate Security Method Based on Device ID (디바이스 ID 기반의 하이브리드 PKI 공인 인증 보안 기법)

  • Son, Young-Hwan;Choi, Woon-Soo;Kim, Ki-Hyun;Choi, Han-Na;Lee, Dae-Yoon;Oh, Chung-Shick;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.113-124
    • /
    • 2010
  • In this study, the hybrid authorization quotation technique is based on the device ID for the integrity of the source region guarantee of user certificate, in order to improve the convenience and security for user in the hybrid PKI certificate Mechanism for authentication. The feature of the model in which it is presented from this paper is 5. First, because the user can select the policy himself in which it matches with each authentication situation and security level, the convenience can be improved. Second, the integrity of the source region of the user certificate can be guaranteed through the comparison of the DLDI Key, that is the hash-value of the device ID. Third, the security can be improved by continuously changing an encoding, and the value of the key in which it decodes through the EOTP Key. Fourth, the index value is added to a certificate, and the storage of a certificate is possible at the Multi-Device. Fifth, since the addi the inan aratus for the integrity of the source region guarantee of a certificate is not needed, the authentication process time can be reduced and the computational load of the certificate server can be reduced also.

Mobile Devices Control System using LSM (리눅스 보안 모듈을 이용한 모바일 장치 통제 시스템)

  • Bae, Hee-sung;Kim, So-yeon;Park, Tae-kyou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.49-57
    • /
    • 2017
  • With the prevalence of mobile devices, many organizations introduce MDM BYOD and try to increase the level of security with them. However, device control of mobile devices in application level cannot be a solution against the fundamental problems. In this paper, we propose a more flexible and more secure method to control the hardware devices using Linux Security Module in the kernel level with the mandatory access control.

Countermeasures for BadUSB Vulnerability (BadUSB의 취약성 및 대응방안)

  • Choi, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.559-565
    • /
    • 2015
  • To defend against information leakage or malware inflow by USB memory, security technologies such as copy protection and device control have being researched and developed. However, countermeasure are insufficient despite being recognized as a fatal security-hole for BadUSB presented at the Black Hat Security Conference 2014. To solve this problem, the countermeasures for BadUSB vulnerability are proposed.

Risk of Attack through an Open Wireless Network of IoT Devices (IoT 장치의 개방형 무선 네트워크를 통한 공격 위험)

  • Lee, Geonwoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.10-14
    • /
    • 2019
  • The number of security incidents is increasing as the Internet of Things(IoT) is distributed widely. The security incidents of IoT can cause financial damages. Moreover, It can become direct threats to humans. In order to prevent these problems, the security installation for IoT devices is important. This paper describes the definition of IoT devices, security incident case, architecture, and the security threats that can occur when a device is connected to network without security installation.

  • PDF

Design and Implementation of CVM on Real-Time Operating System, UbiFOSTM (실시간 운영체제 UbiFOSTM에서의 CVM 설계 및 구현)

  • Choi, chan-woo;Lee, cheol-hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.812-816
    • /
    • 2007
  • Having been speedy development of the IT industry, devices such as set-top box and smart phone are used in the broad filed. Because Java has merits that are platform independency, security and mobility, that is important software platform to offer stable services in the small device. This needs JVM(Java Virtual Machine) to execute Java application in the small device. CVM(Classic Virtual Machine) which is the kind of JVM is designed for embedded device to have limited resources. In this paper, CVM which is defined by CDC has designed and implemented on the Real-Time Operating System, UbiFOS$^{TM}$.

  • PDF

A Study on the Actuating Device Technology in Guided Weapon System (유도무기체계 구동장치 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.145-154
    • /
    • 2007
  • In this paper, a study on the actuator device technology in guided weapon system development. Hydraulic and pressure, electric motor device had been mostly used, but recently due to high output to weight ratio, pressure actuator device is widely used except for small tactical guided ammunition which needed small power. And now the actuator design concept and technical level is changed because of high mobility of guided ammunition, development of magnetic materials which used new material for requirement of despondence, progress of control and electrodynamics technology, and digitalize and integrity. In this paper we clearly proposed the actuator design criteria and detailed technology development trend for next generation guided weapon system.

  • PDF

UPFC Device: Optimal Location and Parameter Setting to Reduce Losses in Electric-Power Systems Using a Genetic-algorithm Method

  • Mezaache, Mohamed;Chikhi, Khaled;Fetha, Cherif
    • Transactions on Electrical and Electronic Materials
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2016
  • Ensuring the secure operation of power systems has become an important and critical matter during the present time, along with the development of large, complex and load-increasing systems. Security constraints such as the thermal limits of transmission lines and bus-voltage limits must be satisfied under all of a system’s operational conditions. An alternative solution to improve the security of a power system is the employment of Flexible Alternating-Current Transmission Systems (FACTS). FACTS devices can reduce the flows of heavily loaded lines, maintain the bus voltages at desired levels, and improve the stability of a power network. The Unified Power Flow Controller (UPFC) is a versatile FACTS device that can independently or simultaneously control the active power, the reactive power and the bus voltage; however, to achieve such functionality, it is very important to determine the optimal location of the UPFC device, with the appropriate parameter setting, in the power system. In this paper, a genetic algorithm (GA) method is applied to determine the optimal location of the UPFC device in a network for the enhancement of the power-system loadability and the minimization of the active power loss in the transmission line. To verify our approach, simulations were performed on the IEEE 14 Bus, 30 Bus, and 57 Bus test systems. The proposed work was implemented in the MATLAB platform.

Development of Smart Device Module for Perimeter Intrusion Detection (외곽 침입 감지를 위한 스마트 디바이스의 개발)

  • Ryu, Dae-Hyun;Choi, Tae-Wan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.2
    • /
    • pp.363-370
    • /
    • 2021
  • The perimeter intrusion detection system is very important in physical security. In this study, a micro smart device (module) using MEMS sensor was developed in IoT environment for external intrusion detection. The outer intrusion detection system applying the smart device developed in this study is installed in various installation environments, such as barbed wire of various materials and shapes, the city center, the beach, and the mountain, so that it can detect external intrusion and its location as well as false alarms. As a smart sensor that can minimize the false alarm rate and economical construction cost, it is expected that it can be used for the safe operation of major facilities and prevention of disasters and crimes.