• Title/Summary/Keyword: Electronic Security(System)

Search Result 847, Processing Time 0.038 seconds

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

iVisher: Real-Time Detection of Caller ID Spoofing

  • Song, Jaeseung;Kim, Hyoungshick;Gkelias, Athanasios
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.865-875
    • /
    • 2014
  • Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.

Analysis of Digital VHF data system requirement for electronic Navigation (e-Navigation 실현을 위한 디지털 VHF 데이터 시스템의 요구사항 분석)

  • Park, Ok-Sun;Kim, Dae-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.593-596
    • /
    • 2010
  • Currently, maritime information service is provided by a variety of equipments such as satellites, radar and VHF devices with independent standards and protocols. However, the increase of vessel traffic and development of global marine industries need an infrastructure providing seamless information transfer for the safety, security and protection of the marine environment. Therefore, we propose features and requirements of future VHF data systems and equipments as a component of e-Navigation.

  • PDF

Asymmetric Public Key Cryptography by Using Logic-based Optical Processing

  • Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.55-63
    • /
    • 2016
  • In this paper, a new asymmetric public key cryptography based on the modified RSA algorithm is proposed by using logic-based optical processing. The proposed asymmetric public key algorithm is realized into an optical schematic, where AND, OR and XOR logic operations are implemented by using free space digital optics architecture. Schematically, the proposed optical configuration has an advantage of generating the public keys simultaneously. Another advantage is that the suggested optical setup can also be used for message encryption and decryption by simply replacing data inputs of SLMs in the optical configuration. The last merit is that the optical configuration has a 2-D array data format which can increase the key length easily. This can provide longer 2-D key length resulting in a higher security cryptosystem than the conventional 1-D key length cryptosystem. Results of numerical simulation and differential cryptanalysis are presented to verify that the proposed method shows the effectiveness in the optical asymmetric cryptographic system.

Design of Security for Web based Electronic Bidding System (웹기반 전자 입찰 시스템 보안 설계)

  • 윤선희;주경준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.163-165
    • /
    • 2000
  • 최근 컴퓨팅 기술과 통신 기술의 급속한 발전으로 클라이언트/서버 컴퓨팅 환경에서 네트워크 컴퓨팅 시대를 지나 인터넷 컴퓨팅 시대가 도래하고 있다. 인터넷 사용이 보편화되어 감에 따라 기업의 정보 시스템의 인터넷 기반의 인트라넷/익스트라넷 시스템으로 구축되어 가고 있으며 인터넷 환경에서의 기업과 소비자간 또는 기업과 기업간의 전자 거래 관련 응용 프로그램의 개발이 다양해 지고 있다. 본 논문에서는 인터넷 환경에서 기업과 기업간 전자 거래에 있어서 기업의 글로벌화를 통해 조달 업무의 투명성과 신속성 및 질적 향상을 추구할 수 있도록 제공하기 위한 웹 기반 전자 입찰 시스템을 구현하는데 있어서 클라이언트와 서버 및 데이터 베이스를 연동하기 위한 웹기술, 기업간의 문서 교환을 위한 XML/EDI 기술 및, 입찰과 계약과정, 조달과정에서 안전성 및 신뢰성을 보장하기 위해 공개키 암호화 기술인 PKI 기반 구조의 인증 및 전자서명을 활용한 보안 기능을 설계한다.

  • PDF

A study on DDoS Attack, Detecting and Defence in ubiquitous system (유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구)

  • Jung, Chang-Duk;Cha, Joo-Won;Hwang, Sun-Il
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF

Scream Detection System for Public Security Improvement (치안 향상을 위한 비명 감지 시스템)

  • Park, Kichoel;Jeong, Inhye;Kwon, Soonhwan;Hyung, Sungjae;Kim, Bongjae
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.1133-1136
    • /
    • 2017
  • 폐쇄회로 텔레비전(CCTV, Closed Circuit Television)은 범죄 예방을 위해서 현재 많이 사용되고 있다. 하지만, CCTV의 경우 주로 영상에 기반하기 때문에 사각지대가 존재할 수 있으며 범죄 발생시 즉각적인 대처보다는 후속 조치에 주로 활용된다. 본 논문에서는 이와 같은 문제점을 해결하기 위해 비명을 탐지할 수 있는 치안 향상을 위한 비명 감지 시스템을 설계하고 구현하였다. 제안하는 시스템은 비명을 감지하면 경보음을 제공해주며, 중앙 시스템에 알림을 주어 관리자가 확인하고 즉각적인 대응이 가능할 수 있도록 할 수 있는 기능을 제공한다.

Digital Color Image Watermarking for HVS(Human Visual System) using Daubechies wavelet

  • Park, Jong-Tae;Rhee, Kang-Hyeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1488-1492
    • /
    • 2004
  • The digital signal has been replaced the analog signal in most of every field of multimedia including still image, animation, and audio due to the enormous extension of computer supply and the fast development of computer network. The consumers of information are able to enjoy the abundance of information because of one of the digital signal traits that very easy to regenerate the original data. Because of the trait, however, it is very hard for the producers of information to keep the copyright with the merit of original copy in quality excellency. In this paper, the watermarking technology which inserts a RGB color watermark in color image using the visual characteristics of wavelet coefficient was proposed. As a result, the PSNR value of image was varied depending on perceptual parameter, but we can obtain 32dB as a whole.

The Construction of the Testbed for the Integrated Intrusion Detection Management System (침입정보 통합관리시스템을 위한 테스트베드 구축)

  • Lee, Seong-Ho;Park, Yong-Cheol;Lee, Hyung-Hyo;Noh, Bong-Nam
    • Annual Conference of KIPS
    • /
    • 2003.05c
    • /
    • pp.1969-1972
    • /
    • 2003
  • 전통적인 IDS는 단일 시스템, 단일 환경하의 침입 탐지만을 제공하므로, 보안대상 제한, 유연성 한계, 다양한 형태의 침입탐지 불가 등의 문제점이 대두되고 있다. 최근 이러한 문제점을 해결하기 위하여 여러 IDS의 침입정보를 통합, 분석하는 연구가 활발히 진행되고 있다. IDWG는 IDS간 상호운용을 지원하고자 침입정보 전송 프로토콜과 메시지 친환 형태를 표준화하는 작업을 진행하고 있다. 본 논문은 이 기종 IDS 관리 및 침입정보 통합을 위한 테스트베드 구축 과정을 제시한다. 단위 IDS는 Snort와 Snare를 사용하였으며, 국제표준을 준수하는 RoadRunner 라이브러리를 이용하였다.

  • PDF