• 제목/요약/키워드: Hybrid authentication

검색결과 46건 처리시간 0.025초

Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks

  • Kim, Daehee;Kim, Dongwan;An, Sunshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1249-1272
    • /
    • 2016
  • In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security requirements. This is accomplished by taking advantage of the communication pattern of wireless sensor networks and adopting heterogeneous wireless sensor networks. By considering the unique communication pattern of wireless sensor networks due to the nature of information gathering from the physical world, the number of keys to be established is minimized and, consequently, the overhead spent for establishing keys decreases. With heterogeneous wireless sensor networks, we can build a hybrid scheme where a small number of powerful nodes do more works than a large number of resource-constrained nodes to provide enhanced security service such as broadcast authentication and reduce the burden of resource-limited nodes. In addition, an on-demand key establishment scheme is introduced to support extra communications and optimize the resource usage. Our performance analysis shows that the proposed scheme is very efficient and highly scalable in terms of storage, communication and computation overhead. Furthermore, our proposed scheme not only satisfies the security requirements but also provides resilience to several attacks.

안드로이드 기반의 위치정보를 이용한 수강생 인증 시스템 (Authentication System of Students using the Position Information of Android-based)

  • 박성현;편도길;육정수;정회경
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.632-634
    • /
    • 2013
  • 현재 스마트시대에서 대학이나 교육기관의 수업 중 현장답사와 견학시스템 및 강의 일지 작성을 필요로 하는 과목이 증가하고 있다. 이러한 시점에서 교수들이 일일이 확인하고 일지를 작성, 데이터화 하는 과정의 편리성을 확보 하려고 한다. 이에, 본 논문에서는 안드로이드 위치정보 및 다양한 모듈로 현장답사 및 견학시스템의 자료화 및 인증화 하는 시스템을 도입하여, 보다 편리한 학습 환경 및 일지작성을 단순화 하는 작업시스템을 설계 및 구현하였다.

  • PDF

다중 암호화 기법을 활용한 하이브리드 스마트카드 구현 (Implementation of Hybrid Smartcard Using Multi Encryption Method)

  • 이성은;장홍종;박인재;한선영
    • 정보보호학회논문지
    • /
    • 제13권2호
    • /
    • pp.81-89
    • /
    • 2003
  • 정보통신의 급속한 발전으로 정보의 온라인 유통이 급증하고 있으며 이에 따른 유통 정보에 대한 보호가 중요해지고 있다. 현재 공개키 기반구조(Public Key Infrastructure, PKI)는 전자상거래를 위한 정보보호 기반구조로써 많이 활용되고 있으며 스마트카드는 공개키 기반구조를 가장 잘 적용할 수 있다. 그러나 공개키 기반의 인증서는 사용자의 인증 정보만을 제공하기 때문에 사용자의 본인확인 및 권한 정보가 필요한 응용에서는 그 사용이 제한적일 수밖에 없으며 스마트카드의 위·변조 가능성 또한 존재하고 있다. 이의 해결을 위해 본 논문에서는 인증서 유효성 검증만으로 해결할 수 혀는 스마트카드의 위·변조에 대한 가능성을 광영상 암호화 기법인 각 다중화와 암호키다중화를 사용하여 위·변조를 방지하였고, 위·변조 시 이를 검증할 수 있도록 하였다. 또한, 보안성과 이동성이 뛰어난 스마트카드와 결합한 공개키 인증기반의 본인확인 기법을 제안하여 다중 인증 체계의 새로운 보안 인증시스템을 제안하였다.

Design and Implementation of a Low-Code/No-Code System

  • Hyun, Chang Young
    • International journal of advanced smart convergence
    • /
    • 제8권4호
    • /
    • pp.188-193
    • /
    • 2019
  • This paper is about environment-based low-code and no-code execution platform and execution method that combines hybrid and native apps. In detail, this paper describes the Low-Code/No-Code execution structure that combines the advantages of hybrid and native apps. It supports the iPhone and Android phones simultaneously, supports various templates, and avoids developer-oriented development methods based on the production process of coding-free apps and the produced apps play the role of Java virtual machine (VM). The Low-Code /No-Code (LCNC) development platform is a visual integrated development environment that allows non-technical developers to drag and drop application components to develop mobile or web applications. It provides the functions to manage dependencies that are packaged into small modules such as widgets and dynamically loads when needed, to apply model-view-controller (MVC) pattern, and to handle document object model (DOM). In the Low-Code/No-Code system, the widget calls the AppOS API provided by the UCMS platform to deliver the necessary requests to AppOS. The AppOS API provides authentication/authorization, online to offline (O2O), commerce, messaging, social publishing, and vision. It includes providing the functionality of vision.

클라우드 컴퓨팅 보안 대책 연구 (Cloud computing Issues and Security measure)

  • 이상호
    • 중소기업융합학회논문지
    • /
    • 제5권1호
    • /
    • pp.31-35
    • /
    • 2015
  • 클라우드 컴퓨팅은 인터넷 기반 컴퓨팅 기술이다. 인터넷을 중심으로 서비스를 주고받는 형태이다. 비용이 절약되고, 쉬운 사용이 가능하기 때문에 많은 기업들이 이용하고 있는 추세이다. 클라우드의 형태로는 public cloud, private cloud, hybrid cloud가 있다. 서비스 모델에는 SaaS, PaaS, IaaS가 있다. 클라우드 컴퓨팅은 쉬운 사용이 가능한 만큼 보안 취약점을 가지고 있다. 특히 가상화와 정보집중화에 따른 취약점이 있다. 이를 극복하기 위해서는 새로운 보안 기술이 개발되어야한다. 또 다른 극복 방법은 보안 책임을 분명히 해야하고, 정책을 통일화 해야 한다.

  • PDF

Access Control of Visiting Mobile Node on the Foreign Domain Network in Mobile IPv6

  • Park, Sugil;Masayuki Abe;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2002년도 종합학술발표회논문집
    • /
    • pp.495-498
    • /
    • 2002
  • The need for network protection, accounting and resource management in foreign administrative domain requires appropriate security services. In this paper, we propose an access control protocol to support the authentication between mobile node and visiting subnet. Our hybrid way of approach aims to reduce computational overhead and minimize the use of network bandwidth. We also propose non-certificate based public-key cryptography to provide non-repudiation, which does not require CRL retrieval and certificate validation.

  • PDF

신뢰도 최적화 문제에 대한 웹기반의 Solver 개발 (A Web-based Solver for solving the Reliability Optimization Problems)

  • 김재환
    • 해양환경안전학회지
    • /
    • 제8권1호
    • /
    • pp.127-137
    • /
    • 2002
  • This paper deals with developing a Web-based Solver NRO(Network Reliability Optimizer) for solving three classes of reliability redundancy optimization problems which are generated in series systems. parallel systems and complex systems. Inputs of NRO consisted in four parts. that is, user authentication. system selection. input data and confirmation. After processing of inputs through internet, NRO provides conveniently the optimal solutions for the given problems on the Web-site. To alleviate the risks of being trapped in a local optimum, HH(Hybrid-Heuristic) algorithm is incorporated in NRO for solving the given three classes of problems, and moderately combined GA(Genetic Algorithm) with the modified SA(Simulated Annealing) algorithm.

  • PDF

인증기능을 가진 혼합형 암호시스템 설계 (Hybrid Cryptosystem Design with Authentication)

  • 이선근;김영일;고영욱;송재호;김환용
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(2)
    • /
    • pp.341-344
    • /
    • 2002
  • The importance of protection for information is increasing by the rapid development of information communication and network. Asymmetric crypto-system is the mainstream in encryption system rather than symmetric cryptosystem by above reasons. But asymmetric cryptosystem is restricted in applying to application fields by the reason it takes more times to process than symmetric cryptosystem. In this paper, the proposed cryptosystem uses an algorithm that combines block cipherment with stream ciphcrment. Proposed cryptosystem has a high stability in aspect of secret rate by means of transition of key sequence according to the information of plaintext while asymmetric /symmetric cryptosystern conducts encipherment/decipherment using a fixed key Consequently, it is very difficult to crack although unauthenticator acquires the key information. So, the proposed encryption system which has a certification function of asymmetric cryptosystcm and a processing time equivalent to symmetric cryptosystcm will be highly useful to authorize data or exchange important information.

  • PDF

감초의 기원 및 교잡종 외내부형태 성상 비교연구 (Comparative study of external-intenal morphological shape in origins and hybrids for Glycyrrhizae Radix et Rhizoma)

  • 김영식;박춘근;최고야;장재기;이정훈;주영승
    • 대한본초학회지
    • /
    • 제34권5호
    • /
    • pp.1-12
    • /
    • 2019
  • Objectives : The consumption of licorice is large in Korea, but domestic production is insufficient due to the lack of adaptability. This study aimed to provide a morphological basis for adding interspecific hybrid licorice with improved adaptability to pharmacopoeia. Methods : This study was to establish identification criteria for the original plants, external and internal morphology of the authentic herbal medicines (Glycyrrhiza uralensis, G. glabra and G. inflata), market products and artificially interspecific hybrid forms of licorice. For this purpose, previous studies were investigated and visual and histological observations were carried out. We focused on the internal morphology by microscopic observation for securing objectivity. Finally, we proposed the identification keys for precise classification of each part. Results : 1) Original plant : Licorice species in the compendium were distinguished by the number of leaflets, presence of hair on the fruit, curvature and swelling of the fruit. 2) External morphology : Licorice species were distinguished by degree of powderiness, tearing gap, radial structure in the cross section and existence of protrusion of outer epidermis. 3) Internal morphology : Licorice species were distinguished by the degree of development of phloem fiber bundle, development of obliterated sieve, whether the secondary medullary ray are branched. In the case of interspecific hybrids, the characteristics of both species used for hybridization were mixed in all observation methods. Conclusions : These results suggest that the interspecific crossbred licorice is suitable for the pharmacopoeial standard. Therefore, it can be applied as a herbal medicine through additional supplementary study.

Real Time Related Key Attack on Hummingbird-2

  • Zhang, Kai;Ding, Lin;Li, Junzhi;Guan, Jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권8호
    • /
    • pp.1946-1963
    • /
    • 2012
  • Hummingbird is a lightweight encryption and message authentication primitive published in RISC'09 and WLC'10. In FSE'11, Markku-Juhani O.Saarinen presented a differential divide-and-conquer method which has complexity upper bounded by $2^{64}$ operations and requires processing of few megabytes of chosen messages under two related nonces (IVs). The improved version, Hummingbird-2, was presented in RFIDSec 2011. Based on the idea of differential collision, this paper discovers some weaknesses of the round function WD16. Combining with the simple key loading algorithm, a related-key chosen-IV attack which can recover the full secret key is proposed. Under 15 pairs of related keys, the 128 bit initial key can be recovered, requiring $2^{27}$ chosen IV and the computational complexity is $O(2^{27})$. In average, the attack needs several minutes to recover the full 128-bit secret key on a PC. The experimental result corroborates our attack. The result shows that the Hummingbird-2 cipher can't resist related key attack.