• Title/Summary/Keyword: Information secure service

Search Result 861, Processing Time 0.027 seconds

A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 헤더 선출 기법)

  • Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.107-118
    • /
    • 2007
  • Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network. In this paper, first each node transmit residual electric power and authentication message to BS (Base-Station). BS reflects "Validity Authentication Rate" and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates "Validity Authentication Rate" of former round. Finally, BS can select more secure cluster header.

  • PDF

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

Expansion of Universal Service into Broadband and Mobile Communications : The Case of Korea (통신서비스 보편화 이슈 분석 : 초고속인터넷과 이동전화를 중심으로)

  • Lee, Jongyong;Lee, Donghee
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.1
    • /
    • pp.61-76
    • /
    • 2015
  • In general universal service in telecommunications means a regulatory tool to secure the availability of basic communication services like fixed telephony at an affordable price throughout a country. A re-evaluation of the scope of existing universal service, however, is becoming a core issue as the penetration and usage of broadband and mobile communications matures and a new ICT ecosystem emerges. This study examined whether the universal service polices in Korea need adapting and updating to include broadband and mobile telephony in the universal service, which is based on the necessary and sufficient conditions derived from previous research and foreign countries' experiences : geographical ubiquity of a certain service and the market's ability to provide the service. The result shows the nationwide ubiquity of broadband and mobile communications exists but the ultimate goal pursued by universal service polices trying to make them available and affordable for all is being fulfilled by market dynamics in Korea. Thus, the inclusion of both services in the scope of universal service is regarded as an unnecessary regulation at present time and the expansion of universal service could be addressed as a long-term issue depending on market conditions in the future.

BcN을 위한 secure QoS 및 보안 기술 동향

  • 전용희
    • Information and Communications Magazine
    • /
    • v.21 no.8
    • /
    • pp.107-121
    • /
    • 2004
  • 광대역 통합망(BcN: Broadband convergence Networks)이란 통신$.$방송$.$인터넷이 융합된 품질 보장형 광대역 멀티미디어 서비스를 언제 어디서나 끊임없이 안전하게 이용할 수 있는 차세대 통합네트워크를 말한다. 이를 위하여 BcN 전달망은 서비스 품질(QoS: Quality of Service) 보장, 고도의 통신망 관리 기능과 보안(Security) 기능, IPv6 주소체계의 수용을 통하여 다양한 서비스를 쉽게 창출할 수 있는 개방형 망구조(Open API)를 도입한 통신망으로 유선ㆍ무선ㆍ방송 등의 다양한 가입자망의 특성을 통합하여 수용해야 하며, 표준 인터페이스를 통해 다양한 응용서비스의 개발 및 이용 환경을 제공할 수 있어야 한다.(중략)

Secure Ticketing Service for Mobile Environment (이동 환경에서의 안전한 티켓팅 서비스)

  • 홍준우;황성민;김순자
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.178-181
    • /
    • 2003
  • 이동 환경과 관련된 기술이 발달함에 따라 모바일 티켓팅 서비스에 대한 관심이 높아지고 있다. 그러나 지금까지 제안된 모바일 티켓팅 시스템은 만족할 만한 확장성과 안전성을 제공하지 못하고 있다. 본 논문에서는 보다 안전한 모바일 티켓팅 시스템을 제안한다. 기존의 모바일 티켓팅 시스템의 문제점을 살펴보고 모바일 환경에 적합한 프레임 워크를 바탕으로 티켓의 복사, 수정을 방지할 수 있는 시스템을 제시한다. 기존의 시스템에서 티켓의 수정이 가능한 것을 서명을 사용함으로서 해결하고 그에 대한 안전성을 분석한다.

  • PDF

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.

Performance Evaluation of Recommendation Results through Optimization on Content Recommendation Algorithm Applying Personalization in Scientific Information Service Platform (과학 학술정보 서비스 플랫폼에서 개인화를 적용한 콘텐츠 추천 알고리즘 최적화를 통한 추천 결과의 성능 평가)

  • Park, Seong-Eun;Hwang, Yun-Young;Yoon, Jungsun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.11
    • /
    • pp.183-191
    • /
    • 2017
  • In order to secure the convenience of information retrieval by users of scientific information service platforms and to reduce the time required to acquire the proper information, this study proposes an optimized content recommendation algorithm among the algorithms that currently provide service menus and content information for each service, and conducts comparative evaluation on the results. To enhance the recommendation accuracy, users' major items were added to the original algorithm, and performance evaluations on the recommendation results from the original and optimized algorithms were performed. As a result of this evaluation, we found that the relevance of the content provided to the users through the optimized algorithm was increased by 21.2%. This study proposes a method to shorten the information acquisition time and extend the life cycle of the results as valuable information by automatically computing and providing content suitable for users in the system for each service menu.

The Security Considerations for Implementation of Secure and Reliable e-Government (안전하고 신뢰성있는 전자정부 구축을 위한 보안요구사항)

  • 김명은;오승희;정연서;서동일
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.77-83
    • /
    • 2004
  • According as information society has been raised, many countries of the world have taken a lot of interests in e-government implementation. The several guidance countries already have offered people various administrative service and popular enmity service in the Internet conveniently People can use e-government service more conveniently by the Internet, but important personal information or state secret can be leaked in the Internet. Because of these security vulnerabilities, a lot of countries are constructing security infrastructure that can protect personal information. In this paper, we examine e-government construction trends of the several guidance countries, and propose security considerations to provide safe and reliable e-government service.

  • PDF

Vehicle Communication System Implementation for u-TSN and Its Performance Evaluations (u-TSN에서 차량 통신시스템 구성 및 성능평가)

  • Jeon, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.7
    • /
    • pp.35-40
    • /
    • 2011
  • In u-TSN environment, the communication between vehicle terminal and roadside equipment is very important to support prompt service and to secure road traffic information in real-time upon organizing traffic system. This study suggested V2I or I2V communication service scenario for performance test on vehicle communication system as well as V2V inter-vehicle communication service scenario for emergency information transmission which requires rapidity and accuracy. After implementing real inter-vehicle communication system, we performed vehicle communication experiment following suggested communication service scenario to test the performance. Consequently, we could draw out the optimal transmission mode setup condition, and the result can be applied to the development of stable and efficient u-TSN vehicle communication system.

Group Key Management based on (2, 2) Secret Sharing

  • Wuu, Lih-Chyau;Hung, Chi-Hsiang;Kuo, Wen-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1144-1156
    • /
    • 2014
  • In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services may require secure multicast to protect integrity and confidentiality of the group traffic, and validate message authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose a group key management scheme based on the secret sharing technology to require each member by itself to generate the group key when receiving a rekeying message multicast by the group key distributor. The proposed scheme enforces mutual authentication between a member and the group key distributor while executing the rekeying process, and provides forward secrecy and backward secrecy properties, and resists replay attack, impersonating attack, group key disclosing attack and malicious insider attack.