• Title/Summary/Keyword: Key Establishment

Search Result 588, Processing Time 0.025 seconds

User Authentication Key Establishment Scheme based on Color Model for Healthcare Environment (헬스케어 환경을 위한 칼라 모델 기반의 사용자 인증 키 설립 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.115-121
    • /
    • 2017
  • Hospital medical services are making great efforts to provide prompt medical services to patients or improve the quality of medical services by convergence patient's healthcare information. However, recent research suggests problems about safety and efficiency when trying to transmit patient's healthcare information to hospital server via radio and wireless. In this paper, we propose a color model - based patient authentication key establishment protocol method to securely transmit patient healthcare information. The proposed method extracts randomly three color information used in the color model and vectorizes the extracted arbitrary information to obtain the key information required for user authentication as the sum of orthogonal vectors to improve the efficiency. In addition, the proposed method can securely generate key information used for user authentication without using an additional encryption algorithm. In performance evaluation result, proposed method shows that the server processing time of the sensed information is 8.1% higher than the existing method and 7.7% lower than the existing method.

China's recent establishment of its ADIZ and its implications for regional security (중국의 방공식별구역(ADIZ) 선포와 역내 안보적 함의)

  • SHIN, Chang-Hoon
    • Strategy21
    • /
    • s.33
    • /
    • pp.148-177
    • /
    • 2014
  • The regional security and stability in Northeast Asia has become more complicated because of a sudden establishment of China's Air Defense Identification Zone (ADIZ) on 23 November 2013. One dimensional conflicts on the territorial sovereignty over the islands between the regional States has developed into the two dimensional conflicts like maritime delimitations among the States concerned since they have all ratified the 1982 United Nations Convention on the Law of the Sea which adopts the 200 nautical mile Exclusive Economic Zone regime. Moreover, due to the notion of the outer limit of the continental shelf, the conflicts have developed into three dimensional ones in order to acquire more natural resources even in the seabed. To make matters worse, such three dimensional conflicts have expanded to the airspace as well. The paper will analyze what implications the sudden declaration of China's ADIZ have for the regional security in Northeast Asia from the perspectives of public international law. To this end, the paper 1) starts with the debates on the legal nature of the ADIZ, 2) identifies the Chinese government's political motives for the establishment of the ADIZ over the East China Sea, 3) assesses the responses of the regional States and the USA to the China's establishment of the ADIZ, and then 4) discuss what implications the overlapped ADIZ of the three key States in the region have for the regional security and stability.

A Study on Group Key Management based on Mobile Device ID in Ad-hoc network (Ad-hoc 네트워크에서 모바일 디바이스 아이디 기반의 그룹 키 관리에 대한 연구)

  • Kang, Seo-Il;Lee, Nam-Hoon;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.540-549
    • /
    • 2009
  • An arbitrary mobile device configures Ad-hoc network to provide the transmission of a data and services using wireless communications. A mobile device requires authentication and encryption key management to securely communicate in the Ad-hoc network. This paper examines the trend of the authentication in the Ad-hoc network and the group key management and suggests the plan for ID-based mutual authentication and group key establishment. ID-based mutual authentication in proposed scheme uses zero knowledge in the absence of shared information and is applied to establish a session key and group key. In addition, the proposed scheme is applied to Ad-hoc network to increase the efficiency and the safety of security technology.

  • PDF

Foreign Key Management Server Products and the necessity of Korean Related Law and Policy (해외의 키관리서버 제품들과 우리나라의 해당 법규정 및 정책 설정의 필요성)

  • Kim, Ji Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.501-504
    • /
    • 2012
  • Personal Information Protection Law and Information Communication Network Law is administered from March, 2012 and August, 2012. It is very important to protect and manage the key well so that the third party doesn't know the key. Thus, at present, there increases an importance of Key Management Server. Key Management Server is an appliance type of hardware equipment which can securely store and manage encryption and decryption key. In this paper, we will survey on foreign key management server products and discuss about the necessities of legislation of related law and establishment of policy.

  • PDF

A Study on Optical-LSP Establishment and QoS Maintenance Scheme Based on DOQS Classes in OVPN (OVPN에서 차등화된 광 QoS 서비스(DOQS) 클래스를 고려한 Optical-LSP의 설립 및 QoS유지 방안 연구)

  • 조준모;윤미라;김성운;이상조
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.8
    • /
    • pp.318-330
    • /
    • 2003
  • The advantages of "VPN over Internet" are cost-effectiveness and flexibility However, the disadvantages are the lack of sufficient QoS mechanism and transmission capacity for high bandwidth service. Given this increasing demand for high bandwidth Internet and QoS assurances in "PN over Internet", IP/GMPLS based control plane combined with a high bandwidth capacity of DWDM optical network is seen as a very favorable approach for the realization of future "OVPN over IP/GMPLS over DWDM" Within OVPN for providing QoS guaranteed multimedia service over the NGOI(Next Generation Optical Internet) based on the "IP/GMPLS over DWDM" concept, differentiated QoS framework is one of the key issues to implement OVPN over DWDM-based NGOI. Keeping in mind that IETF(Internet Engineering Task Force) and ITU-T(International Telecommunication Union) are standardizing IP/GMPLS over DWDM protocol framework as a solution for the NGOI, in this paper, we suggest Optical-LSP establishment and QoS maintenance scheme based on DOQS(Differentiated Optical QoS Service) classes, which are the key issue of DOQS protocol framework for assuring end-to-end QoS in "OVPN over IP/GMPLS over DWDM".

A Study on Efficient Group Communication in the Integrated Muticasting Environment (통합 멀티캐스팅 환경에서 효율적인 그룹 통신에 관한 연구)

  • Kim Hyun-jue;Nam Jung-hyun;Kim Seung-joo;Won Dong-ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.159-167
    • /
    • 2005
  • Through the increment of group oriented application services, the multicast communication in wire/wireless network has become a widely discussed researching topic. However solution for security, efnciency and scaleability of a multicast communications are not enough to be satisfactory. Tn this paper, we Propose a new secure, efficient and scalable multicasting protocols to provide a integrated multicast service. Our protocol is an authenticated key establishment protocol which has been designed specifically for use with low powered computationally weak equipment such as Cellular phone and PDA(Personal Digital Assistant).

  • PDF

Secure Key Predistribution Scheme using Authentication in Cluster-based Routing Method (클러스터 기반에서의 인증을 통한 안전한 키 관리 기법)

  • Kim, Jin-Su;Choi, Seong-Yong;Jung, Kyung-Yong;Ryu, Joong-Kyung;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.105-113
    • /
    • 2009
  • The previous key management methods are not appropriate for secure data communication in cluster-based routing scheme. Because cluster heads are elected in every round and communicate with the member nodes for authentication and share-key establishment phase in the cluster. In addition, there are not considered to mobility of nodes in previous key management mechanisms. In this paper, we propose the secure and effective key management mechanisim in the cluster-based routing scheme that if there are no share keys between cluster head and its nodes, we create the cluster key using authentication with base station or trust autentication and exchange the their information for a round.

An Authority-Based Efficient Key Management Protocol for Cloud Environment (클라우드 환경을 위한 효율적인 권한 기반 키 설립 프로토콜)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1035-1045
    • /
    • 2018
  • Recently, with the development of IT technology, authentication methods of users using cloud services have been diversified. However, research on providing authentication information of a user using a cloud service securely according to authority has not been make until now. In this paper, we propose a key establishment protocol which can perform split authentication using secret key and access control key according to the role authority of user in Intra cloud environment. The proposed protocol generates the access control key and secret key of the user by using the attributes of the user and the generated random number($t_1$, $t_2$), and classifies the roles according to the user's authority after generating the key. Unnecessary operation processes can be reduced. As a result of the performance evaluation, the proposed protocol guarantees the security against various type of attacks that may occur in the cloud environment because the user is authenticated by dividing the access control key and secret key. The size of the ciphertext used to establish the key could be reduced by ${\sum}+1$ more than the existing protocol.

A pairwise key establishment scheme for USN (U-센서네트워크에서의 Pairwise key 설정 기법)

  • Lee, Kyoung-Hyo;Jung, Seok-Won;Oh, Byeong-Kyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.552-555
    • /
    • 2006
  • 센서네트워크는 유비쿼터스 컴퓨팅 사회에서 핵심 기술로 부각되고 있다. 이러한 센서네트워크는 노드들이 노출되거나 데이터 전송 시 일반 네트워크보다 보안에 취약하므로 안전한 통신을 위하여 센서 노드간 키를 설정하는 것은 보안을 위한 기본적인 요구사항이 되고 있다. 본 논문에서는 배치된 센서네트워크에서 셋업서버의 오버헤드를 줄이기 위하여 네트워크를 클러스터링하고 각 셀 안에 클러스터 헤더와 노드들을 배치한 후 클러스터내의 노드사이의 안전한 통신을 하기위한 pairwise key를 설정하는 기법을 제안하였다.

  • PDF