• 제목/요약/키워드: Key Management System

검색결과 2,026건 처리시간 0.029초

Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices

  • Koo, Han-Seung;Kwon, O-Hyung;Lee, Soo-In
    • ETRI Journal
    • /
    • 제32권2호
    • /
    • pp.204-213
    • /
    • 2010
  • In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing management scheme. The proposed protocol not only resists disclosed SM ID and TP ID threats and indirect connection between TA and TP threats, but also meets some desirable security attributes such as known key secrecy, perfect forward secrecy, key compromised impersonation, unknown key-share, and key control.

이동네트워크 환경에서의 그룹키 관리구조 (A Group Key Management Architecture in Mobile Network Environments)

  • 박영호
    • 정보보호학회논문지
    • /
    • 제12권2호
    • /
    • pp.89-100
    • /
    • 2002
  • 본 논문에서는 안전한 그룹통신을 위한 그룹키 관리 기법을 기반으로 이동네트워크 환경에서의 그룹키 관리 구조와 멤버의 인종과 키 설정을 위한 프로토콜을 제안한다. 기존의 대부분의 그룹키 관리기법들이 초기의 키 서버와 멤버간의 안전한 공유키 설정을 위해 공개키 기반의 인증서 교환을 이용하였으나, 본 논문에서는 인증서의 교환과 검증으로 인한 대역폭 소모의 효율성을 위해 ICPK를 이용해서 그룹 내에서의 멤버의 인증과 키 교환에 이용하도록 한다. 또한, 전체 그룹을 이동호스트들에 대한 셀 그룹과 셀 그룹 관리자들에 대한 제어그룹으로 구분하여 셀 그룹마다 셀 그룹 관리자가 관리함으로써 멤버십의 변경으로 인한 영향을 지역적으로 한정시킨다.

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • 박요한;박영호;문상재
    • 한국산업정보학회논문지
    • /
    • 제16권2호
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.

대한안전경영과학회지의 연구 주제에 대한 사회 연결망 분석 (A Social network analysis on the research subjects in Journal of Korean Safety Management and Science)

  • 양병학
    • 대한안전경영과학회지
    • /
    • 제15권2호
    • /
    • pp.161-166
    • /
    • 2013
  • The purpose of this research is to analyse the research subject in journal of Korean safety management and sciences. Total 1850 key words in 560 papers were analysed by the Pajek system which is one of well known social network analysis tool. Key words trend from 2008 to 2012 was examined. Then the relationship among each key words was visualized. There were five key words group which strongly connected among key words. The degree centrality, between centrality, proximity prestige on each key words were calculated to verify influence degree to other key words.

중소 제조업의 융합모형 설계에 따른 핵심성과지표 적용 사례 (Application of KPI based on Coupling Model Design in Medium and Small Manufacturers)

  • 박국제;이운식;황건용
    • 산업경영시스템학회지
    • /
    • 제31권1호
    • /
    • pp.66-73
    • /
    • 2008
  • It is important to manage quality and safety of a product for coping with fast-paced world effectively. This paper demonstrates an integrated model between ISO 9001 Quality Management System and Product Safety Management System. And the paper presents a method which decides key performance indicators (KPI) to be concentrated on the effectiveness of system operation. A case study shows an process for industry to implement the developed methodology.

제한수신시스템을 위한 키 관리 메카니즘과 성능향상 방안 (A New Key Management Mechanism and Performance Improvement for Conditional Access System)

  • 조현숙;이상호
    • 정보처리학회논문지C
    • /
    • 제8C권1호
    • /
    • pp.75-87
    • /
    • 2001
  • 이 논문에서는 제한수신시스템의 일반구조 및 암/복호화에 사용되는 키의 안정성을 위한 키관리 메카니즘 그리고 시스템 성능 향상을 위한 키 계층 구조의 개선에 대해서 살펴본다. 또한 시스템 성능 분석을 위한 기본 개념으로 큐잉 이론(queuing theory)을 설명하고, 디지털 방송 유료화 서비스의 실현 및 시스템 성능 향상을 위한 시스템 최적화 방안으로서 몇 가지 산정된 자료를 기초로 하여 최적의 키 생성 및 전달 주기, 최적의 키관리 주기에 따른 최대/최소 키 전달 시간, 과금 데이터처리를 위한 전용선의 용량 및 시스템 용량을 산정 한다.

  • PDF

원격 감시 제어시스템에서 키 관리 방안 연구 (Research on key management for supervisory control and data acquisition system)

  • 이건직
    • 디지털산업정보학회논문지
    • /
    • 제16권4호
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

디지털 유료 방송시스템에 적합한 키 관리 모델에 관한 연구 (A Study on Efficient Key Management Model for Digital Pay-TV System)

  • 양형규
    • 한국통신학회논문지
    • /
    • 제31권2C호
    • /
    • pp.200-207
    • /
    • 2006
  • 최근 들어, 정보통신 기술의 발달과 함께 디지털 방송 기술이 주목을 받으면서 제공되는 컨텐츠들에 대한 보호의 중요성이 증대되고 있다. 하지만, 이러한 여러 가지 디지털 방송 서비스의 활성화를 위해서는 방송 컨텐츠의 보호, 송수신자간의 상호 인증 등 여러 가지 보안 서비스가 제공되어야 한다. 그러므로 본 논문에서는 기존의 디지털 방송 시스템의 안전성 및 효율성을 분석하고, 디지털 유료 방송 시스템에 적합한 키 관리 모델을 제안한다.

A Design of Secure Communication Architecture Applying Quantum Cryptography

  • Shim, Kyu-Seok;Kim, Yong-Hwan;Lee, Wonhyuk
    • Journal of Information Science Theory and Practice
    • /
    • 제10권spc호
    • /
    • pp.123-134
    • /
    • 2022
  • Existing network cryptography systems are threatened by recent developments in quantum computing. For example, the Shor algorithm, which can be run on a quantum computer, is capable of overriding public key-based network cryptography systems in a short time. Therefore, research on new cryptography systems is actively being conducted. The most powerful cryptography systems are quantum key distribution (QKD) and post quantum cryptograph (PQC) systems; in this study, a network based on both QKD and PQC is proposed, along with a quantum key management system (QKMS) and a Q-controller to efficiently operate the network. The proposed quantum cryptography communication network uses QKD as its backbone, and replaces QKD with PQC at the user end to overcome the shortcomings of QKD. This paper presents the functional requirements of QKMS and Q-Controller, which can be utilized to perform efficient network resource management.

Performance Management System for Benchmarking in Construction Companies

  • You-Jin, Jang;Moon-Seo, Park;Hyun-Soo, Lee
    • 국제학술발표논문집
    • /
    • The 3th International Conference on Construction Engineering and Project Management
    • /
    • pp.935-941
    • /
    • 2009
  • In competitive society, performance management is an essential element of business success. Despite the importance of performance management, it has not been widely implemented in construction companies. In the recent years, construction companies have become more aware of its need to identify, implement, and sustain performance improvements more systematically. Thus, the objective of this paper is to develop performance management system (PMS) for construction companies. The roles of performance management system is not only measuring performance but also offering guidance to improve performance. Therefore, PMS needs benchmarking process that provides Best Practice and new knowledge. This paper investigates the case of PMSs in UK, USA, Brazil, and Chile and discusses the lessons learned. To overcome the limitations of existing PMSs, new performance measurement framework, in form of 'Construction' BSC, is proposed. Based on the 'Construction' BSC, key performance indicators are derived and methodology of performance management is suggested. This paper concludes by developing PMS for benchmarking in construction companies and recommending some further directions on this research topic.

  • PDF