• Title/Summary/Keyword: Message authenticity

Search Result 25, Processing Time 0.022 seconds

A Study on the Utilization of Bolero Bill of Lading(BBL) (Bolero Bill of Lading(BBL) 실용화에 관한 연구)

  • Oh, Won-Suk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.16
    • /
    • pp.183-203
    • /
    • 2001
  • To accomplish international electronic commerce via the Internet, the most serious dilemma is the international payment system. The BBL is a secure and effective electronic commerce framework for the replacement of traditional paper documents by electronic messages via the Internet providing significant benefits in terms of cost savings, improved logistics and reduced errors in documentation. The most important legal obstacles in the BBL are how to secure authenticity, non-repudiation and message integrity as well as the status of negotiability equivalent to paper B/L. These kinds of functions may be carried out through the electronic title registry of the Bolero International Limited. The technical structure is supported contractually by the Bolero Rulebook. And other documents except B/L can be made out without any legal or technical problems. What are the handicaps of the BBL in its practical use at this time? I can summarize the current and expected problems as follows: First, the fee to join Bolero Association Limited is burdensome to sellers, buyers and trade related organizations all over the world. Second, the liability in errors or defaults in operating central data registry of Bolero International Limited is limited to U.S.$100,000. The amount is not sufficient to the many bulk cargo owners to cover the damages. Third, businessmen are used to traditional paper documents; therefore it takes much time for them to change their customs and practices. So the BBL and traditional papers would be used simultaneously for the time being. Finally, it is very important to incorporate the Rulebook, a multilateral contract binding on all users signed, in each domestic law, which will accomplish the uniform law basis.

  • PDF

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment (IoT 환경에서 네트워크 코딩의 위장패킷 탐지와 유효한 복구의 식별 알고리즘)

  • Lee, Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • Work to improve network throughput has been focused on network coding as the utilization of IoT-based application services increases and network usage increases rapidly. In network coding, nodes transform packets received from neighboring nodes into a combination of encoded packets for transmission and decoding at the destination. This scheme is based on trust among nodes, but in the IoT environment where nodes are free to join, a malicious node can fabricate the packet if it legally participates in the configuration. It is difficult to identify the authenticity of the encoded packet since the packet received at destination is not a single source but a combination of packets generated by several nodes. In this paper, we propose a method to detect "look-like-valid" packets that have been attacked and disguised in packets received at destination, and to identify valid messages in the reconstructions. This method shows that network coding performance is significantly improved because the destination can reconstruct a valid message with only received packets without retransmission with a high probability, despite the presence of disguised packets.

A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks (VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜)

  • Kim, Sung-Hoon;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.115-124
    • /
    • 2008
  • In vehicular networks, vehicles should be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. however, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies the several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonym and MAC (Message Authentication Code) chain. And also by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

Leslie Marmon Silko's Decolonizing Efforts and Syncretic Vision in Gardens in the Dunes (『모래언덕 위의 정원』에 나타난 레슬리 마몬 실코의 탈식민화 작업과 혼합주의적 비전)

  • Kang, Ja Mo
    • Journal of English Language & Literature
    • /
    • v.55 no.4
    • /
    • pp.597-618
    • /
    • 2009
  • Leslie Marmon Silko, in her novel Gardens in the Dunes, primarily focuses on revealing the white colonialists' plan to exterminate and destroy American Indians and their culture. In this regard, this novel is clearly an Indian counter narrative to interrogate and abrogate the authority of the oppressive and destructive discourse of the whites who are full of colonialist impulses to sterilize Indians and their culture. However, it should be noted that Silko is very careful not to insist on cultural exclusivism and reverse ethnocentrism, since these only mean a return to the violent colonialists' discourse based on dualism and cultural authenticity which, she believes, has led to the marginalization and eventual deterioration of Indians and their culture. White values and culture are something to recognize and tolerate as long as they are not the products of witchery, also known as the destroyer or evil for Silko, which promotes disruption and antagonism between races and classes. As she reveals in her interview, her major concern in the novel is to dismantle political and/or racial distinctions like Native Americans versus EuroAmericans and thus to enhance the idea of the reconciliation and coexistence of whites and Indians. Silko's Gardens in the Dunes can be regarded as an experiment in the possibility of the universal and homogeneous (at least in its roots) global culture which tolerates all forms of culture. Global culture does not mean a uniform totalitarian culture but a vision of a harmonious world characterized by hybridity and heterogeneity, in which different cultures associate freely without the notion of inferiority or superiority of any one culture. Silko's belief in syncretism emphasizes the spirit of tolerance and exchange between different cultures, dismantling the authority of exclusive ethnocentrism. The ultimate message implied in Gardens in the Dunes is that the syncretic spirit is not only an effective means to correct the white colonialists' hegemonic desire aimed at the extermination of Indians and their culture but also a source of energy for the life and prosperity of modern Indians and their societies.