• Title/Summary/Keyword: Mobile Key Recovery

Search Result 16, Processing Time 0.025 seconds

Threats Analysis and Mobile Key Recovery for Internet of Things (IoT 환경에서의 보안위협 분석과 모바일 키 복구)

  • Lee, Yunjung;Park, Yongjoon;Kim, Chul Soo;Lee, Bongkyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.918-923
    • /
    • 2016
  • IoT should be considered security risk environments such as various platforms and services including smart devices that can be mounted on household electric appliances, healthcare, car, and heterogeneous networks that are connected to the Internet, cloud services and mobile Apps.. In this paper, we provide analysis of new security threats, caused by open-platform of IoT and sensors via the Internet. Also, we present the key recovery mechanism that is applied to IoT. It results to have compatibility with given research, reduces network overhead, and performs key recovery without depending on key escrow agencies or authorized party.

(A New Key Recovery Protocol of Wireless Authentication Key Establishment for the M-Commerce) (M-Commerce상에서 키 복구를 지원하는 무선 인증 및 키 설립 프로토콜)

  • 이용호;이임영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.371-376
    • /
    • 2003
  • As Mobile Internet gets more popular, the switchover of E-Commerce to M-Commerce gets faster and many service providers offer diverse M-Commerce service by using mobile technology. Also, as M-Commerce makes rapid progress, the security protocol gets more widely recognized for its significance. In particular, WAKE(Wireless Authentication and Key Establishment) protocol carried out wirelessly is of great importance, since the user and service provider must get through to carry out the M-Commerce. Key recovery method is a part of the key management in order to provide an emergency recovery of key whenever necessary, like when the user lost the key or the cryptosystem was illegally used. The ASPeCT project first tried to support the key recovery function in WAKE Protocol Since then, a variety of WAKE Key Recovery protocols have been proposed. In this thesis, problems of WAKE Key Recovery protocols proposed so far are analyzed and new WAKE Key Recovery protocol is suggested to solve those problems.

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.

Deep Learning based Loss Recovery Mechanism for Video Streaming over Mobile Information-Centric Network

  • Han, Longzhe;Maksymyuk, Taras;Bao, Xuecai;Zhao, Jia;Liu, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4572-4586
    • /
    • 2019
  • Mobile Edge Computing (MEC) and Information-Centric Networking (ICN) are essential network architectures for the future Internet. The advantages of MEC and ICN such as computation and storage capabilities at the edge of the network, in-network caching and named-data communication paradigm can greatly improve the quality of video streaming applications. However, the packet loss in wireless network environments still affects the video streaming performance and the existing loss recovery approaches in ICN does not exploit the capabilities of MEC. This paper proposes a Deep Learning based Loss Recovery Mechanism (DL-LRM) for video streaming over MEC based ICN. Different with existing approaches, the Forward Error Correction (FEC) packets are generated at the edge of the network, which dramatically reduces the workload of core network and backhaul. By monitoring network states, our proposed DL-LRM controls the FEC request rate by deep reinforcement learning algorithm. Considering the characteristics of video streaming and MEC, in this paper we develop content caching detection and fast retransmission algorithm to effectively utilize resources of MEC. Experimental results demonstrate that the DL-LRM is able to adaptively adjust and control the FEC request rate and achieve better video quality than the existing approaches.

IPSec Key Recovery for IKEv2 (IKEv2를 지원하는 IPSec 에서의 키 복구 설계)

  • Rhee, Yoon-Jung;Kim, Chul-Soo;Lee, Bong-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1260-1265
    • /
    • 2010
  • IPSec is the security protocol that do encryption and authentication service to IP messages on network layer of the internet. This paper presents the key recovery mechanism that is applied to IKEv2 of IPSec for mobile communication environments. It results to have compatibility with IPSec and IKEv2, reduce network overhead, and perform key recovery without depending on key escrew agencies or authorized party.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

Design of Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints (암호화된 체크포인트를 이용한 결함 허용성을 가지는 이동 에이전트의 이주 기법 설계)

  • 김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.77-84
    • /
    • 2003
  • A mobile agent is a program which represents a user in a network and is capable of migrating from one node to another node, performing computations on behalf of the user. In this paper, we suggest a scheme that can safely recover mobile agent using the checkpoint that is saved at the platform that it visited previously and restart its execution from the abnormal termination point of the mobile agent. For security, mobile agent uses its public key to encrypt the checkpoint and the home platform uses the private key of the mobile agent to decrypt the encrypted checkpoints at the recovery stage. When home platform receives the checkpoint of the mobile agent, home platform verifies the checkpoint using message digest. Home platform verifies the correctness of the checkpoint by comparing the message digest generated at checkpoint mention time with the message digest generated at mobile agent recovery time.

Isolation and Purification of Bioactive Materials Using High-Performance Counter-Current Chromatography (HPCCC) (고속역류크로마토그래피 기술을 이용한 생리활성 물질의 분리 및 정제)

  • Jung, Dong-Su;Shin, Hyun-Jae
    • KSBB Journal
    • /
    • v.25 no.3
    • /
    • pp.205-214
    • /
    • 2010
  • Many successive liquid-liquid extractions occur enabling purification of the crude material to occur. In high performance counter-current chromatography (HPCCC), crude material is partitioned between two immiscible layers of solvent phases. The stationary phase (SP) is retained by hydrodynamic force field effect and the mobile phase (MP) is pumped through the column. Purification occurs because of the different solubility of the components in the liquid mobile and stationary phases. There are many key benefits of liquid stationary phases such as high mass and volume injection loadings, total sample recovery, and easy scale-up. Many researchers showed that predictable scale-up from simple test is feasible with knowledge of the stationary phase retention for the planned process scale run. In this review we review the recent advances in HPCCC research and also describe the key applications such as natural products and synthetics (small or large molecules).

A Study on Key Recovery Model in Mobile Communication Systems (이동 통신 시스템에서의 키 복구 모델에 관한 연구)

  • 황보성;이임영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.295-297
    • /
    • 2000
  • 무선이동통신 기술의 발달은 이용자의 수와 데이터 양의 폭발적인 증가를 가져왔다. 이러한 추세에 따라 Cellular, PCS, Radio-paging, Multimedia data, Internet services를 통합하는 제3세대 무선이동통신이 연구 중에 있다. 모든 서비스들이 무선이동통신으로 이동함에 따라 보안문제들(인증, 키교환, 키복구등)이 중요시되고 있다. 그 중에서도 범법자들의 통신에 대한 국가적 법집행능력 확보를 위한 키 복구 모델은 꼭 필요 할 것이다. 따라서, 본 논문에서는 이동통신시스템에서의 효율적인 키 복구를 위한 모델을 제안하고 이에 따른 데이터 타입을 정의한다.

  • PDF

A Study on Key Exchange System with Key Recovery in Mobile Communications (이동통신 환경에서 키 복구 기능을 가진 키 분배 시스템에 관한 연구)

  • Joo, Mi-Ri;Seo, In-Seog;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1965-1968
    • /
    • 2003
  • 이동성과 편리성을 제공하는 이동 통신 환경은 다양한 장점을 가지고 있는 반면 무선이라는 특성상 보안에 대하여 취약하다. 따라서 기밀성과 인증 기능을 제공하는 다양한 암호 시스템 사용이 필요하게 되었으며, 암호의 역기능을 방지하기 위한 키 복구 기능이 포함된 다양한 키 분배 프로토콜이 제안되었다. 본 논문에서는 이동 통신 환경에 적합하게 설계된 키 복구 기능을 가진 키 분배 프로토콜에 대하여 분석하고, 이를 토대로 키 분배 프로토콜 설계 원칙을 제시하였다. 또한 제시한 설계 원칙을 기반으로 키 복구 기능을 가진 키 분배 프로토콜을 제안하였다.

  • PDF