• Title/Summary/Keyword: Network security infrastructure

Search Result 430, Processing Time 0.025 seconds

Performance Evaluation of MACSec for Host Mobility (MACSec의 단말 이동성 성능평가)

  • Ahn, Sangjun;Shin, Dongcheon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.55-70
    • /
    • 2019
  • It is essential to consider the relationships between each component in the communication infrastructure in order to build and optimize the infrastructure. In this paper, based on the major factors to consider for the optimized communication infrastructure, we propose an enhanced MACSec-based deployment mechanism for communication infrastructure. The proposed MACSec mechanism can replace the IPSec without the additional devices and redesign of the communication infrastructure. In addition, we evaluate the performance of MACSec and IPSec in terms of the major factors such as message overhead, encryption processing, and host mobility. According to the evaluation results, we can say that MACSec is superior to IPSec with regard to mobility as well as hop delay and message overhead.

A Development of Cipher Device based on Embedded Linux for Serial Communication in SCADA (임베디드 리눅스 기반의 SCADA 직렬통신 구간 암호화 장치 개발)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.25-32
    • /
    • 2010
  • The Supervisory Control and Data Acquisition Systems (SCADA) system provides monitoring, data gathering, analysis, and control of the equipment used to manage most infrastructure. The SCADA Network is implemented in a various manner for larger utilities, and multiple types of protocol and communication interfaces are used to network the control center to remote sites. The existing SCADA equipment and protocols were designed and implemented with availability and efficiency, and as a result security was not a consideration. So, performance, reliability, flexibility and safety of SCADA systems are robust, while the security of these systems is often weak. This makes some SCADA networks potentially vulnerable to disruption of service, process redirection, or manipulation of operational data that could result in public safety concerns and/or serious disruptions to the infrastructure. To reduce the risks, therefore, there is a need to have a security device such as cipher devices or cryptographic modules for security solutions. In this paper we develop an embedded cipher device for the SCADA equipment. This paper presents a cipher device designed to improve the security of its networks, especially in the serial communication.

mNPKI for Mobile Government in Developing Countries (개발도상국의 모바일 정부를 위한 mNPKI)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.161-171
    • /
    • 2019
  • Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

A Study on GIS Metwork Security (지리공간 유통망 보안 방안에 관한 연구)

  • Kim, Ji-Hong;Lim, Gi-Uk
    • Journal of Korea Spatial Information System Society
    • /
    • v.3 no.2 s.6
    • /
    • pp.53-61
    • /
    • 2001
  • The GIS Network consists of the Clearinghouse Network Gateway and Clearinghouse Node and Geo-spatial Data Server. Recently with the development of Information and Network technologies, GIS Network should be needed to be more secure than ever. In this paper, we proposed the effective access control method for the distributed GIS network. PKI (Public Key Infrastructure) Technologies are used for access control and security for transmission on Geo-spatial data

  • PDF

Revocation Protocol for Group Signatures in VANETs: A Secure Construction

  • Shari, Nur Fadhilah Mohd;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.299-322
    • /
    • 2020
  • Vehicular ad hoc networks (VANETs) enable wireless communication between vehicles and roadside infrastructure to provide a safer and more efficient driving environment. However, due to VANETs wireless nature, vehicles are exposed to several security attacks when they join the network. In order to protect VANETs against misbehaviours, one of the vital security requirements is to revoke the misbehaved vehicles from the network. Some existing revocation protocols have been proposed to enhance security in VANETs. However, most of the protocols do not efficiently address revocation issues associated with group signature-based schemes. In this paper, we address the problem by constructing a revocation protocol particularly for group signatures in VANETs. We show that this protocol can be securely and efficiently solve the issue of revocation in group signature schemes. The theoretical analysis and simulation results demonstrate our work is secure against adversaries and achieves performance efficiency and scalability.

Design and Implementation of Security Integration Framework for Secure Mobile RFID Service Network (안전한 모바일 RFID 서비스 네트워크를 위한 보안 통합 프레임워크의 설계 및 구현)

  • Park, Nam-Je;Chung, Kyo-Il
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.63-64
    • /
    • 2008
  • The mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and profiling using RFID technology. Therefore, in this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID services which complies with the Korea's mobile RFID forum standard.

  • PDF

Problems of Regulatory and Legal Support of Polygraph Application in Ukraine

  • Irkha, Yurii;Butenko, Oleksii;Pogrebytskyi, Mykola;Manzhai, Oleksandr;Krushynskyi, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.203-206
    • /
    • 2021
  • The article is devoted to the study of the problems of polygraphic research to obtain forensically significant information. An analysis of the legal basis for the use of the polygraph in Ukraine. Problematic issues concerning the appropriateness of using a polygraph in the investigation and detection of crimes have been studied. The domestic legal norms that regulate this issue, as well as foreign experience are analyzed. The article reveals the essence of the polygraph, the legal basis and requirements for its use. Attention is drawn to the main difficulties of using a polygraph and ways to solve them.

Malicious Trust Managers Identification (MTMI) in Peer to Peer Networks

  • Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.91-98
    • /
    • 2021
  • Peer to Peer Networks play an increasing role in today's networks, also it's expected that this type of communication networks evolves more in the future. Since the number of users that is involved in Peer to Peer Networks is huge and will be increased more in the future, security issues will appear and increase as well. Thus, providing a sustainable solution is needed to ensure the security of Peer to Peer Networks. This paper is presenting a new protocol called Malicious Trust Managers Identification (MTMI). This protocol is used to ensure anonymity of trust manager, that computes and stores the trust value for another peer. The proposed protocol builds a secure connection between trust managers by using public key infrastructure. As well as experimental testing has been conducted to validate the proposed protocol.

The development of industrial secure L2 switch and introduction example for management and security improvement of supervisory control network in purification plant (정수장 감시제어망의 관리와 보안개선을 위한 산업용 보안 L2스위치 개발 및 적용사례)

  • Kim, Yunha;Yu, Chool;Oh, Eun;Kim, Chanmoon;Park, Ikdong;Kim, Yongseong;Choi, Hyunju
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.33 no.5
    • /
    • pp.329-339
    • /
    • 2019
  • Recently, the advancement of information and communication technology(ICT) is expanding the connectivity through Internet of Things(IoT), and the media of connection is also expanding from wire/cable transmission to broadband wireless communication, which has significantly improved mobility. This hyperconnectivity has become a key element of the fourth industrial revolution, whereas the supervisory control network of purification plants in korea is operated as a communication network separated from the outside, thereby lagging in terms of connectivity. This is considered the best way to ensure security, and thus there is hardly any consideration of establishing alternatives to operate an efficient and stable communication network. Moreover, security for management of a commercialized communication network and network management solution may be accompanied by immense costs, making it more difficult to make new attempts. Therefore, to improve the conditions for the current supervisory control network of purification plants, this study developed a industrial security L2 switch that supports modbus TCP(Transmission Control Protocol) communication and encryption function of the transmission section. As a result, the communication security performance improved significantly, and the cost for implementing the network management system using Historical Trend and information of HMI(Human Machine Interface) could be reduced by approximately KRW 200 million. The results of this study may be applied to systems for gas, electricity and social safety nets that are infrastructure communication networks that are similar to purification plants.

Density-Based Opportunistic Broadcasting Protocol for Emergency Situations in V2X Networks

  • Park, Hyunhee;Singh, Kamal Deep;Piamrat, Kandaraj
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.26-32
    • /
    • 2014
  • Vehicular-to-anything (V2X) technology is attractive for wireless vehicular ad-hoc networks (VANETs) because it allows for opportunistic choice of a vehicular protocol between vehicular-to-vehicular (V2V) and vehicular-to-infrastructure (V2I) communications. In particular, achieving seamless connectivity in a VANET with nearby network infrastructure is challenging. In this paper, we propose a density-based opportunistic broadcasting (DOB) protocol, in which opportunistic connectivity is carried out by using the nearby infrastructure and opposite vehicles for solving the problems of disconnection and long end-to-end delay times. The performance evaluation results indicate that the proposed DOB protocol outperforms the considered comparative conventional schemes, i.e., the shortest path protocol and standard mobile WiMAX, in terms of the average end-to-end delay, packet delivery ratio, handover latency, and number of lost packets.