• Title/Summary/Keyword: Pre-shared Key

Search Result 36, Processing Time 0.018 seconds

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.

Integrated Authentication Protocol of Financial Sector that Modified OAuth2.0 (OAuth2.0을 변형한 금융권 통합인증 프로토콜)

  • Jung, Kyu-Won;Shin, Hye-seong;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.373-381
    • /
    • 2017
  • Currently, various types of user authentication methods based on public certificates are used in domestic financial transactions. Such an authorized certificate method has a problem that a different security module must be installed every time a user connects an individual financial company to a web server. Also, the financial company relying on this authentication method has a problem that a new security module should be additionally installed for each financial institution whenever a next generation authentication method such as biometric authentication is newly introduced. In order to solve these problems, we propose an integrated authentication system that handles user authentication on behalf of each financial institution in financial transactions, and proposes an integrated authentication protocol that handles secure user authentication between user and financial company web server. The new authentication protocol is a modified version of OAuth2.0 that increases security and efficiency. It is characterized by performing a challenge-response protocol with a pre-shared secret key between the authentication server and the financial company web server. This gives users a convenient and secure Single Sign-On (SSO) effect.

Analysis of the Lee-Chen's One-Time Password Authentication Scheme (Lee와 Chen의 일회용 비밀번호 인증기법 분석)

  • You, Il-Sun;Kim, Bo-Nam;Kim, Heung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.285-292
    • /
    • 2009
  • In 2005, Lee and Chen suggested an enhanced one-time password authentication scheme which can prevent the stolen verifier attack that the Yeh-Shen-Whang's scheme has. The Lee-Chen's scheme addresses the stolen verifier attack by deriving each user's pre-shared secret SEED from the server secret. However, we investigated the weakness of the Lee-Chen's scheme and found out that it was suffering from the off-line dictionary attack on the server secret. We demonstrated that the off-line dictionary attack on the server secret can be easily tackled with only the help of the Hardware Security Modules (HSM). Moreover, we improved the scheme not to be weak to the denial of service attack and allow compromise of the past session keys even though the current password is stolen. Through the comparison between the Lee-Chen's scheme and the proposed one, we showed that the proposed one is stronger than other.

IPsec VPN Encrypted Packet Analysis Method for Contents Auditing (콘텐츠 감사를 위한 IPsec VPN 패킷 분석 기술 연구)

  • Junghyung Park;Jaenam Yoon;Jaecheol Ryou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.41-52
    • /
    • 2024
  • Security audits of IPsec VPNs are crucial for identifying vulnerabilities caused by implementation flaws or misconfigurations, as well as investigating incidents. Nevertheless, auditing IPsec VPN presents noteworthy challenge due to the encryptiong of network contents which ensere confidentiality, integrity, authentications and more. Some researchers have suggested using man-in-the-middle(MITM) techniques to overcome this challenge. MITM techniques require direct participation in the network and prior knowledge of the pre-shared key for authentication. This causes temporary network disconnection for security audits, and it is impossible to analyse data collected before the audit. In this paper, we present an analysis technique aimed at ensuring network continuity without relying on a specific IPsec VPN topologies or authentication method. Therefore, it is anticipated that this approach will be effective, practical and adaptable for conducting IPsec VPN security

Geospatial Data Pipeline to Study the Health Effects of Environments -Limitations and Solutions- (환경의 건강 영향 연구를 위한 공간지리정보 데이터 파이프라인 -자료활용의 제한점과 극복방안-)

  • Won Kyung Kim;Goeun Jung;Dongook Son;Sun-Young Kim
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.27 no.3
    • /
    • pp.60-75
    • /
    • 2024
  • Research on health outcomes of environmental factors has been implemented by multiple and interacting factors, including environmental, socio-demographic, economic, and traffic aspects. There are still significant challenges and limitations in constructing databases for the connections between contributing factors and an integrated approach to environmental health research even though there has been a dramatic increase in data availability and incredible technological advance in data storage and processing. This study emphasizes the necessity of establishing a geospatial data pipeline to analyze the impact of environmental factors on health. It also highlights the difficulties and solutions related to the construction and utilization of a geospatial database. Key challenges include diverse data sources and formats, different spatio-temporal data structures, and coordinate system inconsistencies over time within the same geospatial data. To address these issues, a data pipeline was constructed with pre-processing and post-processing for the data, resulting in refined datasets that could be used for calculating geographic variables. In addition, an AWS-based relational database and shared platform were established to provide an efficient environment for data storage and analysis. Guidelines for each step of the process, including data management and analysis, were developed to enable future researchers to effectively use the data pipeline.

Korean Ocean Forecasting System: Present and Future (한국의 해양예측, 오늘과 내일)

  • Kim, Young Ho;Choi, Byoung-Ju;Lee, Jun-Soo;Byun, Do-Seong;Kang, Kiryong;Kim, Young-Gyu;Cho, Yang-Ki
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.18 no.2
    • /
    • pp.89-103
    • /
    • 2013
  • National demands for the ocean forecasting system have been increased to support economic activity and national safety including search and rescue, maritime defense, fisheries, port management, leisure activities and marine transportation. Further, the ocean forecasting has been regarded as one of the key components to improve the weather and climate forecasting. Due to the national demands as well as improvement of the technology, the ocean forecasting systems have been established among advanced countries since late 1990. Global Ocean Data Assimilation Experiment (GODAE) significantly contributed to the achievement and world-wide spreading of ocean forecasting systems. Four stages of GODAE were summarized. Goal, vision, development history and research on ocean forecasting system of the advanced countries such as USA, France, UK, Italy, Norway, Australia, Japan, China, who operationally use the systems, were examined and compared. Strategies of the successfully established ocean forecasting systems can be summarized as follows: First, concentration of the national ability is required to establish successful operational ocean forecasting system. Second, newly developed technologies were shared with other countries and they achieved mutual and cooperative development through the international program. Third, each participating organization has devoted to its own task according to its role. In Korean society, demands on the ocean forecasting system have been also extended. Present status on development of the ocean forecasting system and long-term plan of KMA (Korea Meteorological Administration), KHOA (Korea Hydrographic and Oceanographic Administration), NFRDI (National Fisheries Research & Development Institute), ADD (Agency for Defense Development) were surveyed. From the history of the pre-established systems in other countries, the cooperation among the relevant Korean organizations is essential to establish the accurate and successful ocean forecasting system, and they can form a consortium. Through the cooperation, we can (1) set up high-quality ocean forecasting models and systems, (2) efficiently invest and distribute financial resources without duplicate investment, (3) overcome lack of manpower for the development. At present stage, it is strongly requested to concentrate national resources on developing a large-scale operational Korea Ocean Forecasting System which can produce open boundary and initial conditions for local ocean and climate forecasting models. Once the system is established, each organization can modify the system for its own specialized purpose. In addition, we can contribute to the international ocean prediction community.