• Title/Summary/Keyword: Public key infrastructure

Search Result 350, Processing Time 0.025 seconds

A Development of Cipher Device based on Embedded Linux for Serial Communication in SCADA (임베디드 리눅스 기반의 SCADA 직렬통신 구간 암호화 장치 개발)

  • Lee, Jong-Joo;Kim, Seog-Joo;Kang, Dong-Joo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.4
    • /
    • pp.25-32
    • /
    • 2010
  • The Supervisory Control and Data Acquisition Systems (SCADA) system provides monitoring, data gathering, analysis, and control of the equipment used to manage most infrastructure. The SCADA Network is implemented in a various manner for larger utilities, and multiple types of protocol and communication interfaces are used to network the control center to remote sites. The existing SCADA equipment and protocols were designed and implemented with availability and efficiency, and as a result security was not a consideration. So, performance, reliability, flexibility and safety of SCADA systems are robust, while the security of these systems is often weak. This makes some SCADA networks potentially vulnerable to disruption of service, process redirection, or manipulation of operational data that could result in public safety concerns and/or serious disruptions to the infrastructure. To reduce the risks, therefore, there is a need to have a security device such as cipher devices or cryptographic modules for security solutions. In this paper we develop an embedded cipher device for the SCADA equipment. This paper presents a cipher device designed to improve the security of its networks, especially in the serial communication.

A Study on Wireless PKI Technology Standard (무선 PKI 기술 표준에 관한 연구)

  • Sung, Yeon-Guk;Kim, Hyun-Chul;Jung, Jin-Wook;Kim, Soon-Chul;Ryu, Won
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.29-38
    • /
    • 2002
  • Everyday demand of wireless internet is increasing. Security problem is certainly resolved for wireless internet activation. Especially problem is only wiretap in mobile communication with voice, but problems, user authentication, data integrity guarantee etc., are resolved in data-services that have commercial transaction over simple data information service such bill, banking. Necessity of wireless PKI that can offer security service likely in wired environment is requested for offering security service in wireless environment. For offering security services, confidentiality, integrity, non-repudiation etc, that of offered in wired environment in wireless environment, first it must construct wireless PKI infrastructure and do service activity. This paper analyze various wireless internet technology for offering safe wireless internet service and wireless PH standards. Performance Result of this paper expect activity of safe wireless PH service and activity of electronic commercial transaction used wireless internet such banking service, bill transaction, online shopping.

  • PDF

A Study on the Changing Roles of Cadastral Organizations to Comply with Environmental Changes (환경변화에 따른 지적기관의 역할 변화에 대한 고찰)

  • Oh, Yi-Kyun;Park, Jong-Cheul
    • Journal of Cadastre & Land InformatiX
    • /
    • v.44 no.2
    • /
    • pp.59-72
    • /
    • 2014
  • In this paper the key drivers change for cadastral organizations have been presented according to the following aspects; Geo-ICT development including positioning technology, government's public organization innovation policy, cadastral market opening pressure and decreasing of cadastral survey work. It was confirmed that the role of cadastral organization has to be changed from the conducting cadastral survey organization to the spatial information provision organization. Eventually it should take a role to realize Spatially Enabled Society(SES) which is fundamental for national development and upgrading quality of life in the society. From the case study of international cadastral organization, cadastral organization should take core responsibility for the Nation Spatial Data Infrastructure(NSDI) and meeting the future costumers requirements through technical developments and organization's innovation efforts.

An Implementation of NEIS′DB Security Using RBAC based on PMI (PMI기반의 RBAC를 이용한 NEIS의 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.31-45
    • /
    • 2004
  • Public Key Infrastructure(PKI) provides a strong authentication. Privilege Management Infrastructure(PMI) as a new technology can provide user's attribute information. The main function of PMI is to give more specified authority and role to user. To authenticate net and role, we have used digital signature. Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. NEIS(National Education Information System) can not always provide satisfied quality of security management. The main idea of the proposed RNEIS(Roll Based NEIS) is that user's role is stored in AC, access control decisions are driven by authentication policy and role. Security manager enables user to refer to the role stored in user's AC, admits access control and suggests DB encryption by digital signature.

CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks (차량통신에서 T-DMB 데이터 서비스에 기반한 인증서 취소 목록 배포 기법)

  • Kim, Hyun-Gon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.161-169
    • /
    • 2011
  • There is a consensus in the field of vehicular network security that public key cryptography should be used to secure communications. A certificate revocation list (CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a CRL distribution method aided by terrestrial digital multimedia broadcasting (T-DMB). By using T-DMB data broadcasting channels as alternative communication channels, the proposed method can broaden the network coverage, achieve real-time delivery, and enhance transmission reliability. Even if roadside units are not deployed or only sparsely deployed, vehicles can obtain recent CRLs from the T-DMB infrastructure. A new transport protocol expert group (TPEG) CRL application was also designed for the purpose of broadcasting CRLs over the T-DMB infrastructure.

Decision Support Model for Determining Public or Private Highway Investment Projects (고속도로 건설사업의 재정/민자 발주선택 의사결정 지원모델)

  • Yeo, Donghoon;Jeong, Wooyong;Han, Seung Heon;Lee, Young Cheon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.3D
    • /
    • pp.381-389
    • /
    • 2009
  • Korean government is investing 1.8 billion won on infrastructure and investment on PPP projects constitutes 16.3%. This phenomenon is to promote private investment as well as lessening government burdens of public budgeting. However, the only criterion to be considered is government financial status in selecting public or private highway investment projects. So systematic decision support model is required in choosing public or private highway investment projects. So, this paper suggests a systematic decision support model for deciding public or private highway investment at the early stage of project planning. Furthermore, this paper identifies key decision variables with respect to economic, politic, project management criterions based on the related literatures and feedbacks from experts. This paper analyzed 30 cases of government investment and PPP projects and got the survey result from highway specialists. As a result, this paper presents an interval with respect to economic criteria using mean and standard deviation and a logistic regression equation which can predict the possibility of PPP project. Through this study, decision maker of central or local government can decide public or PPP highway project more systematically and reasonably.

A Comparative Study on Factors Influencing Residential Satisfaction by Types of Public Rental Housing (공공임대주택 유형별 주거만족도 영향요인 비교연구)

  • Mee-Jung Lee;Chan-Ho Kim;Chang-Soo Lee
    • Land and Housing Review
    • /
    • v.15 no.1
    • /
    • pp.39-55
    • /
    • 2024
  • The aim of this study is to analyse housing satisfaction among residents of different types of public rental housing-permanent, national, and happy housing-following the integration of housing types upon the full-scale supply of integrated public rental housing. By identifying key factors that influence residential satisfaction, our goal is to inform the planning of public rental housing complexes and derive policy implications. The study focuses on analysing discrepancies in residential satisfaction among residents of different types of public rental housing and comparing the factors influencing this satisfaction. Microdata from the Ministry of Land, Infrastructure, and Transport's 'Housing Situation Survey' in 2021 is utilized for analysis, employing one-way ANOVA and binomial logistic regression methods. Empirical analysis reveals variations in residential satisfaction levels between residents of permanent and national rental housing, with national rental housing residents exhibiting higher satisfaction. The influencing factors of overall condition satisfaction are consistent for permanent and national rental residents but differ for happy housing residents. Additionally, the influencing factors of overall residential environmental satisfaction vary across all three housing types. Nonetheless, common factors across all types include housing noise and facility accessibility, highlighting their significance in complex planning. Subsequent studies may involve time series analysis to assess changes in influencing factors over time.

Necessity for Establishing International Certification Authority System for Global Electronic Commerce (인증 관련 주요 국제기구 및 국가인증제도 현황 분석)

  • Lee, Ho-Gun;Park, Seung-Lak;Yoon, Young-Han
    • International Commerce and Information Review
    • /
    • v.1 no.2
    • /
    • pp.123-143
    • /
    • 1999
  • 전자상거래는 비대면(非對面) 거래로 모든 제반과정이 진행되기 때문에 상대에 대한 신뢰성의 문제가 크며, 거래 당사자와 거래 내역에 대한 입증을 해줄 인증기관이 필요하게 된다. 현재 미국의 베리사인 등 사설인증업체가 국내전자상거래 업체의 인증업무를 담당하고 있는 실정이다. 또한, 인중은 필연적으로 관련 기술의 표준화가 수반되는데 이에 대한 국내기술이 미흡하므로 국제동향을 고려한 국내인증기술의 개발이 시급하다. 특히, 글로벌 전자상거래에서는 인증기관에 대한 문제가 더욱 절실한데 문제는 어떠한 형태로 어떤 기관이 주축이 되어 인중체계를 구축하는가 하는 것이다. 현재, 인증체계는 네트워크 방식, 계층구조, 혼합형의 세가지가 논의되고 있으며, 각각의 장단점이 존재하므로 이에 대한 심도있는 논의가 필요하다. 이러한 체계는 국가별로 상이할 수 있지만, 문제는 글로벌 전자상거래를 활성화하기 위해서는 보다 일관된 형태의 인증체계 구축이 필요하다는 점이다. 현재까지 이와 관련한 심도있는 논의는 미흡한 실정이며, 미국 EU 등 일부국가와 UNCITRAL, OECD, ICC 등 관련 기구에서 다양한 의견을 제시하고 있는 상태이다. 이러한 문제는 단시일 내에 해결되기는 어려울 것으로 보인다. 다만, 단기적으로는 관련국가들간의 상호인증을 통한 해결이 가능할 것으로 판단되며, 이러한 상호 인증이 전세계적으로 확산되어감에 따라 글로벌 전자상거래를 위한 인증체계가 심도있게 논의될 것으로 판단된다. 이와 관련하여 상호 인증과 관련한 국내관련 법제의 보완이 필요하며, 실제로 인증을 담당할 관련 당사자들의 자구노력이 매우 시급한 시정이라 하겠다.

  • PDF

The Design of the Security Protocol for Electronic Commerce Payment System (전자상거래 지불시스템을 위한 보안 프로토콜 설계)

  • Lee, Sang-Duck;Han, Seung-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.112-117
    • /
    • 2007
  • The Internet leads the transformation of the all-over social life with its radical diffusion and development. Moreover, it can be more focussed on the electronic commerce using the Internet - a new type of commerce, which is diffusion and developing. In the paper, we propose an electronic payment protocol with a network-type electronic-cash based on Public Key Infrastructure(PKI). The proposed protocol overcomes the problem of NetBill which deals with only contents and can't ensure anonymity. It also prevents illegal copy and distribution and insures the greatest safety by means of giving a certification number to the digital contents offered on the on-line.

  • PDF

A PKI-based Secure Multiagent Engine (PKI 기반의 보안 다중 에이전트 엔진)

  • 장혜진
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.3 no.4
    • /
    • pp.319-324
    • /
    • 2002
  • The Integration of agent technology and security technology is needed to many application areas like electronic commerce. This paper suggests a model of extended multi-agent engine which supports privacy, integrity, authentication and non-repudiation on agent communication. Each agent which is developed with the agent engine is composed of agent engine layer and agent application layer. We describe and use the concepts self-to-self messages, secure communication channel, and distinction of KQML messages in agent application layer and messages in agent engine layer. The suggested agent engine provides an agent communication language which is extended to enable secure communication between agents without any modifications or restrictions to content layer and message layer of KQML. Also, in the model of our multi-agent engine, secure communication is expressed and processed transparently on the agent communication language.

  • PDF