• Title/Summary/Keyword: Secure System

Search Result 3,573, Processing Time 0.035 seconds

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

Implementing the ESES for Secure Electronic Commerce Platform (안전한 전자상거래 플랫폼 개발을 위한 ESES의 구현)

  • Lee, Joo-Young;Kim, Ju-Han;Lee, Jae-Seung;Moon, Ki-Young
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.551-556
    • /
    • 2001
  • The ESES system has been developed to supply a digital signature function, an encryption function, and a library of cryptographic primitives and algorithm for securing an XML document and the existing non-XML documents that are exchanged in the electronic commerce. In this paper, we will introduce the overview of ESES system and explain how the ESES processes to offer security services Finally we\`ll conclude our talk by presenting the summary and further works.

  • PDF

Implementation of the Secure Web Server-Client Module Based on Protocol Architecture (프로토콜 기반 웹 클라이언트-서버 보안 모듈 구현)

  • Jang, Seung-Ju;Han, Soo-Whan
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.931-938
    • /
    • 2002
  • We implement the PBSM (Protocol-Based Security Module) system which guarantees the secure data transmission under web circumstances. There are two modules to implement for the PBSM architecture. One is Web Server Security Module (WSSM) which is working on a web server, the other is the Winsock Client Security Module (WSCSM) which is working on a client. The WSCSM security module decrypts the encrypted HTML document that is received from the security web server The decrypted HTML document is displayed on the screen of a client. The WSSM module contains the encryption part for HTML file and the decryption part for CGI (Common Gateway Interface). We also implement the proposed idea at the web system.

A New Key Protection Technique of AES Core against Scan-based Side Channel Attack (스캔 기반 사이드 채널 공격에 대한 새로운 AES 코아 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Park, Sung-Ju
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.1
    • /
    • pp.33-39
    • /
    • 2009
  • This paper presents a new secure scan design technique to protect secret key from scan-based side channel attack for an Advanced Encryption Standard(AES) core embedded on an System-on-a-Chip(SoC). Our proposed secure scan design technique can be applied to crypto IF core which is optimized for applications without the IP core modification. The IEEE1149.1 standard is kept, and low area and power consumption overheads and high fault coverage can be achieved compared to the existing methods.

Technologies Analysis based on IoT Security Requirements and Secure Operating System (IoT 보안 요구사항 및 보안 운영체제 기반 기술 분석)

  • Ko, Jae-Yong;Lee, Sang-Gil;Kim, Jin-Woo;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.164-177
    • /
    • 2018
  • As the market for IoT devices grows, it is expected that the scale of malware attack will be considerable. Accordingly, the improvement of related legislation has been actively promoted, the recently strengthened Information and Communication Network Act was enforced. Because IoT related accidents can lead to not only financial damages but also human accidents, IoT device Security has been attracted a great deal of attention. In this paper, IoT devices provide essential security functions through legal and technical perspectives, and analyze related technologies. This can be used to a reference for the Start-up developer and IoT device designer.

Scrambler Design and Real Time Implementation for Secure Communication (비화 통신을 위한 바화기 설계 및 실시간 구현)

  • Seok, Gwang-Won;Yeo, Song-Pil;Park, Jung-Ho;Jeong, Jeong-Gyun;Du, Hyeon-Ung;Kim, Seong-Hwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.6
    • /
    • pp.41-46
    • /
    • 1996
  • Conversations over telephone line are easily monitored and therefore acceptable level of security is not provided. In this paper, we propose the design of scrambler for secure communication and real time implementation of it. Especially, we con reduce the complexity of hardware and implement it easily by designing the scrambling system which doesn't require synchronization signal, and provide the scrambling filter with a sufficient level of security of adding new gain into the scrambling system.

  • PDF

Efficient Key Agreement Protocols using Proxy Server (Proxy 서버를 이용하는 효율적인 키 분배 프로토콜)

  • Yang Hyung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.29-36
    • /
    • 2005
  • A key agreement protocol is the most important part to establish a secure cryptographic system and the effort to standardize the key agreement protocols is in rapid progress. Several efficient and secure key agreement protocols have been proposed so far since Diffie-Hellman proposed a public key agreement system in 1976. But, since Diffie-Hellman based key agreement protocols need a lot of computation to establish the session key, they are not suitable for wireless Internet environment. In this paper, we propose the efficient key agreement protocol using Proxy server. The Proposed Protocol gives the security equivalent to that the Diffie-Hellman based Protocol and the computation work of mobile user can be decreased using proxy server.

A Study on RFID Authentication Protocol suitable for Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에 적합한 RFID 인증 프로토콜에 관한 연구)

  • Yang Hyungkyu;An YoungHwa
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.1
    • /
    • pp.45-50
    • /
    • 2005
  • Recently, ubiquitous Computing is being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. Therefore, in this paper, we analyze the privacy problems of previous methods and propose more secure and effective authentication method to protect user's privacy. The proposed protocol is secure against replay attack, spoofing attack and tracking by an attacker.

A Study for Improving Overseas Forestation System to Cope with the UN Framework Convention on Climate Change (기후변화협약에 대응한 해외조림사업 추진체계 개선방안)

  • Moon, Hee-Cheol;Lim, Young-Se
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.355-379
    • /
    • 2007
  • With the effectuation of United Nations Framework Convention on Climate Change(UNFCCC) and Kyoto Protocol in 2005, ever growing concern on the importance of overseas forestation is diffusing worldwide. However, fierce international competition to secure overseas forestation sites, inherent uncertainty in UNFCCC or overseas forestation projects, and imbalances among policies on overseas natural resources development make it difficult to realize Korean long-term overseas forestation objective to secure 1 million ha by 2050. In view of necessity of overseas forestation projects for sustainable forest management and securing sinks of carbon to mitigate climate change, various efforts to reform current Korean overseas forestation systems are required. This study suggests several alternatives to improve current Korean overseas forestation systems including expanding financial support for overseas forestation projects, cultivating overseas forestation experts, establishing official organization for overseas forestation, constructing effective support system for overseas forestation projects, fostering international cooperation in the field of forest resources, and so on. Many theoretical, empirical or policy-oriented studies on the influences of UNFCCC and countermeasures on it in various Korean industries should follow this study.

  • PDF

Anti-islanding Detection Method for BESS Based on 3 Phase Inverter Using Negative-Sequence Current Injection (역상분 전류 주입을 적용한 3상 인버터 기반 BESS의 단독 운전 검출 방법)

  • Sin, Eun-Suk;Kim, Hyun-Jun;Han, Byung-Moon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.9
    • /
    • pp.1315-1322
    • /
    • 2015
  • This paper proposes an active islanding detection method for the BESS (Battery Energy Storage System) with 3-phase inverter which is connected to the AC grid. The proposed method adopts the DDSRF (Decoupled Double Synchronous Reference Frame) PLL (Phase Locked-Loop) so that the independent control of positive-sequence and negative-sequence current is successfully carried out using the detected phase angle information. The islanding state can be detected by sensing the variation of negative-sequence voltage at the PCC (Point of Common Connection) due to the injection of 2-3% negative-sequence current from the BESS. The proposed method provides a secure and rapid detection under the variation of negative-sequence voltage due to the sag and swell. The feasibility of proposed method was verified by computer simulations with PSCAD/EMTDC and experimental analyses with 5kW hardware prototype for the benchmark circuit of islanding detection suggested by IEEE 1547 and UL1741. The proposed method would be applicable for the secure detection of islanding state in the grid-tied Microgrid.