• Title/Summary/Keyword: Security Communication

Search Result 4,389, Processing Time 0.039 seconds

Implementation of IPv6 IKE System on VxWorks (VxWorks 기반의 IPv6 IKE 시스템 구현)

  • Kang, Seong-Min;Lee, Jae-Hwang;Kim, Sun-Woo;Kim, Young-Keun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.126-128
    • /
    • 2004
  • This paper proposes design and implementation for IKE system that is available to IP security communication on IPv6 network. IPsec is a standard for security on network or processing layer of network communication. IPsec consists of step to negotiate security policy and step to negotiate and provide security key material for peer-to-peer security. We use the ISAKMP for negotiating security policy. And we use the IKE for negotiating and providing the key material. The system is based on VxWorks and is tested with Racoon that is a IKE daemon on FreeBSD. In this paper, we propose an implementation method for mobile host providing network communication with IP security.

  • PDF

Security Analysis on the Implementation Vulnerabilities of I-PIN (주민등록번호 대체수단에 대한 구현 취약점 분석)

  • Choi, Youn-Sung;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.145-185
    • /
    • 2007
  • A resident registration number is used to confirm and prove his/her identity in a government/non-governmental agency. It is a essential requirement to become the registered member on internet website in Korea. It is serious problem that the resident registration number and name are outflowed in internet and misused by others. So the MIC(Ministry of Information and Communication) in Korea plans and operates the identification system using I-PIN that integrate 5 alternative methods of resident registration number. In this paper, we analyze the problem about the method of 5 I-PIN services and show the security analysis on the implementation vulnerabilities of I-PIN services. we also analyze 17 websites that provides identification system using I-PIN. Finally, we analyze the overall problem of I-PIN service and propose the countermeasure about the problem.

Secure Framework for SIP-based VoIP Network (SIP 프로토콜을 기반으로한 VOIP 네트워크를 위한 Secure Framework)

  • Han, Kyong-Heon;Choi, Sung-Jong;Choi, Dong-You;Bae, Yong-Guen
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.295-297
    • /
    • 2008
  • Session Initiation Protocol (SIP) has become the call control protocol of choice for Voice over IP (VoIP) networks because of its open and extensible nature. However, the integrity of call signaling between sites is of utmost importance, and SIP is vulnerable to attackers when left unprotected. Currently a hop-by-hop security model is prevalent, wherein intermediaries forward a request towards the destination user agent server (UAS) without a user agent client (UAC) knowing whether or not the intermediary behaved in a trusted manner. This paper presents an integrated security model for SIP-based VoIP network by combining hop-by-hop security and end-to-end security.

  • PDF

A Study on Enhancing Hash Function Security against Collision Search Attack (충돌쌍 탐색 공격에 대한 해쉬 함수 안전성 강화에 관한 연구)

  • Jeong, Eun-Jin;Han, Jeong-Hoon;Kim, Seung-Joo;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1120-1123
    • /
    • 2008
  • 단방향 암호화 함수인 해쉬 함수는 2005년 Wang의 새로운 공격법이 발표되면서 안전성에 대한 문제점이 조금씩 드러나기 시작하고 있다. Wang의 새로운 차분 공격법은 현재 가장 널리 사용하고 있는 해쉬 알고리즘인 SHA-1을 이론적으로 $2^{69}$의 계산으로 충돌을 찾을 수 있다고 하였다. 본 논문에서는 차분 공격이 이루어지는 방법과 Wang의 차분 공격이 지니는 두 가지 특성에 대해서 연구하였고, MDx계열의 해쉬 함수의 안전성에 대한 기존의 제시된 해결책과 다른, 한 블록의 모든 워드 값을 변형 처리한 방식을 제안한다.

The Trends of Electronic Security System and Prospects of Security Market (기계경비시스템의 변화와 시장전망)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.147-165
    • /
    • 2003
  • Since Electronic Security System is introduced in Korea in 1981 by foreign technology, Security market has been increasing considerably during short period, and It performs it's security roles well in place of security guards. As electronic and communication technology is highly developed, Electronic Security System and security market structure is changing naturally. Especially high-tech mobile communication technology will change the method of Electronic Security business. Also the pattens of residence and life style, such as the trend toward nuclear family and single life could effect security market. In recent year, new business models that apply the mobile phone and internet is appeared. Although Electronic Security System is changed by the changes of technology, It is very difficult to change the basic elements, such as sensing, alarm signal transfering, and response. The rate of increase of Electronic Security market is expected to matain it's increase pace for the time being. But the development of new system for new protectes such as childeren, old person, vehicle rather than immovable facility is necessary to prepare for the continuous competition.

  • PDF

Research on Security Threats Emerging from Blockchain-based Services

  • Yoo, Soonduck
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

A Study on the Security Requirements for Developing Protection Profiles (보호프로파일 개발을 위한 보안요구사항 도출 방법에 관한 연구)

  • Zheng, He;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.133-138
    • /
    • 2007
  • As a formal document that expresses a set of security requirements for IT products that meets specific consumer needs in the ISO/IEC 15408(CC, Common Criteria) evaluation, protection profiles are developing by many national agencies and companies recently. Since a protection profile is a criteria for security evaluation when the IT systems and products are introduced, the importance of the protection profile is increasing. However, developing protection profiles are still difficult due to lack of detailed methodology and guidance to analyze security environments or to derive security requirements. In this paper, we analyze foreign instances of developing protection profiles and propose a methodology for deriving security requirements through analyzing the TOE security environment.

Development of Smart NFC Security Authenticator(SNSA) (Smart NFC 보안인증기기(SNSA) 개발)

  • Kang, Jeong-Jin;Lee, Yong-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.177-181
    • /
    • 2013
  • As smart devices and OS with communication capabilities based latest NFC (Near Field Communication) have been spreaded, many applications with using existing RFID are being replaced to NFC. Smart NFC technology and existing services and devices can be easily combined convergence and advantage of smart phones, such as authentication and billing, medical care, the creation of a new paradigm of Network Communication are to be expected. By developing H/W, S/W of the Smart NFC Security Authenticator(SNSA), satisfying with wireless communication test results within accepted reference value, analyzing and testing the impact of topology, the signal performance of Daisy Chain Topology was much better than Star Topology's.

Method to Extract Communication History in Instant Messenger (인터넷 메신저의 통신내역 수집기술)

  • Lee, Jin-Kyung;Han, Ji-Sung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.49-60
    • /
    • 2011
  • Instant Messenger is one of the most popular communication service when translating message or data each other through Internet. For digital crime investigation, therefore, it is obviously important to obtain communication trace and contents derived from Instant Messenger. This is because that gathering traditional communication histories also have been important until now. However, extracting communication trace and contents are not easy because they are generally encrypted or obfuscated in local system, futhermore, sometimes they are located at server computer for Instant Messenger. This paper researches on extracting communication histories against NateOn, BuddyBuddy, Yahoo! messenger and Mi3 messenger, and obtaining user password or bypassing authentication system to Instant Messenger Service when a user use auto-login option.

Study of applicable security tunneling technique for military wireless network (군 무선네트워크 환경에서 적용 가능한 보안 터널링 기법 연구)

  • Kim, Yun-young;Namkung, Seung-Pil
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.107-112
    • /
    • 2015
  • Due to the rapid development of wireless communication technology, foundation system of military communication that is based on the daily use technology has been changed in to wireless system. However, military communication contains clssified information, and it is expected to have increase amount of enemy's there in such a imperfect security system. The next generation of tactical network communication system is expected to adopt All IP based wireless system. This research studies expected threatening factor on the wireless environment, and find the appropriate tunneling techniques.