• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.053 seconds

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).

A RFID Authentication Protocol with a Strong Forward Security (전방위 안전성이 향상된 RFID 인증 프로토콜 제안)

  • Kim Hun-Wook;Jo Jong-Kuen;Lee Jang-Chun;Lee Ern-Yu;Lim Shu-Yun;Lee Hoon-Jae
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.897-900
    • /
    • 2006
  • RFID(Radio Frequency Identification) 기술의 발전은 편의성과 경제성으로 전 세계에 확산되어 사용되고 있다. 비록 세계적인 보안 표준안이 정해 지지 않았지만 RFID 보안 분야는 각 나라에 맞게 표준을 선정하여 적용되고 있다. 한편, RFID 기술의 발전으로 RFID의 칩이 소형화되고, 장거리 통신이 가능해짐에 따라 RFID 시스템에 내장된 정보를 다른 누군가가 활용하여 개인 또는 기업 등의 프라이버시를 불법으로 수집하는 피해가 발생할 수 있다. 본 논문은 RFID 시스템에서 정보의 누출을 막기 위해 해쉬 알고리즘과 초경량 스트림 암호알고리즘을 사용하여 전방위 안전성이 향상된 RFID시스템을 제안, 분석하였다.

  • PDF

A Study on the Selection of Optimum Auto-design Data using FEA (유한요소해석을 이용한 최적자동설계 데이터 선정에 관한 연구)

  • 박진형;이승수;김민주;김순경;전언찬
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.406-409
    • /
    • 2001
  • This study is an investigation for the ADS optimum design by using FEA. We write out program which express ADS perfectly and reduce the required time for correcting of model to the minimum in solution and manufacture result. We complete algorithm which can plan optimum forming of model by feedback error information in CAE. Then we correct model by feedback date obtaining in solution process, repeat course following stress solution again and do modeling rachet wheel for optimum forming. That is our aim. In rachet wheel, greatest equivalence stress originates in key groove corner and KS standard is proved the design for security.

  • PDF

A Study on the Verification Using Finite Element Analysis and Automatic Design of Ratchet Wheel (래칫 휠의 자동설계와 유한요소해석을 이용한 검증에 관한 연구)

  • 김민주;이승수;전언찬
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.11 no.3
    • /
    • pp.45-50
    • /
    • 2002
  • This study is an investigation far the Am optimum design using FEA. We write out program which express ADS perfectly and reduce the required time far correcting of model to the minion in solution md manufacture result. We complete algorithm which can plan optimum forming of model by feedback error information in CAE. Then we contract model by feedbback date obtaining in solution process, repeat course following stress solution again iud do modeling rachet wheel for optimum forming. That is our aim. In cachet wheel, greatest equivalence strss originates in key groove comer and KS standard is proved the design far security.

Study on Practical Design of Datalink in Interoperable UAV Systems (무인기 상호운용시스템에서 실용적인 데이터링크 설계방안 연구)

  • Kyu-Hwan Lee;Myeonggeun Oh;Jihoon Kim
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.1
    • /
    • pp.51-59
    • /
    • 2024
  • Uumanned aerial vehicle(UAV) systems have been used in various fields including industry and military. According to increasing the number of UAVs, the attention on interoperable UAV systems is increasing. In this paper, we propose the practical design of datalink in interoperable UAV systems. For practical design, we firstly review the operational scenarios in the interoperable UAV system. We then propose the system model of the datalink in interoperable UAV system. Consequently, the technical components such as the design of the network, the link management, the support of the multicast transmission, the support for autonomous mission and flight safety, and the datalink security are derived and reviewed for the practical design.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.

Design and Implementation of Packet Filtering System for IPv4/IPv6 Tunneling Environment (IPv4/IPv6 터널링 환경에 적합한 패킷 필터링 기능 설계 및 구현)

  • Heo, Seok-Yeol;Lee, Wan-Jik;Kim, Kyung-Jun;Jeong, Sang-Jin;Shin, Myung-Ki;Kim, Hyoung-Jun;Han, Ki-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.6
    • /
    • pp.407-419
    • /
    • 2006
  • As substituting IPv6 network for all IPv4 network in a short time seems unattainable due to high cost and technical limitation, IPv4 and IPv6 are expected to coexist for a certain period of time. Under the co]existing environment of IPv4 and IPv6, interworking brings a number of extra security considerations even if it may have no security problem for each protocol respectively. Thus, the analysis and solutions for those various attacks toward IPv4/IPv6 interworking-related security are inevitably required for the sake of effective transition and settlement to IPv6. In this paper we carried out a proper rule of packet filtering for IPv6-in-IPv4 tunneling interworking environment to protect the IPv4/IPv6 interworking-related security attacks. Design and implementation of the packet filtering system suitable for IPv4/IPv6 tunneling environment in the form of Linux netfilter and ip6tables are also shown. Thru this study, the packet filtering system was found operating correctly ill the tunneling mechanism.

A Study on the Practical Methodology of Engineering Education through Multi-account Service Composition with Enhanced User Security (사용자 보안을 강화한 다중 계정 서비스 구성을 통해 이루어진 공학 교육 실천 방법론에 관한 연구)

  • Kang, Kyoung-Bo;Park, Jea-Soon;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.10 no.1
    • /
    • pp.1-7
    • /
    • 2018
  • The dual security system that manages user's account information and uses NFC and OTP has been proposed. It also enhances the security of the user authentication phase by using the features that recognize within the range of less than 1m of NFC and the high security of NFC itself. During the graduation work design process which was carried out for one year and six months in a group of two in the electronics engineering major of the four-year undergraduate system was conducted. In the interim results, we participated in the conferences and thesis contest at the Institute of related to major for three times. Finally passed the examination process for three times judged by 6 professors in the major. The results were published in a graduation thesis together with other people who passed and composed in thesis form. Through the experience gained through these stages of design and production, it has gained the confidence to gain employment opportunities and actively pursue the growth stage, and presented a methodology to practice engineering education through employment.

An Area-Efficient Design of Merged TEA Block Cipher for Mobile Security (모바일 보안용 병합 TEA 블록 암호의 면적 효율적인 설계)

  • Sonh, Seungil;Kang, Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.11-19
    • /
    • 2020
  • In this paper, a merged TEA block cipher processor which unifies Tiny Encryption Algorithm(TEA), extended Tiny Encryption Algorithm(XTEA) and corrected block TEA(XXTEA) is designed. After TEA cipher algorithm was first designed, XTEA and XXTEA cipher algorithms were designed to correct security weakness. Three types of cipher algorithm uses a 128-bit master key. The designed cipher processor can encrypt or decrypt 64-bit message block for TEA/XTEA and variable-length message blocks up to 256-bit for XXTEA. The maximum throughput for 64-bit message blocks is 137Mbps and that of 256-bit message blocks is 369Mbps. The merged TEA block cipher designed in this paper has a 16% gain on the area side compared to a lightweight LEA cipher. The cryptographic IP of this paper is applicable in security module of the mobile areas such as smart card, internet banking, and e-commerce.