• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

The Efficient AES-CCM Architecture for a hardware library in the WAVE (WAVE 하드웨어 암호 라이브러리에 적합한 효율적인 AES-CCM 구조 설계)

  • Lee, Yeon-Cheol;Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2899-2905
    • /
    • 2013
  • According to developing wireless communications in vehicle, various security threat in the WAVE(Wireless access in vehicular environments) is increased. To protect this, IEEE 1609.2 specify services as for prevent message from attacks such as spoofing, eavesdropping and replay. It is possible to implement a hardware library for defending these attacks. In this paper, we proposed a efficient AES-CCM architecture for the hardware library in the WAVE. We compare our architecture to the previous one in the same FPGA. And our design uses less slices than 27 % of it and less slices than 45 % of it if we share registers that were used by other modules in the library. We also achieves a throughput of 1355 Gbits/s in xc5vlx110t-2ff1136.

A Design of Smart Banking System using Digital Signature based on Biometric Authentication (바이오인증 기반의 전자서명을 이용한 스마트 뱅킹 시스템 설계)

  • Kim, Jae-Woo;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6282-6289
    • /
    • 2015
  • Today, there is an increasing number of cases in which certificate information is leak, and accordingly, electronic finance frauds are prevailing. As certificate and private key a file-based medium, are easily accessible and duplicated, they are vulnerable to information leaking crimes by cyber-attack using malignant codes such as pharming, phishing and smishing. Therefore, the use of security token and storage toke' has been encouraged as they are much safer medium, but the actual users are only minimal due to the reasons such as the risk of loss, high costs and so on. This thesis, in an effort to solve above-mentioned problems and to complement the shortcomings, proposes a system in which digital signature for Internet banking can be made with a simply bio-authentication process. In conclusion, it was found that the newly proposed system showed a better capability in handling financial transitions in terms of safety and convenience.

Design and Implementation of Facial Biometric Data based User Authentication System using One-Time Password Generation Mechanism (얼굴 정보 기반 일회용 패스워드 생성 메커니즘을 이용한 사용자 인증 시스템 설계 및 구현)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1911-1918
    • /
    • 2011
  • Internet banking, electronic financial services and internet telephony service can be available on smart phone recently. In this case, more robust authentication mechanisms should be provided for enhancing security on it. In this study, a facial biometric ID based one-time password generation mechanism is designed and implemented for enhancing user authentication on smart phone. After capturing a facial biometric data using camera module on smart phone, it is sent to server to generate one-time biometric ID. Finally one-time password will be generated by client module after receiving the one time biometric ID based challenge token from the server. Using proposed biometric ID based one-time password mechanism, it is possible for us to provide more secure user authentication service on smart phone for SIP protocol.

Building GIS Application Model in Support of Tsunami Relief Effort (쓰나미 재난 대응을 위한 GIS 응용모델 구축에 관한 연구)

  • Liyanage, Asha Nilani;Lee, Heewon;Lee, Seok-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1489-1494
    • /
    • 2013
  • Tsunami happens rarely enough to allow a false sense of security, but when they do occur, there may be just minutes or hours for people to reach a safe location. Natural disasters like tsunami are inevitable and it is almost impossible to fully recoup damages caused by the disasters. However, it is possible to minimize the potential risk by developing early warning strategies. GIS modelling with its geoprocessing and analysis capability can play a crucial role in efficient mitigation and management of disaster. This study aims at developing integrated spatial information system processing model supporting tsunami evacuation action planning using geo-information technology such as GIS. The integration process classified into four phases. And in each phase, required input data and GIS processes are decided. The main effort in minimizing casualties in tsunami disaster is to evacuate people from the hazard area before tsunami strikes by means of either horizontal or vertical evacuation. The study provides essential spatial information for local decision making related with people's evacuation in tsunami-prone areas based on a modeling approach transferable to other coastal areas.

Design and Implementation of a Manage System for CORBA-based Distrbuted Multimedia Services (CORBA 기반의 분산 멀티미디어 서비스를 위한 관리시스템의 설계와 구현)

  • Gong, Ji-Yeong;Hong, Won-Gi;Kim, Dong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.564-573
    • /
    • 1999
  • Recently, as the development and use of distributed multimedia services are growing explosively in every aspects of our lives, administrators of multimedia services are very concerned with providing users with reliable and efficient services. However, the management of distributed multimedia services is a very complex and troublesome work such that a flexible but powerful management system is necessary. This paper proposes a management system for managing CORBA-based distributed multimedia services. We have developed an architecture for the management system and defined a set of management services needed to monitor and control distributed multimedia services. The architecture consists of several objects, which perform configuration management, fault management, security management and event management. A generic distributed multimedia service (DMS) MIB has been defined for the management of various multimedia services and applications. In addition, as a proof of concept, we have developed a Web-based management system for a CORBA-based distributed multimedia system called MAESTRO. The prototype management system uses OrbixWeb to interface with the management server which is implemented as a set of CORBA objects. Though our management system has been developed for distributed multimedia services, it can easily manage other CORBA-based services and applications.

Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection (IP Fragmentation 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • Guk, Gyeong-Hwan;Lee, Sang-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.331-338
    • /
    • 2001
  • With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  • PDF

Design and Implementation of J2ME-based Wired/Wireless Interworking Mobile Wallet (J2ME 기반 유.무선 연동의 모바일 전자지갑 설계 및 구현)

  • Park, Nam-Je;Song, You-Jin
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.687-698
    • /
    • 2002
  • Together with the activation of wireless Internet, the interest for various integrated methods of the existing wired and wireless e-commerces is on the rise. For the integrated wired and wireless e-commerce, firstly, the optimized security and authentication under the radio communication environment should be decided. And also the user-friendly usage is important. In this paper, we designed and implemented wired and wireless interworking Mobile Wallet on terminal that can be used through both wired and wireless methods by developing electronic wallet module for electronic payment using MIDP (Mobile Information Device Profile) based on J2ME (Java 2 Micro Edition). The characteristics of mobile wallet implemented in this paper provide the stability through encoding/decoding payment information and on-line usage on wired/wireless environments through downloading electronic wallet. In addition, we also present safe and convenient payment method for e-commerce based on wired/wireless Internet.

Design and Implementation of Tree-based Reliable Dissemination Multicast Protocol With Differential Control and Key Management (차별 제어와 키 관리 기능을 통한 트리 기반의 신뢰성 있는 멀티캐스트 프로토콜의 설계 및 구현)

  • Kim, Yeong-Jae;Park, Eun-Yong;An, Sang-Jun;Hyeon, Ho-Jae;Han, Seon-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.235-246
    • /
    • 2002
  • While the Internet is suffering from the massive data such as video stream, IP multicast can ease the load of the Internet by enabling one copy of digital information to be received by multiple computers simultaneously. But If multicast is based on UDP, packets are delivered using a best-effort Policy without any reliability, congestion control or flow control. Multicast group members can join or leave a multicast group at will, and multicast uses broadcast mechanism, it's very hard to keep security from unauthorized members. In this paper, we introduce a new reliable multicast protocol TRDMF proper for one-to-many multicast model with reliability, flow control, congestion control and key management.

A Study on the Improvement Direction of the Building Escape Regulation Considering Inconvenient Movers (이동약자를 고려한 건축물 피난규정 개선 방안에 관한 연구)

  • Hwang, Eun-Kyoung
    • Fire Science and Engineering
    • /
    • v.23 no.6
    • /
    • pp.32-38
    • /
    • 2009
  • Owing to increase of the large-scaled, high-raised and complexed building construction, the escape design of the building became very important issue to insure the safety of occupant. Specially, it is demanded to have building escape regulation considering for inconvenient movers such as disables elders pregnant women. However, building regulations for inconvenient movers are divided into "Regulation of Escape and Fire-prevention of Building" and "Act on the Promotion and Guarantee of Access for the Disabled, the Aged and Pregnant Women to Facilities and Information". But, for the escape security of inconvenient movers, the connection of each regulation are necessary. So this study suggested the improvement direction of the building escape regulation considering inconvenient movers through the compared analysis on the "Regulation of Escape and Fire-prevention of Building" and "Act on the Promotion and Guarantee of Access for the Disabled, the Aged and Pregnant Women to Facilities and Information".

A Design of the Smart Control System for Industrial Automation Equipment (산업용 자동화 장비를 위한 스마트 제어 시스템 설계)

  • Kim, Bo-Hun;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.677-684
    • /
    • 2017
  • Smart devices are used in a variety of industries, because applications for them are easy to develop and portable. However, industrial equipment can cause security problems for information and accidents when controlling the actuator of the equipment at a remote location. In this paper, we studied methods of solving these problems and the advantages of applying smart control systems to industrial equipment. We propose a manual manipulation method using queries and a smart control access procedure for controlling equipment using a smart device. In addition, we propose a data transmission method employing multiple encryption protocols and a user authentication method using unique information from the smart device and Q & A as the communication data protection and user authentication methods, respectively. In order to evaluate its performance, an operation test of the smart control system and user authentication comparison experiment were performed. In order to understand the advantages of applying the smart control system to the equipment, we conducted a comparative experiment with a teach pendant and evaluated its reaction time in case of error.