• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.032 seconds

Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1223-1247
    • /
    • 2012
  • The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission critical fields such as military and medical applications. Security techniques that are used to secure any network depend on the security requirements that should be achieved to protect the network from different types of attacks. Furthermore, the characteristics of wireless networks should be taken into consideration when applying security techniques to these networks. In this paper, energy efficient Security Model for Tree-based Routing protocols (SMTR) is proposed. In SMTR, different attacks that could face any tree-based routing protocol in WSNs are studied to design a security reference model that achieves authentication and data integrity using either Message Authentication Code (MAC) or Digital Signature (DS) techniques. The SMTR communication and processing costs are mathematically analyzed. Moreover, SMTR evaluation is performed by firstly, evaluating several MAC and DS techniques by applying them to tree-based routing protocol and assess their efficiency in terms of their power requirements. Secondly, the results of this assessment are utilized to evaluate SMTR phases in terms of energy saving, packet delivery success ratio and network life time.

Framework of Security Development Method based on Component (컴포넌트기반 보안개발방법의 프레임워크)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.926-930
    • /
    • 2010
  • This paper is about a development framework, which is required to develop of security system is based on component. With applying of SDLC(system development life cycle) of information system, the application of information security products DLC is required at this point of time. In this paper, we review NIST requirement specification of development method, requirement criteria of SDLC in each stage, and major security guidelines of risk assessment. Also we are reviewed major security element of SDLC, and to aid understanding of security framework based on component, present the relationship fo security design and DFD in respect of spoofing for the outside entity based on threat tree STRIDE.

A Study on Security Audit Checking Items for the RFID-Based Information System (RFID 기반 정보시스템을 위한 보안감리 점검항목 연구)

  • Jeon, Sang-Duk;Lim, Ji-Young;Lee, Ki-Young;Han, Ki-Joon
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.107-121
    • /
    • 2012
  • The core infra-technology in the ubiquitous era, RFID which has taken action from the public institution with the pilot projects as well as the practical projects is gradually extending its spectrum to the private enterprises. Along with its expansion, the audit required on the RFID-based information system is also growing in the industry. Especially, since RFID-based information systems, especially compared to other information systems, are likely to be exposed to many threats, the security audit for them is being emphasized. This paper suggests security audit checking items for the RFID-based information system, which can be used to perform the efficient security audit. The security audit checking items consist of eight basic checking items, each of which consists of detailed review items and can be applied for each building steps of the system(analysis, design, implementation, testing, and development). Finally, this paper confirmed the efficiency of the security audit checking items proposed in this paper through survey by the experienced auditors and analysis of practical audit cases.

A log visualization method for network security monitoring (네트워크 보안 관제를 위한 로그 시각화 방법)

  • Joe, Woo-Jin;Shin, Hyo-Jeong;Kim, Hyong-Shik
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.70-78
    • /
    • 2018
  • Current trends in information system have led many companies to adopt security solutions. However, even with a large budget, they cannot function properly without proper security monitoring that manages them. Security monitoring necessitates a quick response in the event of a problem, and it is needed to design appropriate visualization dashboards for monitoring purposes so that necessary information can be delivered quickly. This paper shows how to visualize a security log using the open source program Elastic Stack and demonstrates that the proposed method is suitable for network security monitoring by implementing it as a appropriate dashboard for monitoring purposes. We confirmed that the dashboard was effectively exploited for the analysis of abnormal traffic growth and attack paths.

Formal Methodology for Safety Analysis of Security Protocols (보안 프로토콜의 안전성 분석을 위한 정형적 방법론)

  • Kim Il-Gon;Jeon Chul-Wuk;Kim Hyun-Seok;Choi Jin-Young;Kang In-Hye
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.17-27
    • /
    • 2005
  • With the development of wire and wireless based networks, a various security protocols have been proposed to protect important resources and user information against attackers. However, many security protocols have found oかy to be later vulnerable to attacks. In this Paper, we introduce the formal methodology to verify the safety of security protocols in the design phase, and we take advantage of the formal methodology which uses Casper/CSP and FDR tools by introducing the verification example of EKE protocol and BCY protocol. Lastly, we propose a new BCY protocol after verifying it's safety.

Design and Implementation of a Secure Software Architecture for Security Patch Distribution (안전한 보안패치 분배 구조의 설계 및 구현)

  • 손태식;서정우;문종섭;서정택;임을규;이철원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.47-62
    • /
    • 2003
  • Patch distribution is one of important processes to fix vulnerabilities of software and to ensure security of systems. Since an institute or a company has various operating systems or applications, it is not easy to update patches promptly. In this paper, we propose a secure patch distribution architecture with an authentication mechanism, a security assurance mechanism, a patch integrity assurance mechanism, and an automatic patch installation mechanism. We argue that the proposed architecture improve security of patch distribution processes within a domain.

Design of Improved Strong Password Authentication Scheme to Secure on Replay Attack (재전송 공격에 안전한 개선된 강력한 패스워드 인증 프로토콜 설계)

  • Kim, Jun-Sub;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.133-140
    • /
    • 2011
  • Password-based authentication is the protocol that two entities share a password in advance and use the password as the basic of authentication. Password authentication schemes are divided into weak-password and strong-password authentication scheme. SPAS protocol, one of the strong-password authentication scheme, was proposed for secure against DoS attack. However it has vulnerability of the replay attack. In this paper, we analyze the vulnerability to the replay attack in SPAS protocol. Then we also propose an Improved-Strong Password Authentication Scheme (I-SPAS) with secure against the replay attack.

Efficiency Analysis of Social Security Expenditure in 31 Provinces and Autonomous Regions in China

  • ZHOU, Lin-Lin;KIM, Hyung-Ho
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.9 no.2
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose - The purpose of this study is to measure the efficiency of social security expenditure in 31 provinces, cities and autonomous regions in China and proposes corresponding improvement plans. Research design, data, and methodology - The data were obtained from the statistical yearbook of each province. The BCC and CCR models of DEA model and Malmquist index are used to analyze the efficiency, and the input-output index is expanded. Result - The results show that the social security performance of the Chinese government has improved on the whole despite the unbalanced development in different regions. Each region should look for strategies to improve the efficiency of social security according to its own problems. The study suggests that provinces affected by TCI should improve their internal environment, such as raising social security fund structure and strengthening fund supervision, to improve efficiency. Areas affected by TECI need to be more responsive to policy, socio-economic and technological development. Conclusion - The research conclusion can provide reference for Chinese provinces to improve the efficiency of social security expenditure in the future. This study is not comprehensive enough in the selection of input-output indicators, which can be further expanded in the future.

Demand Survey Method for Commercialization of Police Science Technology and Equipment

  • Myeonggi, Hong;Junho, Park;JeongHyeon, Chang;Seongju, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.609-625
    • /
    • 2023
  • This study is a demand research for the selection of public safety science and technology equipment and suggests an empirical research method. The technology demand survey is the beginning of the selection of innovative technology. And it is the basis of collecting information required for the technology required in the market and helping to apply it to the field. The demand survey for police science and technology can reduce the uncertainty of crime prevention and help the smooth implementation of security policies. However, in Korea, adoption of security science and technology equipment was centered on social issues or researchers' opinions rather than the demands of field users. Until, there was no research has been conducted on the demands of field police officers for selection of security science and technology equipment in Korea. Also, there was no preferential study for the demand for security science and technology equipment. Therefore, this study proposes a methodology that can systematically identify the needs for the technology and equipment of field experts suitable for the public security situation for the selection of security science and technology equipment. Specifically, we propose a sample design for a technology classification system and a survey tool for technology awareness and satisfaction. It is expected that this tool will provide a classification system for security science and technology equipment selected for the Korean police and will help determine the priority of equipment suitable for the field.

Monitoring Environment Design for Web Connection Information (웹 클라이언트 연결 정보 모니터링 설계 및 구현)

  • Jo, A-Ra;Jeong, Chi-Yoon;Chang, Beom-Hwan;Na, Jung-Chan
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.1466-1469
    • /
    • 2009
  • 최근 웹 서비스 환경에서 공격자가 자신의 근원지를 은닉하기 위하여 여러 단계의 경유지를 거쳐 공격을 시도하는 사례가 증가하고 있으며, 이에 대한 법률적 증거 확보 및 능동적인 대처를 위하여 웹 어플리케이션에서의 역추적 기술이 필요하다. 현재 자바 애플릿이나 ActiveX, 플러그인, 웹 로그 등을 이용한 응용 계층의 추적 기술이 개발되고 있지만, 웹 클라이언트에 의하여 차단될 가능성이 높고, 플러그인 종류 및 호환되지 않는 운영 환경 등 제약조건으로 인하여 사용에 제한이 있다. 본 논문에서는 액션 스크립트를 이용한 웹 클라이언트 모니터링 시스템을 제안한다. 제안된 시스템은 웹 클라이언트가 실행을 인식하지 못하고 수행되어 웹 클라이언트에 의한 차단을 막을 수 있고, 다양한 운영 환경에서 사용이 가능하다.