• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

Design of Context-Aware-Based Drone Control Mechanism by Using Two-Factor (이중요소를 이용한 상황인지 기반 드론 제어 메커니즘 설계)

  • Oh, Yoon-Seok;Kim, Aeyoung;Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.57-66
    • /
    • 2019
  • Drones, which are used in various fields, are vulnerable to various security threats such as physical deodorization attacks and information leakage attacks because they operate in an unmanned environment and use wireless communication with weak security. In particular, research is needed to prevent damages such as leakage of stored information and unauthorized use due to illegal drone deodorization. In this paper, we propose a context - aware drone control mechanism that protects stored internal information and prevents unauthorized use when the drones are illegally deactivated. We also demonstrated the feasibility of the proposed mechanism as a prototype implementation and experiment.

Design and Implementation of a Peer-to-Peer Data Sharing Scheme for Closed User Group with Security and Flexibility (보안성과 유연성을 갖춘 Peer-to-Peer 데이터 공유 기법의 설계 및 구현)

  • Lee Goo-Yeon;Lee Yong;Kim Hwa-Jong;Jeong Choong-Kyo;Lee Dong-Eun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.61-70
    • /
    • 2005
  • We propose and implement a flexible secure peer-to-peer(P2P) file sharing scheme which can be used for data sharing among closed user group (CUG) members. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient storage management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention. We also implement the proposed system and find that the system is very useful among P2P service of closed user groups.

A lightweight true random number generator using beta radiation for IoT applications

  • Park, Kyunghwan;Park, Seongmo;Choi, Byoung Gun;Kang, Taewook;Kim, Jongbum;Kim, Young-Hee;Jin, Hong-Zhou
    • ETRI Journal
    • /
    • v.42 no.6
    • /
    • pp.951-964
    • /
    • 2020
  • This paper presents a lightweight true random number generator (TRNG) using beta radiation that is useful for Internet of Things (IoT) security. In general, a random number generator (RNG) is required for all secure communication devices because random numbers are needed to generate encryption keys. Most RNGs are computer algorithms and use physical noise as their seed. However, it is difficult to obtain physical noise in small IoT devices. Since IoT security functions are required in almost all countries, IoT devices must be equipped with security algorithms that can pass the cryptographic module validation programs of each country. In this regard, it is very cumbersome to embed security algorithms, random number generation algorithms, and even physical noise sources in small IoT devices. Therefore, this paper introduces a lightweight TRNG comprising a thin-film beta-radiation source and integrated circuits (ICs). Although the ICs are currently being designed, the IC design was functionally verified at the board level. Our random numbers are output from a verification board and tested according to National Institute of Standards and Technology standards.

A Study on the Factors Affecting the User Satisfaction and Continuous Use Intention of the Improved Army Tactical Command Information System (ATCIS 성능개량체계 만족 및 지속사용 의도에 미치는 영향요인)

  • Lee, Tae Bok;Baek, Seung Nyoung
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.1-24
    • /
    • 2022
  • Purpose The purpose of this study is to investigate the factors that affect the user satisfaction and continuous use intention of the improved ATCIS in the Korean Army. Design/methodology/approach Based on the various theories in relation to IT continuance, user satisfaction was identified as the main factor with regard to the continuous use intention of the improved ATCIS. In addition, computer self-efficacy, education-training, and system quality were hypothesized as antecedent variables to user satisfaction, and information security stress was set as a moderating variable for these relationships. Findings Survey results show that computer self-efficacy, education and training, and system quality had a positive effect on user satisfaction, and information security stress was found to moderate these relationships. The effects of computer self-efficacy and education-training on user satisfaction were higher in the group with low information security stress. However, the relationship between system quality and user satisfaction was higher in the group with high information security stress. User satisfaction is found to have a positive effect on the continuous use intention even with habit considered as a control variable.

Modeling cryptographic algorithms validation and developing block ciphers with electronic code book for a control system at nuclear power plants

  • JunYoung Son;Taewoo Tak;Hahm Inhye
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.25-36
    • /
    • 2023
  • Nuclear power plants have recognized the importance of nuclear cybersecurity. Based on regulatory guidelines and security-related standards issued by regulatory agencies around the world including IAEA, NRC, and KINAC, nuclear operating organizations and related systems manufacturing organizations, design companies, and regulatory agencies are considering methods to prepare for nuclear cybersecurity. Cryptographic algorithms have to be developed and applied in order to meet nuclear cybersecurity requirements. This paper presents methodologies for validating cryptographic algorithms that should be continuously applied at the critical control system of I&C in NPPs. Through the proposed schemes, validation programs are developed in the PLC, which is a critical system of a NPP's I&C, and the validation program is verified through simulation results. Since the development of a cryptographic algorithm validation program for critical digital systems of NPPs has not been carried out, the methodologies proposed in this paper could provide guidelines for Cryptographic Module Validation Modeling for Control Systems in NPPs. In particular, among several CMVP, specific testing techniques for ECB mode-based block ciphers are introduced with program codes and validation models.

Comparative Analysis of Intrusion Detection Attack Based on Machine Learning Classifiers

  • Surafel Mehari;Anuja Kumar Acharya
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.10
    • /
    • pp.115-124
    • /
    • 2024
  • In current day information transmitted from one place to another by using network communication technology. Due to such transmission of information, networking system required a high security environment. The main strategy to secure this environment is to correctly identify the packet and detect if the packet contain a malicious and any illegal activity happened in network environments. To accomplish this we use intrusion detection system (IDS). Intrusion detection is a security technology that design detects and automatically alert or notify to a responsible person. However, creating an efficient Intrusion Detection System face a number of challenges. These challenges are false detection and the data contain high number of features. Currently many researchers use machine learning techniques to overcome the limitation of intrusion detection and increase the efficiency of intrusion detection for correctly identify the packet either the packet is normal or malicious. Many machine-learning techniques use in intrusion detection. However, the question is which machine learning classifiers has been potentially to address intrusion detection issue in network security environment. Choosing the appropriate machine learning techniques required to improve the accuracy of intrusion detection system. In this work, three machine learning classifier are analyzed. Support vector Machine, Naïve Bayes Classifier and K-Nearest Neighbor classifiers. These algorithms tested using NSL KDD dataset by using the combination of Chi square and Extra Tree feature selection method and Python used to implement, analyze and evaluate the classifiers. Experimental result show that K-Nearest Neighbor classifiers outperform the method in categorizing the packet either is normal or malicious.

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

User Keystroke Logging Module Design and Implementation on the Linux Kernel (리눅스 커널 기반 사용자 키스트로크 로깅 모듈 설계 및 구현)

  • 정계옥;김정순;노봉남
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.330-333
    • /
    • 2002
  • 일반적으로 시스템들은 관리자를 위한 많은 로깅 기능을 제공한다. 이러한 로깅 기능에는 사용자 행위를 파악하는 부분도 제공하고 있으나 정작 사용자들이 입력하는 명령어를 직접 로깅하는 기능은 없거나 매우 미약하다. 시스템 사용자들이 입력한 명령어는 시스템 자체에서 사용자가 어떤 행위를 하였는가를 가장 확실히 보여주는 중요한 단서이다. 본 논문에서는 리눅스 커널을 기반으로 하여 사용자 키스트로크를 로그로 남길 수 있는 방법을 제안하고 구현한다.

  • PDF

A Design Methodology of Role Hierarchies providing Restricted Permission Inheritance (권한상속 제한 기능을 제공하는 역할 계층 설계 방법론)

  • 김명재;이용훈;이형효;노봉남
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.326-329
    • /
    • 2002
  • RBAC은 역할 계층구조에서 권한의 계승과 의무분리와 같은 제약조건을 다룸으로써 접근 권한의 관리를 수월하게 하는 장점이 있다. 하지만 기존의 RBAC 연구에서는 현실세계의 기업 환경에서 일어나는 역할계층을 제대로 반영한다고 볼 수 없다. 역할 계층에서 접근 권한이 항상 아래에서 위로 상속된다는 것은 최소권한의 원칙 등의 문제를 일으킬 수 있다. 본 논문에서는 기업 환경에서 조직체계를 깨뜨리지 않고 역할을 여러 개 부역할(sub role)로 세분화하여 전체 상속, 부분 상속, 상속되지 않는 역할로 나누어 계층구조를 유지할 수 있으면서 역할 상속을 제한하는 모델을 제시하고 있다.

  • PDF

Design of ETRI Privilege Management Infrastructure (E-PMI의 설계)

  • 김희선;조상래;조영섭;진승헌
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.295-297
    • /
    • 2002
  • 응용 서비스 측면에서는 서비스를 이용하고자 하는 사용자들의 신원확인 뿐만 아니라 이러한 그들이 어떠한 서비스를 이용할 수 있는 권한을 갖고 있는가를 반드시 확인해야 한다. 응용에 따라서는 신원 확인보다도 권한 확인을 더 중요하게 처리하고자 하는 경우도 있다. 이런 의도에서 권한 인가와 권한 정보의 관리는 매우 중요한 보안 서비스의 하나로 인식되고 있다. 본 논문에서는 이러한 권한관리 메카니즘의 하나로서 제시된 권한관리기반구조 개념에 대하여 살펴보고, 이를 바탕으로 설계한 E-PMI에 대해 설명하고자 한다. E-PMI에 대해서는 구조 및 시나리오, 시스템 특징에 관하여 기술한다.

  • PDF