• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.036 seconds

Design and Implementation of Network Model for Security Simulation (보안 시뮬레이션을 위한 네트워크 모델 설계 및 구현)

  • 신동훈;김형종
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.504-507
    • /
    • 2002
  • 취약성 진단을 위한 시뮬레이션 시스템의 주요 구성 요소인 네트워크 모델의 설계 및 구현을 소개한다. 특히, 네트워크에 존재하는 취약점을 진단, 분석하기 위한 모델링 방법론을 제시하고, 구체적인 모델의 설계와 구현을 수행하였다. 네트워크 모델은 네트워크 구성요소인 허브, 라우터 및 네트워크 호스트들을 추상화한 모델들의 결합(Coupling) 형태로 구성되며, 각 구성 요소들은 각자의 취약성을 가지고 있다. 본 연구에서는 이러한 각 구성요소의 취약성의 집합으로 네트워크를 표현하고, 취약성을 기반으로 한 네트워크 모델의 구조적인 특성과 동적인 특성을 제시한다. 취약성 진단을 위해 제시된 모델링 방법을 통해 구현된 네트워크 모델은 시뮬레이션 실행을 통해 분석되어 그 유효성을 검증하였다.

  • PDF

Design and Implementation of Image Encryption Method for Multi-Parameter Chaotic System (다중변수 혼돈계를 이용한 이미지 암호화 방법의 설계 및 구현)

  • Yim, Geo-Su
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.57-64
    • /
    • 2008
  • The Security of digital images has become increasingly more important in highly computerized and interconnected world. Therefore, The chaos-based encryption algorithms have suggested some new and efficient ways to develop secure image encryption method. This paper is described for the point at issue in all chaos-based encryption method for distribution of a chaotic signals. It has a method for generation of uniformly distributed chaotic signals that we designed secure algorithm of multi-parameter chaotic systems. So we are present validity of the theoretical models for results of image encryption and decryption for proposed method.

  • PDF

Design and implementation of security and control system for home electronic appliances

  • Kim, Eung-Soo;Kim, Won-Jae;Jo, Jun-Mo
    • Journal of Sensor Science and Technology
    • /
    • v.15 no.2
    • /
    • pp.134-138
    • /
    • 2006
  • We have been designed and developed a security system including home automation with control of electronic appliances. The system can detect intruders using infrared sensors and monitor rooms or offices in real time by web camera. The password was needed to enter a house or office. The operation of home electronic appliances also can be easy and remotely controlled by Internet. The system was designed by VHDL. The size of the fabricated system is small and it showed good performance.

Security Protocol Design and Analysis for passive RFID Tag (수동형 RFID 태그를 위한 보안 프로토콜 설계 및 분석)

  • Kim, In-Seop;Lee, Byung-Gil;Kim, Ho-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.52-54
    • /
    • 2005
  • 모든 사물에 고유 식별 정보(Unique Product Identifier)가 부착되어 사물의 개별 관리 및 컴퓨팅 환경을 구성하는 RFID(전자식별) 기술이 다양한 응용 및 구현 기술을 위해 활발하게 연구되고 있다. 하지만 수동형 태그 기반 RFID 시스템은 태그 자체의 자원 제약성 때문에 인가되지 않은 사용자에 의한 악의적인 태그 점보 노출이 용이하고, 그 결과 개인의 프라이버시 및 정보의 기밀성이 위협받게 된다. 비록 이를 예방하기 위해 다양한 보호 기법이 제안 되고 있지만 수동형 태그에 적용하기 힘들거나(예: Hash 기반 메카니즘) 보안에 취약하다. 따라서 본 논문에서는 태그 코드 암호화와 리더 인증 관리를 통해서 수동형 태그에 적합하고 프라이버시 보호 및 기밀성을 제공할 수 있는 메카니즘을 제안하고자 한다.

  • PDF

A Driving Mechanism of Outdoor Security Robots for High Speed Applications (고속 주행용 실외 경비로봇을 위한 구동 메커니즘)

  • Jeong, Hae-Kwan;Koh, Doo-Yeol;Woo, Chun-Kyu;Kwak, Yoon-Keun
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.2
    • /
    • pp.163-168
    • /
    • 2009
  • In this paper, a new driving mechanism of security robotswhich should overcome obstacles with stability even though movingin high speed is introduced. The driving mechanism has spring-based suspension and two wheels positively necessary to overcome obstacles. From the driving mechanism, it is mainly discussed how we can decrease overshoot and impulse occurred when the robot is in the process of overcoming obstacles. Finally, design parameters of the driving mechanism which guarantees stable motion while overcoming obstacles is deduced based on simulation results. Experiments are also followed to demonstrate how well the manufactured system works in its early stage of the practical use.

  • PDF

Device Alive Check Algorithm using TCP Session under CCTV Network based on NAT (TCP 세션을 활용한 사설망 구간 CCTV 단말의 생사판별 알고리즘)

  • Shin, HaeJoon;Chung, YounKy
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.5
    • /
    • pp.631-640
    • /
    • 2015
  • Recently CCTV system is installed widely purpose to enhanced physical security, gathering criminal evidence and management of facilities. In spite of supporting strong management function, CCTV system has weak security function. Therefore high security management function is required. Generally it's not easy to control the devices under NAT using a NMS(Network Management System). So we design and implement alive check algorithm of CCTV devices under NAT using DVRNS address resolution and TCP session check. We evaluated and analyzed of developed system on real environment which includes about 100 DVRs under NAT. As a result of test, it showed that device alive check and DVRNS address resolution were well performed without any error.

Provably Secure Length-Saving Public-Key Encryption Scheme under the Computational Diffie-Hellman Assumption

  • Baek, Joon-Sang;Lee, Byoung-Cheon;Kim, Kwang-Jo
    • ETRI Journal
    • /
    • v.22 no.4
    • /
    • pp.25-31
    • /
    • 2000
  • Design of secure and efficient public-key encryption schemes under weaker computational assumptions has been regarded as an important and challenging task. As far as ElGamal-type encryption schemes are concerned, some variants of the original ElGamal encryption scheme based on weaker computational assumption have been proposed: Although security of the ElGamal variant of Fujisaki-Okamoto public -key encryption scheme and Cramer and Shoup's encryption scheme is based on the Decisional Diffie-Hellman Assumption (DDH-A), security of the recent Pointcheval's ElGamal encryption variant is based on the Computational Diffie-Hellman Assumption (CDH-A), which is known to be weaker than DDH-A. In this paper, we propose new ElGamal encryption variants whose security is based on CDH-A and the Elliptic Curve Computational Diffie-Hellman Assumption (EC-CDH-A). Also, we show that the proposed variants are secure against the adaptive chosen-ciphertext attack in the random oracle model. An important feature of the proposed variants is length-efficiency which provides shorter ciphertexts than those of other schemes.

  • PDF

Implementation of IPv6 Neighbor Discovery Protocol supporting CGA

  • Kim Joong Min;Park In Kap;Yu Jae Wook
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.571-575
    • /
    • 2004
  • Having age of ubiquitous ahead, existing IPv4's address space insufficiency phenomenon appears because of increasing network usage as well as multimedia data transmission becomes much, necessity of new IP address system that guarantee QoS are needed. IPv6 was made to solve these problem. IPv6 solves address space insufficiency phenomenon offering by 128bit address space, and also offers hierarchical address layer that support improved QoS. IPv6 defines relation between surrounding node using Neighbor Discovery protocol. Used Neighbor Discovery messages, grasp surrounding node, include important informations about network. These network information outcrops can give rise in network attack and also service that use network will paralysis. Various kinds of security limitation was found in Present Neighbor Discovery protocol therefore security function to supplement tris problem was required. In this thesis, Secure Neighbor Discovery protocol that add with security function was design and embody by CGA module and SEND module.

  • PDF

Omnidirectional Camera System Design for a Security Robot (경비용 로봇을 위한 전방향 카메라 장치 설계)

  • Kim, Kilsu;Do, Yongtae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.2
    • /
    • pp.74-81
    • /
    • 2008
  • This paper describes a low-cost omnidirectional camera system designed for the intruder detection capability of a security robot. Moving targets on sequential images are detected first by an adaptive background subtraction technique, and the targets are identified as intruders if they fail to enter a password within a preset time. A warning message is then sent to the owner's mobile phone. The owner can check scene pictures posted by the system on the web. The system developed worked well in experiments including a situation when the indoor lighting was suddenly changed.

  • PDF

A Design of Secure Mechanism for IoT Devices (IoT 디바이스 보안 메커니즘 설계)

  • Park, Jae-Kyung;Ma, Myung-Chul;Choi, Sang-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.281-282
    • /
    • 2016
  • 본 논문에서는 IoT 디바이스를 안전하게 관리하고 인가되지 않은 접근과 같은 위협에 대응할 수 있는 보안 메커니즘을 제안한다. 이 메커니즘은 IoT 디바이스의 시스템 특징 및 네트워크 특징을 조합하여 개별적인 시그니처를 생성하고 이를 네트워크에서 지속적이고 주기적으로 검사를 수행함으로써 허가되지 않은 디바이스의 접근을 근본적으로 차단하는 방안이다. 본 논문에서는 제안한 메커니즘을 확인하기 위해 실험망을 구성하여 정상 IoT 디바이스와 비정상 IoT 디바이스를 정책적으로 구별하여 차단하여 보안 메커니즘의 우수함을 보인다.

  • PDF