• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

Design and Embodiment in Home Network at Gateway is Stabilization MSAC (Home Network 게이트웨이에서 효율적인 MSAC 설계 및 구현)

  • Yoon, Woon-Kwan;Choi, Kyong-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.105-110
    • /
    • 2006
  • Home Gateway which composes Home network in Ubiquitous Computing environment is an equipment to provide the connection with the external Internet Physically, and it carry out the role which communication, control and monitor is important. But Home gateway has potential threats because it connected on external Internet as spillage user's information from outside wrongdoers. Consequently, Home gateway has to have security module and structure for the communication which is sate. In this research paper, We designed Home gateway security structure for the communication which is protected when computer user use the computer from the outside to home to send information or important data.

  • PDF

Design of Sensor Network Security Model using Contract Net Protocol and DEVS Modeling (계약망 프로토콜과 DEVS 모델링을 통한 센서네트워크 보안 모델의 설계)

  • Hur, Suh Mahn;Seo, Hee Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.41-49
    • /
    • 2008
  • Sensor networks are often deployed in unattended environments, thus leaving these networks vulnerable to false data injection attacks in which an adversary injects forged reports into the network through compromised nodes. Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powered network. In order to reduce damage from these attacks, several security solutions have been proposed. Researchers have also proposed some techniques to increase the energy-efficiency of such security solutions. In this paper, we propose a CH(Cluster Header) selection algorithm to choose low power delivery method in sensor networks. The CNP(Contract Net Protocol), which is an approach to solve distribution problems, is applied to choose CHs for event sensing. As a result of employing CNP, the proposed method can prevent dropping of sensing reports with an insufficient number of message authentication codes during the forwarding process, and is efficient in terms of energy saving.

TinyIBAK: Design and Prototype Implementation of An Identity-based Authenticated Key Agreement Scheme for Large Scale Sensor Networks

  • Yang, Lijun;Ding, Chao;Wu, Meng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2769-2792
    • /
    • 2013
  • In this paper, we propose an authenticated key agreement scheme, TinyIBAK, based on the identity-based cryptography and bilinear paring, for large scale sensor networks. We prove the security of our proposal in the random oracle model. According to the formal security validation using AVISPA, the proposed scheme is strongly secure against the passive and active attacks, such as replay, man-in-the middle and node compromise attacks, etc. We implemented our proposal for TinyOS-2.1, analyzed the memory occupation, and evaluated the time and energy performance on the MICAz motes using the Avrora toolkits. Moreover, we deployed our proposal within the TOSSIM simulation framework, and investigated the effect of node density on the performance of our scheme. Experimental results indicate that our proposal consumes an acceptable amount of resources, and is feasible for infrequent key distribution and rekeying in large scale sensor networks. Compared with other ID-based key agreement approaches, TinyIBAK is much more efficient or comparable in performance but provides rekeying. Compared with the traditional key pre-distribution schemes, TinyIBAK achieves significant improvements in terms of security strength, key connectivity, scalability, communication and storage overhead, and enables efficient secure rekeying.

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

  • Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.1-19
    • /
    • 2020
  • In an underlay cognitive simultaneous wireless information and power transfer (SWIPT) network, communication from secondary user (SU) to secondary destination (SD) is accomplished with decode-and-forward (DF) relays. Multiple energy-constrained relays are assumed to harvest energy from SU via power splitting (PS) protocol and complete SU secure information transmission with beamforming. Hence, physical layer security (PLS) is investigated in cognitive SWIPT network. In order to interfere with eavesdropper and improve relay's energy efficiency, a destination-assisted jamming scheme is proposed. Namely, SD transmits artificial noise (AN) to interfere with eavesdropping, while jamming signal can also provide harvested energy to relays. Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. We solve this non-convex optimization problem via a general two-stage procedure. Firstly, we obtain the optimal beamforming vector through semi-definite relaxation (SDR) method with a fixed power splitting ratio. Secondly, the best power splitting ratio can be obtained by one-dimensional search. We provide simulation results to verify the proposed solution. Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks.

A Design and Implementation of Security Image Information Search Service System using Location Information Based RSSI of ZigBee (ZigBee의 RSSI 위치정보기반 보안 영상정보 검색 시스템 설계 및 구현)

  • Kim, Myung-Hwan;Chung, Yeong-Jee
    • Journal of Information Technology Services
    • /
    • v.10 no.4
    • /
    • pp.243-258
    • /
    • 2011
  • With increasing interest in ubiquitous computing technology, an infrastructure for the short-distance wireless communication has been extended socially, bringing spotlight to the security system using the image or location. In case of existing security system, there have been issues such as the occurrences of blind spots, difficulty in recognizing multiple objects and storing of the unspecified objects. In order to solve this issue, zone-based location-estimation search system for the image have been suggested as an alternative based on the real-time location determination technology combined with image. This paper intends to suggest the search service for the image zone-based location-estimation. For this, it proposed the location determination algorism using IEEE 802.15.4/ZigBee's RSSI and for real-time image service, the RTP/RTCP protocol was applied. In order to combine the location and image, at the event of the entry of the specified target, the record of the time for image and the time of occurrence of the event on a global time standard, it has devised a time stamp, applying XML based meta data formation method based on the media's feature data based in connection with the location based data for the events of the object. Using the proposed meta data, the service mode which can search for the image from the point in time when the entry of the specified target was proposed.

Power System Security Control Method for Quench Characteristic of High-Temperature Superconducting Cable (초전도 케이블의 Quench 특성에 대한 계통안전성 제어방식)

  • Lee, Geun-Joon;Hwang, Si-Dol
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.19 no.6
    • /
    • pp.29-35
    • /
    • 2005
  • This paper presents the basic quench protection idea for the HTS(High-Temperature Superconducting) cable. In Korea power system, the transfer capability of transmission line is limited by the voltage stability, HTS cable could be one of the countermeasure to enhance the transfer limit with its higher current capacity and lower impedance[1]. However, the quench characteristic makes not only HTS cable to loss its superconductivity, but also change the impedance of the transmission line and power system operating condition dramatically. This pheonominum threats HTS cable safety as well as power system security, therefore a proper protection scheme and security control counterplan have to be established before HTS cable implementation. In this paper, the quench characteristics of HTS cable for the fault current based on heat balance equation was established and a proper protection method regarding conventional protection system was suggested.

CCC-NSG : A Security Enhancement of the Bluetooth $E_0$Cipher using a Circular-Clock-Controlled Nonlinear Algorithm (CCC-NSG : 순환 클럭 조절된 비선형 알고리즘을 이용한 블루투스 $E_0$암호화시스템의 안전성 개선)

  • Kim, Hyeong-Rag;Lee, Hoon-Jae;Moon, Sang-Jae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7C
    • /
    • pp.640-648
    • /
    • 2009
  • Summation generator with high period and high linear complexity can be easily implemented by a simple hardware or software and it is proper to apply in mobile security system for ubiquitous environments. However the generator has been some weaknesses from Dawson's divided-and-conquer attack, Golic's correlation attack and Meier's fast correlation attack. In this paper, we propose an improved version($2^{128}$security level) of $E_0$algorithm, CVC-NSG(Circular-Clock-Controlled - Nonlinear Summation Generator), which partially replaces LFSRs with nonlinear FSRs and controls the irregular clock to reinforce it's own weaknesses. Finally, we analyze our proposed design in terms of security and performance.

Design of the Entropy Processor using the Memory Stream Allocation for the Image Processing (메모리 스트림 할당 기법을 이용한 영상처리용 엔트로피 프로세서 설계)

  • Lee, Seon-Keun;Jeong, Woo-Yeol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1017-1026
    • /
    • 2012
  • Due to acceleration of the IT industry and the environment for a variety of media in modern society, such as real-time video images 3D-TV is a very important issue. These high-quality live video is being applied to various fields such as CCTV footage has become an important performance parameters. However, these high quality images, even vulnerable because of shortcomings secure channel or by using various security algorithms attempt to get rid of these disadvantages are underway very active. These shortcomings, this study added extra security technologies to reduce the processing speed image processing itself, but by adding security features to transmit real-time processing and security measures for improving the present.

Design and Implementation of Location Detection System of Wireless Access Point (무선 Access Point위치 탐지시스템의 설계 및 구현)

  • Ku, Yong-Ki;Hong, Jin-Keun;Han, Kun-Hui;Kim, Ki-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.1012-1017
    • /
    • 2008
  • Recently, the use of wireless fan is increased by the development of wireless communication and convenience. Moreover, it makes an issue of security threat and vulnerability of wireless tan. Therefore, the IEEE established new standard such as 802.11i in 802.11 to supplement security vulnerability of wireless tan. But the security threat that does not solve, still remains. In this paper, we proposed that the location detection algorithm, that is used Kalman-Filter, Lateration and RSSI, and the mechanism that detects security status of AP and unauthorized AP by using beacon-frame of AP in building. Finally, we confirmed performance of proposed algorithm is good in comparison of established algorithm.

A Design on XCAP based Authorization Management applicable to VoIP based Presence Services (VoIP 프레즌스 서비스에 적용 가능한 XCAP 기반 권한관리기법 설계)

  • Lee, Tai-Jin;Won, Yong-Geun;Im, Cha-Te;Won, You-Jae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.16-20
    • /
    • 2007
  • SIP 기반 프레즌스 서비스는 향후 유비쿼터스 시대의 상황인지형 서비스를 비롯한 다양한 곳에 응용될 수 있는 핵심서비스이다. 또한 프레즌스 서비스는 개인의 프라이버시 문제를 다루기 때문에, 권한관리를 위해 draft로 제시되어 있는 XCAP 기반 기술이 주요 이슈로 대두되고 있다. 그러나, 현재 프레즌스 기반 구조를 활용한 응용서비스 모델이 제시되어 있지 않으며, XCAP 기반 권한관리 기술이 적용된 사례가 나와있지 않다. 본 논문에서는 VoIP에 적용 가능한 프레즌스 서비스 모델을 선정하고, 서비스 개발을 위한 프레즌스 기반구조의 적용방법, XCAP 기반 권한관리 기술의 적용방안을 설계하였다. 본 논문을 통해 중요한 서비스로 인식되면서도 마땅한 서비스가 발굴되지 않은 현실에서, 프레즌스 기반 서비스 개발 및 XCAP 기반 권한관리 기술개발을 위한 참조모델로 활용할 수 있다. 특히, 보안에 민감한 프라이버시 정보를 다루는 프레즌스 서비스 보호를 위해 XCAP 기반기술은 반드시 필요하며, 임의의 응용서비스에 독립적으로 적용할 수 있는 XCAP 기반기술의 특징을 고려하면 더욱 큰 의미를 지닌다.

  • PDF