• Title/Summary/Keyword: Session Authentication

Search Result 233, Processing Time 0.028 seconds

Development of Personalized Heart Disease Health Status Monitoring Web Service (개인별 맞춤형 심장질환 건강상태 모니터링 웹 서비스 개발)

  • Young-bok Cho
    • Journal of Practical Engineering Education
    • /
    • v.16 no.4
    • /
    • pp.491-497
    • /
    • 2024
  • Over the past five years, the proportion of patients with arrhythmia heart disease among teenagers and those in their 20s has been increasing. Heart disease has consistently remained the second leading cause of death in Korea and as the number has increased, electrocardiogram testing for arrhythmia has become important. However, specialized electrocardiogram medical devices are economically burdensome and are difficult to store individually in hospitals due to their large size and difficulty in operation. Testing is conducted through visits. Therefore, it is essential to enable individuals to perform ECG self-examinations using an Arduino-based ECG sensor that is affordable and easy to use in daily life, so that arrhythmia can be identified through individual ECG measurement. In this study, data is measured using an electrocardiogram sensor (AD8232), and changes in bio signals are visually provided through real-time monitoring, allowing users to make intuitive decisions and at the same time understand test results. To safeguard sensitive personal information, we have developed a web service that provides individual heart disease and customized health guides that can protect personal information through web vulnerability security using session and user authentication and SSL.

New Security Approaches for SSL/TLS Attacks Resistance in Practice (SSL/TLS 공격에 대한 신규 대응 방안)

  • Phuc, Tran Song Dat;Lee, Changhoon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.169-185
    • /
    • 2017
  • Juliano Rizzo and Thai Duong, the authors of the BEAST attack [11, 12] on SSL, have proposed a new attack named CRIME [13] which is Compression Ratio Info-leak Made Easy. The CRIME exploits how data compression and encryption interact to discover secret information about the underlying encrypted data. Repeating this method allows an attacker to eventually decrypt the data and recover HTTP session cookies. This security weakness targets in SPDY and SSL/TLS compression. The attack becomes effective because the attacker is enable to choose different input data and observe the length of the encrypted data that comes out. Since Transport Layer Security (TLS) ensures integrity of data transmitted between two parties (server and client) and provides strong authentication for both parties, in the last few years, it has a wide range of attacks on SSL/TLS which have exploited various features in the TLS mechanism. In this paper, we will discuss about the CRIME and other versions of SSL/TLS attacks along with countermeasures, implementations. We also present direction for SSL/TLS attacks resistance in practice.

The Mechanism of Proxy Mobile IPv4 to Minimize the Latency of Handover Using MIH Services (MIH 서비스를 활용한 Proxy Mobile IPv4의 핸드오버 지연 최소화 방안)

  • Kim, Sung-Jin;You, Heung-Ryeol;Rhee, Seuck-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.211-217
    • /
    • 2008
  • Recently, there are many efforts to support seamless mobility in 802.11 WLANs using IP Layer mobility protocols. The IP layer mobility protocols are the most efficient mechanism to guarantee the service session continuity when IP subnet is changed during handover. Even if the IP layer mobility protocols are quite efficient, the feature of the protocols that had been designed to consider only L3 layer makes it difficult to improve the performance of hand over more and more. Nowadays, to overcome this limitation of IP mobility protocols, many researchers have worked on the mobility protocols integration of different layers (e.g., L2 layer). In this paper, we propose the enhanced Proxy MIPv4 to minimize the latency of handover using MIH protocol in 802.11 WLANs. The proposed mechanism minimizes the latency of authentication by exchanging security keys between Access Routers during handover. Moreover, it also minimizes packet losses by Inter-AP Tunneling and data forwarding.

  • PDF