• Title/Summary/Keyword: System ID

Search Result 1,005, Processing Time 0.027 seconds

C4ISR Systems IDS Performance Enhancing Method (C4ISR 체계 IDS의 성능 향상 방안)

  • Choi, Junesung;Kook, Kwangho
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.57-69
    • /
    • 2012
  • C4ISR system is an important tool for military operational command and control. Therefore, it is frequently exposed to the cyber-terror attempt to paralyze the military command and control system. Generally, the information system uses IDS and firewall as major security computing tools. C4ISR system also uses them as major measures for the information protection. But the usefulness of IDS is reduced due to the frequent false-positives and false-negatives if the behavioral patterns are modified or new behavioral patterns appear. This paper presents new IDS structure which can create modified attack patterns and unexpected attack patterns automatically during IDS probing process. The proposed IDS structure is expected to enhance the information protection capability of the C4ISR system by reducing false-positives and false-negatives through the creation and verification of new attack patterns.

Low-cost Authentication Protocol Using Pre-synchronized Search Information in RFID System (검색 정보 사전 동기화를 이용한 저비용 RFID 인증 방식)

  • Ha, Jae-Cheol;Park, Jea-Hoon;Ha, Jung-Hoon;Kim, Hwan-Koo;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.77-87
    • /
    • 2008
  • Recently, many hash-based authentication protocols were presented to guarantee mutual authentication between tag and DB in RFID system. To be suitable for distributed DB environment, one generally uses fixed constant value as a tag ID. However, some existing protocols have security flaws or heavy computational loads in DB in order to search a tag ID. We propose a secure authentication protocol which is suitable for distributed DB environment by using unchangeable tag ID. The storage method of pre-synchronized information in DB at previous session is core idea of our proposal which gives low-cost ID search of DB at next session. In normal synchronization state, our protocol only requires 3 hash operations in tag and DB respectively.

A Study of applying Method of Unipolar-ZCD Spreading Code for LED-ID in Interference Environment (LED-ID용 간섭채널환경하에서의 단극형 ZCD확산코드 적용 기법에 관한 연구)

  • Cha, Jae-Sang;Kim, Jin-Young;Jang, Yeong-Min;Kim, Jong-Tae;Lee, Kyong-Gun;Moon, Kyung-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.275-280
    • /
    • 2010
  • Recently, This paper suggests that LED-ID technique applying positioning method for LED light. also, Authors in this paper has launched this investigation earnestly. However, there are various interferences such as MPI(Multi Path Interference) by reflected waves of the surface and interfere factors by their correlation properties of the ID in LED-ID wireless channel. Therefore, in this paper, we propose a novel OOK(On-Off Keying)-CDMA(Code Division Multiple Access) system using unipolar ZCD(Zero Correlation Duration) spreading code and verify the availability of the proposed system via the evaluation performance simulation.

ID management technology on RFID system (RFID에서 ID 관리 기술)

  • Lee, Chang-Yeol
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.409-412
    • /
    • 2005
  • RFID 시스템은 태그, 리더, 그리고 RFID를 관리하는 S/W 시스템으로 구성되고 있다. RFID태그에 기록하는 정보는 RFID 태그를 분류하는 클라스에 따라 다르지만, 모든 RFID태그는 국제적 표준에 따른 ID 체계를 갖추고, 운영을 하여야 한다. 여기서는 국제적 RFID용 ID표준을 살펴보고, ISO15459에 따른 ID 관리 시스템이 갖추어야 할 구조적 특징에 대하여 연구하기로 한다.

  • PDF

A Federation Policy Development Method for Generating Domestic ID Federation (국내 ID 연합 생성을 위한 연합 정책 개발 방안)

  • Wang, Gicheol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.28-36
    • /
    • 2016
  • ID federation provides users various benefits such as employing multiple services with only single authentication and mitigating management burden of service providers that individually preserve account information of users. To keep up with this international trend, efforts for making the domestic ID federation is ongoing to provide users in the domestic research and education community seamless network connectivity and to support tetherless extension of research environment. In this paper, we analyze the foreign ID federation policies and compare them as a underlying work for making the domestic ID federation. Besides, we suggest some contents that should be included in the domestic ID federation policy. To activate the coming domestic ID federation, we need to first have a well-made federation policy. Then, we need to aggressively promote the domestic ID federation, develop various and fascinating services, and build a convenient support system for technology and service.

Design of improved Janus system based on the threshold cryptographic scheme (임계 암호 기법에 기반한 개선된 야누스 시스템의 설계)

  • 심미선;양종필;이경현
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.150-153
    • /
    • 2003
  • 지속적으로 증가하고 있는 웹사이트는 사용자마다 유일한 신분확인정보(ID, 패스워드)를 요구 한다. 이 때 사용자는 웹사이트마다 별개의 계정을 만드는 것이 공격자의 위협으로부터 안전하지만, 현실적으로 사용자의 기억의 한계, 편의 추구로 인해 한 사용자가 사용하는 계정의 가짓수는 한정되기 마련이다. 따라서, 어느 공격자가 단일 사용자의 특정 웹사이트에 대한 ID와 패스워드를 알게되면, 기공격자는 다른 웹사이트에 동일한 ID와 패스워드를 사용한 로그인 시도 공격이 성공할 확률이 매우 높다고 할 수 있다. 본 논문에서는 이러한 사용자 ID와 패스워드에 대한 문제점을 해결하기 위한 방안으로서 사용자는 로그인하려는 웹사이트에 상관없이 항상 동일한 ID와 패스워드를 사용하지만, 실질적으로는 사용자 머신내에 있는 내부 프록시(proxy)에 의해서 웹사이트마다 독립적이고 유일한 가명ID와 가명 패스워드를 생성하는 방안을 제안한다. 또한 제안 방안에서는 임계 암호 기법을 이용하여 단일 사용자 ID와 패스워드로부터 가명 ID와 가명 패스워드를 생성하는 함수를 안전하게 구성한다.

  • PDF

A Key Distribution Scheme for 1 TO N Group Communication Using Modified ID-Based System (수정된 ID 기본 암호시스템을 이응 1대 N그룹통신에 적합한 키 분배방법)

  • 임웅택;김화수
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.239-248
    • /
    • 1991
  • ID 기본 암호시스템은 1984년 Shamir에 의해 제안되어 기존의 암호시스템이 가지고 있는 공개키 관리에 대한 문제점을 해결하였다. ID기본 암호시스템은 두 사용자간 암호통신에 적합하지만 이를 1 대 N 그룹통신에 적용할 경우 N개의 각 사용자에 대한 대화키(Session Key)를 생성하여 N번의 암호화로 각 사용자와 암호통신을 해야 하는 문제점이 대두되므로, 본 논문은 지금까지 발표된 ID기본 암호시스템을 바탕으로 1 대 N 그룹통신에 적합하도록 수정된 ID 기본 암호시스템을 제안한다. 제안된 ID 기본 암호시스템은 암호통신을 하고자하는 사용자가 임의의 사용자 그룹을 선정하여 각 사용자와 핸드쉐이크 과정을 통하여 상호 인증을 실시하며, 핸드쉐이크 과정에서 전달된 각 사용자의 비밀키가 포함된 자료를 이용 그룹 공통의 대화키를 생성한다. 제안된 ID 기본 암호방식의 특징은 (i)암호통신을 위한 사용자 그룹은 둘 이상 임의로 선정 가능하고, (ii)상대방 인증을 위해 별도의 해쉬 함수를 사용하지 않으며, (iii)그룹은 하나의 공통 대화키를 사용한다는 점이다.

  • PDF

Contactless Power Transfer System using Voltage Phase (전압위상을 이용한 무접점 전원공급 시스템에 관한 연구)

  • Yu, Joo-Hee;Kim, Choon-Sam
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.16 no.3
    • /
    • pp.219-226
    • /
    • 2011
  • As the existing contactless power transfer system(CPTS) is adopting the principle of contactless transformer enables to supply power in contactless way using RFID(radio frequency identification)/ID communication method between primary and secondary sides of contactless transformer and detect the alien load. Such CPTS requires the circuit that generates ID in addition, and the ID identification and control generated from the secondary side is performed at the primary side, which cuases complexity of the circuit. Therefore, this study suggested the CPTS using voltage phase, and In order to verify the validity of this study, 3[W] class CPTS shall be designed, and the simulation and test of CPTS using current and voltage phases shall be carried out.

Application of RF-ID in Subway System (지하철 시스템에 대한 RF-ID의 적용)

  • Lee, Yong-Jea;Kim, Do-Hun;Kim, Yong-Sang;Yim, Sang-Wook;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 2003.04a
    • /
    • pp.402-404
    • /
    • 2003
  • Radio frequency identification (RF-ID) is an automatic data capture (ADC) technology that comprises small data-carrying device(is called Tag) and fixed or mobile device(is called reader). Tags are attached or deattached device. Readers may be installed at locations where data capture is required, and may also be in the form of portable readers. In this paper, we are proposing an application for the subway station using the RF-ID system and a system for the gateless fare collection passing through the booth in only carrying the card. In this system that RF-ID system and Bluetooth are applied. We designed two wireless communication channels. One is the 125kHz communication channel by FSK and PSK for power supplying on the card and identification and the other is 2.4GHz channel for the collection.

  • PDF

Pattern Analysis of an Evaluation Model on Disaster Management System Using Fuzzy ID3 (퍼지 ID3를 이용한 재난관리시스템 평가모델의 패턴분석)

  • Kim, Hong-Jin;Hwang, Seung-Gook;Park, Young-Man;Park, Kwang-Bak
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.826-831
    • /
    • 2008
  • In this paper, an evaluation model of disaster management system which is developed by using GRI G3 version and BCP process for the sustainability management of small and middle enterprises was proposed. The proposed evaluation model can be used to evaluate the disaster management system directly, and to establish the disaster management system as an index. Also, the rules obtained by pattern analysis using fuzzy ID3 for the proposed evaluation model are expected to use the guideline effectively for self evaluation in the small and middle enterprises.