• Title/Summary/Keyword: Wireless Public Key Infrastructure (WPKI)

Search Result 12, Processing Time 0.371 seconds

A Design of Proactive Authentication Technique for Stable Roaming In Wireless LAN Environment (무선 랜 환경에서 안정적인 로밍을 위한 선행 인증기법 설계)

  • Hong, Soon-Ja;Koo, Yong-Wan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.33-41
    • /
    • 2006
  • Wireless LAN is intrinsically weak in security of transmissions. WPKI (Wireless Public Key Infrastructure) is a well known Method to deal with the security issues in wireless LAN. The authentication required by the method becomes a source of unrellability of the hand-off performance. This paper suggests a solution to overcome the instability while using the WPKI technique, Prior to getting into the next region, a station is provided with the keys of the surrounding regions so that the possible delay problem can be avoided during the actual hand-off time. Thereby the hand-off instability can be solved in the WPKI framework.

  • PDF

Centralized Smart Government Architecture based on Trust Manager

  • Ahamad, Shaik Shakeel
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.565-569
    • /
    • 2021
  • The rapid growth and development of ICT (Information and Communication Technology) and internet services has boosted the adoption of Mobile Government services all around the globe. There is a huge increase in the adoption of government services during COVID-19 pandemic. Existing Mobile Government (MG) solutions are not trustworthy and secure. This paper provides secure and trustworthy solution for mobile government, proposes a centralized smart governance architecture which is based on trust manager. Our proposed work has Wireless Bridge Certifying Authority (WBCA) and Wireless Public Key Infrastructure (WPKI) thereby ensuring security and privacy. Our proposed work ensures trust with WBCA as WBCA acts as a Trust Manager (TM). Proposed protocol has less computational cost and energy cost

Authentication and Key Exchange Protocol for Wireless Internet using Passwords (무선 인터넷을 위한 패스워드 기반의 인증 및 키 교환 프로토골)

  • Nyang, Dae-Hun;Lee, Sok-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.324-332
    • /
    • 2002
  • We design authentication protocols for wireless internet not using certificates but using passwords. The target protocols include WTLS and the certificate request protocol in the wireless PKI(Public Key Infrastructure). When a password based protocol is designed and implemented for authentication and key exchange, care mutt be taken of the short length and of the not-so-randomness of passwords. To frustrate the offline guessing attack that makes use of those weaknesses, our two protocols are dependent on the password based authentication protocol that has security proof. In this paper, how to design systematically the security protocols for authentication and key exchange using passwords is presented, and the methodology hopes to be useful in some other area that needs authentication using passwords.

Effective Certificate Verification of Wireless PKI Based in WAP (WAP에서 무선 PKI기반의 효율적인 인증서 검증)

  • Shin Jung-Won;Choi Seong-Kwon;Ji Hong-Il;Lee Byong-Rok;Cho Yong-Hwan
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.175-180
    • /
    • 2005
  • To data service is offered successfully including electronic commercial transaction in radio Internet, security problem should be solved. Security protocole for radio internet does certification and key exchange by leitmotif and designed because suppose WPKI(WAP Public Key Infrastructure) mainly and use certificate. Wish to discuss efficient certificate verification of PKI that consider radio surrounding hereupon.

  • PDF

Design and Implementation of an End-To-End Security System On WAP (WAP에서의 종단간 보안 시스템 설계 및 구현)

  • 조영수;김명균
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.232-236
    • /
    • 2001
  • 본 논문에서는 WAP 포럼에서 제시하고 있는 무선 인터넷 솔루션인 WAP에서의 보안 메커니즘인 WTLS(Wireless Transport Layer Security), WIM (WAP Identity Module), WMLScript Crypto Library, WPKI(WAP Public Key Infrastructure)에 대해 살펴보고, WAP 게이트웨이를 사용하는 네트워크의 구조적 형태에서 발생되는 종단간 보안 서비스의 문제점에 대해 논의한 후 WAP 환경에서 종단간 보안 서비스를 제공할 수 있는 보안 시스템을 설계 및 구현하고자 한다.

  • PDF

Wireless Certificate Management Protocol for Mobile Phone Security (휴대폰에서의 무선 인증서 관리 프로토콜)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.90-98
    • /
    • 2008
  • PKI (Public Key Infrastructure) which is used for the security of E-commerce (Electronic-commerce) in wired internet is not suitable for the mobile phone because of the fundamental limitation of performance such as less memory and less powerful CPU. Therefore, we need to develop a wireless PKI (WPKI) that provides the similar security level as the wired PKI supporting mobile phone. In this paper, we propose a lightweight and secure Wireless Certificate Management Protocol (WCMP) that is executable to the mobile phone that has a constrained communication environment and limitation of performance, and show the implementation results of the scheme based on the mobile phone. We minimize data sizes processed in mobile phone, and optimize protocols for the certificate management. This results in the reduced module sizes to be able to install in mobile phone and shows as the same level as the wired CMP.

Threshold Cryptosystem without a Trusted Party using Elliptic Curve Algorithm for Secure Wireless Internet (안전한 무선 인터넷을 위한 타원 곡선 알고리즘을 사용한 신뢰된 파티가 없는 쓰레시홀드 암호시스템)

  • Sung, Soon-Hwa
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.1-6
    • /
    • 2007
  • 무선 인터넷 통신은 유선 인터넷 통신보다 더욱 정보 노출이 쉬운 상태여서 강도 높은 보안 솔루션이 요구된다. 본 논문에서는 무선 인터넷의 암호 시스템을 위해, 키 길이가 짧아 처리 속도가 빠른 타원 곡선 알고리즘을 사용한 신뢰된 파티가 없는 쓰레시홀드 암호시스템을 제안한다. 따라서 제안한 시스템은 타원 곡선 알고리즘 사용으로 휴대 단말기 용량 한계에 부딪혔던 WPKI(Wireless Public Key Infrastructure) 서비스를 개선할 수 있으며, 신뢰된 파티를 보장할 수 없는 무선 인터넷 통신에서 안전한 그룹 통신을 할 수 있게 된다. 또한 제안한 시스템은 다양한 타원 곡선을 활용할 수 있는 타원 곡선 암호시스템 장점으로 다양한 암호시스템 설계가 가능하다는 것이 증명되었다.

  • PDF

A System Implementation for Issuing and Verifying the Electronic Receipt for M-Commerce (무선 전자상거래를 위 한 전자영수증 발급 및 검증 기법 구현)

  • Park, Keun-Hong;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.559-566
    • /
    • 2003
  • As cell phone and PDA have been in common use recently, there is a growing tendency to utilize the mobile terminals for M-Commerce. The information security and the receipt of e-trade are very important to support reliable digital transactions in wireless environment as in wired environment. Even though some work such as WML digital signature and WPKI has been studied for M-Commerce, there are several problems on the aspects of the functional limitation of the mobile terminals and the unsecure data transformation of WAP gateway. In this study we have designed and implemented a prototype system of issuing and verifying the electronic receipt that guarantees authentication, data integrity and non-repudiation for secure mobile e-commerce. Moreover, we have enhanced the system performance by letting the trusted independent server verify and manage the electronic receipt.

A Study on Wireless PKI Technology Standard (무선 PKI 기술 표준에 관한 연구)

  • Sung, Yeon-Guk;Kim, Hyun-Chul;Jung, Jin-Wook;Kim, Soon-Chul;Ryu, Won
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.29-38
    • /
    • 2002
  • Everyday demand of wireless internet is increasing. Security problem is certainly resolved for wireless internet activation. Especially problem is only wiretap in mobile communication with voice, but problems, user authentication, data integrity guarantee etc., are resolved in data-services that have commercial transaction over simple data information service such bill, banking. Necessity of wireless PKI that can offer security service likely in wired environment is requested for offering security service in wireless environment. For offering security services, confidentiality, integrity, non-repudiation etc, that of offered in wired environment in wireless environment, first it must construct wireless PKI infrastructure and do service activity. This paper analyze various wireless internet technology for offering safe wireless internet service and wireless PH standards. Performance Result of this paper expect activity of safe wireless PH service and activity of electronic commercial transaction used wireless internet such banking service, bill transaction, online shopping.

  • PDF

무선 PKI 환경에서 사용 가능한 사용자 보안 모듈의 개발 동향과 향후 전망

  • Kwak, Jin;Lee, Seung-Woo;Oh, Soo-Hyun;Won, Dong-Ho
    • Review of KIISC
    • /
    • v.12 no.5
    • /
    • pp.36-49
    • /
    • 2002
  • 최근 이동통신 기술의 발전으로 이동통신 서비스의 발전과 함께 휴대폰과 노트북, PDA(Personal Digital Assistance)를 이용하여 무선 인터넷 이용자가 증가하고 있다. 또한 이를 이용한 뱅킹 서비스, 주식 거래, 온라인 쇼핑 등의 전자상거래가 급속하게 발전하고 있다. 그러므로 무선 인터넷 환경에서 안전한 서비스를 제공하기 위해 유선 인터넷 환경에서와 같은 보안 서비스를 제공할 수 있는 무선 PKI(WPKI:Wireless Public Key Infrastructure)의 필요성이 대두되고 있다. 그러나 무선 인터넷 환경이 갖는 특수성과 사용하는 단말기의 제약 사항들로 인해 유선 인터넷 환경과는 달리 여러 문제점들이 있다. 이러한 무선 인터넷 환경에서의 문제점들을 해결하기 위해 사용자가 쉽게 사용할 수 있는 보안모듈의 필요성이 대두되었다. 현재 대표적인 보안 모듈로는 스마트 카드 방식과 USB 기반 방식이 있으며, 본 고에서는 각 방식들에 관한 관련표준과 최근 제품 동향에 대해 언급하고, 사용자 보안 모듈의 향후 전망에 대하여 살펴보도록 한다.