• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.037 seconds

Blockchain and IoT Integrated Banana Plant System

  • Geethanjali B;Muralidhara B.L.
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.155-157
    • /
    • 2024
  • Internet of Things (IoT) integrated with the Blockchain is the state of the art for keen cultivation and agriculture. Recently the interest in agribusiness information is enlarging owing to the fact of commercializing the smart farming technology. Agribusiness information are known to be untidy, and experts are worried about the legitimacy of information. The blockchain can be a potential answer for the expert's concern on the uncertainty of the agriculture data. This paper proposes an Agri-Banana plant system using Blockchain integrated with IoT. The system is designed by employing IoT sensors incorporated with Hyperledger fabric network, aims to provide farmers with secure storage for preserving the large amounts of IoT and agriculture data that cannot be tampered with. A banana smart contract is implemented between farmer peer and buyer peer of two different organizations under the Hyperledger fabric network setup aids in secure transaction of transferring banana from farmer to buyer.

A Secure Mobile Payment System for Near Field Communication System (NFC를 이용한 안전한 모바일 지급결제 시스템)

  • Lee, Yo-Ram;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.7
    • /
    • pp.3487-3494
    • /
    • 2013
  • Diverse application service such as mobile payment, access control or smart poster have been provided by using smart devices with built-in Near Field Communication technology. Especially, a mobile payment system can provide convenience to its users, but it also can poses including data disclosure while transmitting. There are vulnerabilities while generating session keys used to encrypt data in transaction processes as proposed in KS X 6928, the standard for mobile payment system. Therefore, in this thesis, I analyzed weaknesses of session keys used to encrypt transaction data and proposed a more secure mobile payment system based on NFC to enhance security. The proposed system will provide security functionalities such as key freshness, mutual authentication and key confirmation.

Design and Implementation of ARIA Cryptic Algorithm (ARIA 암호 알고리듬의 하드웨어 설계 및 구현)

  • Park Jinsub;Yun Yeonsang;Kim Young-Dae;Yang Sangwoon;Chang Taejoo;You Younggap
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.4 s.334
    • /
    • pp.29-36
    • /
    • 2005
  • This paper presents the first hardware design of ARIA that KSA(Korea Standards Association) decided as the block encryption standard at Dec. 2004. The ARIA cryptographic algorithm has an efficient involution SPN (Substitution Permutation Network) and is immune to known attacks. The proposed ARIA design based on 1 cycle/round include a dual port ROM to reduce a size of circuit md a high speed round key generator with barrel rotator. ARIA design proposed is implemented with Xilinx VirtexE-1600 FPGA. Throughput is 437 Mbps using 1,491 slices and 16 RAM blocks. To demonstrate the ARIA system operation, we developed a security system cyphering video data of communication though Internet. ARIA addresses applications with high-throughput like data storage and internet security protocol (IPSec and TLS) as well as IC cards.

Improved RFID Authentication Protocol Providing Mutual Authentication (상호인증을 제공하는 개선된 RFID 인증 프로토콜)

  • Jeon, Seo-Kwan;Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • RFID system is the contact-less recognition technology and use for distribution system, environment, transport, security and so on. However, it may create many security relevant problems such as privacy because constraints of RFID communication environment. So several methods of resolving these problems have been proposed. Recently, Shin and Park proposed an efficient RFID authentication protocol with protecting user's privacy using hash function and exclusive-OR.. But Ahn and Bu et al. poia problem that a attacker can to masquerade as malicious reader because their protocol can't providing mutual authentication.nted out weakness of Shin and Park's protocol and proposed more secure and efficient protocol. Unfortunately, Ahn and But's protocol has In this paper, We propose an improved RFID authentication protocol providing mutual authentication. The proposed protocol has advantages that providing mutual authentication between a tag and a reader, secure against replay attack and spoofing attack. Also, it guarantees anonymity of RFID tag and secure against location tracking attack by collusion of malicious readers.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

Job Analysis for IT Security Workers in Defense Industry through DACUM Process (DACUM 기법을 이용한 방위산업체 정보통신보안실무자 직무분석)

  • Woo, Kwang Jea;Song, Hae-Deok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.73-84
    • /
    • 2014
  • As the society turns into more of an information an technology centric society, the importance of information security is being increased these days. Recently, as the number of leaking accidents of personal information and valuable industrial technology is on the rise, every field of industry endeavors to come up with a security solution. In particular, since defense industry is a field where it establishes national defense power that is essential of national security, it requires higher standards of security solutions than any other ordinary fields of industry. According to Defense Industry Security Work Instructions, defense industry firms from security organizations and employ a security worker corresponding to the firm's scale and conditions. In an environment where essential information and technology are stored and managed in information and communication system or storing media, the duty and role of IT security workers are crucial. However, there is a shortage of systematic analysis on the work of IT security workers and development of curriculum to enhance their professionalism. Thus DACUM process, a job analysis technique, was used to identify IT Security workers' duties and responsibilities and verify the validity and credibility of the deducted results from the survey. The findings of this study will help in development of IT security duty in defense industry and can be used as baseline data for the development of curriculum and amendments of related regulations.

A kernel memory collecting method for efficent disk encryption key search (디스크 암호화 키의 효율적인 탐색을 위한 커널 메모리 수집 방법)

  • Kang, Youngbok;Hwang, Hyunuk;Kim, Kibom;Lee, Kyoungho;Kim, Minsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.931-938
    • /
    • 2013
  • It is hard to extract original data from encrypted data before getting the password in encrypted data with disk encryption software. This encryption key of disk encryption software can be extract by using physical memory analysis. Searching encryption key time in the physical memory increases with the size of memory because it is intended for whole memory. But physical memory data includes a lot of data that is unrelated to encryption keys like system kernel objects and file data. Therefore, it needs the method that extracts valid data for searching keys by analysis. We provide a method that collect only saved memory parts of disk encrypting keys in physical memory by analyzing Windows kernel virtual address space. We demonstrate superiority because the suggested method experimentally reduces more of the encryption key searching space than the existing method.

Review on Security Communication Environment in Intelligent Vehicle Transport System (지능형 차량 교통체계에서 보안 통신 리뷰)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.97-102
    • /
    • 2017
  • In this paper, we have interested in cooperative intelligent transport system and autonomous driving system, and focused on analysis of the characteristics of Cooperative Awareness Message (CAM) and Decentralized Environmental Notification Basis Service (DENM) message, which is key delivery message among cooperative intelligent transport system (C-ITS) characteristics for research objectivity. For research method, we also described V2X communication, and also analyzed the security certificate and header structure of CAM and DENM messages. We described CAM message, which is a message informing the position and status of the vehicle. And the DENM message is presented a message informing an event such as a vehicle accident, and analysis security communication, which is supported services. According to standard analysis result, 186 bits or 275 bits are used. In addition to the security header and the certificate format used for vehicle communication, we have gained the certificate verification procedure for vehicles and PKI characteristics for vehicles. Also We derived the characteristics and transmission capability of the security synchronization pattern required for V2X secure communication. Therefore when it is considered for communication service of DENM and CAM in the C-ITS environment, this paper may be meaningful result.

Study of Static Analysis and Ensemble-Based Linux Malware Classification (정적 분석과 앙상블 기반의 리눅스 악성코드 분류 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1327-1337
    • /
    • 2019
  • With the growth of the IoT market, malware security threats are steadily increasing for devices that use the linux architecture. However, except for the major malware causing serious security damage such as Mirai, there is no related technology or research of security community about linux malware. In addition, the diversity of devices, vendors, and architectures in the IoT environment is further intensifying, and the difficulty in handling linux malware is also increasing. Therefore, in this paper, we propose an analysis system based on ELF which is the main format of linux architecture, and a binary based analysis system considering IoT environment. The ELF-based analysis system can be pre-classified for a large number of malicious codes at a relatively high speed and a relatively low-speed binary-based analysis system can classify all the data that are not preprocessed. These two processes are supposed to complement each other and effectively classify linux-based malware.

Real-time user behavior monitoring technique in Linux environment (Linux 환경에서 사용자 행위 모니터링 기법 연구)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.3-8
    • /
    • 2022
  • Security threats occur from the outside, but more often from the inside. In particular, since the internal user knows about the information service, the security threat damage caused by the internal user is greater. In this environment, the actions of all users accessing information services should be monitored and recorded in real-time. However, the current operating system records only the logs of system and application execution, so there is a limit to monitoring user behavior in real-time. In such a security environment, damage may occur due to user's unauthorized actions. To solve this problem, this study proposes an architecture that monitors user behavior in real-time in a Linux environment. As a result of verifying the function to confirm the effectiveness of the proposed architecture, the console input values and output angles of all users who have access to the operating system are monitored in real-time and stored. Although the performance of the proposed architecture is somewhat slower than the identification and authentication functions provided by the operating system, it was confirmed that the performance was not at a level that users would recognize, and thus it was judged to be sufficiently effective. However, since this study focuses on monitoring the console behavior, it is impossible to monitor the behavior of user applications running in the background, so additional research is needed.