• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.036 seconds

A Study on Real-time Bloking System for the Voice Marketing Call (음성스팸 실시간 차단시스템에 관한 연구)

  • Park, Haeryong;Park, Yunsik;Seo, Hyejung;Bong, Kihwan
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.203-206
    • /
    • 2017
  • 최근 휴대전화 문자스팸 차단 강화로 인한 풍선효과로 휴대전화 음성스팸이 지속적으로 증가하고 있고, 2015년 3월부터는 음성스팸 건수가 문자스팸 건수를 역전해서 급속도로 증가하고 있어 효율적으로 음성스팸을 차단할 수 있는 시스템 구축의 필요성이 대두되고 있다. 이에, 음성스팸 신고번호와 음성스팸 가상 트랩(실제 존재하지 않는 가상의 휴대전화번호를 적용)을 통해 탐지된 내용을 기반으로 음성스팸 전화번호 차단리스트를 생성하고 이를 이통사에게 제공하여 일정기간 동안 음성호를 차단하는 음성스팸 실시간 차단시스템을 설계하고자 한다.

ZigBee Security Using Attribute-Based Proxy Re-encryption

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.343-348
    • /
    • 2012
  • ZigBee Network is enabling technology for home automation, surveillance and monitoring system. For better secure network environment, secure and robust security model is important. The paper proposes an application, attribute-based proxy re-encryption on ZigBee networks. The method can distribute the authority to designated sensor nodes to decrypt re-encrypted ciphertext with associated attributes. However, a previous method is required to compute complex pairing operations. The high complexity is not suited to low resource device sensor networks, and it does not provide routing security either. To resolve these problems, we present a novel mechanism. The method can reduce overhead by imposing overhead to full function devices and ensure routing paths as well.

Group Key Management Mechanism for Secure Device in AMI Environment (AMI 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 메커니즘)

  • Jang, Yu-Jong;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.4
    • /
    • pp.679-686
    • /
    • 2012
  • Many researches have proposed key management schemes for Smartgrid System. However, previous studies lack the proper considerations for availability and device security. In this paper, we build up cryptographic security improvement for robust Smartgrid Systems. In addition, we propose a public-key management and hash function architecture for robust Smartgrid Systems which supports reduces the number of key and Secure Device in AMI network environments.

Design of Kerberos Authentication Mechanism based on WPKI (WPKI 기반 Kerberos 인증 메커니즘 설계)

  • Lee, Cheol-Seung;Park, Chan-Mo;Lee, Ho-Young;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.986-992
    • /
    • 2003
  • In this paper we challenge the user Authentication using Kerberos V5 authentication protocol in WPKI environment. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a p개blem on the design that uses wireless public key-based structur and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol Kerberos V5 and its disadvantages.

Security Attribute Design in Security (설계단계에서 보안 속성 설계)

  • Shin, Seong-Yoon;Shin, Kwang-Seong;Lee, Hyun-Chang;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.668-669
    • /
    • 2015
  • In this paper, we showed how to identify specific components of unit production systems. Business units were defined by the system protected, was explained by component. The security attributes based on description and was designed to create lift the examples.

  • PDF

Sensors Network and Security and Multimedia Enhancement

  • Woo, Seon-mi;Lee, Malrey
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.64-68
    • /
    • 2016
  • These fields are integrated to visualize and finalize the proposed development, in simulation environment. SCADA (supervisory control and data acquisition) systems and distributed control systems (DCSs) are widely deployed in all over the world, which are designed to control the industrial infrastructures, in real ways. To supervise and control the various parts of designed systems; trends to require a deep knowledge to understand the overall functional needs of industries, which could be a big challenge. Industrial field devices (or network sensors) are usually distributed in many locations and are controlled from centralized site (or main control center); the communication provides various signs of security issues. To handle these issues, the research contribution will twofold: a method using cryptography is deployed in critical systems for security purposes and overall transmission is controlled from main controller site. At controller site, multimedia components are employed to control the overall transmission graphically, such as system communication, bytes flows, security embedded parameters and others, by the means of multimedia technology.

Design of Phone Card IC with Security and Self-test Features (자체 테스트 및 보안기능을 갖는 공중전화 카드 IC 설계)

  • Park, Tae-Geun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.1
    • /
    • pp.60-66
    • /
    • 2000
  • This paper proposes a design of phone card IC with the self-test features and the hardware and software security functions. We design and verify the proposed functions with modeling the terminal system environment. The proposed phone card IC provides instructions and a non-volatile memory block containing the manufacturer / issuer / user information, the unit (money) value, and the security key. The self-test functions are designed to improve the test time degradation due to a serial I/O communication. Also some security features are implemented using hardware and software approaches.

  • PDF

Technique To Strengthen The Security Of The User Authentication System Using Security Card And Password (보안카드와 비밀번호를 이용한 사용자 인증 시스템의 보안 강화 기법)

  • 박인국;이필중
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.257-262
    • /
    • 2003
  • 본 논문에서는 사용자만이 알고 있는 비밀번호와 그 사용자만이 소유하는 보안카드를 이용하여 계산된 변동비밀번호의 1회 입력만으로 비밀번호와 보안카드를 통합하여 동시에 확인함으로써 안전하게 사용자 인중을 할 수 있는 방법을 제시한다. 본 논문에서 제안하는 사용자 인중 시스템은 변동비밀번호의 1회 입력만으로 지식기반 인중의 비밀번호와 소유기반 인증의 보안카드를 동시에 확인하여 사용자 인중이 이루어지기 때문에 서버의 효율성을 증가시키며, 보안카드의 분실, 도난, 복제 둥에 따른 위험성과 비밀번호의 추측, 노출에 따른 위험성을 줄여 보다 안전한 사용자 인중 시스템을 구축할 수 있다. 또한 본 논문에서 제안하는 시스템은 현재 사용되고 있는 텔레뱅킹(폰뱅킹), 인터넷(PC)뱅킹, 증권 매매, 전자 결재 둥과 같은 기존의 비밀번호를 이용한 사용자 인중 시스템에 큰 교체 없이 적은 추가 비용으로 쉽게 적용하여 보다 안전한 인터넷과 금융 거래의 활성화에 기여할 수 있을 것이다.

  • PDF

A Study on Evaluation for Network Security Performance and Property (네트워크 보안성능 및 보안성 평가에 관한 연구)

  • 황선명;정연서;서동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.712-715
    • /
    • 2003
  • The rapid progress of computer networking technology is changing the environment of today's business and its influence is spreading out widely. Although the practical use of business system using the internet technology is providing easy going infrastructures, many security problems of data or equipment in the open field will be exposed if we do not give serious considerations to their securities. In this paper, we suggest advanced methods to measure the network security capability with considerations for the security of data or equipments.

  • PDF

Design of Security Protocol for RFID System using Mobile Reader (이동형 리더를 사용하는 RFID시스템의 보안 프로토콜 설계)

  • Jang, Bong-Im;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.954-955
    • /
    • 2012
  • Recently as increasing the use of mobile communication devices the use of mobile readers for recognition tag attached to objects is also increasing. Accordingly, meantime, that gives rise to the vulnerability of RFID systems between reader and tag security issues, as well as security issues between the reader and the back-end server will occur. In this paper between the reader and the back-end server to security vulnerabilities efficient authentication protocol using the hash function is proposed.

  • PDF