• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.034 seconds

Internet of Drone: Identity Management using Hyperledger Fabric Platforms

  • Etienne, Igugu Tshisekedi;Kang, Sung-Won;Rhee, Kyung-hyune
    • Annual Conference of KIPS
    • /
    • 2022.05a
    • /
    • pp.204-207
    • /
    • 2022
  • The uses of drones are increasing despite the fact that many of us are still skeptical. In the near future, the data that will be created and used by them will be very voluminous, hence the need to find an architecture that allows good identity management and access control in a decentralized way while guaranteeing security and privacy. In this article, we propose an architecture using hyperledger fabric blockchain platform which will manage the identity in a secure way starting with the registration of the drones on the network then an access control thanks to Public Key Infrastructure (PKI) and membership service provider (MSP) to enable decision-making within the system.

Post-quantum identity-based authenticated multiple key agreement protocol

  • Yang Yang;Hongji Yuan;Linbo Yan;Yinglan Ruan
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.1090-1102
    • /
    • 2023
  • Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that are vulnerable to quantum algorithms. Lattice cryptography provides quantum resistance to authenticated key agreement protocols, but the certificate always incurs excessive public key infrastructure management overhead. Thus, a lightweight lattice-based secure system is needed that removes this overhead. To answer this need, we provide a two-party lattice- and identity-based AMKA scheme based on bilateral short integer or computational bilateral inhomogeneous small integer solutions, and we provide a security proof based on the random oracle model. Compared with existing AMKA protocols, our new protocol has higher efficiency and stronger security.

A Study on the Possibility of Assuring 'The Right to be Forgotten' Through the Digital Extinction Technology (디지털 소멸 기술을 통한 잊힐 권리의 보장 가능성 연구)

  • Joo, Moon-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.435-447
    • /
    • 2016
  • As data can be permanently stored and freely distributed, in modern society, the Internet became a world that remembers everything forever. Because of that, there has been increasing the number of accident with never-forgetting data and, as a result, a movement has been emerged to apply a notion of 'oblivion' to internet world. The movement is called 'The right to be forgotten.' However, 'The right to be forgotten' in a higher level which internet users want to be guaranteed is very limited in the juridical approach because of the confliction with the other basic rights and problems. On the other hand, the requests of individuals to guarantee 'The right to be forgotten' has been urged digital extinction technology, such as volatile SNS, Digital Aging System, to be developed. With introduction of oblivion, digital extinction technology with setting expire date on digital information can present a new solution on assuring 'The right to be forgotten.' This research establishes the detail scope of, analyzes the level of assurance of, and, through digital extinction technology with the established scope, suggest the potential assurance of the 'The right to be forgotten'.

An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems (IP기반의 Pay-TV 시스템을 위한 안전하고 효율적인 그룹 키 분배 프로토콜)

  • Kim, Jung-Yoon;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.199-208
    • /
    • 2009
  • Recently,IP-based broadcasting systems,such as Mobile-TV and IP-TV, have been widely deployed. These systems require a security system to allow only authorized subscribers access to broadcasting services. We analyzed the Conditional Access System, which is a security system used in the IP-based Pay-TV systems. A weakness of the system is that it does not scale well when the system experiences frequent membership changes. In this paper, we propose a group key distribution protocol which overcomes the scalability problem by reducing communication and computation overheads without loss of security strength. Our experimental results show that computation delay of the proposed protocol is smaller than one of the Conditional Access System. This is attributed to the fact that the proposed protocol replaces expensive encryption and decryption with relatively inexpensive arithmetic operations. In addition, the proposed protocol can help to set up a secure channel between a server and a client with the minimum additional overhead.

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

Mind control interface technology for the military control instrument (군사용 제어기기를 위한 마인드 컨트롤 인터페이스 기술)

  • Kim, Eung-Su
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.249-267
    • /
    • 2003
  • EEG is an electrical signal, which occurs during information processing in the brain. These EEG signals have been used clinically, but nowadays we are mainly studying Brain-Computer Interface (BCI) such as interfacing with a computer through the EEG, controlling the machine through the EEG. The ultimate purpose of BCI study is specifying the EEG at various mental states so as to control the computer and machine. This research makes the controlling system of directions with the artifact that are generated from the subject's will, for the purpose of controlling the machine correctly and reliably. We made the system like this. First, we select the particular artifact among the EEG mixed with artifact, then, recognize and classify the signals' pattern, then, change the signals to general signals that can be used by the controlling system of directions.

  • PDF

Indoor Gas Monitoring System Using Smart Phone Application (스마트폰 어플리케이션을 이용한 실내 가스 모니터링 시스템)

  • Choi, Sung-Yeol;Choi, Jang-Sik;Kim, Sang-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.49-54
    • /
    • 2012
  • Special applications designed for smart phone, so called "Apps" are rapidly emerging as unique and effective sources of environmental monitoring tools. Using the advantages of Information and Communication Technology (ICT), this paper propose an application that provides Indoor Gas Monitoring System. In this paper, use four wireless gas sensor modules to acquire sensors data wirelessly coupled with the advantages of existing portable smart device based on Android platform to display the real-time data from the sensor modules. Additionally, this paper adapts a simple gas classification algorithm to inform in-door Gas for users real-time based.

Implementation of Attack Generation Test-Suite for Security System Testing (보안 시스템 테스트를 위한 공격 발생 테스트슈트 구현)

  • 김환국;서동일;이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.51-55
    • /
    • 2004
  • Currently, internet is deeply rooted in everyday life and many things are performed using internet in real-world, increased internet user because convenience. But then, internet accident is on the increase rapidly. Therefore, it is necessary that testing system generate automatically various attack patterns and traffic. In this paper, we describe method of design and implementation about AGT(attack generation test suite : simulator) system which generate various attack patterns using multiple agents.

  • PDF

Secure Transmission for Interactive Three-Dimensional Visualization System

  • Yun, H.Y.;Yoo, Sun Kook
    • Journal of International Society for Simulation Surgery
    • /
    • v.4 no.1
    • /
    • pp.17-20
    • /
    • 2017
  • Purpose Interactive 3D visualization system through remote data transmission over heterogeneous network is growing due to the improvement of internet based real time streaming technology. Materials and Methods The current internet's IP layer has several weaknesses against IP spoofing or IP sniffing type of network attacks since it was developed for reliable packet exchange. In order to compensate the security issues with normal IP layer, we designed a remote medical visualization system, based on Virtual Private Network. Results Particularly in hospital, if there are many surgeons that need to receive the streaming information, too much load on the gateway can results in deficit of processing power and cause the delay. Conclusion End to end security through the network method would be required.

Optical Encryption System using a Computer Generated Hologram

  • Kim, Jong-Yun;Park, Se-Joon;Kim, Soo-Joong;Doh, Yang-Hoi;Kim, Cheol-Su
    • Journal of the Optical Society of Korea
    • /
    • v.4 no.1
    • /
    • pp.19-22
    • /
    • 2000
  • A new image encoding and identification scheme is proposed for security verification by us-ing a CGH(computer generated hologram), random phase mask, and a correlation technique. The encrypted image, which is attached to the security product, is made by multiplying a QP- CGH(quadratic phase CGI) with a random phase function. The random phase function plays a key role when the encrypted image is decrypted. The encrypted image can be optically recovered by a 2-f imaging system and automatically verified for personal identification by a 4-f correlation system. Simulation results show the proposed method can be used for both the reconstruction of an original image and the recognition of an encrypted image.