• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.035 seconds

Highly reliable distributed OT system security mechanism (고신뢰 분산 운영기술 시스템 보안 메커니즘)

  • Jung-Hyun Moon;Il-Gu Lee
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.471-474
    • /
    • 2024
  • 중앙 집중형 OT 시스템은 여러 센서와 장비에서 수집된 데이터가 중앙 서버로 전송되며 처리된다. 이러한 중앙 집중 방식은 모니터링, 의사결정, 제어 등의 데이터 관리를 효율적으로 처리할 수 있지만 구조적으로 데이터 처리가 중앙 시스템에 집중되는 문제가 있다. 그리고 대규모의 산업 데이터가 서버로 전송되기 때문에, 데이터 전송과 활용 과정의 데이터 프라이버시 문제가 존재한다. 그리고 중앙 집중 방식 시스템의 단일 장애 취약점에 의한 데이터 유출이나 시스템 장애로 이어질 수 있다. 이러한 문제를 해결하기 위해 본 연구에서는 고신뢰 분산 OT 보안 메커니즘을 제안한다. 실험 결과에 따르면 제안한 메커니즘은 전체적인 시스템의 구조를 강화하면서 99%의 위험상황 분류 정확도를 보였다.

React-based login system design using Spring Boot Security and JWT (스프링 부트 Security와 JWT를 통한 React 기반 로그인 시스템 설계)

  • Youngchan Lee;Minsung Kim;Hyunwoo You;MinJae Kim;Hong Min
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.45-46
    • /
    • 2024
  • 스프링 부트는 개발 및 실행 환경 설정이 간편하기 때문에 백엔드 개발에 활용되는 프레임워크이고 React는 프론트엔드 개발에 활용되는 프레임워크이다. 본 논문에서는 스프링 부트와 React를 사용하는 웹 응용에서 로그인 시스템 구축 시 JWT를 활용하는 방법과 구조에 관해 설명하였다.

Differential Authentication Scheme for Electric Charging System through Light Gradient Boosting Machine

  • Byung-Hyun Lim;Ismatov, Akobir;Ki-Il Kim
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.3
    • /
    • pp.199-206
    • /
    • 2024
  • The network security of Plug-and-Charge (PnC) technology in electric vehicle charging systems is typically achieved through the well-known Transport Layer Security (TLS) protocol, which causes high communication overhead. To reduce this overhead, a differential authentication method employing different schemes for individual users has been proposed. However, decisions use a simple threshold approach and no quantitative performance evaluation should be made. In this study, we determined each user's trust using several machine learning algorithms with their charging patterns and compared them. The experimental results reveal that the proposed approach outperforms the conventional approach by 41.36% in terms of round-trip time efficiency, demonstrating its effectiveness in reducing the TLS overhead. In addition, we show the simulation results for three user authentication methods and capture the performance variations under CPU busy waiting scenarios.

Research and Anlysis of LibOS for Security Isolation in Operating System and Applications (운영체제 및 애플리케이션의 보안 격리를 위한 LibOS 연구 조사)

  • Jae-Won Baek;KimYeong-Pil Cho
    • Annual Conference of KIPS
    • /
    • 2024.10a
    • /
    • pp.188-190
    • /
    • 2024
  • LibOS는 전통적인 운영체제의 커널을 응용 프로그램 수준의 라이브러리로 재구성한 시스템이다. 애플리케이션이 운영체제의 다양한 기능을 호출할 때 기존 운영체제처럼 무겁고 복잡한 커널과 직접 상호작용하는 대신, 가벼운 라이브러리 형태로 제공하여 시스템의 메모리 사용량을 줄이고 성능을 향상시킨다. 또한 각 애플리케이션이 독립적인 프로세스처럼 동작할 수 있도록 지원하여 보안 격리를 유지한다. 대표적으로 LibOS는 Intel SGX와 결합되어 시스템 호출을 줄이고, Enclave 내에서 대부분의 작업을 수행하여 공격 표면을 줄인다. 본 논문에서는 LibOS가 Intel SGX와 같은 보안 기술을 사용한 연구에 대해 소개한다.

Image Encryption Using Phase-Based Virtual Image and Interferometer

  • Seo, Dong-Hoan;Kim, Soo-Joong
    • Journal of the Optical Society of Korea
    • /
    • v.6 no.4
    • /
    • pp.156-160
    • /
    • 2002
  • In this paper, we propose an improved optical security system using three phase-encoded images and the principle of interference. This optical system based on a Mach-Zehnder interferometer consists of one phase-encoded virtual image to be encrypted and two phase-encoded images, en-crypting image and decrypting image, where every pixel in the three images has a phase value of '0'and'$\pi$'. The proposed encryption is performed by the multiplication of an encrypting image and a phase-encoded virtual image which dose not contain any information from the decrypted im-age. Therefore, even if the unauthorized users steal and analyze the encrypted image, they cannot reconstruct the required image. This virtual image protects the original image from counterfeiting and unauthorized access. The decryption of the original image is simply performed by interfering between a reference wave and a direct pixel-to-pixel mapping image of the en crypted image with a decrypting image. Computer simulations confirmed the effectiveness of the proposed optical technique for optical security applications.

Enabling Energy Efficient Image Encryption using Approximate Memoization

  • Hong, Seongmin;Im, Jaehyung;Islam, SM Mazharul;You, Jaehee;Park, Yongjun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.3
    • /
    • pp.465-472
    • /
    • 2017
  • Security has become one of the most important requirements for various devices for multi-sensor based embedded systems. The AES (Advanced Encryption Standard) algorithm is widely used for security, however, it requires high computing power. In order to reduce the CPU power for the data encryption of images, we propose a new image encryption module using hardware memoization, which can reuse previously generated data. However, as image pixel data are slightly different each other, the reuse rate of the simple memoization system is low. Therefore, we further apply an approximate concept to the memoization system to have a higher reuse rate by sacrificing quality. With the novel technique, the throughput can be highly improved by 23.98% with 14.88% energy savings with image quality loss minimization.

Design of ClientCA Operation and Mechanism for e-Commerce Certificate Management (전자거래 인증서 관리를 위한 ClientCA 운영 메커니즘 설계)

  • 김점구;나상엽
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.85-90
    • /
    • 2004
  • A certificate is important media for the purpose of offering user-authentication service on PKI system. In the paper we analyzed management implement which could make the efficient use of a certificate. This implement called ClientCA will make efficient use of the service about user-authentication consisting of the basis in the age of information through efficient management and partial use of each certificates. Especially, ClientCA could be used efficiently by grafting a small group of PKI system which is operated with particular purposes.

  • PDF

Design and Implementation of Multi Messaging System Using SK-VM Based On J2ME (J2ME기반의 SK-VM을 이용한 다중 메시징 시스템 설계 및 구현)

  • 김응곤;최완규;이성주
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.41-45
    • /
    • 2001
  • In the case of mobile internet service using WAP, It was connected to http protocol using WAP Gateway. So, Users take increased cost of mobile internet service. and it was generated inner security problem because it watched user information in the WAP Gateway. To solve this problem we use java language. Which is independant of platform and low cost and intensely security and downloadable application. Additional, Using socket connection, Multi Messaging System(MMS) will connect real time between PC-Client and Mobile-Client, Mobile-Client and Mobile-Client, and so on. In this paper, as design and implementation o( multi messaging used SK-VM based on .12ME, It will be foundation to develop various mobile application in the future.

  • PDF

Analysis of the Dependability of Voting and Group Management In the Intrusion Tolerant Technology (침입감내기술에서의 Voting 및 그룹관리 신뢰성 분석)

  • 이태진;김형종;이강신
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2004.05a
    • /
    • pp.1-6
    • /
    • 2004
  • Intrusion tolerant technology is the technology to guarantee the Quality of service for certain amount time from the attacks which cannot be defended by the previous information security technologies. It increases the availability and confidentiality of the system by minimizing the damage from the attacks. And the fundamental components of the intrusion tolerant technology are voting and GMP(Group Management Protocol). In this paper, we present a new scheme to analyze the voting dependability and corrupt member detection dependability, which is very critical in GMP. Based on this scheme, we can make a new security policy and the methodology of analyzing the dependability itself also can be applicable to the other field.

  • PDF

A study on the implementation of Digital Cinema platform and its security system (디지털 시네마 플랫폼 구축과 보안에 관한 연구)

  • Kim Jong-An;Kim Jin-Han;Kim Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.82-86
    • /
    • 2006
  • Film has been used widely since Auguste and Louis Lumiere hold the first private screening in 1895. Star Wars Episode II: Attack of the Clones directed by George Lucas released on May 16, was the first motion picture both to be shot completely on a high definition digital 24-frame system and to be projected by digital projectors. Its success showed us that the digital cinema era is imminent. Digital Cinema will enable the studios and movie distributors to low the expenses of making and delivering film prints and dissemination of it can put the entire digital cinema ecosystem in great jeopardy. Therefore DRM and other security policies are used for digital cinema content protection. In this paper it will be discussed how the digital cinema platform can package (encooe & encrypt), transport, and project the digital cinema contents safely.

  • PDF