• Title/Summary/Keyword: many-to-many session

Search Result 185, Processing Time 0.026 seconds

An Improvement of Certification-based One-Round Tripartite Key Agreement Protocols

  • Mtong, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.5
    • /
    • pp.297-301
    • /
    • 2013
  • Key agreement protocols allow multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. Since Joux first published the pairing-based one round tripartite key agreement protocol, many authenticated protocols have been proposed. Unfortunately, many of them have been broken while others have been shown to be deficient in some desirable security attributes. In 2004, Cheng et al. presented two protocols aimed at strengthening Shim's certificate-based and Zhang et al.'s tripartite identity-based protocols. This paper reports that 1) In Cheng et al.'s identity-based protocol, an adversary can extract long-term private keys of all the parties involved; and 2) Cheng et al.'s certification-based protocol is weak against key integrity attacks. This paper suggests possible remedies for the security flaws in both protocols and then presents a modified Cheng et al.'s identity-based, one-round tripartite protocol that is more secure than the original protocol.

  • PDF

BGP Session Takeover Method Based on Docker (Docker 기반의 BGP 세션 절체 방안)

  • Kim, Sang-il;Kim, Hwa-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.238-240
    • /
    • 2016
  • Recently, the improvement in the data communication networks in terms of availability and reliability is emerging as a critical issue. In this context, the high availability and reliability of routers that control data flow and routing path between networks on the data communication network are being recognized as critical problems. Many methods for providing high availability to minimize the loss cost caused by the failure of a router are being studied. This paper proposed a BGP session takeover method using the Docker to support the high availability of the BGP session and to improve the takeover performance.

International Progress on the Impacts of Aviation on Climate Change and Study for an Advanced Carbon Calculation Methodology (국제항공 기후변화 관련 국제동향과 항공 배출가스 계산방법의 개선에 관한 연구)

  • Lee, Gun Young;Yoo, Kwang Eui;Hwang, Sung Youn
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.21 no.2
    • /
    • pp.62-69
    • /
    • 2013
  • The introduction of aviation into the EU-ETS has faced significant opposition from many ICAO member States. Accordingly a global solution through ICAO is in progress. This paper traces the progress of works done by the HGCC in the area of global aviation aspiration goals aiming for the submission to the 38th Session of the ICAO Assembly. Furthermore, devices for calculating the carbon dioxide emissions from flights have been developed by several agencies including international organizations, governments, airlines and nongovernmental organizations. These carbon calculators, however, introduce too many assumptions to simplify the calculation process. This study assesses carbon calculators for aviation emissions and suggests a modified calculation methodology using the pre-existing computer reservation system for better accuracy.

A study with respect to the home networking security Technology based on SIP (SIP기반 홈네트워킹 보안 기술에 관한 연구)

  • Ham, Yoeng-Ock;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.169-180
    • /
    • 2009
  • Generally home networks are based on wired network and wireless network. This makes customers be capable of using electric home appliances and full-duplex multimedia services and controlling the machines without any restrictions of place or time. Now that the scope of home security is being extended, the home networks can be formed with not only personal computer but also home automation, electric home appliances, and etc. But this causes many of attacks of invasion and damages. Therefore in this paper we suggest the SSIP(Secure Session Initiate protocol) model for solving those problems. The SSIP model is able to provide an efficient authentication and reduce the time of session re-establishment and set-up by adding ability of SIP authentication to Cluster-to-Cluster environment performed on home gateway.

Introduction to Leakage-Resilient Authenticated Key Exchange Protocols and Their Applications

  • Imai, Hideki;Shin, Seong-Han;Kobara, Kazukuni
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.207-217
    • /
    • 2008
  • Secure channels, indispensable to many applications, can be established by using an authenticated key exchange (AKE) protocol where the involving parties authenticate one another and then share authenticated session keys over insecure networks. In this paper, we introduce a new type of AKE protocols that are especially designed to minimize the damages caused by leakages of stored secrets. Such protocols are called Leakage-Resilient AKE (LR-AKE) protocols, whose motivation, design principles, several constructions, security analysis and applications are explained in detail.

Design Consideration of Session Manager for N-to-N Multicast Services (다자간 멀티캐스트 서비스 지원을 위한 세션 관리자 고려사항)

  • Jeong, Ok-Jo;Park, Ju-Young;Kang, Shin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.525-527
    • /
    • 2005
  • the multicast services with multiple senders is interested according to the internet services such as multiple audio/video conference services. With the N-plex multicast protocols, multicast session manager is also needed for membership control and session control. RMCP-3 is designed for N:N group communications which is standardizing in ITU-T and supports multiple senders who join sessions. In this paper, we consider requirements of multicast manager for multiplex multicast communication protocol which many a joiner has a role in sender such conference application.

  • PDF

Random Sequence Synchronization for Radio Secure Communication Using Synchronous Stream Cipher (동기식 스트림 암호와 방식을 이용한 무선 암호 통신에서의 난수열 동기)

  • 손해성;홍진근김강욱황찬식
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.66-69
    • /
    • 1998
  • The synchronous stream cipher has the advantage that one bit error in the ciphertext only affects the corresponding bit in the plaintext, but it requires the perfect synchronization between encryptor and decryptor. For synchronization, a periodic resynchronization has been used in many applications. In this paper, we propose the periodic resynchronization scheme for radio secure communication and evaluate the performances according to the period of sync pattern and session key under radio channel environment having 10-2~ 10-6 BER.

  • PDF

Practical Issue of Botulinum Toxin use Liquid Type, Storage and Reuse (액상형 보툴리눔 독소와 임상적 활용)

  • Son, Hee Young
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.30 no.1
    • /
    • pp.9-11
    • /
    • 2019
  • Botulinum toxin (BTX) has been widely used to treat muscle spasms in many voice disorders. Most commercially available forms of BTX require reconstitution before use, which may increase the risk of contamination and requires careful titration. Recently, a liquid-type BTX type A (BTX-A) has been developed, which should simplify the procedure and enhance its efficacy. In this session, I will discuss about the differences of BTX-A from existing types and the practical issues associated with it.

Verification of Safety in a RFID Security Authentication Protocol Using Session and Public Keys (세션키 및 공개키를 이용한 RFID 보안 인증 프로토콜의 안전성 검증)

  • Bae, Woo Sik;Lee, Jong Yun
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.325-332
    • /
    • 2012
  • Due to its communication vulnerability resulting in a range of problems, e.g. eavesdropping, information exposure, traffic analysis and spoofing, RFID system becomes the target of attackers. Accordingly, many investigators have proposed various protocols to the extent of theorem proving or verification as the implementation is challenging. This paper thus proposes a safe RFID security protocol using public keys, session keys, hashes, XORs, and random numbers. Timestamps and hashes are applied to the most vulnerable section between readers and tags to detect attacks in attack signals with time difference. Also, to prevent tag information from being exposed in the last session, hash operation is adopted before communication. Finally, in this paper, we designed a RFID security protocol using public and session keys applicable to real systems and verified the security of the proposed protocol with a differentiated formal verification technique.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.