• Title/Summary/Keyword: multi-device key management

Search Result 18, Processing Time 0.028 seconds

Certified Key Management in Multi K-FIDO Device Environment (복수 K-FIDO 기기 환경에서의 인증키 관리)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.293-303
    • /
    • 2017
  • FIDO(Fast IDentity Online) technology is expanding very rapidly which can replace traditional password-based authentication with biometrics technology[1,7]. FIDO provides convenient authentication with biometrics technology and secure key management with smart card technology, but it does not provide user identification, thus traditional user identification technology should be used before a FIDO device is registered to a FIDO server. K-FIDO[3] is an approach to implement FIDO and certificate-based authentication technology into a single device that user can utilize certificate-based authentication in initial registration of FIDO device to FIDO server. It is expected that very shortly users will own and use multiple K-FIDO devices. If we consider the traditional approach of copying single certificate to multiple devices or issuing independent certificate to each device, there will be many complex problems. In this paper we propose more secure and convenient key management technology in multiple K-FIDO device scenario using self-extended certification[4].

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

Selection and implementation of Standard Functional Blocks for Radio Library in multi-mode mobile device (멀티모드 단말기의 라디오 라이브러리를 위한 표준 기능 블록의 선정 및 구현)

  • Jung, Ildo;Choi, Sengwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.125-132
    • /
    • 2016
  • The European Telecommunication Standards Institute (ETSI) Technical Committee (TC) Reconfigurable Radio Systems (RRS) is standardizing the multi-mode Mobile Device (MD). The configuration of multi-mode MD is determined by the downloaded mobile communication standard software. In this paper, we introduce the Radio Library concept for multi-mode MD which is one of the key components of RRS standard. This paper also introduces the Standard Functional Block which is a part of Radio Library. A method for selecting efficiency SFBs for multi-mode MD is presented and a Radio Library is generated based on the selected SFBs. This paper also shows sample Standard Functional Block Set which included in Radio Library. In order to verify the compatibility of the generated Radio Library which was made by C language, we implement the LTE Rel-10 and Wi-Fi(802.11b) to show the efficiency of generating a mobile communication standard software based on the Radio Library. Then using the Prograph Visual Programming MartenTM 1.6.4, we compiled our LTE Rel-10 and Wi-Fi(802.11b) source code.

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.892-905
    • /
    • 2018
  • In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.

Open Research Problem for effective IoT Authentication

  • Mihir Mehta;Kajal Patel
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.174-178
    • /
    • 2024
  • IoT is collection of different "things" which are associated with open web. As all the things are connected to the Internet, it offers convenience to end users for accessing the resources from "Any Where, Any Time" throughout the globe. At the same time, open nature of IoT provides a fertile ground to an intruder for launching different security related threats. If we can no apply proper security safeguards to the IoT System, then it will be not useful to society. Authentication, Encryption, Trust Management and Secure Routing are different domains to offer security in IoT system. Among them, Authentication is very much important security service as it validates device identity before granting access to system services/ resources. Existing IoT Authentication algorithms are fail to verify device identity in unambiguous way. They are vulnerable to different security threats such as Key Stolen threat, MITM threat and Location Spoofing threat. So, it is a demand of time to design an efficient and secure Multi-factor IoT algorithm which can offer better security and validate device identity in unambiguous way.

A Study on the Key Points of Korean MPL Training System

  • Lee, Jang Ryong;Kwon, Moonjin;Kwon, Hanjoon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.29 no.2
    • /
    • pp.117-121
    • /
    • 2021
  • Multi-crew Pilot License (MPL) is an international pilot certification adopted by the International Civil Aviation Organization (ICAO) in 2006 under the recognition of the need for efficient and systematic pilot training including the education of pilots with advanced aviation technology and ability to respond to flight environment, resolution of the human factor problems of pilots, and provision of stable training tools for transport aircraft pilots for potential risk of pilot shortage in the future. South Korea also has prepared a legal basis for operating an MPL system in the Aviation Act in 2009, but there has been no domestic MPL qualifier. The biggest reason for this seems to be the insufficient domestic MPL training system. Therefore, it is necessary to benchmark the international standards of the ICAO, and to promote the development of the Korean MPL training system through revision and supplementation of laws and regulations in consideration of Korean circumstances.

Design and Implementation of MPEG-7 Based Video Management System for Mobile Devices (모바일 단말기를 위한 MPEG-7 기반의 비디오 관리 시스템의 설계 및 구현)

  • Ahn Byeong-Tae;Min Jeong-Hoon;Kang Byeong-Shoo;Kang Hyun-Syug
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.4
    • /
    • pp.401-413
    • /
    • 2006
  • We propose video management system based on MPEG-7 for mobile device(MVMS). Most of existing MPEG-7 applications manage MPEG-7 document based on file system in the desktop environment. To contrast them, because the MVMS manages only necessary information using embedded database system for MPEG-7 documents in mobile devices, it can use efficiently lack of the resource in mobile device environment. MVMS supports key image extraction and MPEG-7 document edition function. Moreover, this is possible search and management of multi document because of MVMS manage MPEG-7 data through embedded DB.

  • PDF

Study on Design Research using Semantic Network Analysis

  • Chung, Jaehee;Nah, Ken;Kim, Sungbum
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.563-581
    • /
    • 2015
  • Objective: This study was conducted to investigate the potential of sematic network analysis for design research. Background: As HCD (Human-Centered Design) was emphasized, lots of design research methodologies were developed and used in order to find user needs. However, it is still difficult to discover users' latent needs. This study suggests the semantic network analysis as a complementary means for design research, and proved its potential through the practical application, which compares multi-screen purchase and usage behaviors between America and China. Method: We conducted an in-depth interview with 32 consumers from USA and China, and analyzed interview texts through semantic network analysis. Cross cultural differences in purchase and usage behaviors were investigated, based on measuring centrality and community modularity of devices, functions, key buying factors and brands. Results: Americans use more services and functions in the multi-screen environment, compared to Chinese. As a device substitutes other devices, traditional boundaries of the devices are disappearing in the USA. Americans consider function to recall Apple, but Chinese consider function, design and brand to recall Apple, Sony and Samsung as an important brand at the time of their purchase. Conclusion: This study shows the potential of semantic network analysis for design research through the practical application. Semantic network analysis presents how the concepts regarding a theme are structured in the cognitive map of users with visual images and quantitative data. Therefore, it can complement the qualitative analysis of the existing design research. Application: As the design environment becomes more and more complicated like multi-screen environment, semantic network analysis, which is able to provide design insights in the intuitive and holistic perspective, will be acknowledged as an effective tool for further design research.

A Study on Gamers Segmentation based upon Uses and Gratifications of Mobile games (모바일게임 이용 충족이론을 기반으로 한 모바일 게이머 유형 분석에 관한 연구)

  • Han, Kwang-Hyun;Kim, Tae-Ung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.133-164
    • /
    • 2005
  • Mobile games have emerged as the most innovative entertainment technology, adding new revenue streams, taking advantage of the potential of wireless applications and service offerings. Mobile games, like any other types of computer game, offer a unique value for users in providing an exciting digital experience in virtual worlds. Players can become empowered through the development of new characters and strategies within games to achieve rewarding successes against the computers and other players. The overall trend for mobile games is towards bigger, more colorful, more involving and exciting contents, which will build upon the developing capabilities of mobile phones and networks in order to bring new styles, concepts and experiences of game play to the users. In this paper, we attempt to investigate the demographic factors which play critical roles in determining the level of playing times; classify mobile gamers based on their motives for playing games; and empirically test differences in their demographic factors and mobile game usage. Statistical results show that significant differences in playing times exist, depending upon their age, gender, mobile device, mobile phone usage, mobile game experiences, and preferred games genres. Applying Factor analysis, we have identified Escape, Social interaction, Challenge and Competition, Fantasy, Diversion and Relaxation, Ease of Accessibility as key motivators for playing mobile games. Additional cluster analysis shows that the categorization of gamers, according to their usage habits and the key motivators for playing, can be made as follows: M-gamers, Multi-gamers and Communication-focused gamers. Further correlation of these grouping with socio-economic data shows the significant differences in gaming habits and patterns of mobile phone use.

  • PDF

QoS-Aware Power Management of Mobile Games with High-Load Threads (CPU 부하가 큰 쓰레드를 가진 모바일 게임에서 QoS를 고려한 전력관리 기법)

  • Kim, Minsung;Kim, Jihong
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.328-333
    • /
    • 2017
  • Mobile game apps, which are popular in various mobile devices, tend to be power-hungry and rapidly drain the device's battery. Since a long battery lifetime is a key design requirement of mobile devices, reducing the power consumption of mobile game apps has become an important research topic. In this paper, we investigate the power consumption characteristics of popular mobile games with multiple threads, focusing on the inter-thread. From our power measurement study of popular mobile game apps, we observed that some of these apps have abnormally high-load threads that barely affect the user's gaming experience, despite the high energy consumption. In order to reduce the wasted power from these abnormal threads, we propose a novel technique that detects such abnormal threads during run time and reduces their power consumption without degrading user experience. Our experimental results on an Android smartphone show that the proposed technique can reduce the energy consumption of mobile game apps by up to 58% without any negative impact on the user's gaming experience.