• Title/Summary/Keyword: mutual security

Search Result 476, Processing Time 0.042 seconds

A study on the matrix-based RFID authentication protocol (행렬기반 RFID 인증 프로토콜에 관한 연구)

  • Shin, Hyo-Young;Jung, Kye-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.800-803
    • /
    • 2012
  • Recently, research on security of RFID system has been conducted actively in order to utilize RFID system in various fields including distribution and logistics. This paper suggests an authentication protocol which supplement the flaws of previous RFID authentication protocols and we improved its performance using matrix-based authentication. The suggested authentication protocol provides mutual authentication, protects from wiretapping attack, replay attack, spoofing attack, and traffic analysis attack and so on, and reduces overload of back-end database so that has efficient performance.

  • PDF

Analysis of Food Industry Cluster and Value-chain Network in the Northern Area of the Korean Peninsula (한반도 북방지역의 식량산업 클러스터 및 가치사슬 네트워크 분석)

  • Moon, Seung-Woon;Kim, Euijune
    • Journal of Korean Society of Rural Planning
    • /
    • v.23 no.3
    • /
    • pp.147-161
    • /
    • 2017
  • Climate changes from global warming and reduction in agricultural land result in volatility of prices of agricultural products, causing a imbalance of food market in Korea. It is necessary to develop a transnational food industry cooperation system among Korea, China and Russia that directly or indirectly affect food industry in terms of the whole industrial network. This study analyzes the value chain and linkage in the agriculture, forestry and fisheries industries in three nations. The unit structure and the industrial patterns of three nations were derived using the World Input-output Table (WIOT) from 2004 to 2014 every five years. This paper is expected to contribute to develop food security cooperation in the northern part of the Korean peninsula and to promote the mutual growth of food industry through industry linkage and cooperation.

CORBA Based Mutual Authentication Mechanism using CCCA (CCCA를 이용한 CORBA기반의 상호 인증 메커니즘)

  • Yi, Yong-Ju;Jang, Jong-Hyeun;Lee, Dong-Gil
    • The KIPS Transactions:PartC
    • /
    • v.8C no.3
    • /
    • pp.245-252
    • /
    • 2001
  • 인터넷의 이용증가와 전자상거래의 활성화 등으로 인해 급속도로 발전하는 공개키 기반구조에 능동적으로 대처하기 위해서는 확정성과 상호 운용성, 관리용이성, 나 공개키 기반구조 기관의 수용 등 여러 가지 문제를 고려한 인증 모델이 제시되어야 한다. 이 논문에서는 인터넷에서 이기종의 컴퓨터들이 서로 연결되어 자료를 공유하고 분산되어 실행할 수 있는 개방 분산 시스템인 CORBA 기반의 상호인증 모델을 설계한다. 공개케 기반 시스템(PKI)을 도입하되 CCCA(Cross Certification CA)를 이용하여 효율적으로 상호인증 할 수 있는 모듈과 인터페이스를 설계하고 기존 모델과 비교 분석하여 우수성을 증명한다.

  • PDF

A Study on Enhancing Security of Smart Grid AMI Network Through Smart Device Mutual Authentication (스마트 기기 상호 인증을 통한 스마트그리드 AMI 네트워크 보안 강화 방안 연구)

  • Lee, Sang-JI;Park, Sang-Jin;Sin, Young-Tae
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.810-813
    • /
    • 2012
  • 차세대 전력망인 스마트그리드의 구축에 필수적인 AMI는 소비자의 전력 사용 관리를 위해 양방향 통신이 가능한 스마트 기기로 구성된다. 스마트 기기 간의 송수신 되는 소비자의 전력 사용 정보 흐름의 안전성 확보를 위해 제안하는 상호 인증 방안은 MDMS를 통한 지역적 인증이 가능하고, ID를 기반으로 스마트 기기 간 상호 인증을 제공한다. 이에 따라 스마트 기기 간의 안전한 통신 환경을 제공한다.

Algorithm Design to Judge Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.50-58
    • /
    • 2019
  • The clear and specific objective of this study is to design a false news discriminator algorithm for news articles transmitted on a text-based basis and an architecture that builds it into a system (H/W configuration with Hadoop-based in-memory technology, Deep Learning S/W design for bigdata and SNS linkage). Based on learning data on actual news, the government will submit advanced "fake news" test data as a result and complete theoretical research based on it. The need for research proposed by this study is social cost paid by rumors (including malicious comments) and rumors (written false news) due to the flood of fake news, false reports, rumors and stabbings, among other social challenges. In addition, fake news can distort normal communication channels, undermine human mutual trust, and reduce social capital at the same time. The final purpose of the study is to upgrade the study to a topic that is difficult to distinguish between false and exaggerated, fake and hypocrisy, sincere and false, fraud and error, truth and false.

eBPF Technology Trends for Networking and Security in Cloud-native (클라우드 네이티브 환경에서 네트워킹 및 보안을 위한 eBPF 기술 동향)

  • Shin, Y.Y.;Shin, J.S.;Park, C.H.;Park, J.G.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.62-69
    • /
    • 2022
  • In a situation where applications determine business competitiveness, they cannot respond to varying customer requirements without the cloud's flexibility and scalability. Companies have begun seeking ways to enjoy the advantages of the cloud fully, and the concept of "Cloud Native" is emerging as a solution to the problem. Cloud Native is now a target of interest in the market. Microservice and serverless functions can play a vital role in cloud-native architecture. Microservice arranges applications into various independent services, each offering certain functionality through mutual networking. eBPF is attracting attention as a cloud-native networking solution that quickly supports microservice features that repeat creation/deletion. This study identifies the characteristics of eBPF-based networking and evaluates cloud-native networking and secure networking using eBPF.

RFID mutual authentication protocol using OTP (OTP 를 이용한 RFID 상호인증 프로토콜)

  • Lee, Young-Sil;Jang, Won-Tae;Lee, Hoon-Jae
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.789-792
    • /
    • 2011
  • RFID(Radio Frequency Identification) 시스템은 비접촉식 무선 인식 기술로 유통 및 물류, 환경, 교통, 보안 분야 등 산업 전반에 걸쳐 다양하게 활용되고 있다. 그러나 태그의 정보가 전송과정에서 무선특성에 따른 과도한 정보 노출과 사용자의 위치정보 추적 등 심각한 프라이버시 침해를 유발시킨다. 본 논문에서는 해쉬된 ID 와 스트림 암호 알고리즘을 이용한 OTP 를 활용하여 리더와 태그간 상호인증을 제공하는 프로토콜을 제안한다. 제안된 프로토콜의 OTP 생성에 사용된 NLM-128 알고리즘은 $2^{128}$ 비도 수준(Security level)을 갖는 스트림 암호로써, 안전성 및 구현 용이성 등의 특징을 가지며 RFID/USN 등의 저전력, 제한된 메모리 및 컴퓨팅 사양에서 적용하기 용이한 알고리즘이다.

Success Factors for Partnering Implementation in Construction: a Survey from Vietnam

  • Kim, Soo Yong;Le-Hoai, Long;Dang, Chau Ngoc
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.568-572
    • /
    • 2015
  • Traditional procurement methods have revealed many disadvantages in construction fields such as the adversarial relationships between stakeholders. After several decades of application, partnering has shown to be an innovative arrangement that helped to reduce many problems existing in the traditional arrangement. In Vietnam, partnering has been applied for construction projects since the construction industry was facing many new challenges emanated from the global integration and economic booming. Partnering is rather new, so it needs to gain a better understanding of the new concept. This paper has identified twenty eight success factors for partnering in the Vietnamese construction industry. Five factors are considered critical to partnering success including financial security, commitment from top management, mutual trust between parties, adequate resources and effective communication. The findings could help construction practitioners to deploy the innovative procurement type and would also contribute to the global knowledge.

  • PDF

A Comparative Study on the Mutual Influence between Institutional Mechanisms and Trust in Online Platform Environment (온라인 플랫폼 환경에서 제도적 메커니즘과 신뢰 간 상호 영향에 관한 비교 연구)

  • YoonHo Roh;Yeong-Hyeon Hwang
    • Journal of Information Technology Services
    • /
    • v.23 no.2
    • /
    • pp.83-97
    • /
    • 2024
  • This study was conducted to examine the effect of institutional mechanisms on customers' trust and continuous purchase intention in open market platforms, The research frame was expanded by setting institutional situations into positive and negative areas in order to examine the relationship between institutional mechanisms and trust in multiple dimensions. The results of this study confirmed that the feedback system, dispute resolution, and intermediary trust factors affect trust in positive areas, and dispute resolution, information security, and intermediary trust affect buyer trust in negative areas. For the relationship between trust and repurchase intention, it was confirmed that if the institutional situation is positive, trust leads to repurchase intention, and in negative areas, trust does not lead to repurchase intention. The results of this study show that institutional mechanisms are a key factor in building trust in online platforms according to institutional circumstances and play a role in offsetting trust in platforms in negative areas.

A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem (동기화 문제를 해결한 새로운 동적 아이디기반 RFID 상호 인증 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.469-480
    • /
    • 2008
  • The recently proposed RFID(Radio Frequency Identification) authentication protocol based on a hash function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag memory. In this paper, we classify the protocols into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses. Also, we define a new security model including forward/backward traceability, synchronization, forgery attacks. Based on the model, we analyze the previous protocols and propose a new dynamic-ID based RFID mutual authentication protocol. Our protocol provide enhanced RFID user privacy compared to previous protocols and identify a tag efficiently in terms of the operation quantity of a tag and database.