• Title/Summary/Keyword: mutual security

Search Result 476, Processing Time 0.029 seconds

Attribute-based authentication scheme in IPTV broadcasting system (IPTV 방송 시스템에서의 속성기반 사용자 인증 기법)

  • Lee, Ji-Seon;Kim, Hyo-Dong
    • Journal of Broadcast Engineering
    • /
    • v.14 no.3
    • /
    • pp.280-287
    • /
    • 2009
  • An IPTV (Internet Protocol Television) technology is the new convergence technology of the telecommunication and broadcasting which provides various bidirectional TV services. To provide these services only to legal subscribers, mutual authentication between set-top box connected with TV set and the smart card owned by a subscriber is needed. In this paper, we propose an attribute-based mutual authentication scheme that only someone who is satisfied with some attributes, such as titles or departments, can access the contents provided by the IPTV service in an organization. We also show that the proposed scheme is secure. Our proposed scheme has a virtue that user can access various services, provided by an organization where he/she belongs to, according to their attributes with only one time registration. As far as we know, this is the first attribute-based authentication scheme which can be applied to any organizations in IPTV environments.

A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service (IPTV 서비스에서 사용자의 수신자격을 효율적으로 판별할 수 있는 해쉬 함수 기반의 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Jung, Yoon-Sung;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.187-197
    • /
    • 2010
  • The fusion stream of recent broadcasting and communication make multimedia content served in the area of broadcasting into IPTV service which transmits it through high-speed internet, cable TV net and satellite net in realtime. However, as the digital broadcasting service is extended to various media, the security of IPTV service content provided to users by service provider is not fully supported by CAS(Conditional Access System) provided by existing broadcasting system. This paper proposes interactive certification protocol which can efficiently distinguish the receiving-qualification of user between Set-Top Box and Smart Card which are parts of configurations for IPTV system. The proposed protocol uses hash function to make Set-Top Box transmit receiving-qualification about the channel fee which user pays more properly than existing protocol. Also, the proposed protocol uses session key generated between receiver and smart card through inter certification process and encrypts EMM not the service to be used by anyone illegally.

Cathodic Protection of Buried Gas Pipelines Using Common Anode Beds (공용양극을 이용한 가스배관의 전기방식)

  • Ha, Y.C.;Kim, D.K.;Bae, J.H.;Ha, T.H.;Lee, H.G.
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.1
    • /
    • pp.19-24
    • /
    • 2008
  • Due to industrialization and urbanization, underground metallic utilities with different owners have been rapidly increased and cathodic protection (CP) methods, especially impressed current CP systems, have been widely adopted to protect their utilities from corrosion with expanded recognition of this method. The stray current interference problem as well as the difficulty in spatial security for system installation, however, came to a ramification of which each owner couldn't resolve for himself. In this respect, this paper illustrates a field-diagnosed example for mutual interference due to separately operated CP systems and suggests an alternative method to overcome the interference situation by design and field-assessment of a common anode bed cathodic protection system.

  • PDF

Secure and Efficient Access Control Protocol in Digital Broadcasting System (디지털 방송에서 안전하고 효율적인 접근 제어 프로토콜)

  • Lee, Ji-Seon;Kim, Hyo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.32-43
    • /
    • 2010
  • IPTV is an emerging technology that combines both broadcasting and tele-communication technologies, and provides various multi-media contents to the service subscribers. In general, IPTV broadcasters transmit scrambled signals (multi-media contents) to the paying subscribers, and the users within the acknowledged network descramble the signals using the smart-card. That is, users are verified through communication between STB (Set-Top Box) and smart-card. In 2004, Jiang et al. proposed a secure protocol regarding the verification process. The method has been modified and enhanced by several following research works. However, all the methods that have been proposed so far required modular exponentiation operations which may raise the smart-card costs. In this paper, we propose a new efficient mutual authentication and session-key establishment protocol using only hash functions and exclusive-or operations, and show that the proposed protocol is still secure under various security attacks.

An Anonymous Authentication Scheme for Health Information Push Service Based on Indoor Location in Hospital (병원 실내 위치기반 의료정보 푸쉬 서비스를 위한 익명 인증 스킴)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.410-419
    • /
    • 2012
  • This paper proposes a secure and efficient anonymous authentication scheme for health information push service based on indoor location in hospital. The proposed scheme has the following benefits: (1)It is just based on a secure one-way hash function for avoiding complex computations for both health care operations users and health care centers. (2)It does not require sensitive verification table which may cause health care centers to become an attractive target for numerous attacks(e.g., insertion attacks and stolen-verifier attacks), (3)It provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As result, the proposed scheme is very suitable for various location-based medical information service environments using lightweight-device(e.g., smartphone) because of very low computation overload on the part of both health care operations users and health care centers.

Power Support Device (PSD) Based Authentication Protocol for Secure WiBro Services (안전한 WiBro 서비스를 위한 PSD(Power Support Device) 기반 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.3
    • /
    • pp.727-733
    • /
    • 2008
  • An authentication between a user's terminal and a Access Control Router (ACR) is preceded so that a user receives secure WiBro services. Otherwise they can be exposed from many attack risks. So the Telecommunications Technology Association (TTA) constituted a mechanism of the mutual authentication for WiBro service. In mechanism a user executes the mutual authentication between a Portable Equipment (PE) and the ACR by using Portable Internet Subscriber Identity Module (PISIM). But this standard needs many message to authenticate the ACR and the users cann't use wireless Internet service. Therefore in this paper we propose the key agreement protocol between the PSS and the ACR to authenticate the PSS to ACR. At this time Power Support Device (PSD) fer supporting the calculated quantity of the PSS is participated in the key agreement protocol. The ACR sends a generated key to Key Authentication Server (KAS) via secure IPsec tunnel and then it preserves the identity of the PSS and the value of key after it enciphered them. In conclusion we analyze the security and efficiency of the proposed protocol.

A Study on the Effectiveness of Investment Protection in North Korea (대북 투자보호의 실효성 제고 방안에 대한 고찰)

  • Hyun-suk Oh
    • Journal of Arbitration Studies
    • /
    • v.33 no.2
    • /
    • pp.53-83
    • /
    • 2023
  • The investment agreement prepared at the beginning of inter-Korean economic cooperation in 2000 can be evaluated as very ineffective as a product of mutual political and diplomatic compromise rather than an effective protection for our investment assets. South Korean companies suffered a lot of losses due to the freezing of assets in the Geumgang mountain district and the closure of the Kaeseung Industrial Complex, but they did not receive practical damage relief due to institutional vulnerabilities. Currently, North Korea is under international economic sanctions of the UN Security Council, so it is true that the resumption of inter-Korean economic cooperation is far away, but North Korea's human resources and geographical location are still attractive investment destinations for us. Therefore, if strained relations between the two Koreas recover in the future and international economic sanctions on North Korea are eased, Korean companies' investment in North Korea will resume. However, the previous inter-Korean investment agreement system was a fictional systemthat was ineffective. Therefore, if these safety devices are not reorganized when economic cooperation resumes, unfair damage to Korean companies will be repeated again. The core of the improved investment guarantee system is not a bilateral system between the two Koreas, but the establishment of a multilateral system through North Korea's inclusion in the international economy. Specifically, it includes encouraging North Korea to join international agreements for the execution of arbitration decisions, securing subrogation rights through membership of international insurance groups such as MIGA, creating matching funds by international financial organizations. Through this new approach, it will be possible to improve the safety of Korean companies' investment in North Korea, and ultimately, it will be necessary to lay the foundation for mutual development through economic cooperation between the two Koreas.

  • PDF

The study about role of enforcement stage in safety activity for the international conference (국제회의 안전활동에 있어서 실시단계의 역할에 관한 연구)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.387-416
    • /
    • 2013
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference which can be held hereafter. On the basis of security activity problems originating in G20 summit meeding that had been held in Seoul in 2010. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Seoul G20 summit meeding and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role of event site activity stage for international conference are as followings; First, 'security protocol section' protocol and security are needed mutual win-win enough to be compared with adaptative relationship, thereby being demanded the closer cooperation and information exchange. Second, 'situation management section' there is a need of reinforcing the cooperative system between situation rooms of each agency in order to possibly operate all of the security manpower integrally, which are dispersed by function and by event site, in addition to the swift and organic information exchange between wide-area local government and all the security agencies focusing on a preparation planning group. Third, 'security manpower resource management section' there is a need of encouragement and interest in the leadership in order to devise system that all of the security manpower can concentrate on event and to be possibly satisfied the given conditions. Fourth, 'local government cooperative support section' the wide-area local government of a hosting city as international city operates several kinds of the facilities for international conference, supports operation of conference, achieves a ripple effect of event such as tourism, maximizes service of accomodations, and performs the primary responsibility for the maintenance of the traffic facilities, thereby needing to execute special inspection under the responsibility of Si-Do governors.

  • PDF

A study on the developmental plan of Alarm Monitoring Service (기계경비의 발전적 대응방안에 관한 연구)

  • Chung, Tae-Hwang;So, Seung-Young
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.145-168
    • /
    • 2010
  • Since Alarm Monitoring Service was introduced in Korea in 1981, the market has been increasing and is expected to increase continually. Some factors such as the increase of social security need and the change of safety consciousness, increase of persons who live alone could be affected positively on Alarm Monitoring Service industry. As Alarm Monitoring Service come into wide use, the understanding of electronic security service is spread and consumer's demand is difficult, so consideration about new developmental plan is need to respond to the change actively. Electronic security system is consist of various kinds of element, so every element could do their role equally. Alarm Monitoring Service should satisfy consumer's various needs because it is not necessary commodity, also electronic security device could be easily operated and it's appearance has to have a good design. To solve the false alarm problem, detection sensor's improvement should be considered preferentially and development of new type of sensor that operate dissimilarly to replace former sensor is needed. On the other hand, to settle the matter that occurred by response time, security company could explain the limit on Alarm Monitoring System to consumer honestly and ask for an understanding. If consumer could be joined into security activity by security agent's explanation, better security service would be provided with mutual confidence. To save response time the consideration on the introduction of GIS(Global Information System) is needed rather than GPS(Global Positioning System). Although training program for security agents is important, several benefits for security agents should be considered together. The development of new business model is required for preparation against market stagnation and the development of new commodity to secure consumer for housing service rather than commercial facility service. for the purpose of those, new commodity related to home-network system and video surveillance system could be considered, also new added service with network between security company and consumer for a basis is to be considered.

  • PDF

Relation of Social Security Network, Community Unity and Local Government Trust (지역사회 사회안전망구축과 지역사회결속 및 지방자치단체 신뢰의 관계)

  • Kim, Yeong-Nam;Kim, Chan-Sun
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.7-36
    • /
    • 2015
  • This study aims at analyzing difference of social Security network, Community unity and local government trust according to socio-demographical features, exploring the relation of social Security network, Community unity and local government trust according to socio-demographical features, presenting results between each variable as a model and verifying the property of mutual ones. This study sampled general citizens in Gwangju for about 15 days Aug. 15 through Aug. 30, 2014, distributed total 450 copies using cluster random sampling, gathered 438 persons, 412 persons of whom were used for analysis. This study verified the validity and credibility of the questionnaire through an experts' meeting, preliminary test, factor analysis and credibility analysis. The credibility of questionnaire was ${\alpha}=.809{\sim}{\alpha}=.890$. The inout data were analyzed by study purpose using SPSSWIN 18.0, as statistical techniques, factor analysis, credibility analysis, correlation analysis, independent sample t verification, ANOVA, multi-regression analysis, path analysis etc. were used. the findings obtained through the above study methods are as follows. First, building a social Security network has an effect on Community institution. That is, the more activated a, the higher awareness on institution. the more activated street CCTV facilities, anti-crime design, local government Security education, the higher the stability. Second, building a social Security network has an effect on trust of local government. That is, the activated local autonomous anti-crime activity, anti-crime design. local government's Security education, police public oder service, the more increased trust of policy, service management, busines performance. Third, Community unity has an effect on trust of local government. That is, the better Community institution is achieved, the higher trust of policy. Also the stabler Community institution, the higher trust of business performance. Fourth, building a social Security network has a direct or indirect effect on Community unity and local government trust. That is, social Security network has a direct effect on trust of local government, but it has a higher effect through Community unity of parameter. Such results showed that Community unity in Gwangju Region is an important factor, which means it is an important variable mediating building a social Security network and trust of local government. To win trust of local residents, we need to prepare for various cultural events and active communication space and build a social Security network for uniting them.

  • PDF