• Title/Summary/Keyword: mutual security

Search Result 476, Processing Time 0.039 seconds

Effective RFID Authentication Using Hash Function (해시 함수를 이용한 효율적인 RFID 인증)

  • Shin, Hyo-Young;Jung, Gye-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1171-1177
    • /
    • 2010
  • Recently RFID system is used in various fields such as distribution industry, medical industry and military service. The technology for protecting individual privacy is necessary to adapt RFID system in several applications. This paper proposes an authentication protocol which conducts mutual authentication between back-end database and tag using hash function. The proposed protocol satisfies various RFID security requirements : mutual authentication, anonymity, confidentiality, integrity, replay attack, location trace. This protocol reduces the time for authentication minimizing the number of hash operation in back-end database.

Evaluation of Similarity Analysis of Newspaper Article Using Natural Language Processing

  • Ayako Ohshiro;Takeo Okazaki;Takashi Kano;Shinichiro Ueda
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.1-7
    • /
    • 2024
  • Comparing text features involves evaluating the "similarity" between texts. It is crucial to use appropriate similarity measures when comparing similarities. This study utilized various techniques to assess the similarities between newspaper articles, including deep learning and a previously proposed method: a combination of Pointwise Mutual Information (PMI) and Word Pair Matching (WPM), denoted as PMI+WPM. For performance comparison, law data from medical research in Japan were utilized as validation data in evaluating the PMI+WPM method. The distribution of similarities in text data varies depending on the evaluation technique and genre, as revealed by the comparative analysis. For newspaper data, non-deep learning methods demonstrated better similarity evaluation accuracy than deep learning methods. Additionally, evaluating similarities in law data is more challenging than in newspaper articles. Despite deep learning being the prevalent method for evaluating textual similarities, this study demonstrates that non-deep learning methods can be effective regarding Japanese-based texts.

Improvements of a Group key Management based on (2,2) Secret Sharing

  • Yong, Seunglim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.73-78
    • /
    • 2016
  • In 2014, Wuu et al. proposed a group key management scheme based on (2,2) secret sharing. They asserted that their scheme satisfies security requirements and mutual authentication. But this paper pointed out that their scheme does not satisfy mutual authentication and impersonating attack. In this paper, we describe the reasons and processes that a malicious group member can impersonate the Group Key Distributor. To fill the gaps, we discuss the problems, and propose an improved protocol.

Building Cooperation Policing Systems and Roles of Private Security (협력치안체제구축과 민간경비의 역할)

  • Seok, Cheong-Ho
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.67-90
    • /
    • 2010
  • Today, the police alone can not prevent a crime. And the police is limited to meet for people's the increased needs on public safety. So the police and the community needs the cooperation of a variety of resources. Police in cooperation with community resources to respond to the crime's most professional and the private sector is a private security. However, the role of private security for cooperation policing is insufficient in South Korea. So for this study to build a cooperative policing in South Korea as private security for the following four kinds of directions are presented. First, as a private security of the United States and Japan, specializes in diversified business sectors. Simple human-oriented private security of the building security get out. Instead, take the high-tech crime prevention or industry complex security should be changed to a professional organization. Second, the interaction between police and private security should be increased. Police and private security through regular meetings between the need for mutual interests and build consensus is needed. The role of private security companies to be represented on the Security Association of South Korea's active role in the matter. Third, efforts to improve the image of private security activities and the publiciy activity of private security is needed. Some of the private security in an effort to escape a negative image to the people and actively promote a positive image is necessary. Finally, for South Korea to the level the cooperation between the police and private security are required to develop system models. Front-line policing priority in the field and the mutual understanding between the police and private security in an effort to have a positive perception is needed. Equal partners, especially the police and private security to private security companies to have recognized experts in their own recruitment and training should be improved by strengthening the expertise.

  • PDF

Fact and plan on specialist training for social security (사회안전관리에 대한 전문인력 양성실태와 발전방안)

  • Kong, Bae-Wan;Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.5-18
    • /
    • 2002
  • The private security has been one of the fastest growing parts of the law enforcement industry, confronted with mutual coincidence or complementarity. Therefore, the primary factor in order to straighten it up should be bringing op a person, because he or she arranges the private security, based on the society in the end. In addition, it is suggested that further study of technical learning and its practice should be arranged. Because the education for agents undertaking the social security is comprehensive in space and limited in time, it may accompany hardship in arranging its content and curriculum Although this article leaves much to be desired, it has been analyzed end observed if a greater emphasis is placed on ample human resources supply for increased demand on social security in private law enforcement industry through institutional education system. A scientific advancement is expected to be attained in the majors related to the private security, with validity that the continuous studies should be implemented, and a social role of colleges as a specialized institute should be erected.

  • PDF

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

OAuth based Proxy Delegation Service (OAuth 기반의 대리 인증서 위임 서비스)

  • Heo, Daeyoung;Hwang, Suntae
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.55-62
    • /
    • 2012
  • Grid web applications by standard Web technology are increasingly used to provide grid service to users as normal Web user interface and service. It is however difficult to integrate a grid security system such as Grid Security Infrastructure (GSI) into Web applications because the delegation way of standard Web security is not the same as the one of Grid security. This can be solved by allowing Web applications to get a Grid credential by using an online credential repository system such as MyProxy. In this paper, we investigate the problem that occurs when MyProxy, which assumes mutual trust between a user and Grid web application, is adapted for achieving security integration between Web and Grid, and we propose a new Grid proxy delegation service to delegate a Grid credential to the Web without assuming mutual trust. In the service, the X.509 proxy delegation process is added to OAuth protocol for credential exchange, and authentication can be done by an external service such as OpenID. So, users can login onto the Grid web application in a single sign-on manner, and are allowed to securely delegate and retrieve multiple credentials for one or more Virtual Organizations.

A Study Related on Relationship between New Terrorism's and Security Strategy for Korea (뉴테러리즘의 민간시큐리티 연계와 발전방안)

  • Kang, Min-Wan
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.1-13
    • /
    • 2008
  • Conclusion is like below. First, as a private security area's mutual relationship and development device, it is necessary to bring up corresponding-terror expert. Second, a privatized corresponding-terror research center is necessary. Third, the importance of privatization's role for the corresponding-terror prevention law establishment. It is considered that a diversified examination research that can minimize a violation of human rights by bringing up various corresponding-terror expert, paradigm shift of workers related security area, and construct corresponding- terror education equipment as well as education content, it is not a special group's authority, should be continued by a following research. Academical area of terrorism's construction is necessary. You need to approach by private initiatively boldly with the academic world as an active mutual cooperation politically, culturally, socially, internationally, etc, rather than developing national institute initiatively. Also, in a following research, an academical research about a correlation of crime, war, terror should be done deeply, variously. It is necessary to establish an academic foundation of terror study.

  • PDF

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.