• Title/Summary/Keyword: replay

Search Result 317, Processing Time 0.023 seconds

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

Analysis and Improved Solution of Hussian et al.'s Authentication Protocol for Digital Rights Management

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.67-74
    • /
    • 2023
  • In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user. Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.

Key-Agreement Protocol between IoT and Edge Devices for Edge Computing Environments (에지 컴퓨팅 환경을 위한 IoT와 에지 장치 간 키 동의 프로토콜)

  • Choi, Jeong-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.23-29
    • /
    • 2022
  • Recently, due to the increase in the use of Internet of Things (IoT) devices, the amount of data transmitted and processed to cloud computing servers has increased rapidly. As a result, network problems (delay, server overload and security threats) are emerging. In particular, edge computing with lower computational capabilities than cloud computing requires a lightweight authentication algorithm that can easily authenticate numerous IoT devices.In this paper, we proposed a key-agreement protocol of a lightweight algorithm that guarantees anonymity and forward and backward secrecy between IoT and edge devices. and the proposed algorithm is stable in MITM and replay attacks for edge device and IoT. As a result of comparing and analyzing the proposed key-agreement protocol with previous studies, it was shown that a lightweight protocol that can be efficiently used in IoT and edge devices.

A Study on Playback of Ship Collision Accident Using Free Running Model Test (자유항주 모형시험을 활용한 선박 충돌사고 재현에 관한 연구)

  • Hansol Park;Nam Sun Son;Chun Seon Pyo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.60 no.6
    • /
    • pp.450-459
    • /
    • 2023
  • According to Korea Maritime Safety Tribunal, there have been 14,100 maritime accidents from 2017 to 2021. Among those accidents, ship collision accidents have been up to 1,275 cases. But in the accidents relating to small ships like a fishing vessel, analyzing the causes of the accidents would depend on statements of the persons related because there is often no navigational data. But those statements can be incorrect and give rise to disagreements between them so that it causes conflicts with each other during the trial. So a replay system of ship collision accident (RESCA) has been developed in order to reproduce the ship collision accident by using AIS, V-PASS or radar data. But the reproduced trajectory of ship collision accident is needed to be verified because it can be unreasonable physically. So a method to verify the reproduced trajectory and collect the physical data on ship collision accident is newly designed by using free running test. In the RESCA, the accident is reproduced using the navigational data from the trajectory for a ship and measured from free running model test for the other ship at the same time. Through free running test, the behavior of the model ship is transformed from model scale into real scale. In order to check into the accuracy of the new method, free running model tests by using RESCA are carried out on the actual ship collision accidents.

Problem Analysis and Enhancement of 'An Improved of Enhancements of a User Authentication Scheme'

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.53-60
    • /
    • 2024
  • In this paper, we analyze the authentication scheme of Hwang et al. proposed in 2023 and propose a new authentication scheme that improves its problems. Hwang et al. claimed that their authentication scheme was practical and secure, but as a result of analysis in this paper, it is possible to attack the password/ID guessing attack and session key disclosure attack due to insider attack and stolen smart card attack. In addition, Hwang et al.'s authentication scheme, which provides user anonymity, does not provide user untraceability due to its unstable design. The proposed authentication scheme, which improves these problems, not only provides user untraceability, but also is secure for stolen smart card attack, insider attack, session key disclosure attack, and replay attack. In addition, except for one fuzzy extraction operation, it shows the same complexity or very similar one as related authentication schemes. Therefore, the proposed authentication scheme can be said to be an authentication scheme with safety and practicality.

Trust to Share: Investigating the Key Factors to Influence Tenants' Participation in Online Short-Term Rent

  • Liuye Yu;Zhixia Zang;Xue Yang
    • Asia pacific journal of information systems
    • /
    • v.29 no.2
    • /
    • pp.308-327
    • /
    • 2019
  • The concept of sharing economy has received rich attention in recent years. As a typical type of business model in the sharing economy, online short rent has been paid attention by both industry and academia. In this study, we find trust to be a critical determinant to the success of online short rent platforms. Based on three dimensions of trust theory, i.e., ability, benevolence and integrity, we investigate the factors influencing tenant' willingness to participate in online short rent. We further examine the extent to which trust can influence the number of sales and comments of rooms listed at online short-term rent platforms, which can represent tenant' willingness to participate in the sharing economy. The results show that the trust dimensions represented by a landlord's personal characteristics have significant positive correlations with the number of sales and comments. For example, the real name authentication and the sesame score can represent the trust integrity; online replay ratio and the average confirmation time representing the trust sincerity, and the order acceptance ratio representing the trust ability. On this basis, we proposed some recommendations for both platforms and landlords. For example, the landlords can improve the tenants' trust by authenticating his/her real name, replying actively and timely. For platforms, when they make housing list ranking rules, they can take the landlord's personal attributes that may affect trust into consideration. Moreover, platforms can also allow landlords to supply value-added services to improve service quality and ultimately promote the virtuous circle of the platform ecosphere. Through conducting the empirical research on a particular application of the sharing economy, we aim to fill the research gap of this field in China and provide theoretical and practical contributions to the future development of online short rent.

A Study on Replay Experiments and Thermal Analysis for Autoignition Phenomenon of Shredded Waste Tires (폐타이어 분쇄물의 자연발화현상에 대한 재연실험 및 열분석에 관한 연구)

  • Koh, Jae Sun;Jang, Man Joon
    • Fire Science and Engineering
    • /
    • v.26 no.6
    • /
    • pp.99-108
    • /
    • 2012
  • These days, spontaneous ignition phenomena by oxidizing heat frequently occur in the circumstances of processing and storing waste tires. Therefore, to examine the phenomena, in this work, this researcher conducted the tests of fires of fragmented waste tires (shredded tire), closely investigated components of the fire residual materials collected in the processing and storing place, and analyzed the temperature of the starting of the ignition, weight loss, and heat of reaction. For the study, this researcher conducted fire tests with fragmented waste tires in the range of 2.5 mm to 15 mm, whose heat could be easily accumulated, and performed heat analysis through DSC and TGA, DTA, DTG, and GC/MS to give scientific probability to the possibility of spontaneous ignition. According to the tests, at the 48-hour storage, rapid increase in temperature ($178^{\circ}C$), Graphite phenomenon, smoking were observed. And the result from the DTA and DTG analysis showed that at $166.15^{\circ}C$, the minimum weight loss occurred. And, the result from the test on the waste tire analysis material 1 (Unburnt) through DSC and TGA analysis revealed that at $180^{\circ}C$ or so, thermal decomposition started. As a result, the starting temperature of ignition was considered to be $160^{\circ}C$ to $180^{\circ}C$. And, at $305^{\circ}C$, 10 % of the initial weight of the material reduced, and at $416.12^{\circ}C$, 50 % of the intial weight of the material decreased. The result from the test on oxidation and self-reaction through GC/MS and DSC analysis presented that oxidized components like 1,3 cyclopentnadiene were detected a lot. But according to the result from the heat analysis test on standard materials and fragmented waste tires, their heat value was lower than the basis value so that self-reaction was not found. Therefore, to prevent spontaneous ignition by oxidizing heat of waste tires, it is necessary to convert the conventional process into Cryogenic Process that has no or few heat accumulation at the time of fragmentation. And the current storing method in which broken and fragmented materials are stored into large burlap bags (500 kg) should be changed to the method in which they are stored into small burlap bags in order to prevent heat accumulation.

A study on the user's emotional change when they are using a product by using emotional word logging software (감성어휘 로깅 소프트웨어를 이용한 제품 사용중 사용자의 감성변화 연구)

  • Jeong, Sang-Hoon;Lee, Kun-Pyo
    • Science of Emotion and Sensibility
    • /
    • v.9 no.spc3
    • /
    • pp.167-177
    • /
    • 2006
  • In this study, we developed a tool for measuring user's emotions expressed while using a product in the natural and accessible environment for the design field. Also, using emotional word logging software VideoTAME, we measured a user's emotions expressed while using a product. In the testing module of VideoTAME, participants evaluate their emotional changes through playing and watching the video clips of their performing tasks in the experiment room. In the analyzing module, the researchers replay the results created by participants during the experiment and analyze the results using Microsoft Excel. In this research, we have asked users to examine their emotional changes while watching the recorded video clip of them in the experiment room performing a series of tasks using a cellular phone. In this experiment, there were no big differences in the representative emotions expressed for each characteristics of task. The reason for this can be assumed it is because of the emotional changes occurred while facing specific situations when performing a task rather than the task itself. If more data is collected and concrete statistical analysis is done, it is expected that we can clarify what effect a product's usability has on user's emotions.

  • PDF

Lazy Garbage Collection of Coordinated Checkpointing Protocol for Avoiding Sympathetic Rollback (동기적 검사점 기법에서 불필요한 복귀를 회피하기 위한 쓰레기 처리 기법)

  • Chung, Kwang-Sik;Yu, Heon-Chang;Lee, Won-Gyu;Lee, Seong-Hoon;Hwang, Chong-Sun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.6
    • /
    • pp.331-339
    • /
    • 2002
  • This paper presents a garbage collection protocol for checkpoints and message logs which are staved on the stable storage or volatile storage for fault tolerancy. The previous works of garbage collections in coordinated checkpointing protocol delete all the checkpoints except for the last checkpoints on earth processes. But implemented in top of reliable communication protocol like as TCP/IP, rollback recovery protocol based on only last checkpoints makes sympathetic rollback. We show that the old checkpoints or message logs except for the last checkpoints have to be preserved in order to replay the lost message. And we define the conditions for garbage collection of checkpoints and message logs for lost messages and present the garbage collection algorithm for checkpoints and message logs in coordinated checkpointing protocol. Since the proposed algorithm uses process information for lost message piggybacked with messages, the additional messages for garbage collection is not required The proposed garbage collection algorithm makes 'the lazy garbage collectioneffect', because relying on the piggybacked checked checkpoint information in send/receive message. But 'the lazy garbage collection effect'does not break the consistency of the whole systems.