• 제목/요약/키워드: secure solution

검색결과 355건 처리시간 0.028초

IoT 디바이스를 위한 MTM 기반의 안전한 OTP 생성기 구현 (Implementation of a MTM-based secure OTP Generator for IoT Devices)

  • 김영세;한진희;전용성;김정녀
    • 대한임베디드공학회논문지
    • /
    • 제10권4호
    • /
    • pp.199-206
    • /
    • 2015
  • In this paper, we present the implementation of a secure OTP(One Time Password) generator for IoT(Internet of Things) devices. Basically, MTM(Mobile Trusted Module) is used and expanded considering secure IoT services. We combine the MTM architecture with a new hardware-based OTP generation engine. The new architecture is more secure, offering not only the security of devices but also that of the OTP service. We have implemented and verified the MTM-based OTP generator on a real mobile platform embedded with the MTM chip. The proposed method can be used as a solution for enhancing security of IoT devices and services.

차세대 USN기반의 스마트 플랜트안전 프레임워크 개발 (SPSF : Smart Plant Safety Framework based on Reliable-Secure USN)

  • 정지은;송병훈;이형수
    • 정보통신설비학회논문지
    • /
    • 제9권3호
    • /
    • pp.102-106
    • /
    • 2010
  • Recently process industries from oil and gas procedures and mining companies to manufactures of chemicals, foods, and beverages has been exploring the USN (Ubiquitous Sensor Networks) technology to improve safety of production processes. However, to apply the USN technology in the large-scale plant industry, reliability and security issues are not fully addressed yet, and the absence of the industrial sensor networking standard causes a compatibility problem with legacy equipment and systems. Although this situation, process industry such as energy plants are looking for the secure wireless plant solution to provide detailed, accurate safety monitoring from previously hard-reach, unaccordable area. In this paper, SPSF (Smart Plant Safety Framework based on Reliable-Secure USN) is suggested to fulfill the requirements of high-risk industrial environments for highly secure, reliable data collection and plant monitoring that is resistant to interference. The SPSF consists of three main layers: 1) Smart Safety Sensing Layer, 2) Smart Safety Network Layers, 3) Plant Network System Layer.

  • PDF

사회 공학적 공격에 대응하는 색 기반 스마트폰 가상 키보드 (Virtual Keyboard against Social Engineering Attacks in Smartphones)

  • 최동민;백철헌;정일용
    • 한국멀티미디어학회논문지
    • /
    • 제18권3호
    • /
    • pp.368-375
    • /
    • 2015
  • Nowaday, financial institutions provide secure mobile keyboard solutions to keep their mobile banking services safe. However, these are still vulnerable to attacks, such as shoulder surfing attack. Especially, in the case of handicapped person such as visual impairment and blindness, they are more vulnerable than ordinary person because of inconvenience of secure information input. Among them, we focused on the color blind. For the color blind, 4-color based secure keyboard method causes more inconvenience to notify exact color. Thus, we propose a secure mobile keyboard solution to provide advanced functionality for the color blind users. Our method is based on 4-color theorem to support color blind users. In addition, our scheme is robust against shoulder surfing attack. According to the evaluation result, our method offers increased security against shoulder surfing attack compare with existing methods.

정보보호 필요에 따른 클라우드 기반의 안전한 파일관리 보안솔루션 연구 (A Study on Cloud-Based Secure File Management Security Solutions According yo Information Protection Needs)

  • 김희철
    • 한국전자통신학회논문지
    • /
    • 제14권1호
    • /
    • pp.243-250
    • /
    • 2019
  • 본 연구는 클라우드 환경에서 매체기반의 SFMS(: Secure File Management Security) 개발을 통하여 블루투스 기반의 암호모듈을 이용하여 컴퓨터에서 클라우드 데이터를 암 복호화 한다. 블루투스 암호모듈은 클라우드에 저장된 파일을 손쉽게 열람 가능하지만 모듈이 없으면 절대 열람이 불가능하다. 최근 이슈화 되고 있는 해킹이나 개인자료유출 등의 문제점을 근본적으로 차단하는 솔루션이라 할 수 있다.

SecuROS 에서 개발된 사용자 및 프로그램 인터페이스 (Secure User and Program Interface for SecuROS)

  • 두소영;고종국;은성경;김정녀;공은배
    • 정보처리학회논문지C
    • /
    • 제8C권5호
    • /
    • pp.557-564
    • /
    • 2001
  • 공개 운영체제인 Linux와 FreeBSD는 무료이면서 그 성능이 우수하여 많은 사람들이 사용하고 있다. 개방성은 중요한 특징이지만 공개된 커널의 원천코드는 자주 해커들에 의해서 공격당하는 문제점이 되기도 한다. 본 논문에서는 이러한 문제점을 해결하기에 가장 적합한 해결책인 보안운영체제 SecuROS에 대해서 설명하고, 보안운영체제의 활성화를 돕기 위해 필수적인 표준화된 사용자 및 프로그래머 인터페이스에 대해서 소개한다. 개발된 보안운영체제는 MAC과 ACL 접근통제를 사용하고 가장 일반적으로 사용되고 있는 POSIX 표준을 인터페이스 규격으로 따른다.

  • PDF

Single Sign-On을 적용한 네트워크 보안 모델링 (A Study on Network Security Modeling using Single Sign-On)

  • 서희석;김희완
    • 한국컴퓨터산업학회논문지
    • /
    • 제5권1호
    • /
    • pp.49-56
    • /
    • 2004
  • 인터넷 사용의 급증에 따라 대부분의 사용자들은 여러 웹 서버의 서비스를 사용하고 있으며 각 서버의 접속 사용자 ID 및 패스워드의 상이함으로 인해 혼선을 초래하기도 한다. 이러한 문제를 해결하기 위한 방법이 SSO(Single Sign-On)이다. 본 논문은 네트워크에 존재하는 다양한 서버 및 호스트에 접근하기 위한 550를 적용하여 침입 탐지 시스템과 침입 차단 시스템 등과 같은 보안 시스템의 관리를 수월하게 하고 네트워크 사용 및 관리를 효과적으로 수행하기 위한 모델링 방법을 제안한다 본 연구진이 제안하는 방법은 소규모 네트워크에서 적용하여 사용하기 수월하도록 구성하였으며 조직의 여러 데이터를 효과적으로 처리할 수 있도록 구성되었다. SSO의 구성은 인증서 기반의 PKI (Public Key Infrastructure)를 사용하여 구성하였으며 인증 통신을 위한 데이터 암호화를 SSL (Secure Socket Layer) 기반의 SHTTP (Secure Hyper Text Transfer Protocol)을 적용한다.

  • PDF

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

Use of Blockchain to Support the Security of Internet of Things: A Review

  • Saher Un Nisa;Maryam Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.149-154
    • /
    • 2023
  • Internet of Things (IoT) is now spreading everywhere. It's the technology of every person's need so we can't step back from IoT but we can secure it as it is spreading quickly so it has greater chances of danger and being misused. There is an urgent need to make IoT devices secure from getting cracked or hacked. A lot of methods had tried and still trying to mitigate IoT security issues. In this paper Blockchain is going to be the solution of most of the IoT issues or problems. We have discussed or highlighted security issues with centralized IoT and then provided solution of such security challenges through the use of blockchain because is based on a decentralized technology that is hard to modify or update.

IPv6 환경에서의 Secure Packet 전송을 위한 DHCPv6 시스템 개발 (The System of DHCPv6 for Secure Packet Transition in IPv6 Environment)

  • 윤상윤;정진욱
    • 융합보안논문지
    • /
    • 제3권3호
    • /
    • pp.1-6
    • /
    • 2003
  • 인터넷이 급속히 발전함에 따라 기존 IPv4 프로토콜이 안고 있는 데이터 서비스의 새로운 기술도입에 관한 문제와 향후 인터넷 주소부족 문제를 해결하기 위한 궁극적인 해결책으로 IPv6가 제시되었고, 점차적으로 IPv4에서 IPv6로의 전이가 이루어질 것으로 예상하고 있다. Ipv6 환경에서는 보안정책을 적용하기가 용이할 뿐만 아니라 Header 자체에서 그 내용을 포함할 수 있도록 구성이 되어 있음으로 보안정책이 적용된 안전한 Packet을 전송할 수 있다. 이러한 이유로 본 논문에서는 IPv6 망과 IPv4 망을 연동시키기 위하여 DHCPv6 Server를 구현하였고 Client 단에서 보안정책을 적용한 Secure Packet을 적용할 수 있도록 하였다. 또한 DHCPv6 Server 내부에 이들 Message를 처리하도록 구현함으로써 향 후 Ipv6 환경에서 적용할 수 있도록 하였다.

  • PDF

A Study on u-paperless and secure credit card delivery system development

  • Song, Yeongsim;Jang, Jinwook;jeong, Jongsik;Ahn, Taejoon;Joh, Joowan
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.83-90
    • /
    • 2017
  • In the past, when the credit card was delivered to the customer, the postal agreement and receipt were signed by customer. The repossessed documents were sent back to the card company through the reorganization process. The card company checks the error by scanning and keeps it in the document storage room. This process is inefficient in cost and personnel due to delivery time, document print out, document sorting, image scanning, inspection work, and storage. Also, the risk of personal data spill is very high in the process of providing personal information. The proposed system is a service that receives a postal agreement and a receipt to a recipient when signing a credit card, signing the mobile image instead of paper, and automatically sending it to the card company server. We have designed a system that can protect the cost of paper documents, complicated work procedures, delivery times and personal information. In this study, we developed 'u-paperless' and secure credit card delivery system applying electronic document and security system.