• Title/Summary/Keyword: secure solution

Search Result 358, Processing Time 0.024 seconds

A study of Web Service Security System using the Secure Network Transfer Message (안전한 네트워크 전송 메시지를 이용한 웹 서비스 보안 시스템에 관한 연구)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.850-853
    • /
    • 2008
  • As th Internet grew rapidly, the Electronic Commerce that is based on Internet increased. The Electronic Commerce is unsubstantial in the mutual authentication between the parties and a commerce As a solution to this issue, a Web server uses a Client Message technology. The purpose of Client Message is to validate the user and the electronic commercial transaction. Further, it increases efficiency and offers several ability at various purposes. However, the Client Message is transferred and stored as an unencrypted text file, the information can be exposed easily to the network threats, end system threats, and Client Message harvesting threats. In this paper designed by used crypto algorithm a Secure Message as a solution to the issue have proposed above. Further, designed a security service per Network transmitting message to transfer client's user input information to a Web server safety.

  • PDF

A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V

  • Xu, Cheng;Huang, Xiaohong;Ma, Maode;Bao, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2841-2860
    • /
    • 2018
  • Vehicular networks play an important role in current intelligent transportation networks and have gained much attention from academia and industry. Vehicular networks can be enhanced by Long Term Evolution-Vehicle (LTE-V) technology, which has been defined in a series of standards by the 3rd Generation Partnership Project (3GPP). LTE-V technology is a systematic and integrated V2X solution. To guarantee secure LTE-V communication, security and privacy issues must be addressed before the network is deployed. The present study aims to improve the security functionality of vehicular LTE networks by proposing an efficient and secure ID-based message authentication scheme for vehicular networks, named the ESMAV. We demonstrate its ability to simultaneously support both mutual authentication and privacy protection. In addition, the ESMAV exhibit better performance in terms of overhead computation, communication cost, and security functions, which includes privacy preservation and non-frameability.

Secure OS Technical Development Trend (안전한 운영체제 기술개발 동향)

  • 김재명;이규호;김종섭;김귀남
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.9-20
    • /
    • 2001
  • In the 3rd Wave of information revolution, technical research & development for more rapid and safe information exchange take a sudden turn currently According to a step up in importance and efficiency value of information, it's necessary to research technical development in various field altogether. Especially information security is the very core of essential technology. However most System attacks are based on the weakness of OS, it is difficult to achieve the security goal in the only application level. For the solution of this problem, so many technology researches to serve secure, trust information security in OS itself are activated. Consequently we introduce the tendency of current secure OS development projects of security kernel all over world in this report and inquire into security mechanism of the File Griffin which prevents file system forgery, modification perfectly by performing digital signature certificate on kernel level.

  • PDF

A Secure Protocol for High-Performance RFID Tag using Dynamic ID Allocating (동적 ID 할당을 이용한 고기능 RFID 태그용 보안 프로토콜)

  • Park Jin-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.642-648
    • /
    • 2006
  • In this paper, I have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

  • PDF

A Study on the Improvement Plan of AI Voucher Support Project based on the Perception of AI Solution Companies (AI 솔루션 기업 관점의 AI 바우처 지원사업 개선방안 연구)

  • Cho, Ji Yeon;Song, In-Kuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.149-156
    • /
    • 2022
  • In the recent pandemic situation, importance of artificial intelligence has been highlighted and major countries are making efforts to secure leadership in AI technology. The Korean government has been continuously expanding government investment to secure technological competitiveness. Despite the importance of efficient operation strategies for government-supported projects, related discussions rarely existed. Therefore, this study aims to analyze the AI voucher support project, which is a representative government project in the AI field, and to suggest improvement plans. An interview with AI solution companies was conducted, and issues in the process of promoting AI voucher support projects were identified through content analysis. Based on the analysis results, improvement plans were presented in stages of project preparation, progression, termination, and follow-up management. This study has significance in suggesting improvement plans for the government support project for the successful growth of the AI industry at a time when the importance of AI is increasing.

A Study on KSI-based Authentication Management and Communication for Secure Smart Home Environments

  • Ra, Gyeong-Jin;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.892-905
    • /
    • 2018
  • In smart home environment, certificate based signature technology is being studied by communication with Internet of Things(IoT) device. However, block - chain technology has attracted much attention because of the problems such as single - point error and management overhead of the trust server. Among them, Keyless Signature Infrastructure(KSI) provides integrity by configuring user authentication and global timestamp of distributed server into block chain by using hash-based one-time key. In this paper, we provide confidentiality by applying group key and key management based on multi - solution chain. In addition, we propose a smart home environment that can reduce the storage space by using Extended Merkle Tree and secure and efficient KSI-based authentication and communication with enhanced security strength.

A Study on the Development of a Virtual Card Number Generation System to Safety EC (안전한 전자상거래를 위한 가상카드번호 생성시스템의 개발에 관한 연구)

  • Choi, Joon-Kee;Lee, Jong-Kwang;Kang, Young-Chang
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.27-32
    • /
    • 2010
  • In this paper, we research a virtual card generation system to secure e-commerce. Network security has increased the need to meet rapidly growing trend. And the amount and quality of e-commerce expansion due to the need for secure commerce transactions has increased even more. Instead of exposing the actual credit card number, we expose a virtual card number on the network. It can prevent the risk of hacking. We proved that through various experiments.

Study on Optimal Power Flow Considering Voltage Stability Margin (전압안정도 여유를 고려한 최적조류계산에 관한 연구)

  • Kim, S.;Jeong, M.H.;Lee, B.;Song, K.Y.;NamGoong, J.;Choi, H.;Moon, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.3-6
    • /
    • 2000
  • In this paper the concept of voltage stability operating limit in optimal power flow problem is described. A methodology of optimal power flow considering voltage stability margin is proposed based on auxiliary constraint to get a secure dispatch solution. The look-ahead margin is used to shift dispatch solutions to the secure direction in proposed framework. The a1gorithm proposed is successfully tested on IEEE 30-bus system.

  • PDF

A Model-Based Analysis of Secure Video Transmission Based on IPSec and IPv4

  • Van, Quang-Dao;Wei, Anne;Geller, Benoit;Dupeyrat, Gerard
    • ETRI Journal
    • /
    • v.27 no.2
    • /
    • pp.219-222
    • /
    • 2005
  • A promising solution to protect wired Internet networks is to use the Secure Internet Protocol (IPSec); however, this has some drawbacks, particularly on the quality of service (QoS). This paper aims at evaluating the video traffic QoS in terms of end-to-end delay and packet loss rate. Based on some basic assumptions, our analysis shows that the performance with IPSec is rapidly inferior to the IPv4 performance. We thus suggest adding some QoS parameters into IPSec in order to achieve a compromise between QoS and security.

  • PDF

Secure Modulus Data Hiding Scheme

  • Kuo, Wen-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.600-612
    • /
    • 2013
  • In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when the embedding function is disclosed. Our proposed secure data hiding scheme remedies this disclosure shortcoming by employing an additional modulus function. The provided security analysis of our scheme demonstrates that attackers cannot get the secret information from the stegoimage even if the embedding function is made public. Furthermore, our proposed scheme also gives a simple solution to the overflow/underflow problem and maintains high embedding capacity and good stegoimage quality.