• Title/Summary/Keyword: security requirement

Search Result 393, Processing Time 0.037 seconds

Improving the Electronic Program Guide Development Process using PODA Specification Method (FODA 명세 기법을 활용한 전자프로그램가이드 개발 프로세스의 효율성 향상 방안)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.73-79
    • /
    • 2016
  • EPG (Electronic Program Guide), which shows the title, broadcasting time, genre, parental rating of a program, is recognized as one of the most successful data service by viewers and broadcasting stations, who want an improved TV watching experience and a more fruitful profit model, respectively. In the circumstance, the request for the development or renewal of EPG frequently occurs and so the developers are looking for ways to improve the efficiency of the EPG development. This paper addresses the need of the developers by devising an EPG feature model based on FODA (Feature-Oriented Domain Analysis) and the testcases of each feature of the model. By utilizing the EPG feature model and the testcases, the tasks of requirement analysing and testcase designing, which are major tasks of the EPG development process, can be improved.

Challenges and solutions for Internet of Things Driven by IPv6

  • Emad-ul-Haq, Qazi;Aboalsamh, Hatim;Belghith, Abdelfettah;Hussain, Muhammad;Abdul, Wadood;Dahshan, Mostafa H.;Ghouzali, Sanaa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4739-4758
    • /
    • 2015
  • The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devices to the Internet as well as offering new services. Internet of Things, which provides interconnected uniquely identifiable devices in the existing Internet infrastructure, will be greatly affected by the lack of unique IP addresses. In order to connect to the existing Internet infrastructure, every new device needs a uniquely identified IP address for communication. It has been estimated that by the year 2020 more than 30 billion devices would be connected to the Internet. In order to meet the challenge of such vast requirement of unique IP addresses, the devices in IoT will have to adopt IPv6, which is the latest version of Internet Protocol. IPv6 uses 128-bit IP addresses and offers 2128 unique IP addresses. Therefore, it expands IPv4 and provides new features of end to end connections as well as new services. In this paper, the various challenges with respect to providing connectivity, security, mobility, etc., have been discussed and how IPv6 helps in meeting those challenges.

Efficient File System Level Encryption Mechanism Using HSM (HSM을 이용한 효율적인 파일시스템 암호화 메커니즘)

  • Kang, Cheol-Oh;Won, Jong-Jin;Park, Sung-Jin;Ryou, Jea-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.849-858
    • /
    • 2013
  • In today's mobile computing environment, there are many threats, such as device loss or theft, malware, to the sensitive information stored on end user device. To prevent disclosure of information, encryption and authentication method are properly adjusted to the device. In cryptographic file systems, CBC mode of operation has been commonly used. It requires an IV need not be secret, but must be unpredictable and protect integrity of the IV. In this paper, we propose file system-level encryption mechanism with HSM that satisfy the requirement of the IV and improve the performance. Moreover, Design and experimental results prove the efficiency of our proposed method.

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology (인터넷 쿠키로 인한 프라이버시 침해와 잊혀질 권리에 관한 연구)

  • Choi, Younsung;Kwon, Oh-Geol;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.77-85
    • /
    • 2016
  • Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.

A Study on the Implementation and Performance Analysis of 900 MHz RFID System with Convolution Coding (콘벌루션 부호를 적용한 900MHz 대역 RFID 시스템 구현 및 성능 분석에 관한 연구)

  • Yun Sung-Ki;Kang Byeong-Gwon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.1
    • /
    • pp.17-23
    • /
    • 2006
  • In recent years, RFID has received much attention because of spread usage in industrial applications including factory, material flow, logistics and defense areas. However, there is only CRC-16 for error detection in ISO/IEC 18000-6 Protocols prepared for 860-960 MHz RFID, high error rates are expected in cases of high level of security and noisy envirionment. In this paper, we propose a usage of convolution code as a method for satisfying the high level of security requirement and system error performance.'1'he signal control function is implemented in a microprocessor with RF modulation and the convolutional encoding and Viterbi decoding are implemented in an FPGA chip.'The frame error rates are measured with and without convolution coding under the channel conditions of line-of- sight and non line-of-sight, respectively.

  • PDF

A Study on First Demand Guarantees in International Construction Projects -Disputes arising from the DG and Recommendations for their Drafting- (해외건설공사에서 독립보증에 관한 분쟁과 그 대책)

  • Choi, Myung-Kook
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.47
    • /
    • pp.129-156
    • /
    • 2010
  • Since the 1970s, international construction employers have commonly requested first demand guarantees upon their contractors as a form of security for due performance of their works. Contractors prefer the greater protection offered by more traditional forms of security requiring presentation of an arbitral award or other evidence of the caller's entitlement to compensation. Many contractors nonetheless feel that they have no alternative but to provide these unconditional guarantees in order to compete. However, these unconditional first demand guarantees are controversial and have given rise to numerous disputes both in arbitration and litigation. Disputes arising from first demand guarantees can be broken down into a) applications to prevent a perceived fraudulent or otherwise unfair or improper calling of a guarantee, b) claims arising from such abusive calls and c) claims relating to the consequences of such calls even if the call itself may not be abusive as such. The contractors should carefully assess the risk of an abusive call being made bearing in mind the difficulties he may face in seeking to prevent such a call. He should also bear in mind the difficulties, delays and cost he is likely to encounter in seeking to recover any monies wrongfully called. One option would be to provide that the call can only be made once and to the extent that the employer's damages have been assessed or even incurred or even for the default to have been established by an arbitral tribunal or court. Another option would be to provide that any call be accompanied by a decision of a competent and impartial third party stating that the contractor is in breach. For example, such a requirement could be incorporated into a construction contract based on the FIDIC Conditions by submitting this decision to a Dispute Adjudication Board. Another option would be to provide for the "ICC Counter-Guarantee Scheme". In sum, there would appear to be room for compromise between the employer and the contractor in respect of first demand guarantees by conditioning the entitlement to call such guarantees to the determination of a competent and impartial third party.

  • PDF

Chameleon Hash-Based Mutual Authentication Protocol for Secure Communications in OneM2M Environments (OneM2M 환경에서 안전한 통신을 위한 카멜레온 해쉬 기반의 상호인증 프로토콜)

  • Kim, Sung-soo;Jun, Moon-seog;Choi, Do-hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1958-1968
    • /
    • 2015
  • Things intelligence communication (M2M or IoT) service activation and global company of OneM2M-related business on aggressive investing and has led to the acceleration of change in the ICT market. But a variety of hacking security technology because of the possibility of secure communication (data exposure, theft, modification, deletion, etc.) has been issued as an important requirement. In this paper, we propose a mutual authentication protocol for secure communications chameleon hash based on the M2M environment. The results of performance analysis efficiency is encryption and decryption an average of 0.7%, calculated rate showed good results as compared to the target algorithm, equivalent to a 3%(Average 0.003 seconds) difference, mutual authentication and encryption region by using the key update advantage of ECC(Elliptic Curve Cryptography)based Chameleon hash function is signed of the operational efficiency, using a collision message verifiable properties demonstrated strong security of the communication section.

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

XML Signature System on Mobile Environment (모바일 환경에서 XML 전자서명 시스템)

  • Cao, Ke-Rang;Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1441-1447
    • /
    • 2008
  • It is possible to transfer huge data in mobile device by advancing mobile technology, and so in this base, various services are offered. Especially, E-commerce service is offering on mobile environment, and this service is based on XML(eXtensible Markup Language) Signature. XML Signature assure that process integrity, message authentication, and/or signer authentication. And WIPI(Wireless Internet Protocol for Interoperability) that is mobile internet integration platform was proposed to integrate mobile device platform. However, because WIPI transmits and exchanges message by tort of XML base, encryption of XML document and necessity of XML signature are increasing because of weakness of security. Therefor in this paper, Encryption and XML signature module of XML document that satisfy standard requirement in WIPI platform base design and implementation. System that was proposed in this paper used standard encryption and XML signature algorithm and supports safe encryption and XML signature through doing security simulation applied various algorithm for XML document of mobile environment.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.