Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.4.093

Design of an USB Security Framework for Double Use Detection  

Jeong, Yoon-Su (Industry Technical Research Institute, Hannam University)
Lee, Sang-Ho (Dep. Computer Science, College of Electrical & Computer Engineering, Chungbuk Nationla University)
Abstract
Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.
Keywords
Security Framework; Authentication; Double Use;
Citations & Related Records
연도 인용수 순위
  • Reference
1 IEEE 802.16e-2005, "Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems", 2006.
2 IETF RFC 4285, "Authentication Protocol for Mobile IPv6", 2006.
3 WiMAX Forum NWG, "Stage-3: Detailed Protocol and Procedures", 2007.
4 D. I. Kim, S. H. Lee, Y. J. Kim, "Mobility Management in WiBro/Mobile WiMAX", The Korean Institute of Information Scientists and Engineers, vol. 25, No. 04, pp. 5-14. 2007. 04.
5 T. Janevski, "Traffic analysis and design of wireless IP networks", Artech House, pp. 186-190, 2003.
6 A. Mishra, M. Shin and W. Arbaugh, "pro-active Key Distribution using neighbor Graphs", IEEE Wireless Communication, vol. 11, Feb 2004."
7 M. Kassb, A. Belghith, J. M. Bonnin and S. Sassi, "Fast Pre-Authentication Based on Proactive Key Distribution for 802.11 Infrastructure Networks", In Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling, pp. 46-53, 2005.
8 D. Sweeney, "WiMax Operator Manual: building 802.16 Wireless Networks", Apress, 2005.
9 D. Johnston and J. Walker, "Overview of IEEE 802.16 Security", IEEE Security & Privacy, 2004.
10 A. Ghosh, D. R. Wolter, J. G. Andrews and R. Chen, "Broadband Wireless Access with WiMax/802.16: Current Performance Benchmarks and Future Potential", IEEE Communications Magazines, vol. 43, issue 2, pp. 129-136. Feb. 2005.
11 TAS.KO-06.0065R1, "Air and Network Interface Specifications for 2.3GHz band Portable Internet Service -MAC", TTA Standard, 2004.