Browse > Article

Study on the scheme to reinforce military security system based on location information  

Kim, Yun Young (대전대학교 / 군사학과)
Namkung, Seung Pil (우석대학교 / 군사학과)
Publication Information
Abstract
Current PKI system will confront more dangerous elements in the wireless network. Accordingly, this study suggests a plan to strengthen authentication system plan with using access control and encryption to the location. Locational information collecting devices such as GPS and sensor are utilized to create a new key for authentication and collect locational information. Such a key encodes data and creates an authentication code for are access control. By using the method suggested by this study, it is possible to control access of a military secret from unauthorized place and to protect unauthorized user with unproposed technique. In addition, this technique enables access control by stage with utilizing the existing PKI system more wisely.
Keywords
Defense PKI; Location Information; Authentication; Security Technique; Access control;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Ground Tactical C4I system User Guideline, DAPA, pp. 1-2-2-3, 2007
2 Ajou Univ TNRC, "Wireless Network Security Structure & Invation Search/Reaction Technology Research", JCS, pp. 63-78, 2008.
3 D. E. Denning and L. Scott, "Geo-Encryption: Using GPS to Enhance Data Security," GPS World, Apr, 2003.
4 A. Al-fugaha and O. Al-Ibrahim, "Geo-encryption Protocol for Mobil Networks, "Computer Communications, vol. 30, Issue 11-12, pp. 2510-2517, Sep, 2007.   DOI
5 Hsien-Chou Liao Yun-hsiang Chao, "A New Data Encryption Algorithm Based on the Location of Mobile Users", Information Technology Yournal, 7(1), pp. 63-69, 2008.   DOI
6 Tactical Information Communications Network Operational guide book, Army HQ, pp. 2-3-3-7, 2006.
7 Tactical Information Communications Network Operation FM reference 1-2, Army HQ, pp. 2-2 6-27, 2015.