• Title/Summary/Keyword: 그룹 인증

Search Result 255, Processing Time 0.024 seconds

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

A Study for the Relation Between Selenoproteins and Korean Rectal Cancer Using Deuterium Collision Gas HPLC-ICP/MS (HPLC와 중수소 충돌기체 ICP/MS를 이용하여 분석한 셀레노단백질과 한국인 직장암과의 상관관계 연구)

  • Lee, Seo Young;Pak, Yong-Nam
    • Journal of the Korean Chemical Society
    • /
    • v.63 no.6
    • /
    • pp.420-426
    • /
    • 2019
  • Selenoproteins,in Korean blood serum, GPx, SelP, and SeAlb were separated and determined with the use of HPLC-ICP/MS. Deuterium was used as a collision gas and affinity column with ammonium formate was used as an eluting solvent for the accurate quantitation of selenoproteins in human blood serum. Certified reference material BCR 639 (133±12 ng g-1) was tested for the accuracy and the result was satisfactory 130±6 ng g-1. Blood serum for the rectal cancer and controlled groups were collected and analyzed to give 84±27 ng g-1, and 119±28 ng g-1, respectively. The difference was statistically obvious when t-test was performed (tcal 4.93 > t95% 2.04). The decrease for cancer group was more obvious for female and aged group. The distributions of three selenoproteins were similar with each other, which means rectal cancer group did not show any specificity for any selenoproteins. As cancer developed, GPx showed a slight decrease but not obvious while the total concentration was increasing particularly at the second stage of cancer.

Carcass Yields and Meat Quality by Live Weight of Korean Native Black Pigs (재래돼지의 출하체중별 도체수율 및 육질특성)

  • Cho, S.H.;Park, B.Y.;Kim, J.H.;Kim, M.J.;Seong, P.N.;Kim, Y.J.;Kim, D.H.;Ahn, C.N.
    • Journal of Animal Science and Technology
    • /
    • v.49 no.4
    • /
    • pp.523-530
    • /
    • 2007
  • A total of 127 Korean native black pigs(gilt 30, boar 97) were used to investigate the carcass properties, yields of retail cut and meat quality. The average live weight, chilled carcass percentage and retail cut percentage used in this study were 74.69kg, 71.14% and 61.09% for boar, and 75.5kg, 73.88% and 56.25% for gilt, respectively. Although gilts were higher in live weight and chilled carcass percentage whereas lower in retail cut percentage when compared to boars, there was no significantly difference between gender(p<0.05). Gilts had higher fat contents than boars regardless of weight range groups. Protein contents increased as slaughter weight increased for gilt and boar groups. Gilts contained high intramuscular fat contents had significantly lower Warner-Bratzler shear force(WBS) and water holding capacity(WHC) when compared to boar in the same weight range group(p<0.05). There was no significantly different in meat color(p>0.05) although gilts had higher L(lightness), a(redness) and b(yellowness) values when compared to the same group of boar. From the result of this study can be used for the grading guideline and quality evaluation standard of Korean native black pigs by gender and live weight.

Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment (무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안)

  • Song, Il-Gyu;Hong, Choong-Seon;Lee, Dae-Young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.219-228
    • /
    • 2004
  • Wireless LAN(wireless Local Area Network) is constructed network environment by radio in indoors or outdoors environment and that to use electric wave or light instead of wire to client such as PC(Personal Computer), notebook, PDA in hub(Hub) in technological side. Now, among IEEE 802.11 WG(Working Group), there is TGf(Task Group F) that develop standard protocol between AP's(Access Point). In this group, proposed IAPP(Inter Access Point Protocol) to secure interoperability between AP producing in different manufacturer, this offers seamless connectivity between STA by sharing Security Context information or Layer 2 forwarding information between AP without passing through re-authentication process when STAs(Station) move by protocol to secure mobility between AP that differ in equal serve network. In this paper, I wish to suggest method that change avenue of communication of message to block information leakage that can occur at security message or WEP Key transmission between above AP, and uses public key to offer wireless area security little more.

Security Verification of FTP-Proxy Security Model Coloured Petri Net (컬러드 페트리 네트를 기반으로 한 FTP 프록시 보안 모델의 안전성 검증)

  • Lee, Moon-Ku;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.369-376
    • /
    • 2001
  • The firewall systems can be installed between the intemal network and the extemal network. The firewall systems has the least privilege, so its does not provide transparency to user. This problem of transparency can be solved by using the proxy. In this thesis, I have designed and verified the FTP-PSM(FTP-Proxy Security Mode]) which provides transparency for the firewall systems and has a strong security function. FTP-PSM doesn't finish its work after implementing a command. Instead, its does several security functions such as user authentication, MAC(MandatOlY Access Controll, DAC(Discretionary Access Controll and authentication of user group. Those data must not be lost under any circumstances in order to implement the above security functions. So, the security against such problems as falling into deadlock or unlimited loop during the implementation must be verified. Therefore, FTP-PSM suggested in thesis was verified its security through PHPlace Invariant) based on CPNlCo]oured Petri Net).

  • PDF

Mutual Authentication and Route Optimization between MN and CN using AAA in Mobile IPv6 (Mobile IPv6에서 AAA를 이용한 MN과 CN간의 상호 인증 및 경로 최적화)

  • 김미영;문영성
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.5
    • /
    • pp.429-437
    • /
    • 2004
  • The mobileip working group is equipped with the RR(Return Routabilit) taking the simple procedures and small amount of cryptographic operations by considering the processing capability of the mobile node however it dose not provide security features enough. To replace with enhanced methods, mobileip WG is making an effort to find the approved solutions include CGA(Craptographically Generated Address), IPsec(Internet Protocol Security) as well as the existing infrastructure such as AAA(Authentication, Authorization and Account) and PKI(Public Key Infrastructure). In this paper, we propose the authentication and route optimization based on AAA suitable for the requested security service for its successful story in wireless network such as 802.11 and 3GPP(3rd Generation Partnership Project) as well as wired one. We analyze the effectiveness of our scheme according to the traffic and mobility properties. The result shows the cost reduction up to 20 percent comparing with RR.

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF

Design and Implementation of CoAP Authorization Framework Based on OAuth 2.0 (OAuth 2.0 기반 CoAP 인증 프레임워크 설계 및 구현)

  • Kim, Kyoung-Han;Lim, Hyun-Kyo;Heo, Joo-Seong;Han, Youn-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.8
    • /
    • pp.329-342
    • /
    • 2017
  • Recently, interest and investment in the Internet of Things (IoT) have increased significantly, and security issues are constantly being raised. As a solution, the IETF ACE Working Group is establishing the ACE framework standard, which is a new security framework for various constrained IoT environments based on the existing OAuth 2.0. However, additional work is required to apply the ACE framework, which proposes a new lightweight security system, to the existing Internet environment, and this additional cost is a factor that hinders the application of OAuth 2.0 to the IOT environment. Therefore, we propose an IoT authentication framework based on OAuth 2.0's existing development motivation, and implement a proposal framework based on CoAPthon and analyze its performance.

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.

Material Qualification, Equivalency, and Acceptance Test for Aerospace Composite Materials (복합재료의 인증, 동등성 및 수락시험)

  • Lee Ho-Sung
    • Composites Research
    • /
    • v.19 no.2
    • /
    • pp.1-6
    • /
    • 2006
  • The civilian and military agencies require the use of statistic-based allowable to design aerospace vehicles with composite materials. In order to comply this regulation, it is necessary to establish relatively large amount of database, which increases test costs and time. Recently NASA/FAA developed the new method which can satisfy the regulation with smaller test matrix through AGATE(Advanced General Aviation Transport Experiments) program. Especially the concept of material equivalency is very useful when the material has been certified in previous program, and it allows the engineer to use the database with the addition of small test matrix. This paper summarizes the material equivalency and acceptance test methodology so that composite material database can be shared and improve the credibility of the material quality. As a demonstration, the material design allowable of the high temperature carbon/epoxy composite developed domestically was determined with this methodology.