• Title/Summary/Keyword: 단말 인증

Search Result 236, Processing Time 0.024 seconds

Device Authentication System in IoT environment (IoT 환경의 단말 인증 시스템)

  • Dong-Yeon, Kang;Ji-Soo, Jeon;Sung-Hwa, Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.97-102
    • /
    • 2023
  • IoT is being used in a lot of industry domain such as smart home, smart ocean, smart energy, and smart farm, as well as legacy information services. For a server, an IoT device using the same protocol is a trusted object. Therefore, a malicious attacker can use an unauthorized IoT device to access IoT-based information services and access unauthorized important information, and then modify or extract it to the outside. In this study, to improve these problems, we propose an IoT device authentication system used in IoT-based information service. The IoT device authentication system proposed in this study applies identifier-based authentication such as MAC address. If the IoT device authentication function proposed in this study is used, only the authenticated IoT device can access the server. Since this study applies a method of terminating the session of an unauthorized IoT device, additional research on the access deny method, which is a more secure authentication method, is needed.

Weakness and its Improvement about IS-95/cdma2000 Mobile Communication System (IS-95/cdma2000 이동통신 시스템의 취약성과 개선방안)

  • Kim Keon-Woo;Hong Do-Won
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.185-189
    • /
    • 2006
  • 최근 ESN과 IMSI 불법복제에 의해 IS-95/cdma2000 이동통신 서비스 정상가입 사용자와 단말의 피해가 확인되고 있다. 이는 정상 가입자의 요금증가, SMS를 통한 휴대폰 결재, 정상단말의 착발신 장애 등의 문제를 일으키고 있다. 이러한 불법복제 단말의 서비스 접근과 정상단말 신원확인을 위해 이동통신 사업자는 파워온 등록, 착신, 발신시에 인증 메커니즘을 적용하지만, 여전히 CDMA/cdma2000 시스템에는 취약점이 존재하는 것으로 분석되고 이의 대응책이 요구된다. 이에 본 논문에서는 파워온 인증, 발신인증, 착신인증이 도입된 이동통신 시스템에서 정상단말과 불법복제 단말이 동일 기지국내에 위치할 때와 서로다른 기지국에 위치할 때, 각각 불법복제 단말에 의해 발생할 수 있는 취약점과 대응방안을 분석하고자 한다.

  • PDF

User Pre-Authentication Method for Support of Fast Mobility in IEEE 802.11 Wireless LAN (IEEE 802.11 무선랜에서 고속 이동성 지원을 위한 사용자 사전 인증 기법)

  • Kwon, Jung-Ho;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.191-200
    • /
    • 2007
  • As the IEEE 802.11 WLAN has widely installed as a high-speed wireless network information infrastructure, there has been growing interest in both security and mobility of mobile terminals. However, for the case of mobile terminal employing IEEE 802.11i security standard, it is known that the user authentication procedure of IEEE 802.1x for stronger security enforcement may, due to its large delay, not be suitable for real-time multimedia communication. In this paper, we have proposed fast authentication method to resolve the above authentication delay problem, and verifies its performance via simulation analysis. Mobile terminals can get AP information reliably, and selectively execute authentication in advance during handover, which results in fast user authentication. In addition, by effectively managing the authentication information in mobile terminal, which are distributed in advance for pre-authentication, the problem of long-time revelation of authentication information has been solved.

Handover Authentication Protocol in VANET Supporting the Fast Mobility (빠른 이동성을 지원하는 VANET 환경의 핸드오버 인증 프로토콜)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.5
    • /
    • pp.30-39
    • /
    • 2008
  • This paper proposes a secure and efficient handover authentication protocol in VANET supporting fast mobility. Although the existing schemes commonly use the hash function or XOR operation to be suitable for a light-weight mobile, it does not support the security feature such as PBS. To solve this security problem, another protocol utilizing the CGA technology is proposed but it is vulnerable to the DoS attack due to a number of exponent operations. The proposed protocol using a light-weight Diffie-Hellman provides security features and performs a reduced number of exponential operation at the MN than the existing scheme.

유비쿼터스 환경의 모바일 단말 보안 관리 기술 개발

  • Kim, Sang-Wook
    • Review of KIISC
    • /
    • v.19 no.2
    • /
    • pp.74-81
    • /
    • 2009
  • 본 연구는 여러 위치에서 이동 중인 다양한 유형의 단말기에 대해 보안을 관리하는 통합 시스템을 개발하는 것이다. 이 기술은 모바일 단말 인증, 모바일 단말 신뢰, 개인 프라이버시 보호, 3차원 시각화 기술에 의한 모바일 단말 보안 관리 기술이다. 인증과 신뢰 기술은 다른 도메인에 접근하더라도 신뢰할 수 있는지를 검사한다. 개인 프라이버시 보호 기술은 접근 기록을 사용자가 관리하는 기술이다. 3차원 시각화 기술은 단말의 이동과 접근을 3차원으로 모니터링 한다. 이러한 모바일 단말 보안 관리 기술은 여러 기술을 파생하거나 파급할 수 있는 중요한 기술이다.

EAP-AKA Authentication without UICC for Interworking Authentication in Heterogeneous Wireless Networks (이질적인 무선 네트워크 환경에서 인증 연동을 위한 비 UICC 방식의 EAP-AKA 인증)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.168-177
    • /
    • 2009
  • This paper proposes the EAP-AKA scheme without UICC for extending its usage to existing WLAN/WiBro devices. To apply the current EAP-AKA scheme, the WLAN/WiBro devices require an external Universal Integrated Circuit Card (UICC) reader. If they don't use UICC due to cost overhead and architectural problem of device, the EAP-AKA scheme loses its own advantages in security and portability aspects. The proposed scheme uses the DH key algorithm and a password for non-UICC devices instead of using the long-term key stored in UICC. The main contribution is to maintain the security and portability of the EAP-AKA while being applied to non-3GPP network devices not equipped with UICC. Furthermore, it does not require major modifications of authentication architecture in 3GPP.

영국의 단말장치 인증 및 기술기준 동향

  • Kim, Yeong-Tae;Son, Heung
    • Electronics and Telecommunications Trends
    • /
    • v.6 no.2
    • /
    • pp.34-41
    • /
    • 1991
  • 영국은 전기통신 규제완화와 단일시장을 강력 추진하고 있는 유럽의 전기통신시장에서 선도적인 역할을 담당하고 있다. 본 고는 영국의 국내 전기통신망에 접속되는 단말장치의 인증절차 및 인증기술기준에 대해 분석하고 있다.

Authentication Interworking Protocol based on Media Independent Handover in Heterogeneous Networks (MIH 기반의 이기종 네트워크 환경에서 대리 서명을 이용한 인증 연동 프로토콜)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.86-94
    • /
    • 2010
  • This paper proposed an authentication interworking protocol (AIP) based on IEEE 802.21 MIH in the heterogeneous networks. The proposed AIP using the RSA signature reduces handover delay time and communication message overhead when the mobile node moves between the heterogeneous networks. It defines new AIP TLV in MIH frame format and uses the MIH Information Server (MIHIS) for proxy signature issue instead of the authentication server for the heterogeneous networks. For low handover delay, the proposed AIP performs pre-authentication processes with MIH protocol before layer 2 handover. Also, this paper analyzed the performance of the handover and compared with the non-secure MIH protocol.

Authentication and signature protocol using SM in IC-card system (SM을 사용한 IC 카드의 인증 및 서명 프로토콜)

  • 도신호;하재철;박영호;문상재
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.374-382
    • /
    • 1996
  • 본 논문에서는 SM을 사용한 IC 카드의 인증 및 서명 프로토콜을 제안한다. SM은 연산 처리 능력이 우수하고, 안전한 보조 장치로 단말 내부에 장착된다. 제안된 프로토콜은 K nigs의 인증 방식, NIST의 ASACS, 그리고 UEPS와 비교하여 안전하고, 8비트 IC 카드에서 적합하게 개선하였다. 따라서 SM을 주민용 IC 카드의 단말에 장착하여 인증 및 디지탈 서명을 구현하는 방안을 제안한다.

  • PDF

Implementation of crypto key-based IoT network security system (암호키 기반 IoT 네트워크 보안 시스템 구현)

  • Jeon, Ji-Soo;Kang, Dong-Yeon;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.349-350
    • /
    • 2022
  • As research on IT convergence continues, the scope of IoT (Internet of Things) services continues to expand. The IoT service uses a device suitable for the purpose. These IoT devices require an authentication function. In addition, in IoT services that handle important information such as personal information, security of transmission data is required. In this study, we implement a crypto key-based IoT network security system that can authenticate devices for IoT services and securely transmit data between devices. Through this study, IoT service can authenticate the device itself and maintain the confidentiality of transmitted data. However, since it is an IoT service, additional research on the application efficiency of the encryption algorithm is required.

  • PDF