• Title/Summary/Keyword: 무선 통신 보안

Search Result 940, Processing Time 0.024 seconds

Implementation of Secure I-Mail System based on lava (타원곡선 알고리즘을 이용한 안전한 자바 메일 시스템의 설계 및 구현)

  • 이원구;조한진;이재광
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.700-702
    • /
    • 2001
  • As computers and networks become popular, distributing information on the Interment is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mall is gamins popularity abroad and domestically because of their nature of prodding security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mall system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mall system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

  • PDF

Efficient security mechanism in 3GPP-WLAN interworking (3GPP-WLAN interworking에서의 효율적인 보안 메커니즘)

  • 신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.137-144
    • /
    • 2004
  • 3GPP(3rd Generation Project Partnership)-WLAN(Wireless Local Area Network) interworking refers to the utilization of resources and access to services within the 3GPP system by the WLAN UE(User Equipment) and user respectively. The intent of 3GPP-WLAN Interworking is to extend 3GPP services and functionality to the WALN access environment. We propose an efficient mechanism for the setup of UE-initiated tunnels in 3GPP-WLAN interworking. The proposed mechanism is based on a secret key which is pre-distributed in the process of authentication and key agreement between UE and 3GPP AAA(Authentication, Authorization Accounting) server. Therefore it can avoid modular exponentiation and public key signature which need a large amount of computation in UE. Also the proposed scheme provides mutual authentication and session key establishment between UE and PDGW(Packet Data Gateway).

A study on the Efficient OKTEK(One-way Key-chain for TEK) for Realtime Digital Contents Transmission (실시간 디지털 콘텐츠 데이터 전송을 위한 효율적인 OKTEK(One-way Key-chain for TEK) 기법에 관한 연구)

  • Jeon, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.103-111
    • /
    • 2009
  • IEEE 802.16e(Wibro) standard, providing robust mobile realtime data transmission technology, requires of faster and smooth execution of security mechanisms, such as key distribution and user authentications, during base station hopping. In particular, key management mechanisms such as redistribution and regeneration have an impact on digital contents transmission and realtime data transmission, not only in 802.16e environment, but also in typical transmission environment as well. This paper presents traffic management mechanisms designed to realtime digital contents (such as IPTV) transmission efficiency and increase the QoE by utilizing OKTEK methodology.

Remotely Controllable Smart Door Lock (원격 제어가 가능한 스마트 도어락)

  • Choi, Duk-Kyu;Lee, Sang-Bin;Park, Jin-Sol;Kwon, Yong-Min;Kim, Jun-Bin;Kwon, Min-Ji;Jang, Jae-Min;Jeong, woo-won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.261-262
    • /
    • 2020
  • 현대에 흔히 쓰이는 도어락은 안전과 보안등의 목적과 편리함을 목적에 두고 있다. 실제로 그전에 쓰던 열쇠보다 더 편리하고 분실염려도 없고 복제키 등으로 인한 사건, 사고로 인한 범죄율이 줄어들었다. 도어락은 사용자가 손으로 직접 비밀번호를 입력하여 잠금을 해제하는 방식이고 이 과정에서 도어락에 지문이나 표시가 남으며 비밀번호가 주위에 쉽게 노출될 수 있다. 본 논문은 위의 문제를 해결하기 위해 아두이노로 라즈베리파이와 앱을 무선 통신하여 '원격 제어가 가능한 스마트 도어락'을 고안했다. 아두이노 와이파이 모듈을 통해 스마트폰으로 도어락을 원격으로 제어할 수 있으며 라즈베리파이 카메라 모듈과 초음파 센서를 통해 도어락에 접근하는 사람을 감지하고 확인할 수 있다. 이 기능으로 범죄를 예방할 수 있으며 자녀들의 귀가 여부도 확인할 수 있고 문을 열어줘야 할 상황에 비밀번호 노출없이 문을 열어줄 수 있다.

  • PDF

A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division (키 분할을 이용한 Low-Cost RFID 시스템 상호 인증 방안에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.431-438
    • /
    • 2007
  • RFID system is core technology that construct ubiquitous environment for replacement of barcode technology. Use ratio of RFID system rapidly increase because the technology has many good points such as identification speed, storage space, convenience etc. But low-cost tag operates easily by query of reader, so the system happened user privacy violent problem by tag information exposure. The system studied many ways for security application, but operation capability of low-cost tag is about $5K{\sim}10K$ gates, but only $250{\sim}3K$ gates allocated security part. So it is difficult to apply security to the system. Therefore, this scheme uses dividing 64 bits and reduces arithmetic, so proposed scheme provide mutual authentication that can apply to low-cost RFID system. Existing methods divide by 4 and used 96 bits. However, that reduces 32 bits length for lightweight and reduced from communication number of times of 7 times to 5 times. Also, because offer security by random number than existing scheme that generate two random numbers, that is more efficient. However, uses hash function for integrity that was not offered by XOR arithmetic and added extension of proposed scheme. Extended scheme is not offered efficiency than methods that use XOR arithmetic, but identification distance is mode that is proposed secure so that can use in for RFID system.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

Effects of Interference Signals on the Performance of EFTS (간섭신호가 EFTS의 성능에 미치는 영향)

  • Kang, Sanggee
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.3
    • /
    • pp.1-4
    • /
    • 2014
  • A radio communication system has interference caused by other radio transmitters operated in co-channel or adjacent channels. Therefore technical specifications are made by considering and investigating the effects of interference between the new system and present systems when the new system will be started to serve in the near future. FTS is used for preventing an abnormal mission and guaranteeing public protection. Recently the next generation FTS's are researched to reinforce the security and to increase the operating capability of simultaneous use. EFTS known as one of the next generation FTS's is suitable for such purposes. In this paper the effects of interference signals on the performance of EFTS are investigated. Noncoherent DPSK and noncoherent CPFSK are considered for the modulation method of EFTS and a FMCW and a pulse RADAR considered as a interferer. The power of FMCW is 20.3dB lower than the power of EFTS and the power of pulse RADAR is 19.1dB lower than that of EFTS. Simulation results show that FMCW interferer reduce $E_b/N_o$ of about 1dB and $E_b/N_o$ of EFTS deteriorates about 0.5dB due to interference signals generated from pulse RADAR.

Designed and Development of Location Tracking System by The Short-Range Radio Frequency Relay Algorithm (근거리 RF중계알고리즘에 의한 구내 위치추적시스템 연구)

  • Park, Sang-Min;Lee, Gong;Lee, Sang-Keun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.73-81
    • /
    • 2008
  • We can find easily about researches or technical development that deal with grasping the location of an object with GPS(Global Positioning System) in order to use them as a useful information. Most researches or technical development on application of tracing have been developed for the purpose of tracing objects in broad area as physical distribution or transportation, but recently, there are many researches on tracing materials in premise area as a fork lift, carts, or the equipment of work. In general, a system that utilizes location information of objects needs data communication network to transmit location data and it ensures data communication network by using common networks(SK, LG, KFT) or wireless LAN. However these two methods need monthly payment for the rental fee or require considerable amount of investment for the early stage so it is difficult to use them merely for tracing premise subjects. This study was conducted to build a tracing system for premise area by local area RF relay algorithm with low cost applying RF relay algorithm to local area wireless communication(ZIGBEE, 424MHz, Bluetooth, 900MHz) system in order to supplement these demerits and included relay algorithm, RF locating information terminal, local area RF gab-fillers, a plan for collection server of locating information, and the way of realization as they are needed in this system. I consider that this study would be applicable with flexibility in the industry area that needs tracing solution within a specific area or needs ensuring data communication network, to transmit data in ubiquitous environment, by easier and more rapid way with lower cost.

  • PDF

Mobile Point-of-Sales System (모바일 판매 시점 관리 시스템)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.87-93
    • /
    • 2007
  • We propose a mobile point-of-sale system, which consists of only mobile information terminals and personal computers. The proposed system provides most of functionalities related with resource planning, adminstration and management, provided by medium-scale or large-scale POS systems, with additional functionalities, such as automatic information gathering and management through mobile interconnection, while eliminating the necessity of additional special-purpose devices, such as bar-code systems. The proposed system transmits order information through wireless and wired communication lines, thus allowing real-time sharing of order information among diverse information devices, such as mobile order receiving terminals, main server within stores, monitors and printers located in production lines. Also, the system is able to transfer such detail information produced within stores in real-time to the enterprise-level accounting, sales, logistics, personnel management system, which facilitate enterprise-wide management and administrative decision-making. No additional programs are required for mobile terminals. Order information received by such terminals are entered into databases through web server of main server and that information is again transferred to main server and production line printers. The proposed system can handle all the point-of-sale information and can provide almost of the POS functionalities by simply utilizing wireless internet, personal computers, and mobile terminals without installing specific-purpose peripheral devices. The proposed system can be widely applied to the small-scale stores and will contribute in reducing construction and maintenance cost required for point-of-sale management.

  • PDF

The Sub Authentication Method For Driver Using Driving Patterns (운전 패턴을 이용한 운전자 보조 인증방법)

  • Jeong, Jong-Myoung;Kang, Hyung Chul;Jo, Hyo Jin;Yoon, Ji Won;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.919-929
    • /
    • 2013
  • Recently, a variety of IT technologies are applied to the vehicle. However, some vehicle-IT technologies without security considerations may cause security problems. Specially, some researches about a smart key system applied to automobiles for authentication show that the system is insecure from replay attacks and modification attacks using a wireless signal of the smart key. Thus, in this paper, we propose an authentication method for the driver by using driving patterns. Nowadays, we can obtain driving patterns using the In-vehicle network data. In our authentication model, we make driving ppatterns of car owner using standard normal distribution and apply these patterns to driver authentication. To validate our model, we perform an k-fold cross validation test using In-vehicle network data and obtain the result(true positive rate 0.7/false positive rate is 0.35). Considering to our result, it turns out that our model is more secure than existing 'what you have' authentication models such as the smart key if the authentication result is sent to the car owner through mobile networks.