• Title/Summary/Keyword: 보안 게이트웨이

Search Result 179, Processing Time 0.023 seconds

Home Security System Based on IoT (IoT 기반 홈 보안 시스템)

  • Kim, Kang-Chul;Wang, Ding-Hua;Han, Seok-Bung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.147-154
    • /
    • 2017
  • This paper aims to build a home security system based on IoT to monitor a home on a mobile phone. The system consists of data gathering sensors, camera, gateway and Xively platform. The Raspberry Pi collects data from the three sensors and sends the data to Xively, and sends the video stream of home to a client in a smart phone through a internet. The servers are composed of Xively, socket server in Raspberry Pi and E-mail server in Google. The proposed system transmits e-mail, text message, and video stream when there are motion, fire, and gas leakage, and can control the gas valve through Raspberry Pi. The experimental results show that a user gets 'emergency E-mail' and text message and watches the video stream of the home through WIFI or LTE on a smart phone.

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

Role-Based Network Access Control System on Open Network Two-Factor Authentication (네트워크 이중 인증을 통한 역할 기반 개방형 네트워크 접근 통제 시스템의 구현)

  • Lee, Chun-Jae;Cho, Ki-Ryang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.502-508
    • /
    • 2007
  • This paper proposes a method to shut out all of the not certified network access packet by embodying the two-factor(MAC ADDRESS, ID/PASSWORD) authentication system. The Authenticating Gateway System takes over central server's policy and permit or hold up the packet by inherited policy. And checks the whether or not patched the OS version and getting influenced from computer virus. And takes the information about client's resources(H/W, S/W) without Agent in the client. That makes more stability of network operating circumstance and fast facing the attack from hackers. In the fixed mobile network circumstance, This method provides more simplicity and less expenses than IEEE802.1x authentication system(cisco nac).

Design and Implementation Middleware of the Home Network based PLC (PLC 기반의 홈 네트워크 미들웨어 설계 및 구현)

  • Jean, Byoung-Chan;Kim, Hyeock-Jin;Kim, Dong-Kyun
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2008
  • Home network service, which is a part of Ubiquitous application service provides remote control and monitoring service, other appliance and peristaltic service, security service of appliance is connected to network in the home. <중략> By using gateway which is implemented undertook control of each function and using main server for controlling and monitoring of appliance, implemented system which is able to control the appliance in home from inter/outside is implemented.

  • PDF

Authentication using AAA for the Mobility Support of Mobile IPv6 Nodes in VPN Environments (VPN 환경에서 Mobile IPv6 노드의 이동성 제공을 위한 AAA 기반의 인증)

  • Kim Mi-Young;Mun Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.218-230
    • /
    • 2006
  • The enterprise service network is composed of internet, intranet and DMZ. The design rationale of Mobile IP is providing of seamless mobility transparency without regarding to the type of network topology and services. However, Mobile IP specification does not include the mobility support in case of using VPN environment and define the access scenarios to get into the VPN intranet without disturbing existing security policy. In this paper, we propose an authentication method using AAA infrastructure and keying material exchange to enable an user in internet to be able to access the intranet through the VPN gateway. Finally, performance analysis for the proposed scheme is provided.

IoT Platform Service to Support Characters (캐릭터를 지원하기 위한 IoT 플랫폼 서비스)

  • Oh, Won-Hwan;Nam, Kang-Hyun;Pak, Sang-Hyon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.643-650
    • /
    • 2018
  • This service uses beacon with BLE technology, and USER APP has priority with Anchor IPS which secures location and device. Since then, it has been linked with character beacons that can be used in various places. The character beacon which is recognized as a service is able to confirm the user's location through API key of the LBS CMS server, and receives various contents services of the UESR CMS server. The service network consists of character beacon, Anchor IPS, USER APP, LBS CMS server, and USER CMS server. The purpose of the service is to promote local tourism and local culture to tourists through local unique characters.

An Architecture Design of Military Operation System Utilizing Cellular Networks (군작전 효율화를 위한 셀룰라망 연동구조 설계)

  • Kim, Jae-Cheol;Kim, In-Taek;Park, Jong-Bum;Jung, Chang-Uk
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.1
    • /
    • pp.74-83
    • /
    • 2011
  • In this paper, we propose an architecture design of military operation system utilizing cellular networks. The main contribution of this paper is to provide a cost-effective military operation solution for ground forces, which is based on IT(information technology). By employing the cellular phones of officers' and non-commissioned officers' as the tools of operational communication, the proposed system can be constructed in the minimum duration and be built on the four components: command and control system, gateway, security system, and terminal(cell phone). This system is most effective for the warfare of limited area, but the effectiveness does not decrease under the total war covering the whole land of Korea. For the environmental change of near future, expanded architecture is also provided to utilize the functionalities of smart phones.

P2P(Peer-to-Peer) Messenger Integrated Service (피어-투-피어 메신저 통합 서비스)

  • 이태열;박진기;함형범;이양선
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.508-511
    • /
    • 2003
  • 최근에 인터넷 사용량이 증가함에 따라 자료의 양은 많아지고, 서비스 방식도 복잡해지는 문제가 생겨나게 되었다. 그에 따른 해결방안으로 P2P(Peer-to-Peer) 모델은 2000년대에 들어서 다시 컴퓨터 산업 무대의 중심으로 자리 잡게 되었다. 지금까지 잘 알려져 있는 클라이언트/서버 모델은 계속적으로 증가하고 있는 사용자와의 통신 수요에 대한 문제가 있다. 그렇기 때문에 P2P 모델은 이러한 구조에서 벗어나 사용자들 간의 직접적인 정보 교환을 가능하게 해주어 서버의 역할을 최소화 시켜 주었다. 이러한 이점 때문에 현재 많은 기업체들이 P2P 모델을 클라이언트/서버 모델 이상으로 선호하게 되었다. 자바를 이용해서 개발한 P2P용 메신저 통합 서비스에는 기존의 상대방과의 대화뿐만 아니라 파일 공유, 자료의 업/다운, 멀티미디어 채팅으로 상대방의 얼굴을 보며 대화를 할 수 있는 화상채팅 기능이 있고, 친구들을 쉽게 정리하여 사용자만이 관리를 할 수 있는 공유그룹과 폐쇄그룹을 추가하여 보안에 대비 하였다. 또 키워드 검색, 메타 검색으로 더 많은 자료를 손쉽게 찾을 수가 있다. 시스템 상에 XML, 웹 서버, WAP 게이트웨이 서버를 탑재하였고, 가상의 네트워크인 VPN 사용, 그리고 DB를 사용한 회원관리 및 여러 가지 서비스를 제공한다. 향후 P2P 기술은 P2P 검색, P2P 커뮤니케이션, 무선인터넷관련 기술, XML을 이용한 표준통합기술의 발전으로 더욱 침체된 시장에 활력소 역할을 할 것이다.

  • PDF

A Study of Security Method against Attack in TCP/IP (TCP/IP 공격에 대한 보안 방법 연구)

  • Park Dea-Woo;Seo Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.217-226
    • /
    • 2005
  • In today's cyberworld, network performance is affected not only by an increased demand for legitimate content request, but also by an increase in malicious activity. In this Paper, we research that network performance was affected by an increase in malicious Hacker who make DoS Attack, DDoS Attack, SYN Flooding, IP Spoofing, etc. in using TCP/IP. We suggest that Packet filtering in Network Level, Gateway Level, Application Level against to Protect by Hacker's attack. Also, we suggest that content distribution in Web Server approaches to mitigate Hacker's activity using Cache Sever, Mirror Sever, CDN. These suggests are going to use useful Protection methode of Hacker's attack.

  • PDF