• Title/Summary/Keyword: 사전 인증

Search Result 265, Processing Time 0.027 seconds

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

A Study on the Satisfaction Recognition of the Employees of the Social Enterprise in JeollaNamdo (전남지역 사회적기업종사자의 만족도인식 연구)

  • Jeong, Mun-Gyung
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.133-140
    • /
    • 2016
  • The study has been implemented for finding out a revitalization of the social enterprise to be continuously developed. In this research, social enterprise employees residing in JeollaNamdo were selected as the research members. The polled papers had 210 copies of total and 180 copies of recovery. The response results were written as a rule of their own way with advanced visit to them explaining how to write down. The collected data were analysed with T-test and ANOVA. As a result of the research, the system effectiveness of social enterprise is shown to influence the satisfaction of employees. Therefore, it is shown that the certification system and priority purchase system of local government can be effective. Second, it is shown that the satisfaction of employees of the social enterprise influences the satisfaction of employees. Therefore, it is shown that the need of finding out a new business item for a social enterprise to grow influences positively on the satisfaction of employees. Third, operation difficulty of the social enterprise is not shown to influence the satisfaction of employees. In other words, the satisfaction of employees is not influenced by a difficulty arising from not receiving the official recognition from local government on the social enterprise.

Simple Credit Card Payment Protocols Based on SSL and Passwords (SSL과 패스워드 기반의 신용카드 간편결제 프로토콜)

  • Kim, Seon Beom;Kim, Min Gyu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.563-572
    • /
    • 2016
  • Recently, a plenty of credit card payment protocols have been proposed in Korea. Several features of proposed protocols include: using passwords for user authentication in stead of official certificate for authenticity, and no need to download additional security module via ActiveX into user's devices. In this paper, we suggest two new credit card payment protocols that use both SSL(Security Socket Layer) as a standardized secure transaction protocol and password authentication to perform online shopping and payment. The first one is for the case where online shopping mall is different from PG(Payment Gateway) and can be compared to PayPal-based payment methods, and the second one is for the case where online shopping mall is the same as PG and thus can be compared to Amazon-like methods. Two proposed protocols do not require users to perform any pre-registration process which is separate from an underlying shopping process, instead users can perform both shopping and payment into a single process in a convenient way. Also, users are asked to input a distinct payment password, which increases the level of security in the payment protocols. We believe that two proposed protocols can help readers to better understand the recent payment protocols that are suggested by various vendors, and to analyze the security of their payment protocols.

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

AI Security Plan for Public Safety Network App Store (재난안전통신망 앱스토어를 위한 AI 보안 방안 마련)

  • Jung, Jae-eun;Ahn, Jung-hyun;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.458-460
    • /
    • 2021
  • The provision and application of public safety network in Korea is still insufficient for security response to the mobile app of public safety network in the stages of development, initial construction, demonstration, and initial service. The available terminals on the Disaster Safety Network (PS-LTE) are open, Android-based, dedicated terminals that potentially have vulnerabilities that can be used for a variety of mobile malware, requiring preemptive responses similar to FirstNet Certified in U.S and Google's Google Play Protect. In this paper, before listing the application service app on the public safety network mobile app store, we construct a data set for malicious and normal apps, extract features, select the most effective AI model, perform static and dynamic analysis, and analyze Based on the result, if it is not a malicious app, it is suggested to list it in the App Store. As it becomes essential to provide a service that blocks malicious behavior app listing in advance, it is essential to provide authorized authentication to minimize the security blind spot of the public safety network, and to provide certified apps for disaster safety and application service support. The safety of the public safety network can be secured.

  • PDF

Estimated Soft Information based Most Probable Classification Scheme for Sorting Metal Scraps with Laser-induced Breakdown Spectroscopy (레이저유도 플라즈마 분광법을 이용한 폐금속 분류를 위한 추정 연성정보 기반의 최빈 분류 기술)

  • Kim, Eden;Jang, Hyemin;Shin, Sungho;Jeong, Sungho;Hwang, Euiseok
    • Resources Recycling
    • /
    • v.27 no.1
    • /
    • pp.84-91
    • /
    • 2018
  • In this study, a novel soft information based most probable classification scheme is proposed for sorting recyclable metal alloys with laser induced breakdown spectroscopy (LIBS). Regression analysis with LIBS captured spectrums for estimating concentrations of common elements can be efficient for classifying unknown arbitrary metal alloys, even when that particular alloy is not included for training. Therefore, partial least square regression (PLSR) is employed in the proposed scheme, where spectrums of the certified reference materials (CRMs) are used for training. With the PLSR model, the concentrations of the test spectrum are estimated independently and are compared to those of CRMs for finding out the most probable class. Then, joint soft information can be obtained by assuming multi-variate normal (MVN) distribution, which enables to account the probability measure or a prior information and improves classification performance. For evaluating the proposed schemes, MVN soft information is evaluated based on PLSR of LIBS captured spectrums of 9 metal CRMs, and tested for classifying unknown metal alloys. Furthermore, the likelihood is evaluated with the radar chart to effectively visualize and search the most probable class among the candidates. By the leave-one-out cross validation tests, the proposed scheme is not only showing improved classification accuracies but also helpful for adaptive post-processing to correct the mis-classifications.

Study on Improving the Environmental Performance of a Railway Vehicle through a Life Cycle Assessment of the Tilting Train (틸팅열차의 전과정평가를 통한 철도차량 환경성 개선방안연구)

  • Lee, Cheul Kyu;Kim, Yong-Ki;Lee, Jae-Young;Choi, Yo-Han;Kim, Cho-Young
    • Journal of the Korean Society for Railway
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2014
  • Recent international environmental regulations are focused on reducing pre-contamination and on sustainable development prior to the usage stage of a product. The Environmental Performance Declaration is being used as a tool for quantifying the environmental performance of products, to reduce contamination in advance, and for advertising the results of railway vehicles in Europe. In this study, a life cycle assessment of the tilting train was conducted, the first such case study in Korea, according to the ISO 14025 standard and Korea EDP (Environmental Declaration of the Product) rule. As a result of the LCA, the life cycle carbon emission of the tilting train was determined to be $3.54{\times}10^7kgCO_2eq.$ which is higher than that of a European train. Also, the amount of $CO_2$ emission of the Mcp and car body is higher than that of the other car and bogie.

A Study on the Effectiveness of Group Reminiscence Approach among the Elderly Using Daycare Center : Focusing on the Mental Health related Quality of Life(MHRQoL) (주간보호센터 노인의 집단회상프로그램 효과성 검증에 관한 연구 : 정신건강 관련 삶의 질(MHRQoL)을 중심으로)

  • Kwon, OhGyeong;Hur, Junsoo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.592-608
    • /
    • 2022
  • This study conducted a group reminiscence program for the elderly who use the elderly daycare center. And this study verified the effectiveness of the elderly's mental health related quality of life to identify the relationship between the participating elderly and the non-participating elderly in a group reminiscence program. To this end, in order to examine the effectiveness of a group reminiscence programs for the elderly using the daycare center on MHRQoL, and the difference between the experimental group and the control group was compared with the non-equivalent control group pre-post test design. The research results are as follows. First, the experimental group that conducted the group reminiscence program in this study had a higher quality of life than the control group that did not participate the group reminiscence program. Second, significant results were found in vitality and mental health in the sub-factors of MHRQoL of the experimental group, and emotional role restriction and social function did not show significant results. Based on the results of this study, to develop and improve programs that encompass the entire sub-areas of MHRQoL, and to implement programs that positively affect the psycho-social intervention for the elderly persons. Finally, it was suggested to link and cooperate with senior welfare centers and general social welfare centers.

Network Architecture and Fast Vertical Handover Scheme for UMTS-WLAN Interworking (UMTS-WLAN 간 빠른 수직적 핸드오버 제공을 위한 연동망 모델 및 핸드오버 방식)

  • Kim, In-Cheol;Lee, Sung-Kuen;Kim, Eal-Lae;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.492-501
    • /
    • 2007
  • UMTS-WLAN interworking approach can make the best use of the advantages of both networks by eliminating the stand-alone defects of the two services. For the interworking mechanisms of WLANs and UMTS networks, two major solutions have been proposed, namely loose coupling and tight coupling. The loose coupling approach provides separate data paths for WLAN and UMTS. On the other hand, the tight coupling provides a full integration of the WLAN network and the UMTS core network. The loose coupling has been preferred due to the simplicity and less reconfiguration requirement. However, loose coupling is worse in seamless mobility, QoS provision, and network security. In order to lessen the problems involved in the UMTS-WLAN interworking approaches, we propose a new interworking network architecture and a fast vertical handover scheme by employing Mobility Anchor(MA) for interworking between the two different networks. MA can enable authentication and session initialization before L2 handover of the mobile terminal, so that the seamless and fast vertical handover become possible. Thru analysis and numerical experiments, we proved that the proposed scheme has been validated.

Edge Security System for Factory Automation Devices (생산자동화설비의 종단보안 시스템 구조)

  • Hwang, Ho-Young;Kim, Seung-Cheon;Ro, Kwang-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.251-258
    • /
    • 2012
  • The conventional network security solutions for manufacturing or factory automation devices are concentrated on protecting the internal networks from the attacks of external networks. Recently, however, so called Day-zero attacks are increased; the threat from internal devices such as notebooks, USB devices are as critical as attacks from external networks. Thus a new security solution is needed to protect manufacturing devices from both external and internal threat. To this purpose, we propose an edge-security system to provide cost effective, integrated, and simple end-point security solution specialized for automated manufacturing devices, which may avoid the shortcomings of NAC.