• Title/Summary/Keyword: 상호인증 프로토콜

Search Result 311, Processing Time 0.026 seconds

Design and Implementation of a Cryptograhic API considering a DRM Environment (DRM 환경을 고려한 보안 통신 API의 설계 및 구현)

  • Jung, In-Sung;Shin, Yong-Tae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.163-170
    • /
    • 2004
  • The additional mechanism Is required to set up a secure connection among the communication subjects in the internet environment. Each entity should transfer and receive the encrypted and hashed data to guarantee the data integrity. Also, the mutual authentication procedure should be processed using a secure communication protocol. The SSL/TLS is a protocol which creates the secure communication channel among the communication subjects and sends/receives a data. Although the OpenSSL which implements the TLS is using by many developers and its stability and performance are proved, it has a difficulty in using because of its large size. So, this Paper designs and implements the secure communication which the users can use easily by modification works of OpenSSL library API. We proved the real application results using the DRM client/server case which supports a secure communication using the implemented API.

A new satellite CAS using password-based protocol (패스워드 기반 프로토콜을 이용한 새로운 위성 한정 수신 시스템)

  • Kim, Young-Soo;Sohn, Ki-Wook;Yang, Hyung-Kyu;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3597-3605
    • /
    • 1999
  • We introduce a new satellite Conditional Access System(CAS) that a subscriber could watch a pay-TV knowing only his or her identity and password, without using a smart card. For this new system, two password-based protocols are presented which not only share a session key and authenticate each other but also download an authorization key. This system has some merits: First, compared with current systems, it reduces the amount of computations by eliminating the AK-encryption module in SMS(Subscriber Management System) and simplifying the receiver's CW-decryption process. Second, since this system does not need an expensive Card Adaptive Device(CAD), it can reduce costs. finally it provides descrambler independence allowing it to be used through any TV set-top box that includes a descrambler, unlike the current system that a descrambler is linked with a smart card.

  • PDF

The proposal of improved secure cookies system based on public-key certificate (인증서 기반의 개선된 보안 쿠키의 설계와 구현)

  • 양종필;이경현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1090-1096
    • /
    • 2002
  • The HTTP does not support continuity for browser-server interaction between successive visits or a user due to a stateless feature. Cookies were invented to maintain continuity and state on the Web. Because cookies are transmitted in plain and contain text-character strings encoding relevant information about the user, the attacker can easily copy and modify them for his undue profit. In this paper, we design a secure cookies scheme based on X.509 public key certificate for solving these security weakness of typical web cookies. Our secure cookies scheme provides not only mutual authentication between client and server but also confidentiality and integrity of user information. Additionally, we implement our secure cookies scheme and compare it to the performance with SSL(Secure Socket Layer) protocol that is widely used for security of HTTP environment.

U-헬스케어를 위한 IEEE 11073 기반 원격 생체정보 모니터링 보안 기술

  • Na, Jae-Uk;Yun, Eun-Jun;U, Yeon-Gyeong;Park, Jong-Tae
    • Information and Communications Magazine
    • /
    • v.29 no.10
    • /
    • pp.66-73
    • /
    • 2012
  • 전 세계적으로 노령인구가 급격히 증가하면서 만성질환자도 급증하고 있는 추세이다. 또한, 고도화된 현대사회와 과도한 업무, 서양화된 식습관, 그리고 운동부족은 젊은 층에서의 성인병 및 만성질환 증가를 부추기고 있다. 만성질환의 증가는 의료비 증가로 이어지고 결국은 국가재정 부담으로 돌아가게 된다. 만성질환자의 대부분은 지속적인 생체정보 측정과 이를 통한 관리가 필수적인데 매번 병원을 방문해 관리하는 것은 현실적으로나 비용적인 측면으로나 무리가 있는 것이 사실이다. 이러한 문제를 해결하고 언제 어디서나 시간과 공간에 구애받지 않고 생체정보를 원격에서 측정하고 관리 받을 수 있도록 하는 것이 U-헬스케어 서비스이다. U-헬스케어 서비스는 전통적인 의료 서비스에 정보통신 기술을 접목한 형태로 고령인구 및 만성질환자의 지속적인 관리를 위해 현재 주목 받고 있는 기술이다. U-헬스케어 서비스의 가장 중요하면서도 기본적인 요소는 원격지 사용자의 생체정보를 측정하고 수집할 수 있는 원격 생체정보 모니터링 기술이다. 이를 위해서는 다양한 종류의 생체정보 측정기기가 필요한데 장비나 시스템 간 통신 인터페이스의 상호 호환성이 매우 중요하다. 본 논문에서는 원격 생체정보 모니터링을 위한 표준 기술인 IEEE 11073 PHD를 소개하고 현재 IEEE 11073 PHD 표준에서 명시하고 있지 않은 보안 문제점과 필요 기술들을 분석하고자 한다. 또한, IEEE 11073 PHD에서 IEEE 11073-20601 표준 프로토콜을 이용한 사용자 인증 구조를 제안한다.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

A Study on the Performance Improvement of the Security Transmission Using the SSFNet (SSFNet을 이용한 보안전송 성능개선에 관한 연구)

  • Ryu, Jung-Eun;Ryu, Dong-Ju;Lee, Taek-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.811-815
    • /
    • 2005
  • IPSec(Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. IPSec is providing authentication, integrity and confidentiality security services. The specifications for Internet Key Exchange(IKEv1) were released to the world. Some criticisms of IKEv1 were that it was too complex and endeavored to define too much functionality in one place. Multiple options for multiple scenarios were built into the specification. The problem is that some of the included scenarios are rarely if ever encountered. For IPsec to work, the sending and receiving devices must chare a Public Key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates. This thesis is a study on the performance improvement of the security transmission using the SSFNet(Scalable Simulation Framework Network Models)

  • PDF

A Secure Agent of Integrated Administration System for the Electronic Commerce (전자상거래 서비스를 위한 통합 관리 시스템의 보안 에이전트)

  • 서대희;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.674-682
    • /
    • 2002
  • Nowadays economic and commercial businesses have been increased because of the Internet. As a result of this, electronic commerce is becoming one of the most Interesting topic of discussion. Electronic commerce is equal to a real market, only the place of business is the imaginary space supported by the Internet. There are a few conditions to consider, making electronic commerce work safely. The electronic commerce should be connected by a substantial system and an on-line Protocol. There are some conditions needed for information security, authentication, and payment by electronic currency etc. Although there are many kinds of existing systems, which create services successfully, further research for security is required. Therefore, this paper suggests an authenticated Agent management, which offers more convenience and security than before. Also, this paper shows many authenticated methods for a management system. An Agent that is one of interesting things to study can handle information problems and works related to electronic commerce.

  • PDF

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF

Transmitting/Receiving of Standard Health Data Using Bluetooth HDP on the Android Platform (안드로이드에서 블루투스 HDP를 이용한 표준건강정보의 송수신)

  • Park, Young-Jin;Cho, Hui-Sup;Son, Jong-Wuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.464-470
    • /
    • 2013
  • These days, with increasing interest about the health care, research about standard for transmitting/receiving data of health device has been actively conducted. Standardization and testing / certification is underway through the IEEE 11073 PHD, Health Level Seven and the Continua Health Alliance, it'll continue to be more research and experiments in the future. In this paper, we introduce the IEEE 11073 PHD standards for exchange of remote health information and the Bluetooth Health Device Profile(HDP) for health device profile of the Bluetooth technology, also we conducted experiments about exchange health information between health device and smart device which are adapted the IEEE 11073 PHD and Bluetooth HDP. Transmitting/receiving of the IEEE 11073 PHD standard protocol using the Bluetooth HDP profile between health device and smart device can be known by this experiment, and it expect to implement variety of remote medical services through health device supporting these standards in future.

Interoperable Security Framework for Heterogeneous IoT Platforms (이종 사물인터넷 플랫폼 간 보안 상호운용을 위한 프레임워크)

  • Oh, Se-Ra;Kim, Young-Gab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.81-90
    • /
    • 2018
  • Due to the dramatic advancement of IoT (Internet of Things), it is expected that tens of billions of IoT devices will be connected by the year 2024. Furthermore, as IoT technologies evolves, the security management in IoT platforms has become a critical issue. For example, there are interworking problems between heterogeneous IoT platforms caused by differences from communication protocols, security policies, etc. in each platform. In addition, unsecured interworking can cause major security issues including the information leakage. In this paper, in order to solve these problems, a security interworking architecture is proposed and implemented in both FIWARE and oneM2M, which are representative IoT platforms. First, the security architecture of FIWARE is analyzed and implemented, and then the security framework based on OAuth 2.0 is developed on Mobius platform. Finally, in order to validate the proposed security interworking architecture, a LED (Light-Emitting Diode) example, where the LED is controlled by only authorized users, is developed. The proposed architecture can be extended to the diverse IoT platforms and devices.