• Title/Summary/Keyword: 센서 인증

Search Result 337, Processing Time 0.027 seconds

A Fingerprint Verification System Based on Fuzzy Vault and Steganography for Smartphone (퍼지볼트와 스테가노그래피를 이용한 스마트폰 지문 인증 시스템)

  • Nam, Han-Sol;Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.419-426
    • /
    • 2015
  • This paper proposes a fingerprint verification system on a fuzzy vault with steganography for a smartphone. While biometric-based authentication can provide strong security, the biometric data must be handled carefully as it cannot be re-enrolled when it is revealed to other people. When the transformed data is used for authentication, the original biometric data can be protected. In this paper, we combine a fingerprint verification system with a fuzzy vault scheme to protect the fingerprint data of a smartphone user. In addition, the transformed data using a fuzzy vault scheme increases the security as it is concealed by the steganography scheme. The result of the experiment using fingerprint databases shows that the proposed scheme provides a high level of convenience and security for authentication of a smartphone having with a fingerprint sensor.

Efficient Clustering Technique in Sensor Network (센서네트워크에서 효율적인 클러스터링 기법)

  • Chae, Mee-Youn;Song, Joo-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1142-1144
    • /
    • 2007
  • 암호화를 통하여 데이터의 기밀성을 유지하고, 데이터 인증과 무결성을 보장하기 위하여 MAC을 사용하는 LEAP 프로토콜의 장점과 에너지 효율성을 고려하는 LEACH 프로토콜의 방식을 접목하여 효율적인 클러스터링 기법을 제시한다.

  • PDF

유비쿼터스 환경과 보안

  • 김형중
    • Information and Communications Magazine
    • /
    • v.20 no.5
    • /
    • pp.635-644
    • /
    • 2003
  • 유비쿼터스 컴퓨팅 환경에서만 볼 수 있는 보안문제를 가용성, 인증성, 익명성 관점에서 살펴보았다. 이 분야의 보안기술은 기존의 방법과 여러 면에서 다르다. 무선 애드학 네트워크 또는 센서 네트워크의 예에서 보는 것처럼 제한된 계산 성능과 메모리, 전력소모를 최소화히기 위한 통달거리 제한 및 아이들 상태 유지, 온라인 서버가 존재하지 않으므로 인해 발생하는 집중형 기술 구현이 불가능한 한계로 인해 새로운 이슈들이 등장하고 있다. 이런 문제들과 해결책 일부를 소개한다.

Study on the scheme to reinforce military security system based on location information (위치정보를 이용한 군 보안체계 강화 방안)

  • Kim, Yun Young;Namkung, Seung Pil
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.83-90
    • /
    • 2015
  • Current PKI system will confront more dangerous elements in the wireless network. Accordingly, this study suggests a plan to strengthen authentication system plan with using access control and encryption to the location. Locational information collecting devices such as GPS and sensor are utilized to create a new key for authentication and collect locational information. Such a key encodes data and creates an authentication code for are access control. By using the method suggested by this study, it is possible to control access of a military secret from unauthorized place and to protect unauthorized user with unproposed technique. In addition, this technique enables access control by stage with utilizing the existing PKI system more wisely.

Adaptive Partitioning of the Global Key Pool Method using Fuzzy Logic for Resilience in Statistical En-Route Filtering (통계적 여과기법에서 훼손 허용도를 위한 퍼지 로직을 사용한 적응형 전역 키 풀 분할 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.4
    • /
    • pp.57-65
    • /
    • 2007
  • In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Fan Ye et al. proposed that statistical en-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a partition value represents a trade off between resilience and energy where the partition value is the total number of partitions which global key pool is divided. If every partition are compromised by an adversary, SEF disables the filtering capability. Also, when an adversary has compromised a very small portion of keys in every partition, the remaining uncompromised keys which take a large portion of the total cannot be used to filter false reports. We propose a fuzzy-based adaptive partitioning method in which a global key pool is adaptively divided into multiple partitions by a fuzzy rule-based system. The fuzzy logic determines a partition value by considering the number of compromised partitions, the energy and density of all nodes. The fuzzy based partition value can conserve energy, while it provides sufficient resilience.

  • PDF

A Study on the Positioning of Ice Sensors for Assessing Airworthiness of Military Helicopter (군용헬기 결빙 감항인증 시험을 위한 결빙센서 위치선정에 관한 연구)

  • Kim, Chan Dong;Hur, Jang Wook
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.40 no.8
    • /
    • pp.495-501
    • /
    • 2016
  • The measurement of icing conditions needs to be carried out accurately by the ice detector system of an aircraft. Ice detector systems should be installed in locations not affected by backwash, rotor downwash or moving doors or other equipment. Various analyses were carried out in order to find the proper locations sufficiently far from these interfering effects. In this study, the optimum position of the ice detector was assessed using computer simulation, with respect to different flight modes, flow velocities and the amount and distribution of liquid water around the sensor.

User-Oriented Multimedia Service in the Ubiquitous Home Environment (유비쿼터스 흠 환경에서의 사용자 중심 멀티미디어 서비스)

  • Park Jong-Hyuk;Lee Sang-Jin;Koh Byoung-Soo;Lee Sang-Won
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1531-1542
    • /
    • 2005
  • In multimedia service of Ubiquitous Home Environment(UHE), the requirements such as intelligent service that is executed automatically without direct order of user and fitted service compatible for each user and comfortable of user, interoperability of multimedia contents between incompatible devices will increase. Multimedia protection and management, authentication and authority administration methods that are suitable for above demands are also required. In this paper, we suggest authentication method suited for UHE and propose user oriented multimedia service(UHMS: Ubiquitous Home Multimedia Service) that provides the interoperability of multimedia between incompatible devices, conducts intelligently the context information (preference information, device information etc.) using sensor module and home server, provides and secure services.

  • PDF

Public Key Authentication using(t, n) Threshold Scheme for WSN ((t, n) 임계치 기법을 이용한 센서네트워크에서의 공개키 인증)

  • Kim, Jun-Yop;Kim, Wan-Ju;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.58-70
    • /
    • 2008
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. These previous schemes, however, must perform the authentication process one-by-one in hierarchical manner and thus are not fit to be used as primary authentication methods in sensor networks which require mass of multiple authentications at any given time. This paper proposes a new concept of public key-based authentication that can be effectively applied to sensor networks. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t, n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability. The performance advantages of this scheme on memory usage, communication overload and scalability compared to Merkle tree-based authentication are clearly demonstrated using performance analysis.

Device Security Bootstrapping Mechanism on the IEEE 802.15.4-Based LoWPAN (IEEE 802.15.4 기반 LoWPAN에서의 디바이스 보안 설정 메커니즘)

  • Lee, Jong-Hoon;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1561-1569
    • /
    • 2016
  • As the use of the sensor device increases in IoT environment, the need for device security is becoming more and more important When a sensor device is deployed in IEEE 802.15.4-based LoWPAN, it has to perform the join operation with PAN Coordinator and the binding operation with another device. In the join and binding process, authentication and key distribution of the device are performed using the pre-distributed network key or certificate. However, the network key used in the conventional method has problems that it's role is limited to the group authentication and individual identification is not applied in certificate issuing. In this paper, we propose a secure join and binding protocol in LoWPAN environment that solves the problems of pre-distributed network key.