• Title/Summary/Keyword: 안전 메시지

Search Result 673, Processing Time 0.024 seconds

Secure Cluster Head Elections Based on Trust for Wireless Sensor Networks (무선 센서 네트워크를 위한 신뢰 기반의 안전한 클러스터 헤드 선출)

  • Wang, Gicheol;Cho, Gihwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.50-64
    • /
    • 2013
  • In clustered sensor networks, since a CH (Cluster Head) collects data from its members and delivers the collected data to the sink, it is very important to prevent compromised nodes from joining a CH election and manipulating and fabricating the election result. In order to protect CH elections from compromised nodes, unpredictability, non-manipulability, and agreement property should be guaranteed in CH elections. However, existing CH election schemes cannot prevent intelligent compromised nodes from skilfully violating those properties via their cooperation. In this paper, we propose a scheme which protects the CH election process by detecting intelligent compromised nodes and excluding them. For every CH election round, each member gives a direct trust value to other members according to their behavior. Then a real reputation value is given to each member by combining the direct trust value and indirect trust values provided by other members. Then, each node evaluates the real reputation values of members in its cluster and excludes some untrustable nodes from CH candidates. The scheme greatly improves the non-manipulability and agreement property of CH election results compared to other rival schemes. Furthermore, the scheme preserves the high non-manipulability and the high agreement property even in an environment where message losses can happen.

A Study on The Design of China DSRC System SoC (중국형 DSRC 시스템 SoC 설계에 대한 연구)

  • Shin, Dae-Kyo;Choi, Jong-Chan;Lim, Ki-Taeg;Lee, Je-Hyun
    • 전자공학회논문지 IE
    • /
    • v.46 no.4
    • /
    • pp.1-7
    • /
    • 2009
  • The final goal of ITS and ETC will be to improve the traffic efficiency and mobile safety without new road construction. DSRC system is emerging nowadays as a solution of them. China DSRC standard which was released in May 2007 has low bit rate, short message and simple MAC control. The DSRC system users want a long lifetime over 1 year with just one battery. In this paper, we propose the SoC of very low power consumption architecture. Several digital logic concept and analog power control logics were used for very low power consumption. The SoC operation mode and clock speed, operation voltage range, wakeup signal detector, analog comparator and Internal Voltage Regulator & External Power Switch were designed. We confirmed that the SoC power consumption is under 8.5mA@20Mhz, 0.9mA@1Mhz in active mode, and under 5uA in power down mode, by computer simulation. The design of SoC was finished on Aug. 2008, and fabricated on Nov. 2008 with $0.18{\mu}m$ CMOS process.

Analysis of Threats and Countermeasures on Mobile Smartphone (스마트폰 보안위협과 대응기술 분석)

  • Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.153-163
    • /
    • 2011
  • Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method (비밀분산 기반의 2-Subset Difference 브로드캐스트 암호시스템)

  • Lee, Jae Hwan;Park, Jong Hwan
    • Journal of Broadcast Engineering
    • /
    • v.20 no.4
    • /
    • pp.580-597
    • /
    • 2015
  • Broadcast encryption system is a cryptographic primitive that enables a sender to broadcast a message to a set of receivers in a secure channel. Out of previous proposed broadcast encryption systems, the most effective is the one that uses the Subset Difference(SD) method in a binary tree structure. The SD method has been realized by two underlying approaches: Pseudo-Random Generator(PRG) and Secret Sharing(SS). 2-SD method is the generalized version of the SD method by which two subsets of revoked receivers can be dealt with by one subset (in an SD-based broadcast encryption system). The primary advantage of the 2-SD method is to further reduce the size of transmission overhead, compared to the SD method. Until now, however, there is no known broadcast encryption system that is based on such a 2-SD technique using either PRG or SS basis. In this paper, we suggest a new 2-SD broadcast encryption system using the SS-based technique that was suggested by Jae Hwan Lee et al. in 2014[9]. The new system can reduce the size of ciphertext by 25% of the one in the previous SS-based broadcast encryption system. Also, on a theoretical note, ours is the first 2-SD broadcast encryption system that is provably secure.

Research on Vehicle Diagnostic and Monitoring technology Using WiBro Portable Device (와이브로 휴대기기를 사용한 차량진단 및 모니터링 기술에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul;Ahn, Yong-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.10
    • /
    • pp.17-26
    • /
    • 2010
  • This is concerned with the technology to monitor the vehicle operation, failure and disorder by using WiBro portable device. More precisely, the technology makes it possible that the information collection device is connected to both ECU(Electronic Control Unit) which is the device for controlling engine, transmission, brake, air-bag, etc that are connected to in-vehicle network and OBD-II connector that is for data collection from various sensors. In addition, with a WiBro portable device (cell phone, PDA, PMP, UMPC, etc). equipped with a vehicle diagnostic programs, information for operation, failure and malfunction can be obtained and analyzed in real-time, and alarm is alerted when the vehicle is in abnormal status, which makes the early reactions to the status. Furthermore, the collected data can be sent through WiBro network to the server managed by the company specialized in managing the vehicles, thus the technology could help the drivers who have less knowledge about their auto-vehicles have safe and economic driving. There is always a possibility of malfunction due to various types of noise that are caused by wring-harness when the device is wired-connected. In this research, in order to overcome this problem, we propose a system configuration that can do monitoring and diagnosis with a device for collecting data from vehicle and a personal WiBro device. Also, we performed research on data acquisition and interlock for the system defined by the definition for information and data sharing platform.

Research on Communication and The Operating of Server System for Vehicle Diagnosis and Monitoring (차량진단 및 모니터링을 위한 통신과 서버시스템 운용에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.6
    • /
    • pp.41-50
    • /
    • 2011
  • This article is concerned with the technology to provide car driver the car's status which are composed of car trouble code in car engine and many sensors. In addition, it installs vehicle diagnostic programs on wireless communication's portable device, for example, Smart phone, PDA, PMP, UMPC. As a result, this is to provide car manager with many information of car sensors when we go to car maintenance. it can monitor relevant information on vehicle by portable device in real time, alert drivers with specific messages and also enable them to address abnormalities immediately. Moreover, the technology could help the drivers who perhaps don't know very well about their vehicles to drive safely and economically as well; the reason is because the whole system is composed of just Vehicle-information collecting device and personal wireless communication's portables and transfers the relating data to server computers through wireless network in order to handle information on vehicles. This technology make us monitor vehicle's running, failure and disorder by using wireless communication's portable device. Finally, this study system is composed of a lot of application to display us the car's status which get car's inner sensor information while driving a car.

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

The Development of XML Message for Status Tracking the Importing Agrifoods During Transport by UBL (UBL 기반 수입농수산물 운송 중 상태 모니터링을 위한 XML 메시지 개발)

  • Ahn, Kyeong Rim;Ryu, Heeyoung;Lee, Hochoon;Park, Chankwon
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.159-171
    • /
    • 2018
  • The imported foods, which are imported and sold domestically, are on the rise every year, and the scale is expected to be larger, including processing the imported raw materials. However, the origin of raw materials is indicated when declaring cargo for finished products of agricultural products, but the standardization of inspection information management system for raw materials is insufficient. In addition, there is a growing concern about the presence of residual pesticides or radioactivity in raw materials or products, and customer want to know production history information when purchasing agrifoods. It manages the hazard analysis of imported agricultural products, but most of them are global issues such as microorganisms, residual pesticides, food additives, and allergy components, etc. Therefore, it is necessary to share among the logistics entities in the entire transportation process the related data. Additionally, to do this, it needs to design an architecture and standardize business model. In this paper, it defines the architecture and the work-flow that occurs between the business process for collecting, processing, and processing information for tracking the status of imported agricultural products by steps, and develops XML message with UBL and the extracted conceptual information model. It will be easy to exchange and share information among the logistics entities through the defined standard model and it will be possible to establish visibility, reliability, safety, and freshness system for transportation of agricultural products requiring real-time management.