• Title/Summary/Keyword: 인증 메커니즘

Search Result 407, Processing Time 0.029 seconds

Disconnection of Wireless LAN Attack and Countermeasure (무선 LAN 연결 해제 공격과 보안)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.453-458
    • /
    • 2013
  • In a wireless LAN environment, security is the most important. Security of 802.11 standard has many vulnerabilities of the network attack. IEEE has created mechanisms to security for this vulnerability. But the vulnerabilities is characteristic of broadcast in the air in wireless LAN, it is more disclosure then other network environments. In a wireless LAN environment, it can be accessed to the wireless LAN after authentication. Authentication process is one of most important because of the first security step. However, in the authentication process is not mentioned in the method of reducing the disclosure maximum fundamental. Therefore, in this research, the vulnerability of 802.11 are presented and how to do de-authentication in 802.11.

Authentication Mechanism Implementation for Information Sharing in Peer-to-Peer Environment (Peer-to-Peer 환경에서의 정보 공유를 위한 인증 메커니즘 구현)

  • Lee, Jeong-Ki;Bae, Il-Ho;Lee, Cheol-Seung;Moon, Jung-Hwan;Park, Chan-Mo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.7
    • /
    • pp.1120-1125
    • /
    • 2002
  • According as progress by information society, computer network use and enlargement of scale are accelerated more. Also, with good physician increase of information that is exchanged through computer network, security of network is embossed to controversial point that is new. Because P2P as that remove or weakens center server function is open network that can participate between each user, problem about authentication between each users is risen. If certain user in network i3 in open environment, this user must authenticate request about service to user who is admitted between each user to limit connection. This treatise proposed method to keep security in P2P environment to solve this and designed certification mechanism that quote Kerberos certification mechanism to mechanism that can share information safety in P2P environment.

The Development of a One-time Password Mechanism Improving on S/KEY (S/KEY를 개선한 일회용 패스워드 메커니즘 개발)

  • 박중길
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.25-36
    • /
    • 1999
  • In this paper we propose a one-time password mechanism that solves the problems of the S/KEY: the limitation of a usage and the need of storage for keys. because of using a cryptographic algorithm the proposed mechanism has no the limitation of a usage. Also because of producing the key for an authentication from a user's password it is easy to manage the authentication key and is possible to share the session key between a client and a server after the authentication process. In addition the proposed mechanism is easy to protect and manage the authentication information because of using a smart card and is adopted by the system that needs a noe-way authentication from a client to a server without the challenge of a server.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

The Implementation of Device Authentication Mechanism in Home Network based on EAP-AKA (홈 네트워크 환경에서 EAP-AKA 기반 디바이스 인증 메커니즘 구현)

  • Kim Je-Yoon;Lee Jin-Hung;Shin Sang-Uk
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.278-283
    • /
    • 2006
  • 홈 네트워크 보안기술은 안전한 홈 네트워크를 보장하고, 다양한 홈 네트워크 디바이스를 대상으로 안전한 서비스를 위해 필수적이다. 이러한 환경에서 안전하게 디바이스를 인증하고 서비스를 제공하기 위하여 표준화된 보안기술이 요구되고 있다. 본 논문에서는 3GPP UMTS 환경의 표준인 AKA 메커니즘에 기반한 EAP-AKA 인증 방식을 사용하여 디바이스와 네트워크가 상호 인증하고, 디바이스간 보안통신을 컨트롤하는 시스템을 설계하고 구현한다.

  • PDF

P2P 사용자 인증과 OTP 분석

  • Moon, Yong-Hyuk;Kwon, Hyeok-Chan;Nah, Jae-Hoon;Jang, Jong-Soo
    • Review of KIISC
    • /
    • v.17 no.3
    • /
    • pp.32-40
    • /
    • 2007
  • 유비쿼터스 서비스 인프라로 부각되고 있는 P2P(Peer-to-Peer) 네트워크는 사용자 제작 콘텐트, 동영상, 파일 등으로 대표되는 지식 콘텐트뿐만 아니라, 컴퓨터 및 네트워크 자원(Resource)을 다양한 환경에서 N 대 N의 형태로 상호 공유 및 분배할 수 있는 구조적 가능성을 제공하고 있다. 그러나 "Open, Dynamic, Anonymous" 등의 특성을 기반으로 하는 P2P 네트워크는 신뢰적 ID(Identity) 생성 및 관리 그리고 이의 적절한 인증에 대한 지원 없이는 현실적으로 잠재적인 보안 위협에 노출되는 제약이 따르게 된다. 한편, 최근 금융보안업계가 주축이 되어 일회용패스워드로 지칭되는 OTP(One Time Password) 인증 메커니즘(Authentication Mechanism)을 제 1 등급 보안방법으로 명시화하고 있고, 온라인 업계에서도 이를 활용하는 기술적 시도 및 개발 사례가 늘어나고 있어, OTP 기술의 보안성 검토 및 활용 범위를 확대하는 방안에 대한 논의의 필요성이 대두되고 있다. 본고에서는 이러한 기술적 흐름 및 산업계 동향에 발맞춰 P2P 네트워크에서 사용자 인증을 위해 OTP 메커니즘을 활용하기 위한 방안에 대해 검토하고 이의 적용 가능성을 분석한다.

Secure Authentication Mechanism using a Location Information of Device and an OTP Algorithm for Home Network Environment (홈네트워크에서의 기기 위치 정보와 OTP 알고리즘을 활용한 인증 보안 메커니즘)

  • Kim, Jong-Jin;Cho, Eun-Young;Son, Jin-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.12-17
    • /
    • 2007
  • 홈네트워크를 이루는 대부분의 기기는 그 위치가 자주 변동되지 않는다. 때문에 기기의 실제적인 위치 값은 기기를 구분할 수 있는 유일한 ID로 활용이 가능하다. 위치 측정 센서를 통해 홈네트워크를 구성하는 제품의 위치정보를 측정하여 그 값을 인증 보안 메커니즘에 활용한다. 홈네트워크를 구성하는 각각의 기기마다 요구하는 보안 수준외 정도가 다르다. 때문에 각 기기마다 차등 보안 레벨 적용이 가능하다. 즉, 낮은 자원을 이용하는 기기에 대해서는 높은 보안 적용을 위해 기기에게 필요한 추가 자원의 만큼을 절약할 수 있게 된다. 보안 인증 통신을 위해 홈네트워크를 구성하는 저 성능의 기기에게 효과적으로 적용이 가능한 One-Time Password(OTP) 알고리즘을 이용한다. 본 논문에서는 홈네트워크를 구성하는 기기의 위치정보와 OTP의 두 가지 기술을 활용하여 홈네트워크 상의 보안 인증 문제를 해결하고자 한다.

  • PDF

A Study on interative device authentication mechanism in the home network system (홈네트워크 시스템의 양방향 기기 인증 메커니즘에 관한 연구)

  • Baek Sang-Joon;Lee Sung-Jin;Bae Sung-Ho;Oh Sei-Wong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.502-506
    • /
    • 2005
  • Applying wireless mode to an existing wired home network system, the users became to use services of home network conveniently in their home. In order to construct a safe network in home network system, it needs user authentification and interactive authentification to mobile devices. In this paper, we propose an interactive authentification mechanism in order to make a safe home network system in mobile environment.

  • PDF

A Design and Analysis of Authentication Scheme for Tolerating Packet Loss in the Multicast Environment (멀티캐스트 환경에서의 패킷 손실을 고려한 인증기법 설계 및 분석)

  • 임정미;박철훈;유선영;박창섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.163-172
    • /
    • 2003
  • Proposed in this paper is an authentication mechanism for multimedia streaming data in the Intemet multicast environment. The multicast authentication mechanism is coupled with the packet-level forward error correction code which has been recently applied for a reliable multicast transport transmission. Associated with this, Reed-Solomon erasure code is chosen for tolerating packet loss so that each of the received packets can be authenticated independently of the lost packets.