• Title/Summary/Keyword: 자체 인증 기법

Search Result 55, Processing Time 0.03 seconds

Enhanced Mobile Agent Scheme for RFID Privacy Protection (RFID 프라이버시 보호를 위한 향상된 모바일 에이전트 기법)

  • Kim, Soo-Cheol;Yeo, Sang-Soo;Kim, Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2C
    • /
    • pp.208-218
    • /
    • 2008
  • We are sure that RFID system should be a widely used automatic identification system because of its various advantages and applications. However, many people know that invasions of privacy in RFID system is still critical problem that makes it difficult to be used. Many works for solving this problem have focused on light-weight cryptographic functioning in the RFID tag. An agent scheme is another approach that an agent device controls communications between the tag and the reader for protecting privacy. Generally an agent device has strong security modules and enough capability to process high-level cryptographic protocols and can guarantees consumer privacy. In this paper, we present an enhanced mobile agent for RFID privacy protection. In enhanced MARP, we modified some phases of the original MARP to reduce the probability of successful eavesdropping and to reduce the number of tag's protocol participation. And back-end server can authenticate mobile agents more easily using public key cryptography in this scheme. It guarantees not only privacy protection but also preventing forgery.

A Specification-based Intrusion Detection Mechanism for LEACH Protocol (LEACH 프로토콜에 적합한 명세기반 침입탐지 기법)

  • Lee, Yun-Ho;Kang, Jung-Ho;Lee, Soo-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.138-147
    • /
    • 2012
  • With the improvement of wireless communication and embedded technology, WSN is used at various fields. Meanwhile, because WSN is resource constrained, it is more vulnerable than other networks. To solve the security problem of WSN, we can use the traditional secure mechanism like as cryptography and authentication. But the traditional secure mechanism is not enough for all security issues that may be happened in WSN, especially attacks caused by the compromised node. So, we need the IDS as the second secure mechanism for WSN. In this paper, we propose the Specification-based Intrusion Detection Mechanism that makes LEACH, which is one of the clustering routing protocol for WSN, more reliable and safety.

Aerodynamic Noise Prediction of a Helicopter Rotor Blade for the Flight Conditions of Approach and Flyover (비행 조건 별 헬리콥터 로터 블레이드 공력 소음 예측)

  • Wie, Seong-Yong;Kang, Hee Jung;Kim, Deog-Kwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.8
    • /
    • pp.671-678
    • /
    • 2018
  • Helicopter noise prediction is an essential process for developing low noise helicopter technology. In this paper, the noise prediction method is developed using the helicopter integrated performance analysis program CAMRAD-II and in-house noise analysis code. In addition, the analytical technique was verified by analyzing blade-vortex interaction noise, which is the biggest cause of helicopter noise. In order to predict the actual helicopter noise, the noise analysis was performed for the flyover and approach condition, which is the standard measurement condition of the International Civil Aviation Organization (ICAO). Finally, we confirmed the suitability of the analytical method through comparison and analysis with the flight test results.

A Study on the SmartPhone GPS based Graphical Password Approach (스마트폰 GPS 기반 그래피컬 패스워드 기법에 관한 연구)

  • Kim, Tae Eun;Kim, Hyeon Hong;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.525-532
    • /
    • 2013
  • Recently smartphones, tablet, etc. Various types of smart terminal is due to the increased security in mobile devices are becoming an issue. How to enter the password in this environment is a very important issue. Difficult to have a secure password input device on various types of mobile devices. In addition you enter on the touch screen the password of character, uncomfortable and it is vulnerable to SSA attack. Therefore, in this paper provide for defense the SSA(Shoulder Surfing Attacks) and useful password input mechanism is proposed with Smartphone GPS uses a value generated via a graphical password techniques.

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

A Study on the Korean-Stroke based Graphical Password Approach (한국어 획 기반 그래피컬 패스워드 기법에 관한 연구)

  • Ko, Tae-Hyoung;Shon, Tae-Shik;Hong, Man-Pyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.189-200
    • /
    • 2012
  • With increasing the number of smart device such as Tablet PC, smart phone and netbook, information security which based on smart device in mobile environment have become the issue. It is important to enter a password safety. In various types of mobile devices, because of hardware limitation of device, it is difficult that to equip secondary input device such as keyboard and mouse. Also, a loss of accuracy becomes a problem because input information was entered by touch screen. Because of problem mentioned above it can be predicted to change password scheme text based password scheme to graphical password scheme, graphical password scheme is easy to use and is resistant to shoulder surfing attack. So this paper proposes new graphical password scheme based 5 strokes which are made by decomposed the Korean to defend against shoulder surfing attack.

Method for Analyzing Media Compatibility in Home Networks (홈 네트워크에서 미디어 호환성 분석 기법)

  • Park, Yong-Suk;Kim, Hyun-Sik;Park, Se-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.641-643
    • /
    • 2014
  • The Digital Living Network Alliance (DLNA) specification enables sharing of multimedia contents in the home network. Ordinary users will assume multimedia compatibility among DLNA certified devices, but that is generally not the case. There are optional codecs and even proprietary codecs used by the manufacturers. Information on multimedia formats supported by the devices are in general not easily exposed, creating difficulties in media sharing and usage. In this paper, the contents directory information exchanges among DLNA devices over the network is analyzed, and a method for media compatibility analysis is provided, The user can get information on compatible media formats, enabling ease of DLNA system use.

  • PDF

The Watermarking Method Using by Binary Image (이진영상을 이용한 워터마킹 기법)

  • Lim Hyun-Jin;Lee Seung-Kyu;Kim Tea-Ho;Park Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.163-166
    • /
    • 2006
  • The field of medical images has been digitalized as the development of computer and the digitalization of the medical instruments. As a result it causes a lot of problems such as an illegal copy related to medical images and property right of the medical images. Therefore, digital watermarking is used for discrimination whether the data are modified or not. It is also used to protect both the property right of medical images and the private life of many patients. The proposed theories, the Non-blind and the Blind method, have two problems. One is needed an original image and the other is using a gaussian watermarking. This paper proposes the new Blind Watermarking using binary images in order to easily recognize the results of watermark. This algorithm is described that an watermark of a binary image is wavelet-transformed, and then a transformed watermark is inserted in medium-band of frequency domains of original image by the Circular Input method. The propose method presented the good performance of over 0.97 in NC.

  • PDF

Design and Construction of Green Infrastructure-Low Impact Development Experimental Complex for Hydrological cycle (부산대학교 GI·LID 물순환 실증단지 계획 및 구축)

  • Lee, Jae-Hyuk;Yoon, Eui-Hyeok;Jang, Young-Su;Shin, Hyun-Suk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.319-319
    • /
    • 2016
  • 최근 급격한 기후변화와 도시화로 인하여 강우량 및 강우강도는 약 20% 증가하고 강우일수는 14% 감소하며 도시 기온이 최대 $3^{\circ}C$까지 증가하는 등의 현실적인 문제가 발생하고 있다. 이로 인한 도시 물순환체계의 파괴는 도시물관리 여건의 악화로 이어지고 특히 불투수면적 증가로 인한 도시 홍수 및 침수의 증가, 잦은 도시 고온 현상, 도시하천의 건천화로 수질 악화를 야기하는 실정이다. 이에 국토의 자연자원을 보전하고 기후변화에 적응하면서 도시의 안전도와 가치를 높이기 위한 물관리 정책은 먼저 물을 순환을 보다 적극적으로 반영하고 통합적인 물관리 체계 확보를 요구한다. 이를 위해서는 발생원 관리를 포함한 소규모 분산관리 체계로 변화하여야 하며 이들 시설에 대한 네트워크화를 통해 기후변화에 강건하고 통합관리쳬계를 구축하는 것이 중요하다. 이를 위해서는 저영향개발(LID, Low Impact Development) 및 그린인프라(GI, Green Infrastructure) 기반의 분산식 빗물관리기법의 도입이 절실하다. 현재 국내에서는 제도적으로 기후변화 대비, 지속가능한 도시환경 구축을 위한 물순환 건전화를 위해 100대 국정화제에 포함시키는 등(2013.2) 도시계획 및 기반시설 설치 LID기법의 법제적 산업적 도입을 추진중에 있으나, LID 기술의 수자원 치수, 이수 및 환경 효율성에 대한 객관적인 정보의 부재, LID 기술에 대한 효율성 검증 및 인증시스템의 부재, LID 기술의 무분별한 국외기술 도입으로 인한 효과 저감, LID 기술의 설계, 시공, 관리를 위한 매뉴얼 및 가이드라인의 부재, LID 기술에 대한 지자체 지원 및 전문가 양성 시스템의 부재 등 복합적인 문제를 안고 있어 GI 및 LID 기술의 적용을 통한 새로운 도시 및 유역차원의 수자원확보와 재해경감기술 패러다임 확보가 용이하지 않다. 이를 위해 본 연구에서는 강우유출수 관리를 위한 LID기술 신뢰도 향상 및 단일화, 표준화된 효율성 검증 기술 개발과 더 나아가서 도시-건축-수자원-도로-조경 등의 종합적인 인프라를 바탕으로 LID기술 통합관리 및 기술 고도화를 위해 부산대학교 GI LID 물순환 실증단지의 계획 및 구축을 수행하였다.

  • PDF

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.