• Title/Summary/Keyword: 접속 보안

Search Result 525, Processing Time 0.031 seconds

A study of user authentication protocol considering the mobility based on IPv6 in wireless LAN environment (무선랜 환경에서 IPv6기반의 이동성을 고려한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Yi-Kang;Kim, Tea-Sub;Oh, Ryong;Lee, Sang-Jun;Cho, Choong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.218-223
    • /
    • 2008
  • 최근 홈, 오피스 및 핫스팟 영역에서 초고속 멀티미디어의 서비스 수요가 많아짐에 따라 고속의 안정 적인 무선랜에 대한 수요도 증가하고 있다. Access Point 를 이용한 네트워크를 하는 무선랜은 네트워크 에 접근하는 사용자에 대한 인증 프로토콜을 통한 보안이 필요로 하며, 무선랜의 특성상 단말의 이동으로 인해, 핸드오프 시마다 반복되는 사용자 인증은 또 다른 문제를 야기한다. 또, 차세대 인터넷 프로토콜 IPv6는 현재의 주소체계인 IPv4 가 인터넷에 접속된 컴퓨터 수의 기하급수적으로 증가로 인해 빠른 속 도로 고갈되는 상황에서의 대안이다. 따라서 본 논문에서는 이동성을 고려하여 무선랜 환경에서 안전하게 사용자를 인증하고 서비스를 제공하기 위한 패스워드 기반의 사용자 인증 프로토콜을 제안한다. 또한 본 논문에서 제안한 프로토콜을 차세대 주소체계인 IPv6 환경을 바탕으로 구현하였고, 제안한 프로토콜에 대한 다양한 공격으로부터의 안전성을 분석 하였다.

  • PDF

A Study on the Design and the Performance Improvement of IP Access Control Protocol for External Mobile terminal (외부 이동단말의 접근제어를 위한 IP 프로토콜 설계 및 성능 개선에 관한 연구)

  • 박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.41-48
    • /
    • 2004
  • Access control protocol have verified security of external mobile terminal that access to inner information sever at Ubiquitous ages. In this paper, I would design for If Access Control Protocol of considering operation time when make cipher digital signature. Public key are used Individual identification number that issued from certify communication company, and cipher algorithm are used ECDSA definition factor for generation and verification of digital signature and it used Elliptic Curve with over 160 bit Key. Also, Access control operate on If level that designed IPv6 frame architecture. I would conclude that IP Access Control Protocol have verified security and improved performance in operation time more 4 times than before protocols when through the communication of use cipher digital signature for authentication and verification.

  • PDF

Computing Method of Cross-Correlation of Non-Linear Sequences Using Subfield (부분체를 이용한 비선형 수열의 상호상관관계의 효율적인 계산방법)

  • Choi, Un-Sook;Cho, Sung-Jin;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1686-1692
    • /
    • 2012
  • Spreading sequence play an important role in wireless communications, such as in a CDMA(code division multiple access) communication system and multi-carrier spectrum communication system. Spreading sequences with low cross-correlation, in a direct-sequence spread spectrum communication system, help to minimize multiple access interference and to increase security degree of system. Analysis of cross-correlations between the sequences is a necessary process to design sequences. However it require lots of computing time for analysis of cross-correlations between sequences. In this paper we propose a method which is possible to compute effectively cross-correlation using subfield in the process of practical computation of cross-correlation between nonlinear binary sequences.

Ubiquitous intelligent lesson management system (유비쿼터스 지능형 교육관리 시스템)

  • Hong, Sung-Moon;Oh, Suk-Kyung;Lim, Hyung-Min;Cho, Jae-Min;Kim, Dong-Suk;Park, Sang-Gug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.739-742
    • /
    • 2011
  • This paper describes system design and realization to the ubiquitous intelligent lesson management. This system includes students management by utilizing RFID and web-cam, personal security certification by fingerprint recognition, keyboard locking of PC by hooking technology, personal data management by cloud system, internet block access by a packet monitoring. We have design and realize this system, In the future, we will applicate our system to the classes using computer.

  • PDF

An Anomaly Detection Method for the Security of VANETs (VANETs의 보안을 위한 비정상 행위 탐지 방법)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.77-83
    • /
    • 2010
  • Vehicular Ad Hoc Networks are self-organizing Peer-to-Peer networks that typically have highly mobile vehicle nodes, moving at high speeds, very short-lasting and unstable communication links. VANETs are formed without fixed infrastructure, central administration, and dedicated routing equipment, and network nodes are mobile, joining and leaving the network over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connect, without centralized control. In this paper, we propose a rough set based anomaly detection method that efficiently identify malicious behavior of vehicle node activities in these VANETs, and the performance of a proposed scheme is evaluated by a simulation in terms of anomaly detection rate and false alarm rate for the threshold ${\epsilon}$.

Possibility of Disclosure of User Information in Internet Explorer (인터넷 익스플로러에서 사용자 정보 유출 가능성)

  • Lee, SangHo;Maeng, YoungJae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.937-943
    • /
    • 2013
  • Internet Explorer is the popular internet browser the most in domestic. In some version of Internet Explorer, user information could be leaked cause CORS(Cross-Origin Resource Sharing) Internet Explorer support. Different before, without setup a malicious program, attacker can get the user information even account information, credit card usage list and user information with SNS or internet portal site logged in regardless of secure program. Not only Internet Explorer but also mobile browser, it could be. In this paper, we make study of the potential disclosure of user information by attack using CORS, second attack and the way to improvement of vulnerability of CORS.

Design of a WiKi WEB-based Debate System for Sharing Knowledge (지식 공유를 위한 Wiki 웹토론시스템 설계)

  • Woo, Kyung-Hee;Jun, Woo-Chun
    • 한국정보교육학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.263-268
    • /
    • 2006
  • 토론학습시 보다 자발적인 아동의 참여를 향상시킬 수 있는 웹토론시스템은 시간의 편의성을 제공하고 학습자간의 상호작용을 활발하게 한다. 그러나 기존 웹토론시스템은 능숙한 자판사용능력과 물리적인 교육적 환경을 요구한다. Wiki는 하와이어로 '빨리'라는 뜻으로 누구나 '자유롭게' 정보와 지식을 편집할 수 있는 동적 프로그래밍 도구이다. Wiki를 사용하여 기존의 웹토론시스템의 단점을 보안한 본 시스템의 목적은 학습자의 자발적인 토론참여와 토론학습에 대한 흥미를 유발하는 것이다. 본 시스템의 특징은 다음과 같다. 첫째, 본 시스템은 웹토론에 대한 학생들의 흥미를 높일수 있다. 즉 누구나 관리자가 될 수 있는 기능을 이용해서 학생들의 흥미를 유발하였기 때문이다. 둘째, Wiki 웹토론시스템은 기존의 웹토론시스템보다 사용이 편리하여 학생의 참여도를 향상시키고 토론학습에 대한 관심을 증대시킬 수 있다. 기존의 웹토론시스템은 회원가입을 해야하고 로그인을 해야만 토론학습에 참여할 수 있지만 본 시스템은 웹페이지접속만으로도 가능하게 하였다. 셋째, Wiki 웹토론시스템은 웹토론를 학습하는 과정을 공개하여 올려지는 자료나 다른 사람의 의견을 통해 지식공유를 가능하게 한다. 즉, 자신이 찾은 주장의 근거을 찾는 과정에서나 또 그 근거를 통해 새로운 지식을 알게 되고 본 시스템에서 의견을 개진하고 다른 사람의 의견의 근거를 살펴보면서 지식을 공유하게 한다.

  • PDF

Design of Internet Phon(VoIP) System for Voice Security based on VPN (VPN 기반의 음성 보안을 위한 인터넷 텔레포니(VoIP) 시스템 설계)

  • Kim Suk-Hun;Kim Eun-Soo;Song Jung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.942-949
    • /
    • 2006
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

A Study on Relationships Between Information Systems Risk and Password Characteristics (정보 시스템 위험과 패스워드 특성간의 관계에 대한 연구)

  • 오창규;김종기;심윤주
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.62-74
    • /
    • 2003
  • Information security becomes a critical attribute to corporate information systems as increased strategic an operational reliance on information systems. Current proliferation of password requires more attention on information security because its nature of external connection with password user makes information systems more vulnerable from various threats are an important element of information systems management. This study focused on two issues : (1) the relationships between risk management factors(asset, threat, vulnerability) and risk level affected by threat, (2) the relationships between risk level and key password characteristics(length, composition, lifetime, selection method).

  • PDF

IPv6 Address Management System Based on IP Agents (IP Agent 기반 IPv6 주소 관리 시스템)

  • Lee, Dong-Il;Hong, Yoon Hwan;Kim, Myung-Kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1051-1054
    • /
    • 2013
  • Because of the limitations of traditional IPv4 address, the adoption of IPv6 has been accelerated. In IPv6 system, each host can obtain the IP address automatically using auto-configuration functionality, which is one of the features of IPv6. However, the auto-configuration functionality can allow a malicious user to get its IPv6 address and access the network without permission, the IP address management functionality becomes more important than IPv4. In this paper, we propose an IPv6 address management system based on IP agents, which protects the unauthorised users from accessing the network and redirects the web access of those users to a specific web page to induce them to access the network after installing the IP agents.

  • PDF