• Title/Summary/Keyword: 초기인증

Search Result 203, Processing Time 0.026 seconds

Group Key Management Method for Secure Device in Smart Home Environment (스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법)

  • Ryu, Ho-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.479-487
    • /
    • 2015
  • According to IT development, smart home services is providing remote service, monitoring service and other various services through smart home devices based on network. But, smart home environment exists security threats such as data falsification, illegal authentication and invasion of privacy through a malicious device. Smart home is studying to prevent these security threats, but the studies of smart home environment security are still in early stage of development and the studies of group key management method is lacking in smart home. In this paper, we propose the group key management method for secure device in smart home.

무인이동체 드론의 취약점분석 및 대응기술 연구 동향

  • Kim, Myoungsu;You, Ilsun;Yim, Kangbin
    • Review of KIISC
    • /
    • v.30 no.2
    • /
    • pp.49-57
    • /
    • 2020
  • 군사 등의 특수 목적으로만 사용되었던 무인비행체 드론이 최근 상용 수준의 간결한 구조와 저가화가 가능해지면서 여러 제조업체를 통하여 민간분야의 다양한 응용에 활용 가능함을 증명하고 있다. 그러나 제조업체들 간의 시장 우위 선점을 위한 과열 경쟁으로 인하여 보안 안전성 검증 단계를 거치지 않은 드론과 이에 수반되는 애플리케이션이 시장에 바로 출시되면서 이들이 우리 사회를 향한 공격도구로 활용될 수 있다는 새로운 잠재적 위협이 우려되고 있다, 이와 관련하여 현재 드론과 애플리케이션과의 연결 및 데이터 통신 과정에서 완성도가 낮은 접근제어 기술이나 암호화되지 않은 통신방식을 비롯하여 드론 내부 소프트웨어의 코딩 상의 문제점 등에 의하여 다양한 취약점이 노출되고 있는 상태이다. 이러한 취약점들로 인하여 드론의 인증 해제 및 하이재킹을 통한 불법 영상촬영이나 개인정보의 유출 등을 비롯하여 특정 목표물을 향한 드론의 고의적 추락 등이 발생할 경우 재산 피해뿐만 아니라 인명 피해까지 발생할 수 있다. 특히, 현재의 드론 응용은 초기단계여서 향후 다양한 응용과 유관 기술들이 폭넓게 전개되어야 하는 시점에서 이러한 사고 가능성은 매우 심각하게 인식되어야 할 것이다. 더구나 제4차 산업혁명 시대의 드론은 비상시를 위한 다이나믹 모바일 게이트웨이 역할까지도 수행하여야 하는 환경에서 악의적인 행위는 전체 사회로 확산될 우려도 있으므로 미래 사회의 드론을 위한 안전문제는 매우 시급하고 중대하다고 할 수 있다. 이에 본 고에서는 현재까지 발표된 드론에 대한 다양한 보안위협을 조사하고 이러한 보안 위협을 요소별로 분류하여 정리하였다. 본 기고가 간단하게나마 정리한 내용을 통하여 다양한 보안위협에 대한 대응기술을 준비하기 위한 시발점이 되었으면 한다.

Proposing a PRNG based on a block cipher and cryptanalyzing its security (블록 암호 알고리즘기반 의사난수발생기 제안과 안전성 분석)

  • Song, Jun-Hwan;Hyun, Jin-Su;Koo, Bon-Wook;Chang, Ku-Young
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.809-816
    • /
    • 2002
  • Cryptographic applications, such as data confidentiality and authentication, must be used for secure data communications. PRNG(Pseudo-Random Number Generator) is a basic cryptographic component which is supposed to be satisfied by criteria that we provable security and randomness properties. PRNG it used for generating an initial value or key value of cipher and security of whole cryptographic module depends on the security of PRNG. In this paper, we introduce an PRNG based on a block cipher and prove their security.

Modeling of Debris Flow Around Road (도로에서의 토석류에 의한 홍수위험도 모델링)

  • Lim, Jae Tae;Kim, Byung Hyun;Han, Kun Yeun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.304-304
    • /
    • 2015
  • 산지가 많은 우리나라에서 도로는 필연적으로 산지부를 지나가게 되어 토석류에 취약한 문제점이 있다. 2000년대 초반이전까지만 해도 통계자료조차 없었던 도로 인접지에서의 토석류의 발생이 최근 늘어나고 있는데 반해 도로에서의 토석류에 대한 연구는 초기단계에 있다. 도로에서의 사례를 제외하고 보면 2011년 발생한 서울 우면산에서의 토석류 발생 등 일부사례를 중심으로 발생 거동 해석을 수행한 연구결과가 있으나 이러한 연구 결과를 도로에 직접적으로 적용하기에는 어려움이 있다. 특히 도로에서 발생한 토석류에 대한 거동 분석을 수행할 필요가 있으나 이와 같은 문제로 인해 실제 도로에서 발생한 토석류 사례에 대한 거동 분석은 현재까지 이루어지지 않았다. 본 연구에서는 GIS를 이용한 지형분석 및 HEC-HMS를 이용한 수문분석을 실시하였고, 미연방재난관리청(FEMA)의 홍수보험지도와 하천재해해석을 위한 공식 인증 프로그램으로 등록되어 있는 토석류 거동 해석 프로그램인 FLO-2D을 이용하였다. 실제 도로에서 발생한 토석류 사례에 대하여 FLO-2D 모형을 이용하여 거동을 해석하고, 해석결과를 실제 발생한 토석류 자료와 적합도 분석을 수행하였다. 또한, 국내 도로 인접지에서의 토석류 해석에 대한 FLO-2D 모형의 적용 가능성에 대하여 연구하였다.

  • PDF

A Group Key Management Architecture in Mobile Network Environments (이동네트워크 환경에서의 그룹키 관리구조)

  • 박영호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.89-100
    • /
    • 2002
  • In this paper, we propose a group key management architecture for the secure group communications in mobile netwowrks and authenticated key agreement protocol for this system. Most of existing group key management schemes un certificates based on the public key for the purpose of user authentication and key agreement in secure fashion however, we use the ICPK(Implicitly Certified Public key) to reduce the bandwidth for a certificate exchanging and to improve a computational efficiency. In this architecture, we use two-tier approach to deal with key management where the whole group is divided into two parts; the first is a cell groups consisted of mobile hosts and another is a control group consisted of cell group managers. This approach can provide flexibility of key management such that the affection for a membership change is locally restricted to the cell group which is an autonomous area of the CGM(Cell Group Manager).

A Scheme of Security Drone Convergence Service using Cam-Shift Algorithm (Cam-Shift 알고리즘을 이용한 경비드론 융합서비스 기법)

  • Lee, Jeong-Pil;Lee, Jae-Wook;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.29-34
    • /
    • 2016
  • Recently, with the development of high-tech industry, the use of the drones in various aspects of daily life is rapidly advancing. With technical and functional advancements, drones have an advantage of being easy to be utilized in the areas of use according to various lifestyles. In addition, through the diversification of the drone service converged with image processing medium such as camera and CCTV, an automated security system that can replace humans is expected to be introduced. By designing these unmanned security technology, a new convergence security drone service techniques that can strengthen the previous drone application technology will be proposed. In the proposed techniques, a biometric authentication technology will be designed as additional authentication methods that can determine the safety incorporated with security by selecting the search and areas of an object focusing on the objects in the initial windows and search windows through OpenCV technology and CAM-Shift algorithm which are an object tracking algorithm. Through such, a highly efficient security drone convergence service model will be proposed for performing unmanned security by using the drones that can continuously increase the analysis of technology on the mobility and real-time image processing.

Dynamic States Consideration for Next Hop Nodes Selection Method to Improve Energy Efficiency in LEAP based Wireless Sensor Networks (LEAP기반의 무선 센서 네트워크에서 가변적 상태를 고려한 에너지 효율적 다음 홉 노드 선택 기법)

  • Nam, Su-Man;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.6
    • /
    • pp.558-564
    • /
    • 2013
  • Wireless sensor networks (WSNs) contain limited energy resources and are left in open environments. Since these sensor nodes are self-operated, attacks such as sinkhole attacks are possible as they can be compromised by an adversary. The sinkhole attack may cause to change initially constructed routing paths, and capture of significant information at the compromised node. A localized encryption and authentication protocol (LEAP) has been proposed to authenticate packets and node states by using four types of keys against the sinkhole attack. Even though this novel approach can securely transmits the packets to a base station, the packets are forwarded along the constructed paths without checking the next hop node states. In this paper, we propose the next hop node selection method to cater this problem. Our proposed method evaluates the next hop node considering three factors (i.e., remaining energy level, number of shared keys, and number of filtered false packets). When the suitability criterion for next hop node selection is satisfied against a fix threshold value, the packet is forwarded to the next hop node. We aim to enhance energy efficiency and a detour of attacked areas to be effectively selected Experimental results demonstrate validity of the proposed method with up to 6% energy saving against the sinkhole attack as compared to the LEAP.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

The Characteristics of Sustainable University Campus Policy, Plan and it's Architectural Application -Focused on UBC Campus Policy, Plan and CIRS Building- (지속가능한 대학 캠퍼스정책 및 플랜과 건축의 적용 특성 -UBC의 캠퍼스플랜과 CIRS 건물을 중심으로-)

  • Choi, Soon-Sub;Oh, JoonGul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.731-741
    • /
    • 2020
  • University campus plans include urban and spatial values and identities that they emphasize. The purpose of this study is to analyze sustainable campus policy, space, and the application to architectural planning, which UBC in Canada pursues independently from a Green Campus Certificate System. Sustainable directions and architectural components are deduced. The results are as follows: 1) the correspondence between the campus plan's goal and architectural implementation is the most important. Thus, the university must build a system for the plan's goal and a strategy to make a sustainable campus. 2) A guideline and system are requested to make many experts in various fields and stakeholders participate in the initial stage through "Design Charrette." 3) A system of virtuous circulation must be built so that feedback can be applied through the real-time comparison and verification of building energy consumption. Another goal of this study is emphasizing the necessity of campus policy and plans based on the "Living Laboratory" concept to make a sustainable city. This study could be meaningful because it supports a basis for triggering the establishment of goals for a sustainable plan and implementation in Korean universities.

A Barrier-free Design Assessment of Sidewalks for Improving Pedestrian Infrastructure (Barrier Free 인증 모의평가를 통한 보행자도로 개선 방안에 관한 연구 - 인덕원역, 석수역 주변 왕복 6차선 도로를 중심으로)

  • Kang, Jun Mo;Lee, Gun Rock
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.1D
    • /
    • pp.101-110
    • /
    • 2009
  • Urban Designers and Planners are interested in creating barrier-free (BF) environments as the demand for social equity increases. BF design consists of design strategies for modifying buildings or facilities to be used by the physically disadvantaged or disabled. To construct buildings or facilities to be "Barrier-free", design standards specifically modified for the physically disadvantaged or disabled should be applied. The purpose of this study is to analyze the BF design standard used in the national laws and provide suggestions for their future improvements. In the study national laws in four countries were reviewed and important BF standards to be used in the laws were identified using a frequency analysis. The results of the frequency analysis were applied to the BF assessment criteria for sidewalk design. Then a field assessment for two sidewalks located in Seoul metropolitan region was conducted using the refined BF criteria. The findings from the field assessments indicated that current regulations were not appropriately designed to provide sufficient convenience for the disabled. It is needed to enhance the BF standards in the domestic regulations to offer sufficient mobility to the physically disadvantaged or disabled.