• Title/Summary/Keyword: 탈중앙화

Search Result 90, Processing Time 0.026 seconds

블록체인 기반 탈중앙화 사물인터넷 플랫폼 연구

  • Choi, Jongseok;Park, Jong-gyu;Kim, Myeong-kil;Kim, Howon
    • Review of KIISC
    • /
    • v.27 no.6
    • /
    • pp.5-14
    • /
    • 2017
  • 사물인터넷은 응용서비스, 플랫폼, 네트워크, 디바이스의 4계층으로 이루어진다. 사물인터넷의 전체적인 구조도를 보면, 다양한 디바이스가 사물인터넷 플랫폼에 센싱 빅데이터를 전송하고, 사물인터넷 플랫폼에서 수집된 데이터를 이용하여 응용서비스에 정형화된 데이터 서비스를 제공할 수 있다. 그러나 현재의 사물인터넷 플랫폼의 구조는 수백만개의 디바이스에서 생성되는 데이터를 관리하여 플랫폼에 높은 트래픽과 계산부하가 야기될 수 있는 구조이며 이로 인해 해당 플랫폼과 연동된 모든 응용서비스의 가용성이 낮아지고 단일장애지점(Single point of failure)의 원인을 제공한다. 본 논문에서는 단일장애지점에 대한 문제점을 해결하기 위해서 중앙화 된 사물인터넷 플랫폼 대신에 탈중앙화 된 사물인터넷 구조를 위한 방법을 제안하고자 한다. 특히 사물인터넷 플랫폼의 요구사항을 분석하여 탈중앙화 된 사물인터넷 플랫폼에서의 요구사항을 도출한다. 더 나아가 블록체인기반의 탈중앙화 된 사물인터넷 플랫폼을 통해서 기존의 4계층 사물인터넷 구조에서 3계층 사물인터넷 구조로 나아가는 방법을 제시한다.

블록체인 탈중앙화 거래소 DEX의 취약점과 MEV 공격 기법 분석

  • Nakhoon Choi;Heeyoul Kim
    • Review of KIISC
    • /
    • v.34 no.1
    • /
    • pp.53-59
    • /
    • 2024
  • 블록체인 기술의 발전과 중앙집중형 금융서비스의 취약성과 불신에 대한 우려가 커지면서 탈중앙화 금융(DeFi)과 탈중앙화 거래소(DEX)가 유망한 대안으로 떠올랐다. 본 논문에서는 특히 Uniswap에 초점을 맞춰 DeFi 내의 과제와 문제를 살펴본다. 우리는 DeFi 및 DEX의 현재 상태에 대한 배경 지식을 제공하여 MEV(Maximal Extractable Value) 공격에 대한 취약성을 강조한다. 우리의 접근 방식에는 MEV 공격 패턴을 식별하고 분석하기 위한 Uniswap에 구조 분석이 포함된다. 이 연구는 DEX 보안을 강화하고 MEV 위험을 완화하기 위한 귀중한 지침을 제공하여 DeFi 생태계의 이해관계자에게 필수적인 리소스 역할을 한다.

A Study on the Implementation of a Web-browser-based Global e-Navigation Service Discovery System for Decentralized Maritime Service Registries (탈중앙화 MSR 환경에서의 웹 브라우저 기반 글로벌 이내비게이션 서비스 검색 시스템 구현에 대한 연구)

  • Jinki, Jung;Young-Joong, Ahn
    • Journal of Navigation and Port Research
    • /
    • v.46 no.6
    • /
    • pp.501-508
    • /
    • 2022
  • The flow of global digitalization is leading to the emergence of a decentralized system environment based on blockchain or distributed ledger technology in the fields of economy, identity authentication, and logistics. Accordingly, a requirement that public services be searchable from several decentralized maritime service registries (MSRs) has been derived in terms of the discoverability of e-navigation services. This study describes a decentralized MSR environment composed of the MSR ledger and multiple local MSRs, and it has implemented a service search system that can search global e-navigation services in the environment through a web browser. This system is a decentralized application that dynamically generates service attributes, geometry information, and free text queries, and that provides users with relevant MSR and service access information from search results that are registered in the MSR ledger. In this study, we tested the established decentralized MSR environment and the system that performs service search within that environment, and we discussed its advantages and limitations.

Construction of Hyperledger Fabric based Decentralized ID System (하이퍼레저 패브릭 기반 탈중앙화 신원 인증 시스템 구축)

  • Kwang-Man Ko
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.47-52
    • /
    • 2024
  • Through the coronavirus pandemic, research on the use and advancement of blockchain-based decentralized identity authentication (Decentralized ID) technology is being actively conducted in various fields, centered on the central government, local governments, and private businesses. In this paper, we introduce the results of development based on Hyperledger Fabric to change the existing central server-based identity authentication to a decentralized one. These development results can strengthen the security and transparency of identity authentication systems for commercial purposes and provide stable services for user ID issuance, inquiry, and disposal. In addition, the decentralized identity authentication system verified performance results of DID creation of 262,000 rps and DID inquiry of 1,850 rps, DID VP creation of 200 rps, and DID VP inquiry of 220 rps or less through public authentication.

Capability and Limitations of De-Fi(Decentralized Finance) (디파이(De-Fi), 탈중앙화 금융의 가능성과 한계점)

  • Kim, Hyeob;Kim, Min-Su;Kwon, Hyuk-Jun
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.2
    • /
    • pp.143-155
    • /
    • 2021
  • In this study, we focused on the decenterization, innovation, interoperability, and transparency that blockchain technology brings in the financial services sector. Decentralized financial services powered by blockchain technology can leverage virtual assets to expand the scope of financial services and create new business opportunities while encouraging innovation in financial services. Based on the understanding of the concept of De-Fi, we will look at the need for technology and major use cases, and look at future challenges. This will help us understand the vision of developing new technologies for innovation, while identifying the potential as new areas of fintech services.

Design and implementation of access control systems using decentralized identifier technology (탈중앙화 신원증명을 이용한 출입통제 시스템의 설계 및 구현)

  • Lee, Sang-Geun;Kim, Do-Hyeong;Jung, Soon-Ki
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.37-46
    • /
    • 2021
  • Decentralized Identifier (DID) technology is a technology that uses blockchain technology to prove an individual's identity through information owned by the individual rather than through a central system. In this paper, we would like to present an access control system using decentralized identifier technology. The access control system using decentralized identifier technology (DID access control system) is a system that allows users to verify their identity from the DID blockchain server through their smartphone (mobile employee ID) and access when they are confirmed to be registered in the access control system. Through this, access control can be managed only by verifying identification with smartphones (mobile employee ID) and DID blockchain servers without having to store information to prove an individual's identity in the access control system.

Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP (재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리)

  • Cho, Kang-Woo;Jeon, Mi-Hyeon;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.205-217
    • /
    • 2021
  • Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI, we propose a de-identification technique that does not remove identifiers by restructuring the verification results of ZKP (Zero Knowledge Proof) into a form that can be provided to the outside by the verifier. In addition, it is possible to provide restructured de-identification data without the consent of data subject by proposing the concept of differential sovereignty management for each entity participating in verification. As a result, the proposed model satisfies the domestic personal information protection law in a decnetralized SSI, in addition provides secure and efficient de-identification processing and sovereignty management.

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.