• Title/Summary/Keyword: AKA

Search Result 82, Processing Time 0.026 seconds

Analytical Model for Reducing Authentication Signaling Traffic in 3GPP Networks (인증 시그널링 트래픽 최소화를 위한 수학적 분석에 관한 연구)

  • Han, Chan-Kyu;Song, Sehwa;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1155-1158
    • /
    • 2009
  • 모바일 서비스는 사용자보호를 위해 인증 및 암호화 기능이 필수적으로 제공되어야만 한다. 3GPP는 3 세대 이동통신 (UMTS)를 위한 인증보안구조인 AKA를 정의하였다. AKA에서는 인증벡터를 다수 개 생성하여 처리하는 기법을 채택하고 있으나 이러한 기법이 인증서버의 load 증가 및 방문서버의 저장공간 소모라는 문제점을 야기한다. 하지만 인증벡터를 다수 개 생성하는 기법은 단말의 핸드오버를 위한 필수불가결한 기법이다. 따라서 본 논문에서는 사용자의 이동패턴 및 인증요청 처리 속도에 따른 인증벡터의 동적 선택 알고리즘을 제안하여 이동통신 네트워크의 signaling load를 최소화하고자 한다. 이를 위해 확률 및 큐잉 이론이 도입되었으며, 시뮬레이션을 통해 수학적 분석을 검증한다. 또한 기존 관련연구에서 제안 하는 알고리즘과 비교 평가하였다.

Wibro Authentication and Key Agreement Protocol providing Forward Secrecy (전방향 안정성을 제공하는 Wibro인증 및 키 동의 프로토콜)

  • Lee, Seung-Woo;Park, Hee-Ju;Lee, Jin-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.1159-1162
    • /
    • 2008
  • 언제 어디서나 인터넷에 접속하여 필요한 정보를 얻을 수 있는 서비스를 Wibro(Wireless Broadband)라고 한다. 서비스를 제공하기 위해 중요한 기술요소 중 하나가 보안이다. 최근 보다 안전한인증 메커니즘을 설계할 수 있는 UICC기반의 EAP-AKA프로토콜이 제안되었다. 그러나 이 프로토콜은 프라이버시 보호 문제와, 인증서버에 저장공간 오버헤드, 비밀키 노출에 따른 전방향 안전성제공의 문제점들이 있다. 본 논문에서는 UICC기반의 EAP-AKA프로토콜의 문제점을 살펴보고 이러한 문제점을 해결하기 위한 전방향 안정성을 제공하는 Wibro인증 및 키 동의 프로토콜을 제안한다.

Enhancing Identity Privacy Using Identity-Based Encryption in Access Networks of 3GPP (3GPP 접속 망에서 ID 기반 암호를 이용한 신원 프라이버시 개선 연구)

  • Jung, Yonghyun;Lee, Dong Hoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.10
    • /
    • pp.361-372
    • /
    • 2016
  • Identity Privacy issues such as exposures of IMSIs(International Mobile Subscriber Identities) in access network have been consistently raised throughout GSM, UMTS, LTE in 3GPP. The 3GPP specification uses temporary identities instead of IMSI to ensure anonymity of the user. Even if temporary identities are disclosed, Identity Privacy may be maintained at a safe level by security policies such as no linkability and periodic update. But in case of IMSI, it cannot be changed even though it is exposed. There still exist some situations that IMSI is used in clear text for the authentication. Therefore, a protective mechanism for the identity confidentiality is needed. In this paper we propose a protocol based on IBE(Identity-based Encryption) to protect permanent identities in access network. By simplifying the scheme, this protocol has minimized the system impact on current 3GPP environment. And this scheme can be applied to all kind of permanent identities and 3GPP AKA(Authentication and Key Agreement) protocols in access network.

Improved Two-Party ID-Based Authenticated Key Agreement Protocol (개선된 두 참여자간 식별자 기반 인증된 키 동의 프로토콜)

  • Vallent, Thokozani Felix;Kim, Hae-Jung;Yoon, Eun-Jun;Kim, Hyunsung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.595-604
    • /
    • 2013
  • Devising a secure authenticated key agreement (AKA) protocol for two entities communicating over an open network is a matter of current research. McCullagh et al. proposed a new two-party identity-based AKA protocol supporting both key escrow and key escrow-less property instantiated by either in a single domain or over two distinct domains. In this paper, we show that their protocol over two distinct domains suffers from masquerading attack and therefore does not satisfy the claimed security. The attack is made possible due to the lack of sufficient authentication of entity and integrity assurance in the protocol. We then propose an efficient verifiable key agreement protocol by including signature primitive in the authentication procedure to solve the problem of McCullagh et al.'s protocol.

Isotropic Magnetic Bubble Propagation in Ion Implanted Magnetic Bubble Propagation Tracks (이온주입식 자기 버블 전파 회로에서의 자기 버블의 등방성 전파)

  • Choi, Yeon-Bong;Jo, Soon-Chul
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.11
    • /
    • pp.69-76
    • /
    • 1990
  • To find out whether isotropic magnetic bubble propagation can be achived by changing magnetostriction coefficients, bias margins and bubble collapse fields of $2.5{\mu}m$ period "diamond" bubble propagation tracks were measured which were fabricated on three magnetic garnet thin films with nearly isotropic magnetostriction coefficients (${\lambda}111{\simeq}{\lambda}100$). The results showed substantially isotropic bubble propagation in "super","good" and "bad" tracks for all three garnet films. From the bubble collapse fields, the bubble potential well depths vs. the direction of the in-plane rotating magnetic fields were plotted. The results showed that substantial differances in the potential well shapes exist for the three "good," "bad" and "super" tracks when ${\Delta}(=({\lambda}111-{\lambda}100)/{\lambda}100)$ was 0.5 (film AK92). However, the differences were minimal when ${\Delta}$ were 0.3 (film Aka8) or 0.1 (film AKb1). In other words, the bubble potential wells were nearly isotropic. The above two measurements indicate that nearly isotropic bubble propagation can be achieved when B is between 0.1 and 0.3.

  • PDF

Cloning and Expression of D-amino Acid Oxidise from Trigonopsis variabilis for Cephalosporin C Biotransformation (Cephalosporin C의 생변환을 위한 Trigonopsis variabilis의 D-amino Acid Oxidase 유전자의 클로닝 및 발현)

  • 이진형;정태완
    • KSBB Journal
    • /
    • v.10 no.3
    • /
    • pp.264-270
    • /
    • 1995
  • Trigonopsis variabilis is a strong producer of D-amino acid oxidase that can transform cephalosporin C(ceph C) to ${\alpha}$-keto-adipyl-7-aminocephalosporanic acid(AKA-7ACA). Polymerase chain reaction (PCR) was applied to isolate the D-AAO gene from T. variabilis. To clone the PCR fragment, four different methods were examined using enzymatic reactions of Taq DNA polymerase, Klenow, T4 DNA polymerase I, Alkaline phosphatase Calf Intestinal, and T4 kinase. Ligation of phosphorylated blunt-end PCR fragment and dephosphorylated blunt-end of pUC18 plasmid yielded the best cloning efficiency One of recombinant E. coli transformants showed D-AAO activity against ceph C in both cell extracts and permeabilized cells.

  • PDF

Hearts of Darkness: Rethinking the Role of Supermassive Black Holes in Galaxy Evolution

  • Zabludoff, Ann
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.43 no.1
    • /
    • pp.31.1-31.1
    • /
    • 2018
  • While astronomers are working hard to detect the earliest galaxies and to follow their evolution to redshift z~0, they remain baffled by the present-day dichotomy between disky, star forming (aka late-type) galaxies and quiescent, spheroidal (aka early-type) galaxies. The key is to find galaxies in transition from one class to the other, whose spectra indicate intense recent star formation that has now ended. We have identified thousands of such "post-starburst galaxies" and discovered that they are often the products of late-type galaxy-galaxy mergers. Their current kinematics, stellar populations, and morphologies are consistent with late- to early-type galaxy evolution. I will discuss recent work that suggests new connections between this violent history and the central supermassive black hole. In particular, the molecular gas reservoir of a post-starburst galaxy declines rapidly after the starburst ends and in a manner consistent with feedback from an active nucleus. Furthermore, a star is ~300x more likely to be tidally disrupted by the nucleus of a post-starburst galaxy than in other galaxies. Like the well-known black hole-bulge mass correlation, these surprising links between the properties of a galaxy on kpc scales and its supermassive black hole on pc scales require explanation.

  • PDF

A Lightweight Pseudonym Authentication and Key Agreement Protocol for Multi-medical Server Architecture in TMIS

  • Liu, Xiaoxue;Li, Yanping;Qu, Juan;Ding, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.924-944
    • /
    • 2017
  • Telecare Medical Information System (TMIS) helps the patients to gain the health monitoring information at home and access medical services over the mobile Internet. In 2015, Das et al proposed a secure and robust user AKA scheme for hierarchical multi-medical server environment in TMIS, referred to as DAKA protocol, and claimed that their protocol is against all possible attacks. In this paper, we first analyze and show DAKA protocol is vulnerable to internal attacks, impersonation attacks and stolen smart card attack. Furthermore, DAKA protocol also cannot provide confidentiality. We then propose a lightweight pseudonym AKA protocol for multi-medical server architecture in TMIS (short for PAKA). Our PAKA protocol not only keeps good security features declared by DAKA protocol, but also truly provides patient's anonymity by using pseudonym to protect sensitive information from illegal interception. Besides, our PAKA protocol can realize authentication and key agreement with energy-saving, extremely low computation cost, communication cost and fewer storage resources in smart card, medical servers and physical servers. What's more, the PAKA protocol is proved secure against known possible attacks by using Burrows-Abadi-Needham (BAN) logic. As a result, these features make PAKA protocol is very suitable for computation-limited mobile device.

ID-based Authenticated Key Agreement for Unbalanced Computing Environment (비대칭 컴퓨팅 환경을 위한 ID-기반의 인증된 키 동의 프로토콜)

  • Choi Kyu-young;Hwang Jung-yeon;Hong Do-won;Lee Dong-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.23-33
    • /
    • 2006
  • Key Agreement protocols are among the most basic and widely used cryptographic protocols. In this paper we present an efficient O-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments : an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients' devices, we remove expensive operations such as bilinear maps from a client side. Our protocol uses signcryption and provide security in random oracle model.

Specification-based Intrusion Detection System for the Initial Authentication Phase of WiBro (와이브로의 초기인증에 적합한 명세기반의 침입탐지시스템)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.23-32
    • /
    • 2010
  • WiBro(Wireless Broadband), the service based on IEEE 802.16e(mobile WiMAX) standard, is a wireless broadband Internet technology being developed by the domestic telecommunication industry. In this paper, we analyze security vulnerabilities of WiBro focusing on initial authentication phase and propose a specification-based intrusion detection system that can detect those vulnerabilities. We first derive a specification from the normally operational process of the initial authentication based on PKMv2 EAP-AKA and formalize the derived specification as a state transition diagram. Proposed system executes the intrusion detection based on those specification and state transition diagram. In this paper, to verify the detection capability of proposed system, we construct a test bed network and execute scenario-based test.