• Title/Summary/Keyword: ATM Security

Search Result 66, Processing Time 0.023 seconds

A Rate Allocation Algorithm with Virtually Reduced Feedback Delay (피드백 지연의 가상적 단축을 이용한 전송률 할당 알고리즘 연구)

  • Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.71-86
    • /
    • 1996
  • In this paper we propose an explicit rate allocation algorithm for ATM(Asynchronous Transfer Mode) Networks using the available bit rate(ABR) class of service and study the performance of this algorithm. We examine the behavior of ABR traffic with the suggested algorithm, and demonstrate that the algorithm is fair and maintains network efficiency with low cell loss rate. The simulation results show substantial improvements in fairness and efficiency over the existing algorithms.

A Study on the Security of One-Time Keypad (OTK) (원타임 키패드의 보안성 분석)

  • Kim, Jon-Lark;Lee, Nari;Roe, Young Gun;Galvez, Lucky Erap
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.731-742
    • /
    • 2017
  • For all the various cryptographic techniques related to security, social technological attacks such as a shoulder surfing are infeasible to block off completely. Especially, the attacks are executed against financial facilities such as automated teller machine(ATM) which are located in public areas. Furthermore, online financial services whose rate of task management is consistently increasing are vulnerable to a shoulder surfing, smudge attacks, and key stroke inference attacks with google glass behind the convenience of ubiquitous business transactions. In this paper, we show that the security of ATM and internet banking can be reinforced against a shoulder surfing by using One-Time Keypad(OTK) and compare the security of OTK with those of ordinary keypad and One-Time Password(OTP).

The End-to-End Encryption for Enhancing Safety of Electronic Financial Transactions (전자금융거래의 안전성 강화를 위한 종단간 암호화)

  • Seung, Jae-Mo;Lee, Su-Mi;Ahn, Seung-Ho;Noh, Bong-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1920-1925
    • /
    • 2009
  • '05. June, the first Internet banking accident occurred by the malignant cord. It discontinued security programs for protecting important financial informations. A computer hacker had made a collation of password, OTP(One Time Password) values etc and illegally withdraw one´s savings from the bank using the financial information. The attackers are continuously attempted with the hacking tool under bypass security programs as the vaccine program or the personal fire-wall. Therefore, an electronic financial system should be composed with the goal which is to protect financial informations from user's terminal to a banking server. In this paper, we make an analysis of menaces in electronic financial transactions and explain considerable security issues to enhance safety in Internet banking, CD/ATM and mobile banking.

Model Verification Algorithm for ATM Security System (ATM 보안 시스템을 위한 모델 인증 알고리즘)

  • Jeong, Heon;Lim, Chun-Hwan;Pyeon, Suk-Bum
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.72-78
    • /
    • 2000
  • In this study, we propose a model verification algorithm based on DCT and neural network for ATM security system. We construct database about facial images after capturing thirty persons facial images in the same lumination and distance. To simulate model verification, we capture four learning images and test images per a man. After detecting edge in facial images, we detect a characteristic area of square shape using edge distribution in facial images. Characteristic area contains eye bows, eyes, nose, mouth and cheek. We extract characteristic vectors to calculate diagonally coefficients sum after obtaining DCT coefficients about characteristic area. Characteristic vectors is normalized between +1 and -1, and then used for input vectors of neural networks. Not considering passwords, simulations results showed 100% verification rate when facial images were learned and 92% verification rate when facial images weren't learned. But considering passwords, the proposed algorithm showed 100% verification rate in case of two simulations.

  • PDF

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

Study On Integrating Internet and Intranet based on IPSec and IMA Technology (IPSec과 IMA를 이용한 인터넷과 내부 망 통합에 관한 연구)

  • Cho, Yong-Gun
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.71-78
    • /
    • 2008
  • This research is on the study of integrating internet and intranet that was built for their own enterprise into one network system that promises a more economic and secure use. Compared to this system, the traditional network conversion device not only has its mechanical limits, but also requires a separate network set up. This raises both interoperability and security problems and results in a higher cost. Therefore, I propose dual defence system based on the inverse multiplexing of ATM Forum and IPSec to improve network ability and deliver enhanced system reliability while reducing cost. Furthermore, I also addressed some of the weaknesses of the Scanning Attacking Method, SNMP and Spooler Port and proposed counter measures that will deal with these weakness at the dual defence system.

  • PDF

개선된 병렬 논리프로그래밍 시스템의 복잡도 분석

  • 정인정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.2 no.1
    • /
    • pp.59-77
    • /
    • 1992
  • 본 논문은 컴퓨터 시스템의 보호 및 데이타 통신의 암호등과 관계가 있는 논리 프로그래밍에 대한 것이다. 본 논문에서 우리는 병력 논리프로그래밍 시스템에 대한 개선된 conteol strategy를 제안하였으며, 이에대한 형식적인 syntax와 semantics등을 정의하였다. 병렬 논리프로그램에 대한 병력성등을 분류하여, 이들이 어떻게 활용되는지 설명하였다. 또한 병렬 논리프로그램의 유도과정과 계산방식이 같은 alternating Turing machine이란 병렬 계산모형을 제안하여, 논리프로그램의 복잡도의 분석과 제안된 idea에 대한 타당성을 ATM을 이용하여 하였다.

Analysis on international financial biometric adoption cases and propose a scheme for korean financial telebiometrics (한국형 금융 바이오 인식 기술 도입을 위한 분석 및 방안연구)

  • Shin, Yong-Nyuo;Chun, Myung Geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.665-672
    • /
    • 2015
  • In this paper, we analyze the international financial biometric adoption cases in smart phones and ATMs and propose a scheme for Korean financial telebiometrics. Regional privacy issues, financial services environment, according to the differences in the direction of government policy introducing biometric aspects were appearing differently. In Korea, due to changes in fin-tech vitalization and outstanding convenience mobile oriented service to the regulatory environment, the introduction of biometric technology is the point that is being actively discussed. In this paper, we propose a scheme for the Korean banking financial sector through the introduction of biometric technology adoption case analysis of each country. Thus, this paper is intended to help that the financial sector makes a precise decision when it is establishes a policy of biometric technology application for electronic financial services.

A Study of New Authentication Method in Financial Accounts to Lock and Unlock Using the Smart-Devices (스마트기기를 이용한 금융계좌 잠금 및 해제 인증에 관한 연구)

  • Kim, Kwang Jin;Lee, Sung Joong
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.1
    • /
    • pp.21-28
    • /
    • 2012
  • This study can be solved a means of authentication of electronic financial transactions. We suggest that smart devices can be useful to authenticate in electronic financial transactions regardless of time and place. Our new authentication method named Lock-Unlock authentication method with smart devices. This method will be expected to reduce many kind of accidents (theft, phishing, hacking, certificates and simple certified OTP, ATM withdrawals, ARS, etc.) by account locking in electronic financial transactions. And helpful to users can effectively protect electronic financial transactions and minimize the accident during get a electronic trading.

Implementation of the PNNI Routing Simulator for Analyze Topology Aggregation (Topology Aggregation 분석을 위한 PNNI 라우팅 시뮬레이터 구현)

  • 金辯坤;金觀雄;丁光日;申鉉順;鄭炅澤;田炳實
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.6
    • /
    • pp.1-1
    • /
    • 2002
  • In this paper, we focus on comparison and analysis of performance for existing Topology Aggregation algorithm. For these, we designed and implemented PNNI routing simulator which contain various TA schemes, and evaluate performance of TA schemes by this simulator. The PNNI 1.0 specification of the ATM Forum is recommended that hierarchical routing protocol and topology information is aggregated in the network constructed hierarchically Aggregating topology information is known as TA(Topology Aggregation) and TA is very important for scalability and security in network. Therefore, the performance of PNNI network would vary with TA schemes and routing algorithm. PNNI routing simulator can be applied to develope Routing algorithm and TA algorithm and can be develope these algorithms in short period.