• Title/Summary/Keyword: Agent Security

Search Result 343, Processing Time 0.027 seconds

Mobile Agent Security Mechanism through Expanding Cryptograpic Execution Tracing (확장된 암호 실행추적으로 이동에이전트 보안 메커니즘)

  • Kwon, Im-Hyung;Jung, Chang-Ryul;Koh, Jin-Gwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1877-1880
    • /
    • 2003
  • 이동에이전트는 안전한 활동을 보장할 수 있는 이동에이전트 보호가 선행되어야 한다. 본 논문에서는 이러한 이동에이전트를 보다 효과적으로 보호하고 안전성을 보장한 수 있도록 하는 이동에이전트 서버와 검증서버의 메커니즘을 제안한다. 또한 확장된 에이전트 시스템을 통한 실행추적이 기존의 에이전트 추적의 메커니즘과는 달리 확장된 암호화 실행추적을 통하여 안전하게 이동에이전트의 업무수행을 할 수 있도록 한다. 특히 확장된 암호화된 실행추적은 검증 서버를 통하여 항상 안전성을 검증 받도록 함으로써 더욱 안전하게 이동에이전트를 보호할 수 있도록 하였다.

  • PDF

RFID Security Agent (RFID 보안 에이전트)

  • Park, Hye-Young;Kim, Sung-Hun;Park, Chang-Yun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.106-108
    • /
    • 2005
  • 본 논문에서는 현 RFID 시스템에 도입이 가능하고 저등급의 태그도 보호할 수 있는 보안 에이전트를 제안한다. 보안 에이전트는 태그를 대신하여 보안 모듈을 수행하는 구성요소로서 등록된 태그만을 대상으로 이 작업을 수행하게 되는데 보안 에이전트의 보호 범위에는 보호 대상인 태그와 보호대상이 아닌 태그가 존재하기 때문에, 이를 구별하여 보안 모듈을 수행할 수 있는 알고리즘이 필요하다. 보안 모듈 중 가장 간단한 블로킹 기법을 채택하여, 선택적으로 보호 대상인 태그만을 블로킹하는 알고리즘을 설명한다. 보안 에이전트는 추가 구성요소로 동작하기 때문에 현재 RFID 시스템의 변경 없이 도입 가능하여 초기 도입 비용이 적게 들고 사용자가 요구하고 있는 프라이버시 문제를 명쾌하게 해결할 수 있어 RFID 상용화에 이바지할 수 있을 것이라 생각된다.

  • PDF

A Study on Tools for Agent System Development (소프트웨어 정의 기반의 안전한 IoT 환경을 위한 모델 연구)

  • Choi, Seong-Ho;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.680-682
    • /
    • 2015
  • 최근 IoT 환경의 발전을 통해 다양한 네트워크 서비스를 사용하는 사물들이 증가하고 있다. 이에 따라 많은 네트워크 장치를 효율적으로 관리하고 보안상 안전성을 증가시키기 위한 연구가 활발히 진행되고 있다. 본 논문에서는 이러한 문제를 해결 할 수 있는 주요 수단중 하나인 소프트웨어 정의 기반의 네트워크 환경을 통해 IoT에 대한 각각의 디바이스 관리 및 접근제어, 무결성 및 기밀성, 인증을 제공할 수 있는 모델을 제안한다.

Optimized Route Optimization mode of MIPv6 between Domains Based on AAA (관리상의 도메인간 이동시 AAA 기반의 핸드오버 성능향상 방안)

  • Ryu, Seong-Geun;Mun, Young-Song
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.9
    • /
    • pp.39-45
    • /
    • 2009
  • When Mobile IPv6 is deployed in commercial network, a mobile node needs AAA services for an authentication, authorization and accounting. AAA and Mobile IPv6 are protocols which are operated independently. Then schemes which merge these protocols have been emerged. These schemes can enable a mobile node to establish a security association between the mobile node and a home agent and to perform a binding update for the home agent using AAA authentication request. But these schemes introduce many signal messages and long handover latency during the handover, since Route Optimization mode for Mobile Ipv6 is performed using Return Routability procedure. To solve this problem, we propose a scheme for Route Optimization mode that the home agent performs the binding update for a correspondent node via the AAA infrastructure between the home agent and the correspondent node instead of Return Routability procedure. For performance evaluation, we analyze signal message transmission costs and handover latencies during handover. We show performance improvement of the proposed scheme which reduces handover latency as 61% compared with the existing scheme.

Design of Client-Server Model For Effective Processing and Utilization of Bigdata (빅데이터의 효과적인 처리 및 활용을 위한 클라이언트-서버 모델 설계)

  • Park, Dae Seo;Kim, Hwa Jong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.109-122
    • /
    • 2016
  • Recently, big data analysis has developed into a field of interest to individuals and non-experts as well as companies and professionals. Accordingly, it is utilized for marketing and social problem solving by analyzing the data currently opened or collected directly. In Korea, various companies and individuals are challenging big data analysis, but it is difficult from the initial stage of analysis due to limitation of big data disclosure and collection difficulties. Nowadays, the system improvement for big data activation and big data disclosure services are variously carried out in Korea and abroad, and services for opening public data such as domestic government 3.0 (data.go.kr) are mainly implemented. In addition to the efforts made by the government, services that share data held by corporations or individuals are running, but it is difficult to find useful data because of the lack of shared data. In addition, big data traffic problems can occur because it is necessary to download and examine the entire data in order to grasp the attributes and simple information about the shared data. Therefore, We need for a new system for big data processing and utilization. First, big data pre-analysis technology is needed as a way to solve big data sharing problem. Pre-analysis is a concept proposed in this paper in order to solve the problem of sharing big data, and it means to provide users with the results generated by pre-analyzing the data in advance. Through preliminary analysis, it is possible to improve the usability of big data by providing information that can grasp the properties and characteristics of big data when the data user searches for big data. In addition, by sharing the summary data or sample data generated through the pre-analysis, it is possible to solve the security problem that may occur when the original data is disclosed, thereby enabling the big data sharing between the data provider and the data user. Second, it is necessary to quickly generate appropriate preprocessing results according to the level of disclosure or network status of raw data and to provide the results to users through big data distribution processing using spark. Third, in order to solve the problem of big traffic, the system monitors the traffic of the network in real time. When preprocessing the data requested by the user, preprocessing to a size available in the current network and transmitting it to the user is required so that no big traffic occurs. In this paper, we present various data sizes according to the level of disclosure through pre - analysis. This method is expected to show a low traffic volume when compared with the conventional method of sharing only raw data in a large number of systems. In this paper, we describe how to solve problems that occur when big data is released and used, and to help facilitate sharing and analysis. The client-server model uses SPARK for fast analysis and processing of user requests. Server Agent and a Client Agent, each of which is deployed on the Server and Client side. The Server Agent is a necessary agent for the data provider and performs preliminary analysis of big data to generate Data Descriptor with information of Sample Data, Summary Data, and Raw Data. In addition, it performs fast and efficient big data preprocessing through big data distribution processing and continuously monitors network traffic. The Client Agent is an agent placed on the data user side. It can search the big data through the Data Descriptor which is the result of the pre-analysis and can quickly search the data. The desired data can be requested from the server to download the big data according to the level of disclosure. It separates the Server Agent and the client agent when the data provider publishes the data for data to be used by the user. In particular, we focus on the Big Data Sharing, Distributed Big Data Processing, Big Traffic problem, and construct the detailed module of the client - server model and present the design method of each module. The system designed on the basis of the proposed model, the user who acquires the data analyzes the data in the desired direction or preprocesses the new data. By analyzing the newly processed data through the server agent, the data user changes its role as the data provider. The data provider can also obtain useful statistical information from the Data Descriptor of the data it discloses and become a data user to perform new analysis using the sample data. In this way, raw data is processed and processed big data is utilized by the user, thereby forming a natural shared environment. The role of data provider and data user is not distinguished, and provides an ideal shared service that enables everyone to be a provider and a user. The client-server model solves the problem of sharing big data and provides a free sharing environment to securely big data disclosure and provides an ideal shared service to easily find big data.

Relation between Leisure Constraints and Participation by Leisure Types of Security Agent (시큐리티요원의 여가유형에 따른 여가제약과 참가의 관계)

  • Kim, Kyong-Sik;Kim, Chan-Sun;Park, Young-Man
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.826-835
    • /
    • 2009
  • This study is to examine the relation between leisure constraints and participation by leisure type of security agents. By using purposive sampling method, this study collected 387 questionnaires in 14 private security service registered in 2009 at the Seoul National Police Agency. Cronbach's $\alpha$ .673. The conclusion are as follow. First, leisure constraints difference in socio-demographic characteristics such as sex, age, education level, income, position, job pattern. Second, in case of hobby and cultural activities, higher time constraints showed lesser frequency of participation, higher structural constraints showed lesser period of participation, higher personal constraints showed lesser intensity of participation. On the other hand, high time constraitns had high intensity of participation. In case of play and entertainment activities, even with high self-conscious constraints, it showed increased frequency and period of participation and high personal constraints showed increased period of participation but in contrast, higher structural constraints showed decreased frequency of participation and period. In case of viewing and appreciative activities, even with high interpersonal constraints, frequency and period of participation increased and higher time constraints also had increased period of participation. On the other hand, higher structural constraints showed decrease in frequency of participation and period.

Government position, failure causes over 9.11 terror, Iraq war (9.11 테러와 이라크전에 미친 정보의 역할, 실패원인)

  • Baek, Jong-Kap;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.207-234
    • /
    • 2007
  • This study examines the roles of government and reasons of defeat on 9.11 terror, iraq war between 2001 and 2003. The administration functions critical role of national security. And punctual, accurate information supply capability helps policymaker's decision-making. Hence, information of punctuality and accuracy should be given to policymakers. And without two above written factors, it will result in failing. Information concoction on policymaker's pressure, biased informant, inaccurate information and lack of assembly means under the extensive organization and technologized spying means, Fail to keep information objectivity, leads to information failure. In the context of a series of facts, we shall cover the position of government and reasons of calamities. Two incidents deem as information failure by national security service, but concoction of Iraqi mass destruction weaponry is believed as bush administration's deception on account of political gains. For fully functional government role, governing body should reinforce all aspects of gathering, analyzing, and making use of information more objectively in the first place. In particular, information concoction involving policymakers post massive stumbling block to organized outcome. The thesis presents a prospective view of government position under the U.S. secret agent over 9.11 terror and Iraq war.

  • PDF

Secure MAP Discovery Schemes in Hierarchical MIPv6 (계층적 Mobile IPv6에서의 안전한 MAP 검색 기법)

  • Choi, Jong-Hyoun;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.1
    • /
    • pp.41-47
    • /
    • 2007
  • The Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of the Mobile Node and to reduce the signaling load. A Mobility Anchor Point is a router located in a network visited by the Mobile Node. The Mobile Node uses the Mobile Anchor Point as a local Home Agent. The absence of any protections between Mobile Node and Mobile Anchor Point may lead to malicious Mobile Nodes impersonating other legitimate ones or impersonating a Mobile Anchor Point. In this paper, we propose a mechanism of the secure Mobile Anther Point discovery in HMIPv6. The performance analysis and the numerical results presented in this paper show that our proposal has superior performance to other methods.

A Study on Secure Binding Update Protocol Supporting Mobile Nodes with Constraint Computational Power in Mobile IPv6 Environment (모바일 IPv6 환경에서 제한된 계산 능력을 갖는 모바일 노드를 지원하는 바인딩 갱신 인증 프로토콜에 관한 연구)

  • Choi, Sung-Kyo;You, Il-Sun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.5
    • /
    • pp.11-25
    • /
    • 2005
  • In MIPv6 environment, an important design consideration for public key based binding update protocols is to minimize asymmetric cryptographic operations in mobile nodes with constraint computational power, such as PDAs and cellular phones, For that, public key based protocols such as CAM-DH. SUCV and Deng-Zhou-Bao's approach provides an optimization to offload asymmetric cryptographic operations of a mobile node to its home agent. However, such protocols have some problems in providing the optimization. Especially, CAM-DH with this optimization does not unload all asymmetric cryptographic operations from the mobile node, while resulting in the home agent's vulnerability to denial of service attacks. In this paper, we improve the drawbacks of CAM-DH. Furthermore, we adopt Aura's two hash-based CGA scheme to increase the cost of brute-force attacks searching for hash collisions in the CGA method. The comparison of our protocol with other public key based protocols shows that our protocol can minimize the MN's computation overhead, in addition to providing better manageability and stronger security than other protocols.

  • PDF

Evaluation of Applicability of penetrating-type Nano-Coat for Preventing Deterioration of Concrete (침투형 Nano-Coat를 이용한 콘크리트 열화 방지 적용성 평가)

  • Lee, Jun Hee;Kim, Jo Soon;Sim, Yang Mo;Lee, Seung Woo
    • International Journal of Highway Engineering
    • /
    • v.19 no.2
    • /
    • pp.7-15
    • /
    • 2017
  • PURPOSES : Infiltration of moisture, polluted material, and deicer into concrete, accompanied by freeze and thaw can cause significant deterioration of concrete pavement. In order to protect concrete from deterioration, it is necessary to prevent the infiltration of these concrete external materials. The moisture-repellent agent, which is a surface treatment and maintenance material added to concrete structures to render them water resistant, has advantages such as prevention of water infiltration and security against air permeation. Nano-coat, which is referred to as silicon hydride, is typically used as a moisture-repellent agent. Therefore, in this study, an attempt is made to use penetration-type Nano-coat as an alternative in order to evaluate its applicability through environmental resistance tests. METHODS : This study aimed to evaluate the applicability of penetration-type Nano-coat, which can provide water repellency to concrete, in concrete pavements, through various environmental resistance tests such as freezing and thawing resistance, chloride ion penetration resistance, and surface scaling resistance tests. The applicability of penetration-type Nano-coat was demonstrated based on the specification of KS F 2711, KS F 2456, and ASTM C 672. RESULTS :In the case of penetration-type Nano-coat applied on sound concrete, an increase in concrete durability was demonstrated by the negligible chloride ion penetrability and the absence of scaling, as revealed by visual observation of the surface, after 50 cycles of scaling resistance test. In addition, test result of the application of penetration-type Nano-coat on deteriorated concrete established that concrete surface pretreated by grinding provided improved durability than non-treated concrete. CONCLUSIONS :This study indicates that penetration-type Nano-coat is applicable as an effective alternative, to increase the durability of concrete structures. In addition, it was known that pretreatment of deteriorated concrete surface, such as grinding, is required to improve the long-term performance of concrete pavement.