• 제목/요약/키워드: Authentication Technology

검색결과 1,123건 처리시간 0.018초

무자각 지속인증 기술 동향 (Trends in Implicit Continuous Authentication Technology)

  • 김승현;김수형;진승헌
    • 전자통신동향분석
    • /
    • 제33권1호
    • /
    • pp.57-67
    • /
    • 2018
  • Modern users are intensifying their use of online services every day. In addition, hackers are attempting to execute advanced attacks to steal personal information protected using existing authentication technologies. However, existing authentication methods require an explicit authentication procedure for the user, and do not conduct identity verification in the middle of the authentication session. In this paper, we introduce an implicit continuous authentication technology to overcome the limitations of existing authentication technology. Implicit continuous authentication is a technique for continuously authenticating users without explicit intervention by utilizing their behavioral and environmental information. This can improve the level of security by verifying the user's identity during the authentication session without the burden of an explicit authentication procedure. In addition, we briefly introduce the definition, key features, applicable algorithms, and recent research trends for various authentication technologies that can be used as an implicit continuous authentication technology.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

일회용 세션을 활용한 인증정보 기반의 사용자 인증 방안 (User Authentication Mechanism based on Authentication Information using One-time Sessions)

  • 박영수;이병엽
    • 한국콘텐츠학회논문지
    • /
    • 제19권7호
    • /
    • pp.421-426
    • /
    • 2019
  • 현재 사용자 인증에는 지식기반(ID/PW 등)인증과 생체기반(홍채/지문/정맥 인식 등)인증, 소유기반(OTP, 보안카드 등)인증 등 다양한 종류의 기술을 사용하고 있다. 지식기반 인증인 ID/PW인증 기술은 구현 및 유지 보수 비용이 적게 들며, 사용자에게 익숙한 방식이라는 장점에도 불구하고 해킹 공격에 취약하다는 단점을 가지고 있다. 다른 인증 방식들은 ID/PW인증기술에서의 취약점을 해결하였지만, 초기 구축비용과 유지보수시 비용이 많이 발생한다는 점과 재발급 시 번거로운 문제점을 가지고 있다. 본 논문에서는 기존의 ID/PW기반 인증 기술보다 보안성과 편리성을 증진시키고, 인증에 사용되는 기기에 제약이 없는 사용자 인증을 안전하게 할 수 있는 방안을 제안한다.

A Study on Mobile IPv4 Authentication Mechanisms

  • Lim, Jung-Muk;Lim, Hyung-Jin;Chung, Tai-Myoung
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.277-280
    • /
    • 2005
  • With the proliferation of mobile terminals, use of the Internet in mobile environments is becoming more common. To support mobility in these terminals, Mobile IPv4 is proposed and represents the standard in IPv4 environments. Authentication should be mandatory, because mobile terminals can utilize Internet services in any foreign domain. Mobile IPv4 provides symmetric key based authentication using the default HMAC-MD5. However, symmetric key based authentication creates a key distribution problem. To solve this problem, public key based authentication mechanisms have been proposed. In this paper, the performance of each of these mechanisms is evaluated. The results present that, among these mechanisms, partial certificate based authentication has superior performance, and certificate based authentication has the worst performance. Although current public key based authentication mechanisms have lower performance than symmetric key based authentication, this paper presents the possibility that public key based authentication mechanisms may be used for future mobile terminal authentication.

  • PDF

다중 생체인식 기반의 인증기술과 과제 (Technology Review on Multimodal Biometric Authentication)

  • 조병철;박종만
    • 한국통신학회논문지
    • /
    • 제40권1호
    • /
    • pp.132-141
    • /
    • 2015
  • 기존의 단일 생체인증 방법들은 인식과 식별이 주 용도이며 서비스 용도별 실시간 개인 인증보안은 취약하다. 이에 다중 생체인식기반의 실시간 입증 및 인증 기술을 통해 보안성능을 향상시키는 방법의 연구와 개발이 필수적이다. 본 논문은 생체인식기술의 다중 생체인식 파라미터를 조합하여 인증하는 선진 기술 및 특허동향 분석을 통해 국내 기술개발 전략과 과제를 제시하는데 중점을 둔다.

User Authentication Technology using Multiple SSO in the Cloud Computing Environment

  • Cho, Min-Hee;Jang, Eun-Gyeom;Choi, Yong-Rak
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권4호
    • /
    • pp.31-38
    • /
    • 2016
  • The interface between servers and clients and system management in the cloud computing environment is different from the existing computing environment. The technology for information protection. Management and user authentication has become an important issue. For providing a more convenient service to users, SSO technology is applied to this cloud computing service. In the SSO service environment, system access using a single key facilitates access to several servers at the same time. This SSO authentication service technology is vulnerable to security of several systems, once the key is exposed. In this paper, we propose a technology to solve problems, which might be caused by single key authentication in SSO-based cloud computing access. This is a distributed agent authentication technology using a multiple SSO agent to reinforce user authentication using a single key in the SSO service environment. For user authentication reinforcement, phased access is applied and trackable log information is used when there is a security problem in system to provide a safe cloud computing service.

퍼지추출 기술을 활용한 스마트 카드 기반 패스워드 인증 스킴 (Smart Card Based Password Authentication Scheme using Fuzzy Extraction Technology)

  • 최윤성
    • 디지털산업정보학회논문지
    • /
    • 제14권4호
    • /
    • pp.125-134
    • /
    • 2018
  • Lamport firstly suggested password base authentication scheme and then, similar authentication schemes have been studied. Due to the development of Internet network technology, remote user authentication using smart card has been studied. Li et al. analyzed authentication scheme of Chen et al. and then, Li et al. found out the security weakness of Chen et al.'s scheme such forward secrecy and the wrong password login problem, and proposed an a new smart card based user password authentication scheme. But Liu et al. found out that Li et al.'s scheme still had security problems such an insider attack and man-in-the-middle attack and then Liu et al. proposed an efficient and secure smart card based password authentication scheme. This paper analyzed Liu et al.'s authentication and found out that Liu et al.'s authentication has security weakness such as no perfect forward secrecy, off-line password guessing attack, smart-card loss attack, and no anonymity. And then, this paper proposed security enhanced efficient smart card based password authentication scheme using fuzzy extraction technology.

블록체인을 이용한 생체정보와 OTP 기반의 안전한 인증 기법 (Biometric Information and OTP based on Authentication Mechanism using Blockchain)

  • 문형진
    • 융합정보논문지
    • /
    • 제8권3호
    • /
    • pp.85-90
    • /
    • 2018
  • 블록체인 기술은 분산된 신뢰구조를 제공하고, 위변조가 불가능한 시스템 구현이 가능하고, Smart Contract 등 이 가능하면서 인터넷 차세대 보안 기술로 발전하고 있다. 블록체인 기술이 차세대 보안기술로 부각되면서 무결성 뿐만 아니라 인증을 비롯하여 다양한 보안 서비스에 대한 연구가 진행되고 있다. 인터넷 기반의 다양한 서비스는 패스워드 기반의 사용자 인증으로 이루어지고 있지만 클라이언트나 네트워크에서 가로채기가 가능하고, 패스워드 정보가 저장된 서버가 해킹의 위험에 노출되어 있다. 따라서 무결성을 보장할 수 있는 블록체인 기반 기술과 OTP 기반의 안전한 인증 기법을 제안한다. 특히, 이중 인증(Two-Factor Authentication) 은 OTP 기반의 인증과 사용자가 가지고 있는 생체인증의 결합으로 패스워드 없이 안전한 인증이 가능하다. 제안기법은 인증에 필요한 생체정보를 식별할 수 없도록 다중 해시함수를 적용하여 트랜잭션을 생성하여 블록에 담기 때문에 서버로부터 분리되어 서버 공격에 안전하다.

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

귀 주변에서 측정한 유사 심전도 기반 개인 인증 시스템 개발 가능성 (Feasibility of Using Similar Electrocardiography Measured around the Ears to Develop a Personal Authentication System)

  • 최가영;박종윤;김다영;김연우;임지헌;황한정
    • 대한의용생체공학회:의공학회지
    • /
    • 제41권1호
    • /
    • pp.42-47
    • /
    • 2020
  • A personal authentication system based on biosignals has received increasing attention due to its relatively high security as compared to traditional authentication systems based on a key and password. Electrocardiography (ECG) measured from the chest or wrist is one of the widely used biosignals to develop a personal authentication system. In this study, we investigated the feasibility of using similar ECG measured behind the ears to develop a personal authentication system. To this end, similar ECGs were measured from thirty subjects using a pair of three electrodes attached behind each of the ears during resting state during which the standard Lead-I ECG was also simultaneously measured from both wrists as baseline ECG. The three ECG components, Q, R, and S, were extracted for each subject as classification features, and authentication accuracy was estimated using support vector machine (SVM) based on a 5×5-fold cross-validation. The mean authentication accuracies of Lead I-ECG and similar ECG were 90.41 ± 8.26% and 81.15 ± 7.54%, respectively. Considering a chance level of 3.33% (=1/30), the mean authentication performance of similar ECG could demonstrate the feasibility of using similar ECG measured behind the ears on the development of a personal authentication system.