• 제목/요약/키워드: Authentication method

검색결과 1,052건 처리시간 0.027초

Design of a Kerberos Authentication Mechanism based on Password (패스워드 기반의 커버로스 인증 메커니즘 설계)

  • 조경옥;김종우;하태진;한승조
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2004년도 춘계종합학술대회
    • /
    • pp.733-738
    • /
    • 2004
  • In a distributed network system, Kerberos certification mechanism is operated by a user in local area on the premise reliability of Kerberos server in another area. But it has a demerit. If security information of certification server between Kerberos servers is released, Kerberos server can not guarantee the reliability. To solve this problem, the proposed mechanism prevents password speculating attack by increasing the random of password certifier through use of distributed password in stead of certification center and certification which was presented by existing Kerberos mechanism. Besides, it used password based certification method which uses secret distributed technique

  • PDF

A Study on Convergence Security of National Infrastructure (국가 인프라 시설의 융합보안 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2017년도 추계학술대회
    • /
    • pp.341-342
    • /
    • 2017
  • Control and development systems such as air traffic control systems, road traffic systems, and Korea Hydro &Nuclear Power are the infrastructure facilities of the country, and if the malicious hacking attacks proceed, the damage is beyond imagination. In fact, Korea Hydro & Nuclear Power has been subjected to a hacking attack, causing internal information to leak and causing social problems. In this study, we analyze the environment of the development control system and analyze the status of the convergence security research, which is a recent issue, and propose a strategy system for stabilizing various power generation control systems and propose countermeasures. We propose a method to normalize and integrate data types from various physical security systems (facilities), IT security systems, access control systems, to control the whole system through convergence authentication, and to detect risks through fusion control.

  • PDF

An Analysis of Environment-friendly Foods Purchase Behavior and Possibility on Entering Chinese Market on the consumers of Shanghai, China (친환경식품의 구매행태 및 중국진출 가능성 분석 - 중국 상하이의 소비자를 중심으로 -)

  • Ro, Chae-Yeong;Cho, Kook-Il;Ahn, Pyong-Ryol
    • Korean Journal of Organic Agriculture
    • /
    • 제16권3호
    • /
    • pp.259-274
    • /
    • 2008
  • This study was designed to analyze the possibility to enter the Chinese market aggressively by giving light on the factors which have effects on the continuous intention of Shanghai consumers to purchase environment-friendly foods, and the purchase of Korean environment-friendly foods. The objects of analysis were the 209 consumers living in Shanghai, China. As for the analysis method, the frequency, percentage, crossing analysis, $X^2$-test and logistic regression analysis were carried out, making use of SPSS PC+ 13.0. The study results are as follows. Firstly, it was identified that the decisive factors, such as good taste, health of family, freshness, food shop in a department store, international quality authentication, diversity of items and number of family members, had effects on the possibility that the consumers in Shanghai, China would purchase environment friendly foods continuously, showing the meaningful variables. Secondly, as for the decisive factors having effects on the possibility to buy Korean environment friendly foods continuously, it was identified that good taste, health of family, freshness and price cutting were the meaningful variables. Therefore, it is necessary that to set up a export promotion strategy to make the Shanghai consumers get interested in Korean environment-friendly foods and choose to buy the foods.

  • PDF

A Framework of User Authentication for Financial Transaction based Multi-Biometrics in Mobile Environments (모바일 환경에서 다중 바이오인식 기반의 금융 거래를 위한 사용자 인증 프레임워크)

  • Han, Seung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • 제20권1호
    • /
    • pp.143-151
    • /
    • 2015
  • Biometric technology has been proposed as a new means to replace conventional PIN or password because it is hard to be lost and has the low possibility of illegal use. However, unlike a PIN, password, and personal information there is no way to modify the exposure if it is exposed and used illegally. Therefore, the existing single modality with single biometrics is critical when it expose. However in this paper, we use a multi-modality and multi-biometrics to authenticate between users and TTP or between users and financial institutions. Thereby, we propose a more reliable method and compared this paper with existed methods about security and performance in this paper.

WBAN Service Quality Optimization Design Using Error Correction Technique (에러교정기법을 이용한 WBAN 서비스품질 최적화 설계)

  • Lee, Jung-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • 제14권4호
    • /
    • pp.657-662
    • /
    • 2019
  • The power consumption of wearable sensors and electrocardiogram regulators should be very low to extend the network lifetime and anticipated QoS( : Quality of Service) control such as error correction and authentication of data processed by WBAN( : Wireless Body Area Network) nodes is important. Therefore, QoS control is the most urgent concern to implement WBAN in health monitoring regulations. For optimal QoS control, we compare the energy efficiency and the average number of transmissions with IEEE 802.15.6 and the error correction method considering energy efficiency. The performance of the proposed error correction technique shows that the energy efficiency and the transmission rate are improved by adjusting the coding rate appropriately using the channel estimation.

Considerations of the Record Management of the Digital Age While CRMS was Introduced (CRMS 도입을 맞아 생각해보는 디지털 시대의 기록관리)

  • Yim, Jin-Hee
    • Proceedings of Korean Society of Archives and Records Management
    • /
    • 한국기록관리학회 2019년도 춘계학술대회
    • /
    • pp.61-67
    • /
    • 2019
  • Recently, the central government organizations have changed their Business Management System to the cloud-based On-nara Document 2.0. According to this, the National Archives of Korea is spreading a cloud-based records management system. With the development of digital technology, including cloud computing, preservation and utilization of records must be redesigned continuously to be effective and efficient. It is needed that the process and method of the electronic records management will change from simple digitization of paper-based recording to digital technology. This article offers opinions related to the logical transfer, storage and redundancy elimination of digital objects, machine-readable format, big-data analysis, templates of official documents, and authenticity authentication system based on universally unique identifiers (UUID) and hash value.

Secure Authenticated key Exchange Protocol using Signcryption Scheme (Signcryption을 이용한 안전한 인증된 키 교환 프로토콜 연구)

  • Kim Rack-Hyun;Youm Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제16권4호
    • /
    • pp.139-146
    • /
    • 2006
  • A Signcryption proposed by Yuliang Zheng in 1997 is a hybrid public key primitive that combines a digital signature and a encryption. It provides more efficient method than a straightforward composition of an signature scheme with a encryption scheme. In a mobile communication environment, the authenticated key agreement protocol should be designed to have lower computational complexity and memory requirements. The password-based authenticated key exchange protocol is to authenticate a client and a server using an easily memorable password. This paper proposes an secure Authenticated Key Exchange protocol using Signcryption scheme. In Addition we also show that it is secure and a more efficient that other exiting authenticated key exchange protocol.

Method to Extract Communication History in Instant Messenger (인터넷 메신저의 통신내역 수집기술)

  • Lee, Jin-Kyung;Han, Ji-Sung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제21권2호
    • /
    • pp.49-60
    • /
    • 2011
  • Instant Messenger is one of the most popular communication service when translating message or data each other through Internet. For digital crime investigation, therefore, it is obviously important to obtain communication trace and contents derived from Instant Messenger. This is because that gathering traditional communication histories also have been important until now. However, extracting communication trace and contents are not easy because they are generally encrypted or obfuscated in local system, futhermore, sometimes they are located at server computer for Instant Messenger. This paper researches on extracting communication histories against NateOn, BuddyBuddy, Yahoo! messenger and Mi3 messenger, and obtaining user password or bypassing authentication system to Instant Messenger Service when a user use auto-login option.

A Privacy Preserving Efficient Route Tracing Mechanism for VANET (VANET에서 프라이버시를 보호하는 효율적인 경로 추적 방법)

  • Lee, Byeong-Woo;Kim, Sang-Jin;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제20권4호
    • /
    • pp.53-62
    • /
    • 2010
  • In VANETs (Vehicular Ad hoc NETwork), conditional anonymity must be provided to protect privacy of vehicles while enabling authorities to identify misbehaving vehicles. To this end, previous systems provide a mechanism to revoke the anonymity of individual messages. In VANET, if we can trace the movement path of vehicles, it can be useful in determining the liability of vehicles in car accidents and crime investigations. Although route tracing can be provided using previous message revocation techniques, they violate privacy of other vehicles. In this paper, we provide a route tracing technique that protects privacy of vehicles that are not targeted. The proposed method can be employed independently of the authentication mechanism used and includes a mechanism to prevent authorities from abusing this new function.

Security Threats and Attacks in Internet of Things (IOTs)

  • Almtrafi, Sara Mutlaq;Alkhudadi, Bdour Abduallatif;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.107-118
    • /
    • 2021
  • The term Internet of Things (IoTs) refers to the future where things are known daily through the Internet, whether in one way or another, as it is done by the method of collecting various information from various sensors to form a huge network through which people, things and machines are helped to make a link between them at all time and anywhere. The IoTs is everywhere around us such as connected appliances, smart homes security systems and wearable health monitors. However, the question is what if there is a malfunction or outside interference that affects the work of these IoTs based devises? This is the reason of the spread of security causes great concern with the widespread availability of the Internet and Internet devices that are subject to many attacks. Since there aren't many studies that combines requirements, mechanisms, and the attacks of the IoTs, this paper which explores recent published studies between 2017 and 2020 considering different security approaches of protection related to the authentication, integrity, availability and confidentiality Additionally, the paper addresses the different types of attacks in IoTs. We have also addressed the different approaches aim to prevention mechanisms according to several researchers' conclusions and recommendations.