• Title/Summary/Keyword: Authentication method

Search Result 1,045, Processing Time 0.032 seconds

A Study on Authentication Management and Communication Method using AKI Based Verification System in Smart Home Environment (스마트 홈 환경에서 AKI기반 검증 시스템을 활용한 인증관리 및 통신 기법에 관한 연구)

  • Jin, Byung Wook;Park, Jung Oh;Jun, Moon Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • With the development of IOT technology and the expansion of ICT services recently, a variety of home network services have been advanced based on wired and wireless high speed telecommunication. Domestic and global companies have been studying on the innovative technology for the users using IOT based technology and the environment for the smart home services has been gradually developed. The users live their lives with more convenience due to the expansions and developments of smart phones. However, the threatening on the security of the smart home network had occurred by various attacks with the connection to the smart environment telecommunication, lack of applications on low powered and light weight telecommunication, and the problems of security guideline. In addition, the solutions are required for the new and variant attacking cases such as data forgery and alteration of the device for disguising approach with ill will. In this article, the safe communication protocol was designed using certification management technique based on AKI which supplemented the weakness of PKI, the existing certification system in the smart environment. Utilizing the signature technique based on ECDSA, the efficiency on the communication performance was improved, and the security and the safety were analyzed on the security threat under the smart home environment.

Molecular Identification of Deer Antlers using Nucleotide Sequences of Mitochondrial Displacement Loop Region (미토콘드리아 displacement loop 영역의 염기서열을 이용한 녹용의 원산지 동정)

  • Yoo, Hyun-Sook;Lee, Gi-Nam;Lee, Jin-Sung
    • Journal of Life Science
    • /
    • v.20 no.12
    • /
    • pp.1859-1866
    • /
    • 2010
  • It is reported that about 80% of deer antlers (Cervi Pantotricuhum Cornu) produced in the world are consumed in Korea. Fraudulent replacement or mislabeling of costly deer antlers with cheaper ones, however, is one of the most common problems in the Korean deer antler market. Therefore, there is a continuous need for the development of genetic markers to discriminate between genuine and fraudulent deer antlers. This study was performed to develop a method for the identification and authentication of deer antlers using nucleotide sequence analysis against displacement loop of mitochondrial genome among four deer antlers, Cervus eleaphus sibericus, Cervus eleaphus bactrianus, Cervus eleaphus Canadensis, and Cervus eleaphus, originated from Russia, China, North America and New Zealand, respectively. As a result, multiple-alignment of mitochondrial displacement (D) loop region in 1.2 kb showed that, among the four deer antlers, a deleted sequence of about 70 bps was only found in Cervus elaphus bactrianus from China. Finally, Cervus elaphus bactrianus among nine samples of deer antlers were successfully identified by PCR using primer amplifying deleted D-loop. Cervus elaphus bactrianus was also confirmed from cloning the PCR products and their nucleotide sequence analyses were confirmed. However, no marker to identify Cervus eleaphus sibericus, Cervus eleaphus canadensis and Cervus eleaphus were found in the nucleotide sequences of mitochondrial D-loop. Our results suggest that PCR for deleted D-loop region of mitochondrial DNA are useful for identification and authentication of deer antlers of Cervus elaphus bactrianus originating from China.

Molecular Authentication of Schisandrae Fructus and Analysis of Phylogenetic Relationship based on nrDNA-ITS sequences (nrDNA-ITS 분자마커를 이용한 오미자(五味子) 종 감별 및 기원분석 -ITS 염기서열을 이용한 오미자(五味子) 감별-)

  • Moon, Byeong-Cheol;Ji, Yun-Ui;Seo, Hyeong-Seok;Lee, A-Young;Chun, Jin-Mi;Kim, Ho-Kyoung
    • The Korea Journal of Herbology
    • /
    • v.25 no.4
    • /
    • pp.47-54
    • /
    • 2010
  • Objectives : The original plant species of Schisandrae Fructus (O-mi-ja) is prescribed as Schisandra chinensis $B_{AILL.}$, in Korea, but S. chinensis $B_{AILL.}$ and S. sphenanthera $R_{EHD.}$ et $W_{ILS.}$ in China. Moreover, fruit of several other species in genus Schisandra also have been used as the same herbal medicines. To develop a reliable method for correct identification of Schisandrae Fructus and to evaluate the phylogenetic relationship of S. chinensis and its related species, we analyzed internal transcribed spacer (ITS) sequences of nuclear ribosomal DNA (nrDNA). Methods : Twenty-four plant samples of three Schisandra species and one Kadsura species, S. chinensis $B_{AILL.}$, S. spenanthera $R_{EHD.}$ et $W_{ILS.}$, S. nigra $M_{ax.}$ and Kadsura japonica $D_{UNAL}$ were collected from each different native habitate and farm in Korea and China. The nrDNA-ITS region of each samples were amplified using ITS1 and ITS4 primer and nucleotide sequences were determined after sub-cloning into the pGEM-Teasy vector. Authentic marker nucleotides were estimated by the analysis of ClastalW based on the entire nrDNA-ITS sequence. Results : In comparative analysis of the nrDNA-ITS sequences, we found specific nucleotide sequences including indels (insertions and deletions) and substitutions to distinguish C. chinensis, S. spenanthera, S. nigra, and K. japonica. These sequence differences at corresponding positions are avaliable nucleotide markers to determine the botanical origin of O-mi-ja. Moreover, we evaluated the phylogenetic relationship of four plant species by the analysis of nrDNA-ITS sequences. Conclusions : These marker nucleotides would be useful to identify the official herbal medicines by the providing of definitive information that can identify each plant species and distinguish it from unauthentic adulterants for O-mi-ja.

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Home Network Observation System Using Activate Pattern Analysis of User and Multimedia Streaming (사용자의 행동 패턴 분석과 멀티미디어 스트리밍 기술을 이용한 홈 네트워크 감시 시스템)

  • Oh Dong-Yeol;Oh Hae-Seok;Sung Kyung-Sang
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1258-1268
    • /
    • 2005
  • While the concept of Home Network is laying by and its interests are increasing by means of digitalizing of the information communication infrastructure, many efforts are in progress toward convenient lives. Moreover, as information household appliances which have a junction of connecting to the network are appearing over the past a few years, the demands against intellectual Home Services are increasing. In this paper, by being based upon Multimedia which is an essential factor for developing of various application services on ubiquitous computing environments, we suggest a simplified application model that could apply the information to the automated processing system after studying user's behavior patterns using authentication and access control for identity certification of users. In addition, we compared captured video images in the fixed range by pixel unit through some time and checked disorder of them. And that made safe of user certification as adopting self-developed certification method which was used 'Hash' algorism through salt function of 12 byte. In order to show the usefulness of this proposed model, we did some testing by emulator for control of information after construction for Intellectual Multimedia Server, which ubiquitous network is available on as a scheme so as to check out developed applications. According to experimental results, it is very reasonable to believe that we could extend various multimedia applications in our daily lives.

  • PDF

A Study of Authentication Method for Id-Based Encryption Using In M2M Environment (M2M 환경에서 신원기반 암호기법을 활용한 인증기법에 관한 연구)

  • Jin, Byung-Wook;Park, Jae-Pyo;Lee, Keun-Wang;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1926-1934
    • /
    • 2013
  • M2M (Machine-to-Machine Communication) refers to technologies that allow wired and wireless systems to communicate with other devices with similar capabilities. M2M has special features which consist of low electricity consumption, cheap expenses, WAN, WLAN and others. Therefore, it can communicate via a network. Also, it can handle itself without a person's management. However, it has a wireless-communicate weakness because of the machine-communicate request, and also it is difficult to administrate and control each other. So In this Paper, It suggests the safety protocol between Device, Gateway and Network Domain in M2M environment. Proposed protocol is based on ID-Based encryption's certificate and creates session key between the Access Server and the Core Server in the Network Domain. It uses that session key for sending and receiving data in mutual, and adds key renewal protocol so it will automatically update discern result. a comparative analysis of the existing M2M communication technologies and PKI-based certificate technology is compared with the proposed protocol efficiency and safety.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

in Economically Motivated Authentication Food Using Electronic Nose Based on Mass Spectrometer (유사 식품인 오징어 젓갈과 한치 젓갈의 판별을 위한 MS-전자코 분석)

  • Hong, Eun Jeung;Kim, Ki Hwa;Park, Sue Jee;Kang, Jee Won;Kim, Dong-Sul;Lee, Hwa Jung;Kim, Eun Jeong;Lee, Jae Hwang;Kim, Seung-Hee;Lee, Kwang-Ho;Noh, Bong Soo
    • Food Engineering Progress
    • /
    • v.15 no.2
    • /
    • pp.122-129
    • /
    • 2011
  • In this study, discrimination of salted cuttle fish and salted mitra squid was carried out using electronic nose based on mass spectrometer. Intensities of each fragment from salted cuttlefish by electronic nose were completely different from those of salted mitra squid. Each sample was analyzed, and discriminant function analysis (DFA) was used for the discrimination of similar products. DFA plot indicated a significant separation of each salted cuttlefish and mitra squid ($r^2$= 0.8789, F= 162.13). Electronic nose based on mass spectrometer could be used as an efficient method for discrimination of Economically Motivated Authentication (EMA) foods.

Molecular authentication of Lepidii seu Descurainiae Semen by the development of matK amplification primers and analysis of sequences (matK 증폭용 primer 개발 및 염기서열 분석을 통한 정력자(葶藶子) 유전자 감별)

  • Moon, Byeong Cheol;Kim, Wook Jin;Yang, Sungyu;Park, Inkyu;Yeo, Sang Min;Noh, Pureum
    • The Korea Journal of Herbology
    • /
    • v.33 no.3
    • /
    • pp.25-35
    • /
    • 2018
  • Objectives : Lepidii seu Descurainiae Semen has been frequently adulterated with the seeds of several inauthentic plant species. However, the accurate identification of these plant seeds is very difficult. To develop a reliable genetic authentication tool for Lepidii seu Descurainiae Semen, we analyzed matK sequence. Methods : To obtain the matK sequences of plant materials, genomic DNA was extracted from 24 samples and PCR amplification was carried out using matK-AF/matK-8R universal primer set and matK-LDSF/matK-LDSR primer set. For identifying species-specific nucleotides and phylogenetic analysis, matK regions were sequenced and comparatively analyzed by the ClustalW and Maximum Likelihood method. Results : We developed a new primer set to amplify matK region in Lepidii seu Descurainiae Semen and closely related plant samples. From the comparative analysis of matK sequences, we identified species-specific marker nucleotides for D. sophia, L. apetalum, L. latifolium, E. cheiranthoides, E. macilentum, and D. nemorosa, respectively. Furthermore, phylogenetic analysis revealed clear classification depending on the species. These results indicated that the matK sequence obtained a new primer set in this study was useful to identify Lepidii seu Descurainiae Semen in species level. Conclusions : We developed a primer set and identified species-specific marker nucleotides enough to distinguish authentic Lepidii seu Descurainiae Semen and adulterants at the species level based on the matK sequences. These genetic tool will be useful to prevent adulteration and to standardize the quality of Lepidii seu Descurainiae Semen.