• Title/Summary/Keyword: Certificate authority

Search Result 146, Processing Time 0.02 seconds

A Study on Secure Routing Protocol using Multi-level Architecture in Mobile Ad Hoc Network (Multi-level 구조를 이용한 보안 라우팅 프로토콜에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.17-22
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

A Study on The Mutually Authentication Mechanism for The Safe Electronic Signature (안전한 전자서명을 위한 상호인증 메커니즘에 관한 연구)

  • Choi, Sang-Wook;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.772-775
    • /
    • 2008
  • As the wireless communication technology developed, the Electric Commerce using a mobile was activated. WPKI was developed in order to guarantee the stability of the Electric Commerce but it is difficult to be ensured for the safe PKI service which is the same at the wire communication in the technical because of restriction of the mobile terminal. In this paper, we propose the authentication system for the electronic financial service which is safe and is effective in consideration of the restrictive characteristic of the mobile terminal. Moreover, the encryption algorithm for the safe electronic signature is proposed. In WPKI, this makes the cross certification of each certificate authority possible. Moreover, a stability was enhanced through the signature authentication using KCDSA and SEED algorithm.

  • PDF

A Study for PKI Based Home Network System Authentication and Access Control Protocol (PKI 기반 홈 네트워크 시스템 인증 및 접근제어 프로토콜에 관한 연구)

  • Lee, Young-Gu;Kim, Jung-Jae;Kim, Hyun-Chul;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.592-598
    • /
    • 2010
  • A home network system is made up of subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. So, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this paper designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

A Study on the Improvement for Sensitivity Test of Flame Detectors (불꽃화재감지기의 시험기준 개선에 관한 연구)

  • Baek, Dong-Hyun
    • Fire Science and Engineering
    • /
    • v.28 no.6
    • /
    • pp.58-61
    • /
    • 2014
  • Flame detectors has been used more than heat & smoke detector, because this is more effective to catch fire and ceiling height in spite of high price. For upgrade to flame detector, Compare to national or abroad standard about performance test, sensitivity test, sectioning indoor or outdoor, after service and management. As a result, Europe and America have only sensitivity test, no have not operation test and sectioning indoor & outdoor. In performance test, action is put to focus to credit and durability, Not operation test is to be able to tune the sensitivity to match the environment of the site. Also, we need code about aftercare, quality assurance responsibility and implement special detector institution by Certificate Authority implement.

Long Term Operation and Improvement Reliability for SOFC System (SOFC 시스템의 장시간 운전 및 시스템 신뢰성 향상)

  • YI, YONG;SHIN, SEOCK JAE;PARK, SE JIN;KIM, MIN SOO;KIM, HYUNG JOONG;KIM, JUN HO;KIM, INHWAN;KIM, YONG SU
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.28 no.5
    • /
    • pp.502-511
    • /
    • 2017
  • Design, manufacture and operate the 700W Solid oxide fuel cell system suitable for housing. Except for BOP not produced domestically, most of the domestic BOPs were applied as much as possible. Finally, the system size was 350 liter. System performance was electric efficiency 44.64%, thermal efficiency 40.99%, total efficiency 85.62% at certificate authority. The system was operated for 4,500 hours, this operation time include automatically system on/off, E-stop for emergency stop, load trip for blackout and inverter error. There were that the system on/off were 26 times. System performance remains intact after system on/off.

Designing and Implementing a PKI-based Safety Protocol for Electronic Medical Record Systems (공개키 기반의 안전한 전자의무기록에 관한 프로토콜 설계 및 구현)

  • Jin, Gang-Yoon;Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.243-250
    • /
    • 2012
  • This study proposes new protocol protecting patients' personal record more safely as well as solving medical dispute smoothly by storing the record not into a computer server in hospitals but into the National Health Insurance Corporation computer server. The new protocol for electronic medical record is designed using RSA public key algorithm and DSA digital signature. In addition, electronic medical record systems are built up with more safety and reliability through certificate authority. The proposed medical information systems can strengthen trust between doctors and patients. If medical malpractice occurs, the systems can also provide evidence. Furthermore, the systems can be helpful to reduce medical accidents. The systems could be also utilized efficiently in various applied areas.

A Study on the Improvement of Domestic Wind Turbine Certification System (국내 풍력발전시스템 인증제도 개선방안에 관한 연구)

  • Jang, Ho-Jin;Park, Jung-Ha;Park, Young-Hyun;Park, Jin-Chul
    • Journal of the Korean Solar Energy Society
    • /
    • v.31 no.6
    • /
    • pp.125-131
    • /
    • 2011
  • Recently, the application of renewable energy to building is steadily increasing in domestic due to the energy saving efforts around the world. Among the all, wind energy is one of the rising energy source because of its high technological maturity. Domestic wind power market has rapidly increased in recent years but the certification system for wind turbine has not been activated since it was introduced in 2009. Thus, this study aims to propose the improvement of certification system for wind turbine by comparing domestic certification system with international certification system. The result of this study are as follows. First, domestic certification system needs to be subdivided and established by systematic standards. Second, it is considered that education about rating standards is required to wind turbine makers to activate domestic certification system. Third, domestic certification agenciesand test agencies need to be unified and reduced.

Intrusion Detection Using Log Server and Support Vector Machines

  • Donghai Guan;Donggyu Yeo;Lee, Juwan;Dukwhan Oh
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.682-684
    • /
    • 2003
  • With the explosive rapid expansion of computer using during the past few years, security has become a crucial issue for modem computer systems. Today, there are many intrusion detection systems (IDS) on the Internet. A variety of intrusion detection techniques and tools exist in the computer security community such as enterprise security management system (ESM) and system integrity checking tools. However, there is a potential problem involved with intrusion detection systems that are installed locally on the machines to be monitored. If the system being monitored is compromised, it is quite likely that the intruder will after the system logs and the intrusion logs while the intrusion remains undetected. In this project KIT-I, we adopt remote logging server (RLS) mechanism, which is used to backup the log files to the server. Taking into account security, we make use of the function of SSL of Java and certificate authority (CA) based key management. Furthermore, Support Vector Machine (SVM) is applied in our project to detect the intrusion activities.

  • PDF

A Study on PKI Mechanisms with distributed CA for IEEE 802.15.3 High Rate WPAN (IEEE 802.15.3 High Rate WPAN을 위한 분산된 인종기관을 가지는 PKI 메커니즘 연구)

  • 박정우;양대헌;송주석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.125-135
    • /
    • 2004
  • IEEE 802.15.3 High Rate WPAN is a mechanism for wireless home network such as PDAs, digital video camcoder, etc. While symmetric keys are used for MAC layer security, the process of establishing a secure membership or a secure relationship is outside of the scope of the standard. In addition, to prepare for ubiquitous environment in the near future, it is important to study the process of establishing a secure relationship between DEVs in different dependent piconets. This paper propose a secure model and a process of establishing a secure relationship using PKI without a ousted certificate authority.

Key-pair(Public key, Private key) conflict analysis using OpenSSL (OpenSSL을 이용한 키쌍(공개키·개인키) 충돌율 분석)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.8
    • /
    • pp.5294-5302
    • /
    • 2014
  • The development of public-key-based technique that enables a variety of services(E-government, e-banking, e-payment, etc.) evaluated as having complete safety. On the other hand, vulnerabilities(e.g, heartbleed bug, etc.) are constantly being discovered. In this paper, a public key infrastructure to verify the safety and reliability, the collision rate using OpenSSL key pair was analyzed. the experiment was performed using the following procedure. Openssl was used to create five private certification agencies, and each of the private certificate authority certificates to create 2 million, generating a total of 10 million by the certificate of the key pair conflicts analysis. The results revealed 35,000 in 1 million, 0.35% chance of a public key, a private key conflict occurred. This is sufficient in various fields(E-payment, Security Server, etc.). A future public-key-based technique to remove the threat of a random number generator, large minority issues, in-depth study of selection will be needed.