• Title/Summary/Keyword: CyberIdentity

Search Result 98, Processing Time 0.042 seconds

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

A Dynamic Defense Using Client Puzzle for Identity-Forgery Attack on the South-Bound of Software Defined Networks

  • Wu, Zehui;Wei, Qiang;Ren, Kailei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.846-864
    • /
    • 2017
  • Software Defined Network (SDN) realizes management and control over the underlying forwarding device, along with acquisition and analysis of network topology and flow characters through south bridge protocol. Data path Identification (DPID) is the unique identity for managing the underlying device, so forged DPID can be used to attack the link of underlying forwarding devices, as well as carry out DoS over the upper-level controller. This paper proposes a dynamic defense method based on Client-Puzzle model, in which the controller achieves dynamic management over requests from forwarding devices through generating questions with multi-level difficulty. This method can rapidly reduce network load, and at the same time separate attack flow from legal flow, enabling the controller to provide continuous service for legal visit. We conduct experiments on open-source SDN controllers like Fluid and Ryu, the result of which verifies feasibility of this defense method. The experimental result also shows that when cost of controller and forwarding device increases by about 2%-5%, the cost of attacker's CPU increases by near 90%, which greatly raises the attack difficulty for attackers.

On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks

  • Wang, Qiuhua;Kang, Mingyang;Yuan, Lifeng;Wang, Yunlu;Miao, Gongxun;Choo, Kim-Kwang Raymond
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2255-2281
    • /
    • 2021
  • Channel characteristic-based physical layer authentication is one potential identity authentication scheme in wireless communication, such as used in a fog computing environment. While existing channel characteristic-based physical layer authentication schemes may be efficient when deployed in the conventional wireless network environment, they may be less efficient and practical for the industrial wireless communication environment due to the varying requirements. We observe that this is a topic that is understudied, and therefore in this paper, we review the constructions and performance of several commonly used test statistics and analyze their performance in typical industrial wireless networks using simulation experiments. The findings from the simulations show a number of limitations in existing channel characteristic-based physical layer authentication schemes. Therefore, we believe that it is a good idea to combine machine learning and multiple test statistics for identity authentication in future industrial wireless network deployment. Four machine learning methods prove that the scheme significantly improves the authentication accuracy and solves the challenge of choosing a threshold.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

A study on specializing the University Museum in the Perspective of Culture, Arts, and Science (문화.예술.과학의 관점에서 대학박물관의 특성화를 위한 기초연구)

  • Choe, Jong-Ho
    • KOMUNHWA
    • /
    • no.68
    • /
    • pp.25-39
    • /
    • 2006
  • This article attempts to define identity, role and functions of a university museum and to suggest specialization of the university museum in the perspective of culture, arts, and science. A university museum is defined as a center for the service of the university community and its development which acquires, researches, communicates, exhibits and educates, for purposes of eduinfotainment,29 material evidence of people and their environment. The target user of the today's university museum are not only professors, students, university workers, but also university neighbourhood such as the related professionals, patrons, parents, school children and villagers. A multi-dimensional and multi-purpose university museum can be established and managed in a real world and / or a cyber world in the perspective of culture, arts, and science. Based on a ubiquitous system30 in a cyber world vis-a-vie a real world, the university museum can be easily utilized by users anywhere, anytime and any device. In order to specialize the university museum in the perspective of culture, arts and science, it is desirable that the university museum director with the CEO of the university community promote the specialization of the university museum based on philosophy and strategies of university community management after they definitely evaluate the components and resources of the university museum such as human powers, museum collections, organizational, technological, capital, spacial and symbolic resources, The specialization of the university museum should be projected and executed in the direction of maintaining the typical scope of museum activities and managing the effective museum management. Specializing the university museum in the perspective of culture, arts, and science can contribute not only to establish the identity of the university community and to perform role and functions of the university museum but also to encourage academic development, to revaluate the brand of the university community and to promote the marketing for the university.

  • PDF

Effect of Emotional Elements in Personal Relationships on Multiple Personas from the Perspective of Teenage SNS Users (SNS 상의 대인관계에서 나타나는 감정적 요소와 청소년의 온라인 다중정체성 간의 영향관계)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.199-223
    • /
    • 2016
  • As social networking services (SNS) become widely used tools for maintaining social relationships, people use SNS to express themselves online. Users are free to form multiple characters in SNS because of online anonymity. This phenomenon causes SNS users to easily demonstrate multiple personas that are different from their identities in the real world. Therefore, this study focuses on online multi-personas that establish multiple fake identities in the SNS environment. The main objective of this study is to investigate factors that affect online multi-personas. Fake online identities can have various negative consequences such as cyber bullying, cyber vandalism, or antisocial behavior. Since the boundary between the online and offline worlds is fading fast, these negative aspects of online behavior may influence offline behaviors as well. This study focuses on teenagers who often create multi-personas online. According to previous studies, personal identities are usually established during a person's youth. Based on data on 664 teenage users, this study identifies four emotional factors, namely, closeness with others, relative deprivation, peer pressure and social norms. According to data analysis results, three factors (except closeness with others) have positive correlations with users' multi-personas. This study contributes to the literature by identifying the factors that cause young people to form online multi-personas, an issue that has not been fully discussed in previous studies. From a practical perspective, this study provides a basis for a safe online environment by explaining the reasons for creating fake SNS identities.

The Importance and function of Cyber Psychology (사이버 심리의 중요성과 역할)

  • Choi Moon-Hee
    • Science of Emotion and Sensibility
    • /
    • v.8 no.1
    • /
    • pp.75-83
    • /
    • 2005
  • Cyberspace is on its way to experience dynamic change, hereby encompassing technical and social diversities and multiplicities. The internet, with a history of no more than 10 years, has drastically changed the way, meaning and conduct of our lives, the structure and function of society and communication. Even in psychology, in which the purpose is to scientifically look into the human mind and explore its behavior, the in-depth inquiry into the human behavior and psychological features of the cyberspace have become an increasingly important issue. Research suggests that psychological features and concepts brought about during the process of communication in cyberspace have been influenced by the digital mode following the analogue one, and by the online mode following the off line one. It also suggests that, with new issues peculiar to information society, cultural structures should be re-conceptualized, reconstructed and reevaluated in various fields. This approach to the changing role, meaning and style within society should be rearranged and referred to as cyber psychology.

  • PDF

Korean Costume's Figure and Means in the Coming-of-age Ceremony (한국성년례 복식의 형태와 의미)

  • Hwang, Mi-Sun;Lee, Un-Young
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.15 no.1
    • /
    • pp.155-173
    • /
    • 2013
  • Recently, social problem of teens becomes one of the important social issues. Adolescence is the intermediate stages of childhood and adulthood. Teens have not find their identity at this time. That reason is why teens and the old generation are disconnect. That arise from the development of industry and the nuclear family, entrance examination-oriented education system. So they are wandering in the popular culture and the cyber-space. Therefore, families, schools and state should have interesting and understanding for teens, and should strive that teens establish a self established identity. Specially, ethics education using traditional culture will help to establish their identity, and that provide self-esteem and pride about korean traditional culture. This is the reason why culture contents that is based on Korean traditional culture have to make for teens. The purpose of this study is to provide the basic data that will help in the development Korean traditional cultural contents for teens. In this study, this researchers will search the following matters; first, what is ritual for Coming-of-age, second, various forms of ritual for Coming-of-age and Korean modern ritual in order to grasp the meaning of the ritual for Coming-of-age, third, costume and meaning of costume which has in both Kwan-Ryea as Korean traditional ritual for Coming-of-age and Korean modern ritual. This study will compare Kwan-Ryea with traditional ritual of modern.

  • PDF

Adolescent Self-esteem, Career Identity, School Learning Activity and Life Satisfaction Change: From Middle School to High School (중학교에서 고3까지의 자아존중감, 진로정체감, 학습활동과 삶의 만족도 관계연구: 4년간의 변화를 중심으로)

  • Kim, Sunah
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.507-514
    • /
    • 2018
  • This study utilized latent growth curve modeling to investigate the trajectories of adolescent life satisfaction changes in middle and high school students. The effects of self-esteem, career identity, school learning activity, gender, and household earnings on life satisfaction changes were examined. Data was obtained from the Korea Child Youth Panel Survey (KYCPS), a longitudinal study following students for 7 years. Year 3-6 data was utilized. Results found that the life satisfaction trajectory resulted as a quadratic model in which individual differences were significant. Second, school learning activity used as a time variant variable had a positive significant effect on life satisfaction each year. Third, gender and self-esteem as time invariant variables had significant effects on initial levels while self-esteem had effects on the slope and quadratic change. Further implications and research issues are discussed.

A Method for Effective Mobile Electronic Notification Service of Private Institutions

  • Kim, JongBae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.194-200
    • /
    • 2022
  • Traditionally, postal services that produce and deliver paper-based notices have been the mainstream. The reason is that it has the function of distribution and proof of delivery in the postal delivery system as well as the advantage of information delivery through postal delivery. After all, for the purpose of distribution and proof of delivery, many organizations use paper-based postal notices. However, in recent years, it has been in the spotlight to produce a paper-based postal notice as an electronic notice and deliver information to a mobile device through the Internet. In this paper, we propose a safe interworking method for user identification information required for private institutions to transmit mobile electronic notices. In order for a private institution to accurately deliver an electronic notice to a mobile service subscriber, a means to confirm whether the private institution and the mobile device subscriber are the same person is required. In the mobile electronic notification service, the connecting information provided by the personal identity proofing agency is used as a means of user identification. Connecting information is called a resident registration number on the Internet and is one-way hash information that can only be created by the personal identity proofing agency designated by the government. In order to transmit a mobile electronic notice, it is necessary to share connecting information for the same user identification between the institution that requests the sending of the electronic notice and the institution that processes the sending of the electronic notice. Connecting information is personal information that can uniquely identify a user, and if it is disclosed, damage such as personal information infringement may occur. As such, it is necessary to prevent problems that may arise from misuse and abuse of connecting information as well as increase in the benefits of sending the mobile electronic notice. In this paper, a safe and effective mobile electronic notification service can be performed by suggesting a method for safe interworking of information related to the mobile electronic notification service.