• Title/Summary/Keyword: Digital Certificates

Search Result 52, Processing Time 0.021 seconds

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

A Study on the Application of Micro-Credentials for Vocational Competency Development Training Teachers and Instructors (직업능력개발훈련 교·강사의 자격연계형 마이크로 크리덴셜 적용 방안)

  • Miseok Yang;Ohyoung Kwon;Woocheol Kim
    • Journal of Practical Engineering Education
    • /
    • v.15 no.1
    • /
    • pp.169-181
    • /
    • 2023
  • This study was conducted to examine the remuneration curriculum of vocational ability development training teachers and instructors and to examine ways to apply micro credentials. To this end, the current status of the remuneration curriculum of vocational ability development training instructors and instructors at K University's Competency Education Development Institute, the characteristics of micro credentials, and the possibility of linking the remuneration curriculum to micro credentials are as follows. First, most of the recognition of digital certificates was positive for digital certificates such as digital credit, digital badge issuance, and recognition of the recognized qualification process of maintenance education when completing the training course. In addition, as a method of applying micro credentials to conservative education, various cases were proposed to benefit from conservative education, systematization and grading of the qualification process, and credit of the qualification process. Second, as an institutional supplement to enhance the utilization of conservative education using micro credentials, the need to expand NCS-based major conservative education, provide efficient learning contents and learning methods, and set minimum completion time. In addition, the most common response as a way to improve the understanding of teachers and instructors in vocational ability development training was the micro credential promotion plan. Third, in the role of conservative education institutions and vocational ability development training instructors and instructors, conservative education institutions mention maintaining educational quality the most, and active participation was the role of vocational ability development training instructors. Through this study, it is expected to establish a vocational training environment that can enhance expertise and provide a practical portfolio of practical competency history by linking the remuneration curriculum of vocational competency development training instructors and micro credentials.

mNPKI for Mobile Government in Developing Countries (개발도상국의 모바일 정부를 위한 mNPKI)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.161-171
    • /
    • 2019
  • Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

Bitcoin Cryptocurrency: Its Cryptographic Weaknesses and Remedies

  • Anindya Kumar Biswas;Mou Dasgupta
    • Asia pacific journal of information systems
    • /
    • v.30 no.1
    • /
    • pp.21-30
    • /
    • 2020
  • Bitcoin (BTC) is a type of cryptocurrency that supports transaction/payment of virtual money between BTC users without the presence of a central authority or any third party like bank. It uses some cryptographic techniques namely public- and private-keys, digital signature and cryptographic-hash functions, and they are used for making secure transactions and maintaining distributed public ledger called blockchain. In BTC system, each transaction signed by sender is broadcasted over the P2P (Peer-to-Peer) Bitcoin network and a set of such transactions collected over a period is hashed together with the previous block/other values to form a block known as candidate block, where the first block known as genesis-block was created independently. Before a candidate block to be the part of existing blockchain (chaining of blocks), a computation-intensive hard problem needs to be solved. A number of miners try to solve it and a winner earns some BTCs as inspiration. The miners have high computing and hardware resources, and they play key roles in BTC for blockchain formation. This paper mainly analyses the underlying cryptographic techniques, identifies some weaknesses and proposes their enhancements. For these, two modifications of BTC are suggested ― (i) All BTC users must use digital certificates for their authentication and (ii) Winning miner must give signature on the compressed data of a block for authentication of public blocks/blockchain.

A Development of a Curriculum of Robotics Process Automation Education for Digital Transformation (디지털 전환을 위한 대학교 로보틱스 프로세스 자동화 교육과정 개발)

  • Park, Jongjin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.545-550
    • /
    • 2021
  • In this paper, a university curriculum of Automation Robotics Process(RPA) among several goals for digital transformation of companies was developed. In the process of the development of ICT technology and the 4th industrial revolution, the existing analog information has changed through the stages of digitization, digitalization, and digital transformation. Recently, digital transformation has been cited as an essential survival strategy following a disruptive revolution that changes the paradigm of existing industrial systems and business. It is defined as a continuous process by which a company adapts to or promotes disruptive changes in customers and markets by using digital capabilities to create new business models, products and services. To this end, process automation in companies or organizations is an important factor. Accordingly, the need for a curriculum of robotics processes automation in universities has been raised according to these changes, and the related education contents, which have been centered on companies, have been redesigned to introduce the curriculum for universities. Education contents are composed to help students to attain certificates of essential or advanced of AA.

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.

Smart Poster Authentication Scheme based on Authentication URL (인증 URL 기반의 스마트 포스터 인증기법)

  • Lee, Jae-Cheol;Park, Chang-Seop
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.91-99
    • /
    • 2014
  • NFC(Near Field Communication) is a wireless data exchange technology in 13.56MHz frequency band between devices. The NFC Forum defines the NDEF(NFC Data Exchange Format) exchanging data format between NFC devices and NFC Tags, the NFC RTD(Record Type Definition) defining the record types in the NDEF messages, the Smart Poster RTD in order to replace current paper posters and the Signature RTD to ensure the authenticity and integrity for NDEF records. But the previous smart poster authentication scheme have the weaknesses of using the PKI(Public Key Infrastructure) with certificates to verify the public key for the smart poster authentication and requiring the additional storage capacity of NFC tags for the authentication path. Therefore in this paper we propose a smart poster authentication scheme and implementation based on the authentication URL, a digital signature and a public key without the PKI and certificates for the smart poster authentication.

A study on the send and receive of the message in the TEDI system (TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the TEDI System. The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Serves, a RSP Server, and Certification Servers. TEDI has development the system and legal frame work. Exporters, importers, carriers, banks insurance and companies those who engage in the trade releated business have tested TEDI system and evaluated the legal frame work from the practical point of view. TEDI is now refining the system and preparing for the service. A fundamental feature of the TEDI System is the attribution to participants of data messages through public key certificates issued by certification authorities that allow for verification of digital signatures. Access to servers maintained by such certification authorities also takes place through the internet. In principle, certificates used by any reputable certification authority may be employed as long as they are compatible with X.509 V3.

  • PDF

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

A Study on the Certification System in Electromic Commerce (전자상거래(電子商去來)의 인증체계(認證體系)에 관한 고찰(考察))

  • Ha, Kang Hun
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.367-390
    • /
    • 1999
  • The basic requirements for conducting electronic commerce include confidentiality, integrity, authentication and authorization. Cryptographic algorithms, make possible use of powerful authentication and encryption methods. Cryptographic techniques offer essential types of services for electronic commerce : authentication, non-repudiation. The oldest form of key-based cryptography is called secret-key or symmetric encryption. Public-key systems offer some advantages. The public key pair can be rapidly distributed. We don't have to send a copy of your public key to all the respondents. Fast cryptographic algorithms for generating message digests are known as one-way hash function. In order to use public-key cryptography, we need to generate a public key and a private key. We could use e-mail to send public key to all the correspondents. A better, trusted way of distributing public keys is to use a certification authority. A certification authority will accept our public key, along with some proof of identity, and serve as a repository of digital certificates. The digital certificate acts like an electronic driver's license. The Korea government is trying to set up the Public Key Infrastructure for certificate authorities. Both governments and the international business community must involve archiving keys with trusted third parties within a key management infrastructure. The archived keys would be managed, secured by governments under due process of law and strict accountability. It is important that all the nations continue efforts to develop an escrowed key in frastructure based on voluntary use and international standards and agreements.

  • PDF