• 제목/요약/키워드: Distribution Network Communication Security

검색결과 112건 처리시간 0.036초

배전자동화 시스템 통신망에 대한 사이버 공격에 대해 인증의 기법을 이용한 보안 알고리즘 적용방안 (Applying Security Algorithms using Authentication Against Cyber Attacks in DAS Communication Network)

  • 임일형;최면송;이승재;임성일;이성우;하복남;홍석원
    • 전기학회논문지
    • /
    • 제57권3호
    • /
    • pp.327-335
    • /
    • 2008
  • As communication is becoming increasingly prevalent and especially communication architecture is more relying on the open standard communication protocols, the security issues become major concerns. In this paper we consider possible cyber attacks in the applications based on the current distribution communication architecture, and then derive the security goals. Next we propose how the security algorithms can be adapted to achieve these security goals. We intend to adapt the most efficient ways of secure message exchange, taking the resource-constrained FRTUs into account Finally we show some experiments to validate the protocols.

부호 분할 다중 접속 이동 통신망을 위한 인증 키 분해 프로토콜 (An authenticated key distribution protocol for the CDMA mobile communication network)

  • Hak S. Jeon;Dong K. Kim
    • 정보보호학회논문지
    • /
    • 제7권2호
    • /
    • pp.43-54
    • /
    • 1997
  • 본 논문에서는 부호 분할 다중 접속(Code Division Multiple Access) 이동 통신망을 위한 안전하고 최소의 인증 및 키 분배 프로토콜을 제안한다. 가입자의 인증과 가입자 트래픽의 안전성을 유지하기 위해 CDMA 이동 통신망의 보안 프로토콜은 개발되었다. 기존 프로토콜은 이동 통신망의 무선 구간에 대한 통신 보안을 고려하였고, 유선 구간의 통신 보안은 고려하지 않는다. 본 논문에서는 무선 구간의 통신뿐만 아니라 유선 구간의 통신 보안을 보장할 수 있는 인증 및 키 분배 프로토콜을 제안한다. 제안된 프로토콜은 사용자 식별 번호의 기밀성을 유지하면서, 기존 프로토콜과 비교하여 최소의 정보 흐름을 유지한다.

개인 통신망에서 적용가능한 인증 및 키분배 프로토콜 (An applicable Key Distribution and Authentication Protocol in Personal Communication Networks)

  • 송희삼;전문석
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1995년도 종합학술발표회논문집
    • /
    • pp.331-337
    • /
    • 1995
  • In this paper, We present that protocols have already proposed an applicable key distribution and authentication protocol based discrete logarithm and prime-factorization problem in PCN(Personal Communication Network) is anaysised. We newly propose identiity-based protocol using smart card. This proposed potocol is that Fiat-Shamir identification scheme and a new key distribution scheme based on Fiat-Shamir identification scheme are joined. Proposed protocol is compared with suiting protocols with respect to security and efficiency to evalate performance, so its calculation is reduced in key distribution and authentication to evaluate performance.

  • PDF

Comparative Performance Analysis of Network Security Accelerator based on Queuing System

  • Yun Yeonsang;Lee Seonyoung;Han Seonkyoung;Kim Youngdae;You Younggap
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.269-273
    • /
    • 2004
  • This paper presents a comparative performance analysis of a network accelerator model based on M/M/l queuing system. It assumes the Poisson distribution as its input traffic load. The decoding delay is employed as a performance analysis measure. Simulation results based on the proposed model show only $15\%$ differences with respect to actual measurements on field traffic for BCM5820 accelerator device. The performance analysis model provides with reasonable hardware structure of network servers, and can be used to span design spaces statistically.

  • PDF

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man;Kang, Dong-Joo
    • 조명전기설비학회논문지
    • /
    • 제23권11호
    • /
    • pp.34-43
    • /
    • 2009
  • SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).

X.25 프로토콜 기반의 새로운 키 분배 및 인증방식 (A Key Distribution and Authentication Scheme based on X.25 Protocol)

  • 손기욱;박응기;이진석;신기수
    • 한국정보처리학회논문지
    • /
    • 제4권12호
    • /
    • pp.3078-3087
    • /
    • 1997
  • 컴퓨터 통신망을 통한 정보전송에 있어 정보보호의 문제는 매우 중요하며 이를 제공하기 위한 정보보호 시스템 개발이 여러 방면에서 이루어지고 있다. 이러한 정보보호 시스템 개발시 비밀키의 분배 및 상호 인중은 정보 보호의 필수 불가결한 요소이며, 이에 대한 많은 방법들이 제시되어 왔다. 그러나 이러한 많은 방법들은 통신 프로토콜을 고려하지 않은 경우가 많아 실제 통신 환경에 적용하기가 쉽지 않았다. 본 논문에서는 패킷 통신의 하나인 X.25 프로토콜을 중심으로 프로토콜이 갖는 특성을 유지하면서 키 분배 및 인증을 수행하는 방법을 제 안하였으며, 선택적으로 비밀 통신을 할 수 있는 방법을 함께 제안함으로써 정보보호 시스템이 범용성을 갖도록 하였다.

  • PDF

전력선 통신을 이용한 집단주택 안전관리 시스템 (Security Monitoring System for Apartment House Building Using Paver Line Carrier)

  • 김인수;김관호;김요희
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1993년도 하계학술대회 논문집 A
    • /
    • pp.476-478
    • /
    • 1993
  • Instead of installing new communication wiring to each house in the apartment house building. the power distribution network. which is already installed in the building. can be use as communication medium. In a safty management, by adoption of power line communication system, at remote we can monitor safty related sensors such as fire, gas leakage, burglar intrusion and emergency call which are located at each house. From this viewpoint, we developed security monitoring system for apartment house building using power lines. Security monitoring system consists of Power Line Communication-Sub Controller (PLC-SC). Power Line Communication-Main Controller (PLC-MC) and Management System (MS). Between a PLC-MC and a PLC-SC, the transmission rate is 1200 bps in power lines and modulation technique is frequency shirt keying (FSK). In between a PLC-MC and a MS, the transmission rate is 1200 bps in communication line (RS-485). As a result of this research. transmission loss is 0.1dB per meter of intrabuilding distribution network. Transmission can be reach in 250 meters. So it is enough to communicate for security monitoring system in apartment house building.

  • PDF

Reducing Cybersecurity Risks in Cloud Computing Using A Distributed Key Mechanism

  • Altowaijri, Saleh M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.1-10
    • /
    • 2021
  • The Internet of things (IoT) is the main advancement in data processing and communication technologies. In IoT, intelligent devices play an exciting role in wireless communication. Although, sensor nodes are low-cost devices for communication and data gathering. However, sensor nodes are more vulnerable to different security threats because these nodes have continuous access to the internet. Therefore, the multiparty security credential-based key generation mechanism provides effective security against several attacks. The key generation-based methods are implemented at sensor nodes, edge nodes, and also at server nodes for secure communication. The main challenging issue in a collaborative key generation scheme is the extensive multiplication. When the number of parties increased the multiplications are more complex. Thus, the computational cost of batch key and multiparty key-based schemes is high. This paper presents a Secure Multipart Key Distribution scheme (SMKD) that provides secure communication among the nodes by generating a multiparty secure key for communication. In this paper, we provide node authentication and session key generation mechanism among mobile nodes, head nodes, and trusted servers. We analyzed the achievements of the SMKD scheme against SPPDA, PPDAS, and PFDA schemes. Thus, the simulation environment is established by employing an NS 2. Simulation results prove that the performance of SMKD is better in terms of communication cost, computational cost, and energy consumption.

Energy Efficient IDS Node Distribution Algorithm using Minimum Spanning Tree in MANETs

  • Ha, Sung Chul;Kim, Hyun Woo
    • 스마트미디어저널
    • /
    • 제5권4호
    • /
    • pp.41-48
    • /
    • 2016
  • In mobile ad hoc networks(MANETs), all the nodes in a network have limited resources. Therefore, communication topology which has long lifetime is suitable for nodes in MANETs. And MANETs are exposed to various threats because of a new node which can join the network at any time. There are various researches on security problems in MANETs and many researches have tried to make efficient schemes for reducing network power consumption. Power consumption is necessary to secure networks, however too much power consumption can be critical to network lifetime. This paper focuses on energy efficient monitoring node distribution for enhancing network lifetime in MANETs. Since MANETs cannot use centralized infrastructure such as security systems of wired networks, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method to cover all the nodes in a network and enhance the network lifetime. Simulation results show that the proposed algorithm has better performance in comparison with the existing algorithms.

Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks

  • Mohaisen, Abedelaziz;Nyang, Dae-Hun;AbuHmed, Tamer
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제2권5호
    • /
    • pp.222-238
    • /
    • 2008
  • In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduced. As the communication overhead is one of the most critical constraints of any successful protocol design, we introduce an alternative scheme in which the connectivity is maintained at the same level as in the original work, while the communication overhead is reduced by about 40% of the original overhead, for various carefully chosen parameters. The main modification relies on the use of a two-level key pool design and two round assignment/key establishment phases. Further analysis demonstrates the efficiency of our modification.