• Title/Summary/Keyword: Distribution Network Communication Security

Search Result 112, Processing Time 0.035 seconds

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

Us ins Improved Key Distribution Method in Mobile Communication Network (이동통신망에서 개선된 키분배 방식을 이용한 암호화 문제로의 접근)

  • 조장관;전문석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.323-330
    • /
    • 1995
  • 이동통신에서의 암호화 문제는 최근 많은 통신관련 범죄가 증가함에 파라 그 중요성과 필요성의인식이 증대되고 있다. 하지만 기존의 시스템에서는 HSC(Mobile Switch Center)가 모든 정보를 관장하므로 HSC을 통한 정보유출이 발생하면 모든 이동국에 대한 정보가 가로채기를 당하거나 하는 여러가지 정보보호 위협을 당할 소지가 있으므로 이러한 문제를 해결하기 위해서 본 논문에서 중점적으로 다루는 부분은 기존의 방법에서 제공하지 못하는 두개의 이동국 사이에서만 정보론 공유하기 위한 세션키를 형성하는 방법으로 기지국에서의 정보유출을 막기위해서 이러한 방법이 연구되어 오고 있으나 실제로 세션키를 형성하는 방법이 속도면에 문제를 가지고 있어서 적용에 문제점을 가지고 있는 형편이다. 이에 본 논문에서 이러한 Diffie-Bellman의 방법을 기초한 세션키를 간단히 생성하며 적용하는 방법과 이것을 실제 시스템인 EIA/TIA/IS-95 권고안에 근거한 방법에 적용하는 것을 보이고자 한다.

  • PDF

Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking (이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구)

  • Park, Bae-Hyo;Lee, Jae-Il;Hahn, Gene-Beck;Nyang, Dae-Hun
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.

An Efficient Key Distribution for Broadcast Encryption at Embedded Computing Environment (임베디드 컴퓨팅 환경에서 브로드캐스트 암호화를 위한 효율적인 키 분배)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.1
    • /
    • pp.34-45
    • /
    • 2008
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. User acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. The temporary conference environment base structure against an each mobile device wild gap. Without the transmission possible, it follows infrequent location change and with the quality where the key information change flow. Thus, in this paper, in order to apply to the embedded computing environment and the key generation and the efficient key renewal are done when the mobile device is used of the specify space it proposes.

  • PDF

A Study of Location-based Key Management Using a Grid for Wireless Sensor Networks (무선 센서 네트워크에서 그리드 정보를 활용한 위치 기반 키 관리 연구)

  • Choi, Jaewoo;Kim, Yonghyun;Kim, JuYoub;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.759-766
    • /
    • 2015
  • This paper proposes a location-based key management scheme in wireless sensor networks, and among the existing location-based key management techniques, we focused on the LDK (Location Dependent Key management). In order to improve the problems occurred by communication interference, we introduced the key revision process and the method of key establishment using grid information. According to the simulation of this scheme, it increased connectivity while decreased compromise ratio than those of the previous LDK, futhermore, we confirmed that a hexagon distribution of AN reduces the network cost.

A SIP Extension Method for Closed Multiparty Conference with Guarantee of Security (비공개형 다자간 컨퍼런스의 보안성 확보를 위한 SIP 확장 기법)

  • 김현태;김형진;나인호
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.331-337
    • /
    • 2004
  • Multiparty conference service based on SIP supported by VoIP network is gradually increased in use and the continuous development and standardization works on SIP are in the process of advancing. But SIP used in currently does not support identity discovery and distribution of each participant for multipath conference. In this paper, a SIP extension method for guaranteeing security from the multiparty conference based on SIP is proposed. We design a new SIP header and method for discovering and distributing a participant's identity in closed multiparty conference when the call initiation is established. And it can ensure that each participant is notified before a new participant joins.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

PR-Management and Branding of Media Channels with the Application of Social Networks

  • Shalman, Tatiana;Dobrianska, Viktoriia;Kokhan, Marianna;Pletsan, Khrystyna;Humenchuk, Anatolii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.70-76
    • /
    • 2021
  • The relevance of intelligence involves the definition of such communication systems of PR-management and branding of media channels with the use of social networks, which are already implemented in practice by modern representatives of professional PR product. The purpose of the investigation is to determine the system of implementation of technologies of PR-management and branding of media channels with the use of social networks based on a survey of PR and brand of different media channels on the basis of a survey of brand managers and PR. 980 respondents from Ukraine took part in the survey. The survey was conducted on the Google-forms platform. The results outline a list of the most popular social networks and messengers for the implementation of PR management and branding technologies, including Facebook, Twitter, Google, LinkedIn, Tumblr; Telegram, WhatsApp, Viber, Skype. It is determined that the criteria of branding analysis are informativeness, centralization/distribution, content, feedback intensity. Identified 2 prospects for the development of branding in an interactive media environment (creation of a presentation system; integration of websites of social media and companies in universal centers). The criteria of general importance of the factors influencing the behavioral intention of consumers to use social media channels are presented (satisfaction, accessibility, perceived usefulness, trust, ease of use, attitude, social influence, self-efficacy). The meaning of the content of social media channels (public, informational and communication) is indicated. The practical significance of the study was to present the links between the criteria, development prospects and the values of branding factors.

The research on Diffie-Hellman-based IoT Sensor Node key management (Diffie-Hellman 기반 사물인터넷 센서노드 키 관리 연구)

  • Hong, Sunghyuck;Yu, Jina
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.12
    • /
    • pp.9-14
    • /
    • 2017
  • Recently, the Internet of Things are developing in accordance with the technology of implementation in low-cost, small-size, low power consumption and smart sensor that can communicate using the internet. Especially, key management researches for secure information transmission based on the Internet of Things (IoT) are actively performing. But, Internet of Things(IoT) are uses sensor. Therefore low-power consumption and small-memory are restrictive condition. As a result, managing the key is difficult as a general security measure. However, The problem of secure key management is an essential challenge For the continuous development of the Internet of things. In this paper, we propose a key distribution and management technique in secure Internet of things. In the key generation and management stage, it satisfies the conditions and without physically constrained for IoT based communication.

A Hybrid Vulnerability of NFC Technology in Smart Phone (스마트폰에서 NFC를 이용한 융.복합 하이브리드 취약점)

  • Park, Chang Min;Park, Neo;Park, Won Hyung
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.3-8
    • /
    • 2012
  • Smartphones have all the recent technology integration and NFC (Near Field Communication) Technology is one of them and become an essential these days. Despite using smartphones with NFC technology widely, not many security vulnerabilities have been discovered. This paper attempts to identify characteristics and various services in NFC technology, and to present a wide range of security vulnerabilities, prevention, and policies especially in NFC Contactless technology. We describe a security vulnerability and an possible threat based on human vulnerability and traditional malware distribution technic using Peer-to-Peer network on NFC-Enabled smartphones. The vulnerability is as follows: An attacker creates a NFC tag for distributing his or her malicious code to unspecified individuals and apply to hidden spot near by NFC reader in public transport like subway system. The tag will direct smartphone users to a certain website and automatically downloads malicious codes into their smartphones. The infected devices actually help to spread malicious code using P2P mode and finally as traditional DDoS attack, a certain target will be attacked by them at scheduled time.