• Title/Summary/Keyword: End-to-End Security

Search Result 704, Processing Time 0.029 seconds

A Novel Method for Survivability Test Based on End Nodes in Large Scale Network

  • Ming, Liang;Zhao, Gang;Wang, Dongxia;Huang, Minhuan;Li, Xiang;Miao, Qing;Xu, Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.620-636
    • /
    • 2015
  • Survivability is a necessary property of network system in disturbed environment. Recovery ability is a key actor of survivability. This paper concludes network survivability into a novel composite metric, i.e. Network Recovery Degree (NRD). In order to measure this metric in quantity, a concept of Source-Destination Pair (SD Pair), is created to abstract end-to-end activity based on end nodes in network, and the quality of SD Pair is also used to describe network performance, such as connectivity, quality of service, link degree, and so on. After that, a Survivability Test method in large scale Network based on SD pairs, called STNSD, is provided. How to select SD Pairs effectively in large scale network is also provided. We set up simulation environment to validate the test method in a severe destroy scenario and evaluate the method scalability in different large scale network scenarios. Experiment and analysis shows that the metric NRD correctly reflects the effort of different survivability strategy, and the proposed test method STNSD has good scalability and can be used to test and evaluate quantitative survivability in large scale network.

The End-to-End Encryption for Enhancing Safety of Electronic Financial Transactions (전자금융거래의 안전성 강화를 위한 종단간 암호화)

  • Seung, Jae-Mo;Lee, Su-Mi;Ahn, Seung-Ho;Noh, Bong-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1920-1925
    • /
    • 2009
  • '05. June, the first Internet banking accident occurred by the malignant cord. It discontinued security programs for protecting important financial informations. A computer hacker had made a collation of password, OTP(One Time Password) values etc and illegally withdraw one´s savings from the bank using the financial information. The attackers are continuously attempted with the hacking tool under bypass security programs as the vaccine program or the personal fire-wall. Therefore, an electronic financial system should be composed with the goal which is to protect financial informations from user's terminal to a banking server. In this paper, we make an analysis of menaces in electronic financial transactions and explain considerable security issues to enhance safety in Internet banking, CD/ATM and mobile banking.

A Study on Improvement of Password Algorithm (패스워드 알고리즘의 개선에 관한 연구)

  • 김영수;박연식;임재홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.287-293
    • /
    • 1999
  • The first stage for computer security is password. If security of password is impotent even constructing of perfect fire-wall, fire-wall is not anything but a good-for-nothing. Because management of password is depend upon an end-user rather than a system-manager, carelessness of password management is an inevitable result. It is a reason that an end-user is actually not able to manage a high-difficulty-password. In this paper, algorithm of password is improved to be difficult of hacking, having a existing password input pattern for an end-user.

  • PDF

Security Model Improved by End-to-end Security in e-WAP (종단간 보안으로 개선한 e-WAP 에서의 보안모델)

  • Won, D.H.;Chu, S.W.;Oh, J.S.;Lee, J.Y.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1973-1976
    • /
    • 2003
  • 기존의 WAP 게이트웨이 모델에서의 게이트웨이는 많은 기능을 수행하였다. 이에 따른 게이트웨이 오버헤드가 증가하는 문제를 지니고 있기 때문에 이러한 문제를 해결하기 위해 상대적으로 수행 기능이 적고 각 content 제공자에 따라 나누어있는 Web 서버에 게이트웨이의 일부 기능을 이식하여 설계한 e-WAP 모델을 제시하였다. 하지만 e-WAP 의 보안 모델은 이전 WAP 게이트웨이 모델에서 사용되는 보안 방식을 사용하였기 때문에 종단간 보안 (end-to-end Securir)을 보장하지 못하는 기존 WAP의 보안 문제를 그대로 가지고 있다. 이에 본 논문은 기존의 SSL 과 WTLS 를 이용한 암호화 통신 프로토콜을 이용한 보안 모델에 서버와 무선 단말기 사이에 전송되는 데이터에 대해 암호화 한번 더 수행하여 종단간 보안을 보장하는 새로운 e-WAP 보안 모델을 제안하고자 한다.

  • PDF

Patient Classification Scheme for Patient Information Management in Hospital U-Healthcare System (병원 의료시설 내 U-Healthcare 환경에서 환자 정보 관리를 위한 환자 세분화 기법)

  • Lee, Ki-Jeong;Park, Sung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • UMSN (Ubiquitous Medical Sensor Network) is being used in u-Healthcare system of various medical facilities to identify objects and get information from sensors in real-time. RFID using radio frequency determines objects using Reader, which reads Tags attached to patients. However, there is a security vulnerability wherein Tag send its ID to illegal Reader because Tags always response to Readers request regarding of its Tag ID. In this paper, we propose Tag ID Classification Scheme to reduce Back-end Server traffic that caused by requests to authenticate between Readers and Tags that are attached to medical devices, patients, and sensors; To reduce security threats like eavesdropping and spoofing that sometimes occurred during authentication procedure. The proposed scheme specifies the patient category as a group based on patients Tag ID string. Only allowed Reader can perform authentication procedure with Back-end Server. As a result, we can reduce Back-end Server traffic and security threats.

End-to-end MQTT security protocol using elliptic curve cryptography algorithm (타원곡선암호 알고리즘을 이용한 종단간 MQTT 보안 프로토콜)

  • Min, Jung-Hwan;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.1-8
    • /
    • 2019
  • Internet of Things (IoT) is proliferating to provide more intelligent services by interconnecting various Internet devices, and TCP based MQTT is being used as a standard communication protocol of the IoT. Although it is recommended to use TLS/SSL security protocol for TCP with MQTT-based IoT devices, encryption and decryption performance degenerates when applied to low-specification / low-capacity IoT devices. In this paper, we propose an end-to-end message security protocol using elliptic curve cryptosystem, a lightweight encryption algorithm, which improves performance on both sides of the client and server, based on the simulation of TLS/SSL and the proposed protocol.

IBM DIGITAL LIBRARY

  • Kook, Hong-Jung
    • Proceedings of the Korea Database Society Conference
    • /
    • 1995.12a
    • /
    • pp.20-42
    • /
    • 1995
  • ■ IBM Digital Library is a major new IBM initiative ■ Customer solutions are available today ■ End-to-End solution focused on content asset management and creation, security, access and distribution.(omitted)

  • PDF

Fact and plan on specialist training for social security (사회안전관리에 대한 전문인력 양성실태와 발전방안)

  • Kong, Bae-Wan;Kim, Chang-Ho
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.5-18
    • /
    • 2002
  • The private security has been one of the fastest growing parts of the law enforcement industry, confronted with mutual coincidence or complementarity. Therefore, the primary factor in order to straighten it up should be bringing op a person, because he or she arranges the private security, based on the society in the end. In addition, it is suggested that further study of technical learning and its practice should be arranged. Because the education for agents undertaking the social security is comprehensive in space and limited in time, it may accompany hardship in arranging its content and curriculum Although this article leaves much to be desired, it has been analyzed end observed if a greater emphasis is placed on ample human resources supply for increased demand on social security in private law enforcement industry through institutional education system. A scientific advancement is expected to be attained in the majors related to the private security, with validity that the continuous studies should be implemented, and a social role of colleges as a specialized institute should be erected.

  • PDF

Comparing Zoom's Security Analysis and Security Update Results (줌의 보안 취약점 분석과 보안 업데이트 결과 비교)

  • Kim, Kyuhyeong;Choi, Younsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.55-65
    • /
    • 2020
  • As corona began to spread around the world, it had such a big impact on many people's lives that the word "Untact Culture" was born. Among them, non-face-to-face meetings naturally became a daily routine as educational institutions and many domestic and foreign companies used video conferencing service platforms. Among many video conferencing service platforms, Zoom, the company with the largest number of downloads, caused many security issues and caused many concerns about Zoom's security. In this paper, Zoom's security problems and vulnerabilities were classified into five categories, and Zoom's latest update to solve those problems and the 90-day security planning project were compared and analyzed. And the problem was solved and classified as unresolved. Three of the five parts have been resolved but are still described as how they should be resolved and improved in the future for the two remaining parts.

Tag Identification Time Reduction Scheme of Back-End Server for Secure RFID Privacy Protection Protocol (안전한 RFID 프라이버시 보호 프로토콜을 위한 백엔드 서버의 태그 판별 시간 절감 기법)

  • Yeo Sang-Soo;Kim Soon-Seok;Kim Sung-Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.13-26
    • /
    • 2006
  • RFID technology is evaluated as one of core technologies for ubiquitous environment, because of its various characteristics which barcode systems don't have. However, RFID systems have consumer's privacy infringement problems, such like information leakage and location tracing. We need RFID privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect consumer's privacy perfectly. The most secure protocol, that satisfies all of the three essential security requirements, among existing protocols, is the hash-chain based protocol that Ohkubo proposed. Unfortunately this protocol has a big disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the original scheme of Ohkubo protocol.