• Title/Summary/Keyword: Enhanced System Security

Search Result 250, Processing Time 0.03 seconds

Nano Convergence Systems for Smart Living

  • Yeo, Jong-Souk
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2015.08a
    • /
    • pp.55-55
    • /
    • 2015
  • Today, engineers are facing new set of challenges that are quite different from the conventional ones. Information technologies are rapidly commoditizing while the paths beyond the current roadmaps became uncertain as various technologies have been pushed to their limits. Along with these changes in IT ecosystems, grand challenges such as global security, health, sustainability, and energy increasingly require trans-disciplinary solutions that go beyond the traditional arenas in STEM (Science, Technology, Engineering and Mathematics). Addressing these needs is shifting engineering education and research to a new paradigm where the emphasis is placed on the consilience for holistic and system level understanding and the convergence of technology with AHSD (arts, humanities, social science, and design). At the center of this evolutionary convergence, nanotechnologies are enabling novel functionalities such as bio-compatibility, flexibility, low power, and sustainability while on a mission to meet scalability and low cost for smart electronics, u-health, sensing networks, and self-sustainable energy systems. This talk introduces the efforts of convergence based on the emerging nano technology tool sets in the newly launched School of Integrated Technology and the Yonsei Institute of Convergence Technology at Yonsei International Campus. While the conventional devices have largely depended upon the inherent material properties, the newer devices are enabled by nanoscale dimensions and structures in increasingly standardized and scalable fabrication platform. Localized surface plasmon resonance in 0 dimensional nano particles and structures leads to subwavelength confinement and enhanced near-field interactions enabling novel field of metal photonics for sensing and integrated photonic applications [1,2]. Unique properties offered by 1 dimensional nanowires and 2 dimensional materials and structures can enable novel electronic, photonic, nano-bio, and biomimetic applications [3-5]. These novel functionalities offered by the emerging nanotechnologies are continuously finding pathways to be part of smart systems to improve the overall quality of life.

  • PDF

Sender Authentication Mechanism based on DomainKey with SMS for Spam Mail Sending Protection (대량 스팸메일 발송 방지를 위한 SMS 기반 DomainKey 방식의 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.20-29
    • /
    • 2007
  • Although E-mail system is considered as a most important communication media, 'Spam' is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal services. Therefore advanced anti-spam techniques are required to basically reduce its transmission volume on sender mail server or MTA, etc. In this study, we propose a new sender authentication model with encryption function based on modified DomainKey with SMS for Spam mail protection. From the SMS message, we can get secret information used for verification of its real sender on e-mail message. And by distributing this secret information with SMS like out-of-band channel, we can also combine proposed modules with existing PGP scheme for secure e-mail generation and authentication steps. Proposed scheme provide enhanced authentication function and security on Spam mail protection function because it is a 'dual mode' authentication mechanism.

A Design of GPS based Personal Location Self-Control Software on Android Platform (안드로이드 기반 GPS 개인위치정보 자기제어 구조 설계)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.23-29
    • /
    • 2010
  • The various kinds of application is distributed for the Smart phone user recently. There is the advantage that the open source application on Android operating system based Smart phone supports a multi tasking service. Layar, Wikitude, and Sherpa and the other applications using the GPS location information like an a2b etc. were developed in the Smart phone environment. However, the existing Cell-ID based location information can be directly collected by the mobile ISP unit which the mobile carrier installs, the personal privacy problem occurs. Therefore, the personal location information is possible to be exposed publicly without any access control procedure. Therefore, in this research, the self-control mechanism on the GPS location information at the Smart phone is designed and presented. Through this, it is possible to develop diverse applications providing enhanced access control and GPS location management on the Android based Smart Phone.

Application to 2-D Page-oriented Data Optical Cryptography Based on CFB Mode (CFB 모드에 기반한 2 차원 페이지 데이터의 광학적 암호화 응용)

  • Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.424-430
    • /
    • 2015
  • This paper proposes an optical cryptography application to 2-D page-oriented data based on CFB(Cipher Feedback) mode algorithm. The proposed method uses a free-space optical interconnected dual-encoding technique which performs XOR logic operations in order to implement 2-D page-oriented data encryption. The proposed method provides more enhanced cryptosystem with greater security strength than the conventional CFB block mode with 1-D encryption key due to the huge encryption key with 2-D arrayed page type. To verify the proposed method, encryption and decryption of 2-D page data and error analysis are carried out by computer simulations. The results show that the proposed CFB optical encryption system makes it possible to implement stronger cryptosystem with massive data processing and long encryption key compared to 1-D block method.

Secure and Efficient Access Control Protocol in Digital Broadcasting System (디지털 방송에서 안전하고 효율적인 접근 제어 프로토콜)

  • Lee, Ji-Seon;Kim, Hyo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.32-43
    • /
    • 2010
  • IPTV is an emerging technology that combines both broadcasting and tele-communication technologies, and provides various multi-media contents to the service subscribers. In general, IPTV broadcasters transmit scrambled signals (multi-media contents) to the paying subscribers, and the users within the acknowledged network descramble the signals using the smart-card. That is, users are verified through communication between STB (Set-Top Box) and smart-card. In 2004, Jiang et al. proposed a secure protocol regarding the verification process. The method has been modified and enhanced by several following research works. However, all the methods that have been proposed so far required modular exponentiation operations which may raise the smart-card costs. In this paper, we propose a new efficient mutual authentication and session-key establishment protocol using only hash functions and exclusive-or operations, and show that the proposed protocol is still secure under various security attacks.

Two layered Secure Password Generation with Random Number Generator (난수 발생기를 이용한 이중화 구조의 안전한 비밀번호 생성 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.867-875
    • /
    • 2014
  • Rapid development of internet service is enabling internet banking services in anywhere and anytime. However, service access through internet can be exposed to adversary easily. To prevent, current service providers execute authentication process with user's identification and password. However, majority of users use short and simple password and do not periodically change their password. As a result of this, user's password could be exposed to attacker's brute force attack. In this paper, we presented enhanced password system which guarantee higher security even though users do not change their current password. The method uses additional secret information to replace real password periodically without replacement of real password.

Stateful Virtual Proxy Server for Attack Detection based on SIP Protocol State Monitoring Mechanism (SIP 프로토콜 상태정보 기반 공격 탐지 기능을 제공하는 가상 프록시 서버 설계 및 구현)

  • Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.37-48
    • /
    • 2008
  • VoIP service is a transmission of voice data using SIP protocol on IP based network, The SIP protocol has many advantages such as providing IP based voice communication and multimedia service with cheap communication cost and so on. Therefore the SIP protocol spread out very quickly. But, SIP protocol exposes new forms of vulnerabilities on malicious attacks such as Message Flooding attack and protocol parsing attack. And it also suffers threats from many existing vulnerabilities like on IP based protocol. In this paper, we propose a new Virtual Proxy Server system in front of the existed Proxy Server for anomaly detection of SIP attack and stateful management of SIP session with enhanced security. Based on stateful virtual proxy server, out solution shows promising SIP Message Flooding attack verification and detection performance with minimized latency on SIP packet transmission.

  • PDF

Korea National Health Insurance Service Financial Status and Prospect (건강보험 재정 현황과 전망)

  • Joo, Jae Hong;Jang, Sung-In;Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.30 no.2
    • /
    • pp.192-198
    • /
    • 2020
  • Background: Korea National Health Insurance Service (NHIS) is operated as a social insurance system in which people pay a portion of their monthly income as insurance premiums and receive benefits when they experience illness or injury. Since 2005, the national health insurance remained surplus accumulating cumulative reserves each year. However, as of 2018, NHIS revenue recorded 62.11 trillion won and spending of 62.29 trillion won. The deterioration of NHIS finances is expected to accelerate with the aging population, income growth, new medical technology development, and enhanced security policies. Methods: To examine the financial health and sustainability of NHIS, we estimated the future revenue and spending until 2030 using the data from Korea Health Insurance Review and Assessment Service statistical yearbook. 2004-2018 average percentage change in NHIS revenue and spending was calculated. We estimated the future NHIS financial status using two methods. In the first method, we calculated the revenue and spending of the future NHIS by applying the 2004-2018 average percentage change to the subsequent years consecutively. In the second method, we estimated the future NHIS financial status after adjusting for the predicted demographic changes such as the aging population and declining birth rate in South Korea. Results: The estimates from this study suggest that the NHIS's cumulative reserves will run out by 2024. Conclusion: In terms of spending on current health insurance, there should be a search for ways of more efficient spending and funding options.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

A Study on Advanced RF4CE Key Agreement for Device Convergence Security (디바이스 융합 보안을 위한 향상된 RF4CE 키 교환 기법에 관한 연구)

  • Shon, Tae-Shik;Koo, Bon-Hyun;Han, Kyu-Suk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.970-976
    • /
    • 2010
  • Platform convergence originated from the convergence of broadcast and telecommunication is making rapid progress including IT and not-IT fields in order to provide a variety of converged services, S/W eco-system construction, and so on. With the advent of convergence environment, IEEE 802.15.4-based RF4CE technology is rising because of creating momentum for the market using converged connectivity between home and office devices as well as all around located devices. In this paper, we present enhanced RF4CE key seed distribution approach in order to provide efficient connection and control between devices. The proposed approach consists of device mutual authentication, initial vector assignment, and two-phase key seed distribution. Moreover, we make a development real RF4CE test board and its key agreement simulator to verify the proposed approach.