• 제목/요약/키워드: Enhanced security

검색결과 578건 처리시간 0.026초

T-TIME: A Password Scheme Based on Touch Signal Generation Time Difference

  • Yang, Gi-Chul
    • 한국정보기술학회 영문논문지
    • /
    • 제8권2호
    • /
    • pp.41-46
    • /
    • 2018
  • As evidenced through rapidly growing digital devices and information, digital authentication is becoming ever more critical, especially considering the complex and prevalent digital accounts we are using every day. Also, digital authentication is apt to consistent digital security application. In this sense, digital security quality and usability can be enhanced by developing a mechanism for efficient digital authentication. In this paper, a mechanism of efficient digital authentication called T-TIME is introduced in order to alleviate issues dealing with secure and user friendly authentication across ever- growing digital devices and information. Touch Signal generation time difference is utilized for T-TIME as a mediation mechanism that enhances the security quality by confusing others unlike other graphical password mechanisms which are using spatial information. Hence, digital authentication by using T-TIME can be a good way of enhancing security quality and usability.

Improved Multi-layer Authentication Scheme by Merging One-time Password with Voice Biometric Factor

  • ALRUWAILI, Amal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.346-353
    • /
    • 2021
  • In this proposal, we aim to enhance the security of systems accounts by improving the authentication techniques. We mainly intend to enhance the accuracy of the one-time passwords via including voice biometric and recognition techniques. The recognition will be performed on the server to avoid redirecting voice signatures by hackers. Further, to enhance the privacy of data and to ensure that the active user is legitimate, we propose to periodically update the activated sessions using a user-selected biometric factor. Finally, we recommend adding a pre-transaction re-authentication which will guarantee enhanced security for sensitive operations. The main novelty of this proposal is the use of the voice factor in the verification of the one-time password and the various levels of authentications for a full-security guarantee. The improvement provided by this proposal is mainly designed for sensitive applications. From conducted simulations, findings prove the efficiency of the proposed scheme in reducing the probability of hacking users' sessions.

Toward a New Safer Cybersecurity Posture using RC6 & RSA as Hybrid Crypto-Algorithms with VC Cipher

  • Jenan.S, Alkhonaini;Shuruq.A, Alduraywish;Maria Altaib, Badawi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.164-168
    • /
    • 2023
  • As our community has become increasingly dependent on technology, security has become a bigger concern, which makes it more important and challenging than ever. security can be enhanced with encryption as described in this paper by combining RC6 symmetric cryptographic algorithms with RSA asymmetric algorithms, as well as the Vigenère cipher, to help manage weaknesses of RC6 algorithms by utilizing the speed, security, and effectiveness of asymmetric algorithms with the effectiveness of symmetric algorithm items as well as introducing classical algorithms, which add additional confusion to the decryption process. An analysis of the proposed encryption speed and throughput has been conducted in comparison to a variety of well-known algorithms to demonstrate the effectiveness of each algorithm.

An Enhanced Text Mining Approach using Ensemble Algorithm for Detecting Cyber Bullying

  • Z.Sunitha Bai;Sreelatha Malempati
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.1-6
    • /
    • 2023
  • Text mining (TM) is most widely used to process the various unstructured text documents and process the data present in the various domains. The other name for text mining is text classification. This domain is most popular in many domains such as movie reviews, product reviews on various E-commerce websites, sentiment analysis, topic modeling and cyber bullying on social media messages. Cyber-bullying is the type of abusing someone with the insulting language. Personal abusing, sexual harassment, other types of abusing come under cyber-bullying. Several existing systems are developed to detect the bullying words based on their situation in the social networking sites (SNS). SNS becomes platform for bully someone. In this paper, An Enhanced text mining approach is developed by using Ensemble Algorithm (ETMA) to solve several problems in traditional algorithms and improve the accuracy, processing time and quality of the result. ETMA is the algorithm used to analyze the bullying text within the social networking sites (SNS) such as facebook, twitter etc. The ETMA is applied on synthetic dataset collected from various data a source which consists of 5k messages belongs to bullying and non-bullying. The performance is analyzed by showing Precision, Recall, F1-Score and Accuracy.

민생침해범죄 예방을 위한 민간경비와 경찰의 상호협력방안 (Private and Public Securities' Mutual Cooperation Plans to Deal with Crimes Threatening the Livelihood of the People)

  • 홍은선;김태환
    • 한국재난정보학회 논문집
    • /
    • 제4권1호
    • /
    • pp.154-174
    • /
    • 2008
  • Korean public power isn't currently performing its duties of crime prevention or public security services as effectively as the people expect from it due to excessive work load, insufficient budget, and equipment or work force problems, although it should protect the people from increasing crimes. The mutual cooperation between the police and the private security firms can' t be enhanced unless both parties are involved. Above all, the private security companies should secure superior security personnel and provide them with systematic education and training to improve their qualities. The police should also make an effort. In order to foster the private security firms soundly, the police should improve the system if necessary, and establish, guide and monitor the department wholly responsible for the private security affair. Both parties also should deal with crimes systematically by exchanging information for crime prevention, having informal meetings and introducing a joint patrol system. In order to cope with crimes threatening the livelihood of the people in our society, the public and private securities' mutual cooperation plans should be formulated. For this purpose to be achieved, the private security firms and the police should understand each other and bilateral efforts should be made. If both parties understand each other and make an effort, the relationship between them will be improved greatly and developmental plans for preventing crimes can be made.

  • PDF

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권11호
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제1권1호
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

유럽연합과 미국의 개인정보 이전 협약 (프라이버시 쉴드)과 국내 정책 방향 (EU-US Privacy Shield Agreement and Domestic Policy Direction)

  • 윤재석
    • 정보보호학회논문지
    • /
    • 제26권5호
    • /
    • pp.1269-1277
    • /
    • 2016
  • 유럽연합은 미국과 개인정보 이전을 위해 맺은 세이프 하버를 유럽사법재판소의 결정에 따라 새로운 협약인 프라이버시 쉴드로 최근 대체하였다. 동(同) 협약은 보다 강화된 개인정보보호 준수 의무, 강력한 법집행, 명확한 보호 요건 및 투명성의 의무, 유럽연합 시민의 권리보호를 위한 효과적인 구제 수단 강구 등을 제시함으로써 이전보다 개선된 것으로 평가받고 있다. 본 논문에서는 유럽연합과 미국의 개인정보 이전을 위한 논의 경과와 현황을 살펴보고 국외이전 관련 제도 정비, 개인정보 국제 협력 활동과 관련한 국내 정책방향을 제시하였다.

NFC 기반 2 Factor 모바일 전자결제를 위한 갤러리-옥션의 사용자인증 모듈 개발 (User certification module development of Gallery-Auction for NFC-based 2 Factor mobile electronic payment)

  • 조원오;차윤석;오수희;최명수;김형종
    • 스마트미디어저널
    • /
    • 제6권3호
    • /
    • pp.29-40
    • /
    • 2017
  • 최근 NFC 기능이 탑재되어있는 스마트폰의 비중이 급속하게 많아지고 있으며, 이로 인해 NFC 관련 기술이 많은 기업들에 의해 만들어지고 있다. NFC기반 2 factor 전자결제시스템의 보안기능 향상과 새로운 서비스를 위해 갤러리-옥션을 개발하였다. XenServer를 이용해 효율적으로 서버를 관리 할 수 있도록 하였으며, 향상된 보안기능은 FIDO 인증기술을 적용하기 위해 지문인식을 통한 사용자 인증 모듈의 개발 및 TTS를 이용한 갤러리-옥션의 전자계약 음성서비스를 개발하였으며, 실제 적용을 통해 테스트 한 결과, NFC 모바일 전자결제를 통한 사용자의 편리하고 간단한 인증방식과 보안성을 강화하였다.

User-friendly Application for operability with HL7 in mobile agent of Ubiquitous Health Environment

  • 이정훈;곽동엽;문강남;토니 사하마;김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 추계학술대회
    • /
    • pp.866-870
    • /
    • 2009
  • Mobile Health (M-Health) system is a recent term for medical and public health practice supported by mobile devices, such as mobile phones, PDAs, and other wireless devices. Mobile Health system has been successfully establishing at few general hospital in Korea. However, to use diverse devices manufactured by various company cause inoperability, and lack of security disappoints customers often. Although the outstanding health environment, most of hospitals are unavailable to share electronic patient records due to lack of standard protocol to handle the interoperability each other. Health Level 7 (HL7) is the best solution for the problem. In this paper, we will analyse a current M-Health service in terms of security and mobile device, and suggest iPhone for the best device against hospital environment. Also, for keep confidentiality of health information and patient privacy, enhanced security mechanism is introduced. As a consequence, interoperable standard, and most appropriate device for supporting staffs and M-Health performance, and enhanced securirty mechanism will be integrated in order to propose improved M-health model.

  • PDF