• Title/Summary/Keyword: Group Authentication

Search Result 206, Processing Time 0.021 seconds

A Provable Authenticated Certificateless Group Key Agreement with Constant Rounds

  • Teng, Jikai;Wu, Chuankun
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.104-110
    • /
    • 2012
  • Group key agreement protocols allow a group of users, communicating over a public network, to establish a shared secret key to achieve a cryptographic goal. Protocols based on certificateless public key cryptography (CL-PKC) are preferred since CL-PKC does not need certificates to guarantee the authenticity of public keys and does not suffer from key escrow of identity-based cryptography. Most previous certificateless group key agreement protocols deploy signature schemes to achieve authentication and do not have constant rounds. No security model has been presented for group key agreement protocols based on CL-PKC. This paper presents a security model for a certificateless group key agreement protocol and proposes a constant-round group key agreement protocol based on CL-PKC. The proposed protocol does not involve any signature scheme, which increases the efficiency of the protocol. It is formally proven that the proposed protocol provides strong AKE-security and tolerates up to $n$-2 malicious insiders for weak MA-security. The protocol also resists key control attack under a weak corruption model.

Design and Analysis of Fault-Tolerant Object Group Framework for Effective Object Management and Load Distribution (효율적 객체 관리 및 부하 분산을 위한 고장포용 객체그룹 프레임워크 설계)

  • Kang, Myung-Seok;Jung, Jae-Yun;Kim, Hag-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.22-30
    • /
    • 2007
  • In this paper, to achieve consistency maintenance as well as stable service execution, we build a Fault-Tolerant Object Group framework that provides both of the group management service and the load scheduling service. The group management service supports the object management such as registration and authentication, and provides two schemes for failure recovery using the service priority and the checkpointing. In the load scheduling servile, we improve the effectiveness of service execution through the reasoning process of object loads based on the ANFIS architecture. The effectiveness in the performance of the developed framework is validated through a virtual home-network simulation based on the FTOG framework.

A Study on Authentication and Management Scheme of RFID Tag for Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 태그의 인증과 관리에 관한 연구)

  • Seo Dae-Hee;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.81-94
    • /
    • 2006
  • This study, in particular, aims to regulate the core techniques of ubiquitous computing, such as the use of an ad hoc network and the smart-tag technique, and to look more closely into RFID Tag's smart-tag-related security service. The study aims to do so because several important technical factors and structures must be taken into account for RFID Tag to be applied in the ubiquitous-computing-related infrastructure, and the security of the tag is considered one of the core technologies. To realize secure ubiquitous computing in the case of the Passive-tag-Performing RF communication, a less costly security service, the technical items needed to carry this out, a security service to be applied to passive tags, and network management techniques are required. Therefore, the passive-tag-based networks as the authentication level is established based on the secure authentication of each tag and the service that the tag delivers in the passive-tag-based networks and as the same service and authentication levels are applied, and the active-tag-based network system proposed herein is not merely a security service against illegal RFID tags by performing a current-location and service registration process after the secure authentication process of the active RFID tag, but is also a secure protocol for single and group services, is proposed in this study.

A Certificateless-based One-Round Authenticated Group Key Agreement Protocol to Prevent Impersonation Attacks

  • Ren, Huimin;Kim, Suhyun;Seo, Daehee;Lee, Imyeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1687-1707
    • /
    • 2022
  • With the development of multiuser online meetings, more group-oriented technologies and applications for instance collaborative work are becoming increasingly important. Authenticated Group Key Agreement (AGKA) schemes provide a shared group key for users with after their identities are confirmed to guarantee the confidentiality and integrity of group communications. On the basis of the Public Key Cryptography (PKC) system used, AGKA can be classified as Public Key Infrastructure-based, Identity-based, and Certificateless. Because the latter type can solve the certificate management overhead and the key escrow problems of the first two types, Certificateless-AGKA (CL-AGKA) protocols have become a popular area of research. However, most CL-AGKA protocols are vulnerable to Public Key Replacement Attacks (PKRA) due to the lack of public key authentication. In the present work, we present a CL-AGKA scheme that can resist PKRA in order to solve impersonation attacks caused by those attacks. Beyond security, improving scheme efficiency is another direction for AGKA research. To reduce the communication and computation cost, we present a scheme with only one round of information interaction and construct a CL-AGKA scheme replacing the bilinear pairing with elliptic curve cryptography. Therefore, our scheme has good applicability to communication environments with limited bandwidth and computing capabilities.

On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks

  • Mohaisen, Abedelaziz;Choi, Jeong-Woon;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.4
    • /
    • pp.376-384
    • /
    • 2009
  • In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.

ISO/IEC JTC1 SC27 WG4 침해관리, 운영 및 대용 국제표준화 동향

  • Jeon, Sang-Hoon
    • Review of KIISC
    • /
    • v.20 no.6
    • /
    • pp.96-99
    • /
    • 2010
  • ISO/IEC JTC1 SC27는 IT 정보보호에 관한 국제표준 제정 활동을 하는 국제기구로서, 다섯 개의 WG(Working Group)으로 구성되어 있으며, 현재 WG4는 WG1의 정보보호관리체계(ISMS), WG5에서 다루어지고 있는 인증(Authentication), 프라이버시(Privacy) 등과 연계하여, 정보보호 관련 국제표준을 개발 및 제정하고 있다. 본 논문은 2010년 10월 4일부터 8일까지 베를린(Berlin)에서 개최한 회의에서 WG4에서 다루어지고 있는 네트워크 보안 국제표준기술 동향과 표준화에 대한 개요를 소개하고, ISO/IEC JTC1 SC27 WG4 Plenary에서 필자가 제안하여 SP(Study Period) 단계로 승인된 표준안건의 동향과 전망에 대해 소개하고자 한다.

Trends of MPEG-21 IPMP Standardization

  • Hwang, S.O.;Kim, J.H.;Yoon, K.S.;Kim, M.J.
    • Electronics and Telecommunications Trends
    • /
    • v.17 no.4 s.76
    • /
    • pp.51-64
    • /
    • 2002
  • Through the activities of MPEG (Moving Picture Experts Group), a number of issues have been identified within the scope of IPMP (Intellectual Property Management and Protection). This paper aims to address parts of them in the aspects of overall structure of MPEG-21 IPMP and to result in increasing the understanding of MPEG standardization works. In particular, this paper will address the major issues such as hooks, interoperability, and authentication architecture. Based on the architectures, this paper will explain how the MPEG-21 IPMP works with its components.

Authority Delegation Scheme for Secure Social Community Creation in Community-Based Ubiquitous Networks (커뮤니티 기반의 유비쿼터스 네트워크 환경에서 안전한 커뮤니티 생성 권한 위임 방안)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.1
    • /
    • pp.91-98
    • /
    • 2010
  • This paper proposes authority delegation for secure social community creation and mutual authentication scheme between the community members using proxy signature in community-based ubiquitous networks. In community-based ubiquitous network, User's context-awareness information is collected and used to provide context-awareness network service and application service for someone who need it. For the many reason, i.e. study, game, information sharing, business and conference, social community could be created by members of a social group. However, in community-based ubiquitous network, this kind of the context-awareness information could be abused and created by a malicious nodes for attack the community. Also, forgery community could be built up to attack the community members. The proposed scheme using the proxy signature provides a mutual authentication and secure secret key exchange between community members, and supports secure authority delegation that can creates social community. Also, when delegation of signing authority and mutual authentication, this scheme reduces total computation time compared to the RSA signature scheme.

Development of Protein Biomarkers for the Authentication of Organic Rice

  • Lee, Ju-Young;Lim, Jinkyu
    • Journal of Applied Biological Chemistry
    • /
    • v.58 no.4
    • /
    • pp.355-361
    • /
    • 2015
  • The rice protein profiles of Oryza sativa L (Koshihikari) grown under organic and conventional cultivation regimes were compared on 2-D gels to develop diagnostic marker proteins for organic rice. The selected proteins, differentially expressed between organic and conventional rice, were compared with the differentially expressed proteins of another organic and conventional rice pairing, produced at a different location. In the first comparison among conventional, no-chemical, and organic rice grown in the same region, Korea, 13 proteins exhibiting differential expression in organic and conventionally grown plants were selected. Eight of the 13 proteins were down-regulated, and the 5 remaining proteins were up-regulated from conventional to organic rice. The second comparison pairing from Kyungju, revealed 12 differentially expressed proteins, with 8 down-regulated and 4 up-regulated proteins. Ten of the differentially expressed proteins that overlapped between the two comparison sets could not be clustered into any functional group using a functional annotation clustering tool. Further comparisons using another set of conventional and organic rice, belonging to a different variety of Oryza sativa L and produced in Sanchung, revealed 8 differentially expressed proteins, 5 of which were down-regulated and 3 of which were upregulated in the organic rice. Overall, 3 differentially expressed proteins were commonly found in all three organic rice crops. These 3 proteins, along with other overlapping differentially expressed proteins, can provide a good starting point for the development of signature proteins that can be used for the authentication of organic rice with a follow-up studies with more comparison sets.

A study on vulnerabilities of serial based DNP in power control fields (전력 제어시스템의 시리얼 기반 DNP통신 취약점에 관한 연구)

  • Jang, Ji Woong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1143-1156
    • /
    • 2013
  • Power control system like SCADA(Supervisory Control And Data Acquisition) is gathering information using RS232C and low-speed analog communication network. In general, these methods are known as secure because of the secure characteristics from the analog based communication network and serial communication. In this study, first we build DNP communication environment using commercial power control simulator and find some vulnerabilities by testing from the viewpoint of confidentiality, integrity and availability. Consequently, we see the necessity of a valid method for authentication and data encryption when gathering information, even though that is known as secure so far. Discussion of needs of DNP authentication and data encryption is started about several years ago, but there is still nowhere applied that on real environment because the current methods can not fully meet the security requirements of the real environment. This paper suggests a solution to the vulnerabilities, and propose some considerations for enhancing power control system's security level by applying DNP authentication and data encryption.