• Title/Summary/Keyword: Handshake

Search Result 89, Processing Time 0.024 seconds

Host information gathering using the traffic analysis (트래픽 분석을 이용한 호스트 정보 수집)

  • Lee, Hyun-Shin;Lee, Sang-Woo;Kim, Myung-Sup
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1202-1205
    • /
    • 2009
  • 본 논문은 단말 호스트에서 발생한 트래픽 정보를 분석하여 단말 호스트의 다양한 정보를 수집하는 방법론에 대하여 기술한다. 본 논문에서는 첫째로 TCP 의 3-way handshake 중 SYN 패킷의 정보를 이용한 호스트의 운영체제를 예측하는 방법론과 해당 호스트에서 발생한 TCP 연결의 응답시간 분포를 분석하여 호스트의 네트워크 접근 밥법이 유 무선인지 분류하는 새로운 방법론을 제안한다. 분석이 완료된 호스트는 데이타베이스에 해당 호스트의 정보를 기록한다. 이는 웹을 통해 손쉽게 확인 가능하도록 하기 위함이다. 또한 하나의 호스트에서 유 무선 트래픽이 동시에 발생되었을 경우, 이에 대한 정보를 기반으로 유 무선 공유기 설치 유무를 판별할수 있도록 설계하였다.

An Authentication and Session Key Distribution Mechanism Secure Against DoS Attacks in the 802.11 WLAN (IEEE 802.11 무선랜 DoS 공격에 안전한 인증 및 세션키 분배 메커니즘)

  • Byung-Duk Woo;Chang-Seop Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1413-1416
    • /
    • 2008
  • 최근 들어 IEEE 802.11 WLAN 서비스에 대한 수요의 증가와 함께 WLAN 환경에서 실시간 멀티미디어 서비스를 이용하려는 사용자의 관심이 날로 증가하고 있다. 그러나 IEEE 802.11i 의 보안 정책은 MS 의 이동이 빈번하게 발생하는 WLAN 환경에서 끊김 없는 실시간 멀티미디어 서비스를 제공하기에는 핸드오프 지연 시간이 너무 길다. 본 논문은 DoS 공격에 취약한 기존 802.11i 에서의 4-way Handshake 를 대체하는 신속하고 효율적인 인증 및 세션키 분배 메커니즘을 제안한다.

Game-Theoretic Optimization of Common Control Channel Establishment for Spectrum Efficiency in Cognitive Small Cell Network

  • Jiao Yan
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.1-11
    • /
    • 2024
  • Cognitive small cell networks, consisting of macro-cells and small cells, are foreseen as a promising candidate solution to address 5G spectrum scarcity. Recently, many technological issues (such as spectrum sensing, spectrum sharing) related to cognitive small cell networks have been studied, but the common control channel (CCC) establishment problem has been ignored. CCC is an indispensable medium for control message exchange that could have a huge significant on transmitter-receiver handshake, channel access negotiation, topology change, and routing information updates, etc. Therefore, establishing CCC in cognitive small cell networks is a challenging problem. In this paper, we propose a potential game theory-based approach for CCC establishment in cognitive radio networks. We design a utility function and demonstrate that it is an exact potential game with a pure Nash equilibrium. To maintain the common control channel list (CCL), we develop a CCC update algorithm. The simulation results demonstrate that the proposed approach has good convergence. On the other hand, it exhibits good delay and overhead of all networks.

A data security transmission system and method based on key exchange encryption protocol (키 교환 암호 프로토콜 기반 데이터 보안 전송 시스템 및 방법)

  • Jaekyung Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.423-424
    • /
    • 2024
  • 본 논문은 TCP/IP 네트워크 및 암호 프로토콜을 결합하여 CCTV 카메라 영상 데이터를 안전하게 전송하는 시스템에 관한 것이다. 특히, TCP Handshake에서 암호 키를 교환하고, 디바이스의 시그니처 정보를 활용하여 키를 생성하는 키 교환 암호 프로토콜을 도입한다. 이를 통해 CCTV 카메라의 영상 데이터를 암호화하여 전송하고, 수신 시 복호화하여 저장한다. 또한, 적어도 하나 이상의 CCTV 카메라에 대한 보안 인증과 네트워크 연결 상태를 제어하며, 중간자 공격을 방지하기 위한 안전한 키 교환을 수행한다. 이로써 안전성이 강화된 CCTV 카메라 시스템을 제공할 수 있다.

  • PDF

A DATA SYSTEM AND ENCRYPTION METHOD BASED ON KEY EXCHANGE CRYPTOGRAPHIC PROTOCOL USING ENHANCED SECURITY FUNCTION IN NETWORK LAYER (네트워크 계층에 강화된 보안 기능을 활용한 키 교환 암호 프로토콜 기반 데이터 시스템 및 암호화 방법)

  • Jaekyung-Park
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.425-426
    • /
    • 2024
  • 본 논문은 표준 TCP/IP 네트워크의 특징 및 암호 프로토콜의 특징을 결합하여 TCP Handshake 단계에서 암호 키 교환을 수행하고, 디바이스의 고유한 시그니처 정보를 사용하여, 암호 키 생성 데이터로 사용하여, 보안성을 강화하는 것을 특징 으로 하는 네트워크 계층에 강화된 보안 기능을 활용한 키 교환 암호 프로토콜 기반 데이터 시스템 및 암호화 방법에 관한 것으로 개발된 프로토콜을 키 교환 프로토콜로 대체할 경우보다 안전한 보안 프로토콜을 제공할 수 있다.

  • PDF

SLEDS:A System-Level Event-Driven Simulator for Asynchronous Microprocessors (SLEDS:비동기 마이크로프로세서를 위한 상위 수준 사건구동식 시뮬레이터)

  • Choi, Sang-Ik;Lee, Jeong-Gun;Kim, Eui-Seok;Lee, Dong-Ik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.1
    • /
    • pp.42-56
    • /
    • 2002
  • It is possible but not efficient to model and simulate asynchronous microprocessors with the existing HDLs(HARDware Description Languages) such as VHDL or Verilog. The reason it that the description becomes too complex. and also the simulation time becomes too long to explore the design space. Therefore it is necessary to establish a methodology and develop a tool for modeling the handshake protocol of asynchronous microprocessors very easily and simulating it very fast. Under this objective an efficient CAD(Computer Aided Design) tool SLEDS(System Level Event-Driven Simulator) was developed which can evaluate performance of a processor through modeling with a simple description an simulating with event driven engine in the system level. The ultimate goal in the tool SLEDS is to fin the optimal conditions for a system to produce high performance by balancing the delay of each module in the system. Besides SLEDS aims at verifying the design through comparing the expected results with the actual ones by performing the defined behavior.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

WPKI Certificate Verification Using Observer (옵저버를 이용한 WPKI 인증서 검증방법)

  • 김진철;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1203-1209
    • /
    • 2004
  • A huge growth the wireless internet services, which are based on the wireless mobile network technology and internet technology, poses demand for the end-to-end secure connections. Restrictions of wireless mobile environment and mobile devices make difficult to adapt present secure protocols to wireless internet services. In this paper, we analyze existing certificate status verification methods in WPKI and propose a new method, adding a observer information in handshake protocol. The method with observer makes it more efficient for relying parties to verify both the current status of the X.509 certificate and the short-lived WTLS server certificate.

A RTSD Mechanism for Detection of DoS Attack on TCP Network (TCP 네트워크에서 서비스거부공격의 탐지를 위한 RTSD 메커니즘)

  • 이세열;김용수
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.05a
    • /
    • pp.252-255
    • /
    • 2002
  • As more critical services are provided in the internet, the risk to these services from malicious users increases. Several networks have experienced problems like Denial of Service(DoS) attacks recently. We analyse a network-based denial of service attack, which is called SYM flooding, to TCP-based networks. It occurs by an attacker who sends TCP connection requests with spoofed source address to a target system. Each request causes the targeted system to send instantly data packets out of a limited pool of resources. Then the target system's resources are exhausted and incoming TCP port connections can not be established. The paper is concerned with a detailed analysis of TCP SYN flooding denial of service attack. In this paper, we propose a Real Time Scan Detector(RTSD) mechanism and evaluate it\`s Performance.

  • PDF

An Empirical Study on e-Logistics of Port & Logistics industry (항만물류산업의 e-Logistics 실증연구)

  • 조소희;허윤수;남기찬
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.365-370
    • /
    • 2004
  • At the present, e-commerce takes the place of existing transaction form in structure in the world trade by advancement of Information Technology and diffusion of Internet. There is no exceptions of this tendency even in industry of maritime and logistics. So, global shipping lines and logistics companies try to construct the e-Business network system for increasing their competitiveness in an are of cyber. However, in Korea, most of companies prefer "final handshake" as the traditional way of transaction to "e-commerce", because they bear a distrust in mind about the outflow of transaction information and security of settlement. So, number of companies using e-commerce is very small, and this situation causes the limited factor for activating the transaction structure of it. The rate of using e-commerce in logistics industry is lower than other industries, even more higher effectiveness is expected when they use it. Especially, it is very necessary not only e-commerce but also e-Logistics which can serve information of freight cost on cargo flow, operation cost and schedule, and tracing information of cargo. Increasing the necessity of e-Logistics, this study research the rate rf using e-Logistics focused on maritime and logistics companies, and analyze the transaction form among members of these industries for improving them. In detail, this paper examine the drivers for activating e-Logistics, and present the effective factors for a successful development of these industries.

  • PDF