• Title/Summary/Keyword: ID method

Search Result 697, Processing Time 0.048 seconds

Physical Layer Security Method with CAN Bus Node ID Auto-Setting (CAN 버스에서 노드 ID 자동 설정을 통한 물리 계층 보안 기법)

  • Kang, Tae-Wook;Lee, Jong-Bae;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.665-668
    • /
    • 2020
  • When a node in automotive CAN bus is hacked, such node should be blocked to prevent severe danger in the car. In order to do that, such node should be uniquely identified. However, there is no way to identify individual nodes in a CAN bus. In this paper, a physical layer security method is proposed where individual nodes are identified by assigning unique ID to the nodes during booting process. The proposed method was implemented in a CAN controller using Verilog HDL, and it is verified that the node ID auto-setting and internal attack defense are successfully performed.

A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments (모바일 환경으로 확장 가능한 federated ID 연동 방안에 관한 연구)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.27-35
    • /
    • 2005
  • While the current world wide network offers an incredibly rich base of information, it causes network management problem because users should have many independent IDs and passwords for accessing different sewers located in many places. In order to solve this problem users have employed single circle of trust(COT) ID management system, but it is still not sufficient for clearing the problem because the coming ubiquitous network computing environment will be integrated and complex networks combined with wired and wireless network devices. The purpose of this paper is to describe the employment and evaluation of federated ID interoperability method for solving the problem. The use of the proposed model can be a solution for solving network management problem in the age of mobile computing environment as well as wired network computing environment.

ID-Based Cryptosystem and Digital Signature Scheme Using Discrete Logarithm Complexity (이산대수 문제를 이용한 ID 기본 암호시스템과 디지틀 서명방식에 관한 연구)

  • 염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.3-15
    • /
    • 1991
  • in 1984 Shamir proposed the concept of ID(identity)-based cryptosystem and digital signature scheme wich does not require any public file for storing the user' s public keys. In this paper, the concept of the ID-based cryptosystem based on discrete logarithm problem using the conven-tional public-key cryptosystems is described, and the implementation method of the ID-based cryptosystem is also presented. The new digital signaturw schme based on the ID-based crypto-system is proposed and possible atacks are considered and analyzed for the security of digital signature scheme. The proposed ID-based schemes are particularrly useful for smart card and personal identification card application.

A Design of OpenID System Using ID Management Method User-Centric (사용자 중심 ID 관리 기법을 이용한 OpenID 시스템의 설계)

  • Jeong, Eui-Kyeong;Yun, Cheol-Yong;Kim, Hyun-Chul;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1373-1376
    • /
    • 2009
  • 인터넷의 확산과 웹 2.0 서비스의 등장은 기존 서비스 제공자 중심의 ID 관리를 사용자 중심의 ID 관리 형태로 변화시키는 계기가 되었다. 그러나 기존 사용자 중심 ID 관리 기법은 사용자 인증 및 정보 관리에 대한 문제가 존재한다. 본 논문에서는 서비스 제공자가 필요로 하는 정보만을 사용자가 선별적으로 선택하여 제공함으로서 기존 ID 관리 기법의 문제를 해결할 수 있는 사용자 중심의 ID 관리 기법을 이용한 OpenID 시스템을 제안한다. 또한, 실험 및 비교분석을 통하여 보안성 및 효율성 측면에서 우수함을 확인 할 수 있었다.

SAW ID Tag and Receiver System for Passive RFID System Application (수동형 RFID 시스템 적용을 위한 SAW ID 태그 및 수신 시스템 구현)

  • Kim, Jae-Kwon;Park, Joo-Yong;Burm, Jin-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.4
    • /
    • pp.64-71
    • /
    • 2008
  • SAW (Surface Acoustic Waves) ID (identification) tags have been designed and implemented for RFID (Radio frequency IDentification) systems. With SAW ID tag of pulse position encoding method, the data capacity increased 3 times compared with SAW ID tag of amplitude on/off method. Two different kinds of SAW ID tag receiver systems, heterodyne and homodyne receiver systems, were made. The direct conversion receiver showed better isolation property, 10 dB improvement than the heterodyne receiver to increase wireless interrogation distance.

A design and implementation of a priority and context-aware event ID for U-City integrated urban management platform in U-City (U-City 도시통합관제플랫폼의 상황 이벤트 ID, 우선순위 기능 설계 및 구현)

  • Song, Kyu-Seog;Ryou, Jae-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.901-907
    • /
    • 2010
  • This paper proposes a standard method for linking data between the U-City Integrated Urban Management Platform and u-service systems through systemization of event identification and standardization of event priority. By applying the proposed method, the incoming events to the Management Platform are listed and processed according to their priority of urgency. The application of the systemized event ID and standardized event priority enables prompt counter-measures against urban emergencies and disasters, which improves the efficiency of business processes by reducing the time and cost to complete required actions.

ID-based Sensor Node Authentication for Multi-Layer Sensor Networks

  • Sung, Soonhwa;Ryou, Jaecheol
    • Journal of Communications and Networks
    • /
    • v.16 no.4
    • /
    • pp.363-370
    • /
    • 2014
  • Despite several years of intense research, the security and cryptography in wireless sensor networks still have a number of ongoing problems. This paper describes how identification (ID)-based node authentication can be used to solve the key agreement problem in a three-layer interaction. The scheme uses a novel security mechanism that considers the characteristics, architecture, and vulnerability of the sensors, and provides an ID-based node authentication that does not require expensive certificates. The scheme describes the routing process using a simple ID suitable for low power and ID exposure, and proposes an ID-based node authentication. This method achieves low-cost communications with an efficient protocol. Results from this study demonstrates that it improves routing performance under different node densities, and reduces the computational cost of key encryption and decryption.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

Replay Attack based Neutralization Method for DJI UAV Detection/Identification Systems (DJI UAV 탐지·식별 시스템 대상 재전송 공격 기반 무력화 방식)

  • Seungoh Seo;Yonggu Lee;Sehoon Lee;Seongyeol Oh;Junyoung Son
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.4
    • /
    • pp.133-143
    • /
    • 2023
  • As drones (also known as UAV) become popular with advanced information and communication technology (ICT), they have been utilized for various fields (agriculture, architecture, and so on). However, malicious attackers with advanced drones may pose a threat to critical national infrastructures. Thus, anti-drone systems have been developed to respond to drone threats. In particular, remote identification data (R-ID)-based UAV detection and identification systems that detect and identify illegal drones with R-ID broadcasted by drones have been developed, and are widely employed worldwide. However, this R-ID-based UAV detection/identification system is vulnerable to security due to wireless broadcast characteristics. In this paper, we analyze the security vulnerabilities of DJI Aeroscope, a representative example of the R-ID-based UAV detection and identification system, and propose a replay-attack-based neutralization method using the analyzed vulnerabilities. To validate the proposed method, it is implemented as a software program, and verified against four types of attacks in real test environments. The results demonstrate that the proposed neutralization method is an effective neutralization method for R-ID-based UAV detection and identification systems.

A Study of applying Method of Unipolar-ZCD Spreading Code for LED-ID in Interference Environment (LED-ID용 간섭채널환경하에서의 단극형 ZCD확산코드 적용 기법에 관한 연구)

  • Cha, Jae-Sang;Kim, Jin-Young;Jang, Yeong-Min;Kim, Jong-Tae;Lee, Kyong-Gun;Moon, Kyung-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.275-280
    • /
    • 2010
  • Recently, This paper suggests that LED-ID technique applying positioning method for LED light. also, Authors in this paper has launched this investigation earnestly. However, there are various interferences such as MPI(Multi Path Interference) by reflected waves of the surface and interfere factors by their correlation properties of the ID in LED-ID wireless channel. Therefore, in this paper, we propose a novel OOK(On-Off Keying)-CDMA(Code Division Multiple Access) system using unipolar ZCD(Zero Correlation Duration) spreading code and verify the availability of the proposed system via the evaluation performance simulation.