• Title/Summary/Keyword: Information and Communications security

Search Result 1,069, Processing Time 0.029 seconds

Data Transmission Algorithm for LED Communication Systems (LED 통신 시스템의 데이터 전송 알고리즘)

  • Kim, Kyung Ho;Hwang, Yu Min;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.44-49
    • /
    • 2013
  • LED communication is a wireless communication technology to transmit information using visible light coming out from the LED(Light Emitting Diode). It is a technique that can overcome RF(Radio Frequency) communication problems that are frequency allocations, human body hazards, security vulnerabilities, and interference between electronic devices. As a technique that can be used as lighting and communications with using LED, LED communication is suitable for ubiquitous environment. This paper introduces the process of data transmission algorithm for LED communication systems algorithm using LED, PD(Photodiode), and MCU(Micro Controller Unit).

Analysis of Authentication Architecture in Integrated WLAN/3G Networks (통합된 WLAN/3G 네트워크의 증명 방법의 분석)

  • Shrestha, Anish Prasad;Lee, Sang-Duk;Cho, Byung-Lok;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1016-1021
    • /
    • 2008
  • A number of wireless technologies have been implemented, but each technology has its limitation in terms of coverage and bandwidth. WLAN and 3G cellular network has emerged to be a complementary platform for wireless data communications. However, the mobility of roaming terminals in heterogeneous networks poses several risks. To maintain secure communications in universal roaming, the effective authentication must be implemented. The focus of this paper is on analysis of authentication architecture involved in integrated WLAN/3G networks.

Mobile Apps Development Methodology in Considering the Functionality and Security (기능성과 보안성을 고려한 모바일 앱 개발 방법론 제시)

  • Song, Tae-Han;Oh, Joon-Seok;Choi, Jin-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.272-275
    • /
    • 2010
  • 스마트폰의 확산이 증대되고 있으며, 누구든지 모바일 앱을 개발할 수 있는 환경이 제공되고 있다. 모바일 앱을 개발하는 개인 개발자들은 접근성과 이해성이 좋고, 보안성이 고려된 표준 가이드를 적용하여 앱을 개발해야 한다. 이는 오류 발생률 감소 및 코드 수정에 소비되는 시간이 절약될 수 있는 모바일 앱을 개발하는데 도움이 된다. 하지만 개인개발자들을 위한 적절한 가이드가 존재하지 않는 실정이다. 본 논문에서는 개인 개발자들이 쉽게 접근 할 수 있으면서 보안성이 고려된 표준 가이드를 제시하기 위한 개발 방법론을 제시한다.

Implementation of abnormal behavior detection system based packet analysis for industrial control system security (산업 제어 시스템 보안을 위한 패킷 분석 기반 비정상행위 탐지 시스템 구현)

  • Kim, Hyun-Seok;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.47-56
    • /
    • 2018
  • National-scale industrial control systems for gas, electric power, water processing, nuclear power, and traffic control systems increasingly use open networks and open standards protocols based on advanced information and communications technologies. The frequency of cyberattacks increases steadily because of the use of open networks and open standards protocols, but follow-up actions are limited. Therefore, the application of security solutions to an industrial control system is very important. However, it is not possible to apply security solutions to a real system because of the characteristics of industrial control systems. And a security system that can detect attacks without affecting the existing system is imperative. Therefore, in this paper, we propose an intrusion detection system based on packet analysis that can detect anomalous behaviors without affecting the industrial control system, and we verify the effectiveness of the proposed intrusion detection system by applying it in a test bed simulating a real environment.

A Study on the NCS based Curriculum for Educating Information Security Manpower (정보보호 산업분야 신규 인력 양성을 위한 NCS 기반 교육과정 설계에 관한 연구)

  • Song, Jeong-Ho;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.537-544
    • /
    • 2016
  • National Competency Standards (NCS) need to be introduced to train newly hired staff and to gradually improve employees' work performance in the information security industry. In particular, the introduction of a new NCS curriculum for new hires is important in order to retain and efficiently manage professionals in the information security field. However, the legacy NCS is not clearly designed for the information security field. So a formal curriculum has been suggested for institutions training the information security workforce. Therefore, this study establishes a competency unit based on the types of personnel, their duties, and required knowledge. To select the competency unit, this study reviewed prior research to understand the required skills and work knowledge, and reviewed recruitment-based NCS that public agencies and public and private companies have carried out, including them in the study. The selected competency unit was classified into a required competency unit and an elective competency unit based on the importance of the duties and the demands of training. Through a verification process for the new, licensed career path model in the NCS information and communications field, this study suggests updated NCS competency units and required courses to provide an appropriate NCS curriculum for newly hired employees in the information security industry.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

A New Physical Layer Transmission Scheme for LPI and High Throughput in the Cooperative SC-FDMA System

  • Li, Yingshan;Wu, Chao;Sun, Dongyan;Xia, Junli;Ryu, Heung-Gyoon
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.457-463
    • /
    • 2013
  • In recent days, cooperative diversity and communication security become important research issues for wireless communications. In this paper, to achieve low probability of interception (LPI) and high throughput in the cooperative single-carrier frequency division multiple access (SC-FDMA) system, a new physical layer transmission scheme is proposed, where a new encryption algorithm is applied and adaptive modulation is further considered based on channel state information (CSI). By doing so, neither relay node nor eavesdropper can intercept the information signals transmitted from user terminal (UT). Simulation results show above new physical layer transmission scheme brings in high transmission safety and secrecy rate. Furthermore, by applying adaptive modulation and coding (AMC) technique according to CSI, transmission throughput can be increased significantly. Additionally, low peak-to-average power ratio (PAPR) characteristic can still be remained due to the uniform distribution of random coefficients used for encryption algorithm.

Biometrics System for User Authentication in e-biz (전자상거래에서 사용자 인증을 위한 생체측정 시스템)

  • 조동욱;이내준;한길성
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1329-1338
    • /
    • 2001
  • This paper describes the biometrics system for user authentication in electronic commerce. At present, social demands are increasing for information security techniques against the information wiretapping in open communications network. For this, these techniques such as anti-virus, firewall, VPN, authentication, cryptography, public key based systems and security management systems have been developed. This Paper discusses the user authentication for the implementation of efficient electronic payment systems. In particular. user authentication system has keen developed using biometrics techniques and the effectiveness of this paper is demonstrated by several experiments.

  • PDF

Policy기반 QoS+Security 지원 메커니즘

  • 정일영;백승호;장종수
    • Information and Communications Magazine
    • /
    • v.20 no.8
    • /
    • pp.51-62
    • /
    • 2003
  • 네트워크 환경이 복잡해지고 제공되는 서비스 및 사용자의 요구들이 다양해짐에 따라 안정적이고 효율적인 환경을 유지하기 위한 운용관리는 점점 더 어려워지고 있다. 이와 관련하여 각 서비스 정보의 보안에 대한 필요성 및 중요성이 크게 논의되고 있다. 그러나 현재의 인터넷 구조에서 네트워킹의 보안과 QoS를 동시에 만족할 수 있는 방안은 거의 불가능한 상황이다. 즉, 현재의 정보통신 환경에서 보안 기능과 함께 차별화된 서비스의 제공이 절대적으로 필요하지만 이의 효과적인 제공 방안은 현실적으로 없다는 점이 본 논문과 관련된 연구의 주된 동기가 된다. 즉, 특별히 보안성이 요구되는 정보들 중에는 상당히 많은 부분이 서비스 QoS도 역시 요구하고 있다는 점이 정보 서비스에서 보안과 QoS를 분리하여 단순히 처리하는 것이 부적절하다는 점이다. 따라서 본 논문은 보안 기능과 QoS를 이용자 및 서비스의 요구에 따라 효율적으로 제공할수 있는 환경의 구축 및 요구되는 주요 메커니즘을 제안하고자 한다. 그리고 Policy 기반의 Security+QoS 기능을 제공하는 통합 메커니즘에 대한 연구 결과를 소개한다.

Efficient Password-based Key Exchange Protocol for Two users Registered in a Server (동일 서버를 사용하는 두 사용자간 효율적인 패스워드 기반의 키 교환 프로토콜)

  • Shin Seong-chul;Lee Sung-woon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.127-133
    • /
    • 2005
  • This paper presents a password-based key exchange protocol to guarantee secure communications for two users registered in a sever. In this protocol, the server is only responsible for the legality of the users but does not how the session key agreed between them. The protocol can resist the various attacks including server compromise attack and provide the perfect forward secrecy. The proposed protocol is efficient in terms of computation cost because of not employing the sewer's public key.