• Title/Summary/Keyword: Information and Communications security

Search Result 1,069, Processing Time 0.028 seconds

Design and Implementation of an Efficient Fair Off-line E-Cash System based on Elliptic Curve Discrete Logarithm Problem

  • Lee, Manho;Gookwhan Ahn;Kim, Jinho;Park, Jaegwan;Lee, Byoungcheon;Kim, Kwangjo;Lee, Hyuckjae
    • Journal of Communications and Networks
    • /
    • v.4 no.2
    • /
    • pp.81-89
    • /
    • 2002
  • In this paper, we design and implement an efficient fair off-line electronic cash system based on Elliptic Curve Discrete Logarithm Problem (ECDLP), in which the anonymity of coins is revocable by a trustee in case of dispute. To achieve this, we employ the Petersen and Poupard s electronic cash system [1] and extend it by using an elliptic curve over the finite field GF($2^n$). This naturally reduces message size by 85% compared with the original scheme and makes a smart card to store coins easily. Furthermore, we use the Baek et al. s provably secure public key encryption scheme [2] to improve the security of electronic cash system. As an extension, we propose a method to add atomicity into new electronic cash system. To the best of our knowledge, this is the first result to implement a fair off-line electronic cash system based on ECDLP with provable security.

The Software Architecture of A Secure and Efficient Group Key Agreement Protocol

  • Lopez-Benitez, Noe
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.21-25
    • /
    • 2014
  • Group communications are becoming popular in Internet applications such as video conferences, on-line chatting programs, games, and gambling. Secure and efficient group communication is needed for message integration, confidentiality, and system usability. However, the conventional group key agreement protocols are too much focused on minimizing the computational overhead by concentrating on generating the common group key efficiently for secure communication. As a result, the common group key is generated efficiently but a failure in authentication allows adversaries to obtain valuable information during the group communication. After achieving the secure group communication, the secure group communication should generate the group key efficiently and distribute it to group members securely, so the balance of security and system usage must be considered at the same time. Therefore, this research proposes the software architecture model of a secure and efficient group communication that will be imbedded into networking applications.

  • PDF

A Anonymous Authorization Scheme Based on ECC for RFID Privacy (RFID 프라이버시를 위한 ECC기반의 익명인증기법)

  • Jin, Shi-Mei;Li, Yong-Zhen;Lee, Sang-Ho;Rhee, Chung-Sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.293-298
    • /
    • 2008
  • Recently, with the development of mobile techniques and the consideration to conveniency of using, the research on Mobile RFID Reader technique is getting more and more attentions. Until now, all security authentication algorithms of RFID are algorithms about range between Tag and Reader. The range between Reader and backend DB is composed by wired networks, so it's supposed to be secure range. But it must be taken account of the problem of information security and privacy in wireless range during the design of Mobile RFID Reader. In this paper we design an blind signature scheme based on weil-paring finite group's ECC encryption scheme, and by using this blind signature we propose the anonymous authorization scheme to Mobile RFID Reader's users.

A Study of TCP LINK based Real-Time Secure Communication Research in the Ocean (해상에서 실시간 TCP 링크관절 보안통신 연구)

  • Yoo, Jaewon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.250-253
    • /
    • 2014
  • Due to limited resource, marine communication is severely limited when compared to communications in land. Radio relay facilities, etc. based on a wired network through a long distance communication is possible. In addition, the aircraft is in the air, the ground-based network service based on long-range straight-line distance and elevation (LOS: Line of Sight) communications. On the other hand, the distance in a straight line to the sea, the sea level because communication is limited or through satellite, underwater communications relay equipment installed in the communication scheme has been investigated.. In this paper, using TCP-based real-time joint maritime security communication links were studied. Harsh marine environment, real-time communication that can provide secure communications and propose a LINK joint. In this study, more secure, and convenient communications at sea, a plan was presented to you.

  • PDF

Design and Implementation of a Node Power Scheduler in Virtual Computing Lab Environment (가상 컴퓨팅 랩 환경에서 노드 전원관리 스케줄러 설계 및 구현)

  • Seo, Kyung-Seok;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.8
    • /
    • pp.1827-1834
    • /
    • 2013
  • The existing PC-based desktop environment is being changed to a server-based virtual desktop environment due to various advantages such as security, mobility, and upgrade cost reduction. In this paper, a virtual computing lab service system which is applicable to the existing computer lab is designed and implemented using both an open source-based cloud computing platform and hypervisor. In addition, a node power scheduler is proposed in order to reduce power consumption in a server farm. The experimental results show that the power scheduler reduces power consumption considerably over the server farm without the power scheduler.

Near-field Noise-emission Modeling for Monitoring Multimedia Operations in Mobile Devices

  • Song, Eakhwan;Choi, Jieun;Lee, Young-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.6
    • /
    • pp.440-444
    • /
    • 2016
  • In this paper, an equivalent circuit model for near-field noise emission is proposed to implement a multimedia operation-monitoring system for mobile devices. The proposed model includes a magnetic field probe that captures noise emissions from multimedia components, and a transfer function for near-field noise coupling from a transmission line source to a magnetic field probe. The proposed model was empirically verified with transfer function measurements of near-field noise emissions from 10 kHz to 500 MHz. With the proposed model, a magnetic field probe was optimally designed for noise measurement on a camera module and an audio codec in a mobile device. It was demonstrated that the probe successfully captured the near-field noise emissions, depending on the operating conditions of the multimedia components, with enhanced sensitivity from a conventional reference probe.

Wireless PKI Based Certificate Verification Using Virtual Identifier (무선 PKI 기반의 가상 식별자를 이용한 인증서 검증)

  • Choi Seung-Kwon;Shin Jung-Won;Shin Dong-Hwa;Kim Sun-Chul;Lee Byong-Rok;Cho Young-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.8A
    • /
    • pp.804-813
    • /
    • 2006
  • In wireless Internet environment that demand of wireless Internet service increase steadily, wireless PKI(Public Key Infrastructure) service is appearing on stage as necessary essential base technology for information protection service offer, In this paper, we propose the method for verification to reduce the communication overload using VID to CSMP made with a goal of the performance guarantee for security and use in a real time and examine the existent certificate verification methods. The performance of security and the use in a real time is guaranteed by managing the note of authentification by the person who verifies and reducing the amount of the data transmission using VID.

Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks

  • Marimuthu, Mohanapriya;Krishnamurthi, Ilango
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.31-37
    • /
    • 2013
  • Mobile ad hoc networks (MANET) refers to a network designed for special applications for which it is difficult to use a backbone network. In MANETs, applications are mostly involved with sensitive and secret information. Since MANET assumes a trusted environment for routing, security is a major issue. In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the attack. Our technique is capable of finding whether a node is advertising correct topology information or not by verifying its Hello packets, thus detecting node isolation attacks. The experiment results show that our protocol is able to achieve routing security with 45% increase in packet delivery ratio and 44% reduction in packet loss rate when compared to standard OLSR under node isolation attack. Our technique is light weight because it doesn't involve high computational complexity for securing the network.

Digital Divide in Riyadh Neighborhoods: A Spatial Analysis

  • Rawan, Almutlaq;Shuruq, Alshamrani;Ohoud, Alhaqbani;Fatimah, Altamimi;Ghadah, Alammaj;Omer, Alrwais
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.17-24
    • /
    • 2023
  • The objective of this paper is to use Geographical Information Systems for identifying Digital Divide in Riyadh Neighborhoods, Saudi Arabia. Geo-database was created that includes Streets, Neighborhoods, ICT Access Data and Coverage Map for Riyadh. We used QGIS and overlay for analysis, intersection selected as tool for this paper. The results indicate that after analyzing the use of information communication technology in all regions of the Kingdom it turns that Riyadh, Ash Sharqiyyah and Makkah in average with percentage 50%, While Al Jawf, Al Madinah, and Najran are the least with percentage 42%. Then we focused on Riyadh to analyze the digital divide because it is the capital of Saudi Arabia and occupations the highest percent of communications towers in the KSA due to population density. Regarding coverage of the 4G, the neighborhoods at the center have recorded very high coverage score. While neighborhoods at the edges of the city have low values of coverage score. Same for 3G, it is more intense in the center and the coverage percentage is higher than 4G. For 2G we found it had the highest coverage compared to 3G or 4G

Whitelist-Based Anomaly Detection for Industrial Control System Security (제어시스템 보안을 위한 whitelist 기반 이상징후 탐지 기법)

  • Yoo, Hyunguk;Yun, Jeong-Han;Shon, Taeshik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.641-653
    • /
    • 2013
  • Recent cyber attacks targeting control systems are getting sophisticated and intelligent notoriously. As the existing signature based detection techniques faced with their limitations, a whitelist model with security techniques is getting attention again. However, techniques that are being developed in a whitelist model used at the application level narrowly and cannot provide specific information about anomalism of various cases. In this paper, we classify abnormal cases that can occur in control systems of enterprises and propose a new whitelist model for detecting abnormal cases.