• 제목/요약/키워드: Information and Communications security

검색결과 1,069건 처리시간 0.029초

IPv6 Neighbor Discovery 보안 위협과 대응 (IPv6 Neighbor Discovery security treats and opposition)

  • 박수덕;이용식;이병호
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.771-772
    • /
    • 2006
  • IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. If not secured, NDP is vulnerable to various attacks. This document specifies security mechanisms for NDP. Unlike those in the original NDP specifications, these mechanisms do not use IPsec.

  • PDF

스마트폰 보안 기술 분석 (The Study on the security of Smartphone)

  • 이영숙;김지연
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.91-105
    • /
    • 2010
  • With the release Apple's iPhone, smartphone is enjoying a tremendous popularity. Security experts pointed the smartphone security risks and KCC(Korea Communications Commission) published safety rules for smartphone users. In this paper we surveyed market and product trends of smartphone and analyzed the security technology of smartphoen OS including Symbian, iPhone OS, Windows Mobile and Android.

Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs

  • Martinez, Juan A.;Vigueras, Daniel;Ros, Francisco J.;Ruiz, Pedro M.
    • Journal of Communications and Networks
    • /
    • 제15권2호
    • /
    • pp.122-131
    • /
    • 2013
  • We address the problem of effective vehicular routing in hostile scenarios where malicious nodes intend to jeopardize the delivery of messages. Compromised vehicles can severely affect the performance of the network by a number of attacks, such as selectively dropping messages, manipulating them on the fly, and the likes. One of the best performing solutions that has been used in static wireless sensor networks to deal with these attacks is based on the concept of watchdog nodes (also known as guard nodes) that collaborate to continue the forwarding of data packets in case a malicious behavior in a neighbor node is detected. In this work, we consider the beacon-less routing algorithm for vehicular environments routing protocol, which has been previously shown to perform very well in vehicular networks, and analyze whether a similar solution would be feasible for vehicular environments. Our simulation results in an urban scenario show that watchdog nodes are able to avoid up to a 50% of packet drops across different network densities and for different number of attackers, without introducing a significant increase in terms of control overhead. However, the overall performance of the routing protocol is still far from optimal. Thus, in the case of vehicular networks, watchdog nodes alone are not able to completely alleviate these security threats.

이동 에이전트 기술에서의 보안성 문제 분석 (Analyses of Security Issues in Mobile Agent Technology)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.815-818
    • /
    • 2007
  • As wireless communications and mobile multimedia services are booming nowadays, systematic research of the overall aspects of mobile security is crucial. This paper presents a frame model for guising the systematic investigation of mobile security. Based on the introduction of some background viewpoints of security targets from n novel perspective, the kamework is described as a hierarchical model in which mobile security research is partitioned into three different layers.

  • PDF

무선 이동 Ad hoc 네트워크에서의 보안성 문제 분석 (Analyses of Security Issues in Wireless Mobile Ad Hoc Network)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2007년도 추계종합학술대회
    • /
    • pp.737-740
    • /
    • 2007
  • A s wireless communications and mobile multimedia services are booming nowadays, systematic research of the overall aspects of mobile security is crucial. This paper presents a frame model for guising the systematic investigation of mobile security. Based on the introduction of some background viewpoints of security targets from n novel perspective, the framework is described as a hierarchical model in which mobile security research is partitioned into three different layers.

  • PDF

Joint Beamforming and Jamming for Physical Layer Security

  • Myung, Jungho;Heo, Hwanjo;Park, Jongdae
    • ETRI Journal
    • /
    • 제37권5호
    • /
    • pp.898-905
    • /
    • 2015
  • In this paper, we consider a joint beamforming and jamming design to enhance physical layer security against potential multiple eavesdroppers in a multiple-input and single-output cellular broadcast channel. With perfect channel state information at the base station, we propose various design approaches to improve the secrecy of the target user. Among the proposed approaches, the combined beamforming of maximum ratio transmission and zero-forcing transmission with a combination of maximum ratio jamming and zero-forcing jamming (MRT + ZFT with MRJ + ZFJ) shows the best security performance because it utilizes the full transmit antenna dimensions for beamforming and jamming with an efficient power allocation. The simulation results show that the secrecy rate of this particular proposed approach is better than the rates of the considered conventional approaches with quality-of-service and outage probability constraints.

AHP를 이용한 정보보호인력 양성 정책 분석 (Analysis on Information Security Manpower Policy by the Analytic Hierarchy Process)

  • 김태성;전효정
    • 한국통신학회논문지
    • /
    • 제31권5B호
    • /
    • pp.486-493
    • /
    • 2006
  • 정보시스템에 대한 위협이 확산되면서 정보보호에 대한 관심이 증대되고 있다. 정보보호 제품을 생산 설치하고, 정보보호 업무를 담당할 정보보호 인력의 중요성도 증가하고 있다. 그동안 정부에서는 정보보호 인력을 양성하기 위한 다양한 정책을 시행해왔다. 하지만 그동안 정부의 정책은 주로 인력이 부족한 정보보호 분야에 많은 인력을 공급하는데 많은 관심을 보여왔다. 정부의 정책은 단기간내에 많은 정보보호 인력을 양성하는 양적 공급확대 측면에서는 성공했지만, 인력수요의 특성에 적합한 인력의 공급이라는 다양한 수요를 만족시키는 측면에서는 이렇다할만한 성과를 보이지 못했다. 본 연구에서는 AHP(Analytic Hierarchy Process) 방법론을 이용하여 정보보호인력의 양성이 우선적으로 필요한 정보보호 세부 기술분야를 도출한다. 연구결과에 의하면, 시스템 네트워크 정보보호 기술 분야의 인력에 대한 양성이 가장 시급한 것으로 나타났다.

센서 네트워크의 키 관리 기법에 대한 연구 (Study of Sensor Network Key Management Method)

  • 김정식;최경호;임을규
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.451-454
    • /
    • 2006
  • 유비쿼터스 컴퓨팅에서는 센서 네트워크가 중요한 위치를 가진다. 센서 네트워킹의 기술이 발전하며 보안의 중요성이 떠오르고 있는데 키 관리 기법은 중요한 보안 이슈 중 하나이다. 센서 네트워크에서의 키 관리 기법은 센서 노드의 한계로 세션키, 마스터키 등을 이용하는 대칭키 방식을 사용하고 있다. 본 논문에서는 기존에 사용하는 키 관리법과 시간에 따른 신뢰도를 주는 방법을 합쳐 기존의 단점을 없애기 위한 새로운 키 관리법을 제시하였다.

  • PDF

A Novel Certificate Revocation List Distribution for Vehicle Communications in Mobile Communication Networks

  • Dan, Du Anh;Kim, Hyun-Gon
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권12호
    • /
    • pp.109-116
    • /
    • 2017
  • Short-lived pseudonym certificates as vehicle identities could satisfy both security and privacy requirements. However, to remove revoked certificates especially in vehicle communications, pseudonym certificate revocation list (CRL) should be distributed resource-efficiently from a practical deployment point of view and in a timely manner. In this paper, we propose a novel CRL distribution scheme capable of CRL multicast to only activated vehicles registered to the CRL multicast group using the group communication system enabler, namely, the GCSE which is being standardized. The scheme is resource efficient by using CRL distribution paths instead of paging processes to find out multicast vehicle(s) within a certain region. The analyzed results show that the proposed scheme outperforms in terms of paging cost, packets transmission cost, and the processing cost at the respective entities compared to the existing four schemes in the literature.

A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks

  • Shon, Tae-Shik;Park, Yong-Suk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제3권6호
    • /
    • pp.597-611
    • /
    • 2009
  • With the advent of ubiquitous computing society, many advanced technologies have enabled wireless sensor networks which consist of small sensor nodes. However, the sensor nodes have limited computing resources such as small size memory, low battery life, short transmission range, and low computational capabilities. Thus, decreasing energy consumption is one of the most significant issues in wireless sensor networks. In addition, numerous applications for wireless sensor networks are recently spreading to various fields (health-care, surveillance, location tracking, unmanned monitoring, nuclear reactor control, crop harvesting control, u-city, building automation etc.). For many of them, supporting security functionalities is an indispensable feature. Especially in case wireless sensor networks should provide a sufficient variety of security functions, sensor nodes are required to have more powerful performance and more energy demanding features. In other words, simultaneously providing security features and saving energy faces a trade-off problem. This paper presents a novel energy-efficient security architecture in an IEEE 802.15.4-based wireless sensor network called the Hybrid Adaptive Security (HAS) framework in order to resolve the trade off issue between security and energy. Moreover, we present a performance analysis based on the experimental results and a real implementation model in order to verify the proposed approach.