• Title/Summary/Keyword: Information and Communications security

Search Result 1,069, Processing Time 0.027 seconds

IPv6 Neighbor Discovery security treats and opposition (IPv6 Neighbor Discovery 보안 위협과 대응)

  • Park, Soo-Duck;Lee, Yong-Sig;Rhee, Byung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.771-772
    • /
    • 2006
  • IPv6 nodes use the Neighbor Discovery Protocol (NDP) to discover other nodes on the link, to determine their link-layer addresses to find routers, and to maintain reachability information about the paths to active neighbors. If not secured, NDP is vulnerable to various attacks. This document specifies security mechanisms for NDP. Unlike those in the original NDP specifications, these mechanisms do not use IPsec.

  • PDF

The Study on the security of Smartphone (스마트폰 보안 기술 분석)

  • Lee, Young Sook;Kim, Jee Yeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.91-105
    • /
    • 2010
  • With the release Apple's iPhone, smartphone is enjoying a tremendous popularity. Security experts pointed the smartphone security risks and KCC(Korea Communications Commission) published safety rules for smartphone users. In this paper we surveyed market and product trends of smartphone and analyzed the security technology of smartphoen OS including Symbian, iPhone OS, Windows Mobile and Android.

Evaluation of the Use of Guard Nodes for Securing the Routing in VANETs

  • Martinez, Juan A.;Vigueras, Daniel;Ros, Francisco J.;Ruiz, Pedro M.
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.122-131
    • /
    • 2013
  • We address the problem of effective vehicular routing in hostile scenarios where malicious nodes intend to jeopardize the delivery of messages. Compromised vehicles can severely affect the performance of the network by a number of attacks, such as selectively dropping messages, manipulating them on the fly, and the likes. One of the best performing solutions that has been used in static wireless sensor networks to deal with these attacks is based on the concept of watchdog nodes (also known as guard nodes) that collaborate to continue the forwarding of data packets in case a malicious behavior in a neighbor node is detected. In this work, we consider the beacon-less routing algorithm for vehicular environments routing protocol, which has been previously shown to perform very well in vehicular networks, and analyze whether a similar solution would be feasible for vehicular environments. Our simulation results in an urban scenario show that watchdog nodes are able to avoid up to a 50% of packet drops across different network densities and for different number of attackers, without introducing a significant increase in terms of control overhead. However, the overall performance of the routing protocol is still far from optimal. Thus, in the case of vehicular networks, watchdog nodes alone are not able to completely alleviate these security threats.

Analyses of Security Issues in Mobile Agent Technology (이동 에이전트 기술에서의 보안성 문제 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.815-818
    • /
    • 2007
  • As wireless communications and mobile multimedia services are booming nowadays, systematic research of the overall aspects of mobile security is crucial. This paper presents a frame model for guising the systematic investigation of mobile security. Based on the introduction of some background viewpoints of security targets from n novel perspective, the kamework is described as a hierarchical model in which mobile security research is partitioned into three different layers.

  • PDF

Analyses of Security Issues in Wireless Mobile Ad Hoc Network (무선 이동 Ad hoc 네트워크에서의 보안성 문제 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.737-740
    • /
    • 2007
  • A s wireless communications and mobile multimedia services are booming nowadays, systematic research of the overall aspects of mobile security is crucial. This paper presents a frame model for guising the systematic investigation of mobile security. Based on the introduction of some background viewpoints of security targets from n novel perspective, the framework is described as a hierarchical model in which mobile security research is partitioned into three different layers.

  • PDF

Joint Beamforming and Jamming for Physical Layer Security

  • Myung, Jungho;Heo, Hwanjo;Park, Jongdae
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.898-905
    • /
    • 2015
  • In this paper, we consider a joint beamforming and jamming design to enhance physical layer security against potential multiple eavesdroppers in a multiple-input and single-output cellular broadcast channel. With perfect channel state information at the base station, we propose various design approaches to improve the secrecy of the target user. Among the proposed approaches, the combined beamforming of maximum ratio transmission and zero-forcing transmission with a combination of maximum ratio jamming and zero-forcing jamming (MRT + ZFT with MRJ + ZFJ) shows the best security performance because it utilizes the full transmit antenna dimensions for beamforming and jamming with an efficient power allocation. The simulation results show that the secrecy rate of this particular proposed approach is better than the rates of the considered conventional approaches with quality-of-service and outage probability constraints.

Analysis on Information Security Manpower Policy by the Analytic Hierarchy Process (AHP를 이용한 정보보호인력 양성 정책 분석)

  • Kim Tae-Sung;Jun Hyo-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.5B
    • /
    • pp.486-493
    • /
    • 2006
  • As information threats to information systems diffuse, the information security becomes a major concern. Information security manpower who produce and implement information security products, and who are in charge of information security in organizations, has been important. Korean government has implemented various policies to promote the information security manpower. Those policies have been successful to supply enough number of information security manpower, but not successful to supply information security manpower to meet the various requirements of the manpower demand. In this study we adopt analytic hierarchy process(AHP) to analyze the priorities of information security technology categories to meet the demand. Results of the study suggest that the government should concentrate on promotion of manpower for the field of the 'System and Network Security Technology'.

Study of Sensor Network Key Management Method (센서 네트워크의 키 관리 기법에 대한 연구)

  • Kim Jung-Sik;Choi Kyoung-Ho;Im Eul-Gyu
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.451-454
    • /
    • 2006
  • 유비쿼터스 컴퓨팅에서는 센서 네트워크가 중요한 위치를 가진다. 센서 네트워킹의 기술이 발전하며 보안의 중요성이 떠오르고 있는데 키 관리 기법은 중요한 보안 이슈 중 하나이다. 센서 네트워크에서의 키 관리 기법은 센서 노드의 한계로 세션키, 마스터키 등을 이용하는 대칭키 방식을 사용하고 있다. 본 논문에서는 기존에 사용하는 키 관리법과 시간에 따른 신뢰도를 주는 방법을 합쳐 기존의 단점을 없애기 위한 새로운 키 관리법을 제시하였다.

  • PDF

A Novel Certificate Revocation List Distribution for Vehicle Communications in Mobile Communication Networks

  • Dan, Du Anh;Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.109-116
    • /
    • 2017
  • Short-lived pseudonym certificates as vehicle identities could satisfy both security and privacy requirements. However, to remove revoked certificates especially in vehicle communications, pseudonym certificate revocation list (CRL) should be distributed resource-efficiently from a practical deployment point of view and in a timely manner. In this paper, we propose a novel CRL distribution scheme capable of CRL multicast to only activated vehicles registered to the CRL multicast group using the group communication system enabler, namely, the GCSE which is being standardized. The scheme is resource efficient by using CRL distribution paths instead of paging processes to find out multicast vehicle(s) within a certain region. The analyzed results show that the proposed scheme outperforms in terms of paging cost, packets transmission cost, and the processing cost at the respective entities compared to the existing four schemes in the literature.

A Hybrid Adaptive Security Framework for IEEE 802.15.4-based Wireless Sensor Networks

  • Shon, Tae-Shik;Park, Yong-Suk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.597-611
    • /
    • 2009
  • With the advent of ubiquitous computing society, many advanced technologies have enabled wireless sensor networks which consist of small sensor nodes. However, the sensor nodes have limited computing resources such as small size memory, low battery life, short transmission range, and low computational capabilities. Thus, decreasing energy consumption is one of the most significant issues in wireless sensor networks. In addition, numerous applications for wireless sensor networks are recently spreading to various fields (health-care, surveillance, location tracking, unmanned monitoring, nuclear reactor control, crop harvesting control, u-city, building automation etc.). For many of them, supporting security functionalities is an indispensable feature. Especially in case wireless sensor networks should provide a sufficient variety of security functions, sensor nodes are required to have more powerful performance and more energy demanding features. In other words, simultaneously providing security features and saving energy faces a trade-off problem. This paper presents a novel energy-efficient security architecture in an IEEE 802.15.4-based wireless sensor network called the Hybrid Adaptive Security (HAS) framework in order to resolve the trade off issue between security and energy. Moreover, we present a performance analysis based on the experimental results and a real implementation model in order to verify the proposed approach.