• Title/Summary/Keyword: Internet Key Exchange

Search Result 116, Processing Time 0.028 seconds

A Study of Improved Key Exchange Protocol Based on Z-WAVE in IoT Environment (IoT 환경에서 Z-WAVE 기반의 향상된 키 교환 프로토콜 연구)

  • Song, Kyung-Hwan;Choi, Seulgi;Song, Jin-Hee;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.594-597
    • /
    • 2015
  • IoT(Internet of Thing) 환경이 도래하면서 다양한 무선 통신 기술들이 사용되고 있다. 그 중에서 가장 많이 쓰이는 무선 통신 기술은 Z-WAVE이다. Z-WAVE는 저전력, 양방향 RF 등의 장점을 가지며, 세계 스마트 홈 시장에서 가장 폭 넓게 사용되는 기술이다. 이 기술을 채택한 연합을 Z-WAVE 연합이라고 하는데, 이 연합은 수백 개 이상의 제조사들과 1000개 이상의 활성화된 제품을 가지고 있다. 하지만 Z-WAVE는 중간자 공격 등과 같은 보안성의 취약점을 가지고 있으며 아직까지 연구가 부족한 실정이다. 따라서 본 논문에서는 IoT 환경에서 Z-WAVE 기반의 향상된 키 교환 프로토콜 기법을 제안한다.

Smart Factory Promotion and Operation Analysis in the 4th Industrial Revolution Environment

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • International journal of advanced smart convergence
    • /
    • v.11 no.3
    • /
    • pp.42-48
    • /
    • 2022
  • Currently, the world is facing severe inflation due to Corona and the war in Ukraine, and it is causing a lot of difficulties for us. Companies are facing a lot of restrictions on their economic activities compared to the past due to supply chain problems and foreign exchange rates. In this situation, many countries have been implementing various smart factory promotion projects to secure competitiveness through productivity improvement in the manufacturing industry. In this study, the contents of smart factory promotion in major countries were reviewed, and problems raised about the implementation of smart factory in Korea, which are being implemented based on this, were described. It is most reasonable to judge the success of a smart factory by the achievement of the performance indicators presented at the time of the project. Therefore, based on the performance index of the business, which is a key factor in determining the success or failure of a smart factory, we investigated whether the company's smart factory promotion can be carried out successfully through examples

Noisy Weighted Data Aggregation for Smart Meter Privacy System (스마트 미터 프라이버시 시스템을 위한 잡음 가중치 데이터 집계)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.3
    • /
    • pp.49-59
    • /
    • 2018
  • Smart grid system has been deployed fast despite of legal, business and technology problems in many countries. One important problem in deploying the smart grid system is to protect private smart meter readings from the unbelievable parties while the major smart meter functions are untouched. Privacy-preserving involves some challenges such as hardware limitations, secure cryptographic schemes and secure signal processing. In this paper, we focused particularly on the smart meter reading aggregation,which is the major research field in the smart meter privacy-preserving. We suggest a noisy weighted aggregation scheme to guarantee differential privacy. The noisy weighted values are generated in such a way that their product is one and are used for making the veiled measurements. In case that a Diffie-Hellman generator is applied to obtain the noisy weighted values, the noisy values are transformed in such a way that their sum is zero. The advantage of Diffie and Hellman group is usually to use 512 bits. Thus, compared to Paillier cryptosystem series which relies on very large key sizes, a significant performance can be obtained.

On-Demand Tunnel Creation Mechanism in Star VPN Topology (성형 VPN 구조에서의 주문형 터널 생성 메커니즘)

  • Byun, Hae-Sun;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.452-461
    • /
    • 2005
  • In the star VPN (Virtual Private Network) topology, the traffic between the communicating two CPE(Customer Premise Equipment) VPN GW(Gateway)s nay be inefficiently transferred. Also, the Center VPN GW nav erperience the overload due to excessive packet processing overhead. As a solution to this problem, a direct tunnel can be established between the communicating two CPE VPN GWs using the IKE (Internet Key Exchange) mechanism of IPSec(IP Security). In this case, however, the tunnel establishment and management nay be complicated. In this paper, we propose a mechanism called' SVOT (Star VPN On-demand Tunnel)', which automatically establishes a direct tunnel between the communicating CPE VPN GWs based on demand. In the SVOT scheme, CPE VPN GWs determine whether it will establish a direct tunnel or not depending on the traffic information monitored. CPE VPN GW requests the information that is necessary to establishes a direct tunnel to the Center VPN GW Through a simulation, we investigate the performance of the scheme performs better than the SYST scheme with respect to scalability, traffic efficiency and overhead of Center VPN GW, while it shows similar performance to the FVST with respect to end-to-end delay and throughput.

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

An Analysis of the Vulnerability of SSL/TLS for Secure Web Services (안전한 웹 서비스를 위한 SSL/TLS 프로토콜 취약성 분석)

  • 조한진;이재광
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1269-1284
    • /
    • 2001
  • The Secure Sockets Layer is a protocol for encryption TCP/IP traffic that provides confidentiality, authentication and data integrity. Also the SSL is intended to provide the widely applicable connection-oriented mechanism which is applicable for various application-layer, for Internet client/server communication security. SSL, designed by Netscape is supported by all clients' browsers and server supporting security services. Now the version of SSL is 3.0. The first official TLS vl.0 specification was released by IETF Transport Layer Security working group in January 1999. As the version of SSL has had upgraded, a lot of vulnerabilities were revealed. SSL and TLS generate the private key with parameters exchange method in handshake protocol, a lot of attacks may be caused on this exchange mechanism, also the same thing may be come about in record protocol. In this paper, we analyze SSL protocol, compare the difference between TLS and SSL protocol, and suggest what developers should pay attention to implementation.

  • PDF

A Study on the Clothing Culture for New Generation of Korea and Japan (2002 한.일 국민교류년 기념' 한국과 일본의 신세대의 복식업화에 대한 연구 - Street Fashion을 중심으로 -)

  • 백샘이;간호섭
    • Journal of the Korean Society of Costume
    • /
    • v.53 no.3
    • /
    • pp.31-49
    • /
    • 2003
  • The Purpose of this research is to examine and contrast the cultural characteristics of the street fashion in new generations of Korea and Japan. We also intended to help clothing companies understand the current trend in this new generation. As the method for street fashion analysis. various literature, internet information and new media materials were utilized. Key observations obtained are as following First, they pursue a complex image. New generations seem to admix images from different areas to create a synthetic image, rather than adopting a single image; Second, practicality is an important factor. They Pursue a sense of their own unique trend: Third, distinction. The difference in society values between Koreans and Japanese is incorporated. The Korean new generation considers the traditional moral principles as important social values. In contrast the Japanese new generation is greatly influenced by the open sexuality culture ; Fourth. public ownership and sharing of the culture. There is a gradual deviation from a dominating unidirectional influence from one country on another. Now the two countries are influencing each other ; Fifth, sense. There are numerous fashion items and generalized total coordination. New generations express more active and creative fashion sense in those fashion items.

The Web-Based Engineering Process Framework for Concurrent Engineering (동시공학 구현을 위한 Web 기반의 공학 프로세서 지원 프레임워크)

  • Kim, Hyun;Myong, Jae-Hyong;Mok, Kyung-Tae
    • Korean Journal of Computational Design and Engineering
    • /
    • v.3 no.4
    • /
    • pp.283-292
    • /
    • 1998
  • The engineering process including design, analysis/evaluation and manufacturing activities is becoming one of the key issues to embody a concurrent engineering concept. This paper proposes a framework to integrated the complicated engineering design and manufacturing processes under the concurrent engineering environment. The framework offers the following facilities: (1) to represent the complicated engineering process (2) to coordinate design activities and execute the process in a distributed environment (3) to support a communication among the related engineers. The engineering processes is depicted using process flow graphs that consist in tasks and the corresponding input and output data. The engineering activities in the defined processes can be executed in a distributed environment through process controller of the framework. Engineers can communicate to suggest their opinions and to exchange product information in the framework. We have conformed the CORBA standard to integrate various distributed engineering the and communicate among them, and used a Java to support the platform independent environment on the Internet. Since the proposed framework an be a formal approach to integrate the engineering processes by providing formalism, parallelism, reusability, and flexibility, it can be effectively applied to embody the concurrent engineering concept in a distributed environment.

  • PDF

Approach with direct tunnels between CPE VPN GWs in star VPN topology (Star VPN 구조에서 CPE VPN GW간 직접 터널을 이용한 성능 향상 방안)

  • Byun, Hae-Sun;Lee, Mee-Jeong;Ahn, Sang-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1271-1274
    • /
    • 2004
  • 현재 운용중인 대부분의 VPN은 모든 CPE(Customer Premise Equipment) VPN GW(Gateway)들이 Center VPN GW에 연결되어 있는 Star 구조를 취하고 있다. 이러한 구조에서는 모든 트래픽들이 항상 Center VPN GW를 거쳐서 전송되므로 비효율적인 트래픽 전송이 이루어진다. 또한 대용량의 멀티미디어 트래픽 전송이 빈번하거나 다수의 지점을 갖고 있는 기업의 경우 Center VPN GW에서의 오버헤드가 증가하게 된다. 이러한 문제를 해결하기 위한 방법으로는 IPSec의 IKE(Internet Key Exchange) 메커니즘을 이용하여 CPE VPN GW간 직접 터널을 맺어 줄 수 있으나, 터널 설립에 앞서 원격지 CPE VPN GW의 주소, 요구되는 보안 등급 등의 터널 설정에 필요한 정보를 관리자가 직접 설정해 주어야 한다. 이는 현재 DHCP와 같은 동적 IP 환경에서 운용되는 ADSL 기반의 VPN 환경에서 관리 오버헤드를 증가시키는 요인이 된다. 이에 본 논문에서는 CPE VPN GW 간 직접 터널 연결이 필요할 시에 자동적으로 제반 기능들이 수행될 수 있게 하는 주문형 터널 생성(On-demand Tunnel Creation) 메커니즘 제안한다. 시뮬레이션을 통해 제안하는 방안에 대하여 성능을 조사하였고, 이와 함께 기존의 Star VPN 구조, Full-mesh VPN 구조와 성능을 비교하였다. 시뮬레이션 결과, 제안하는 방안이 기존의 Star VPN 구조보다 확장성과 트래픽 전송효율성, Center VPN GW의 오버헤드 측면에서 우수한 성능을 보였으며 Full-mesh 구조의 VPN과 거의 비슷한 종단간 지연시간과 처리율을 보였다.

  • PDF

A study on Kerberos Authentication mechanism (Kerberos 인증메커니즘에 관한 연구)

  • Kim Cheol-hyun;Lee Yon-Sik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.53-64
    • /
    • 2005
  • In this paper, proposes Kerberos certification mechanism that improve certification service of PKINIT base that announce in IETF CAT Working Croup. Also proposed Authentication Mechanism for reusability of Ticket that after Ticket's Lifetime is ended, message exchange that Local Client receives Remote Server's service. Since my suggestion to regional services are not described in Kerberos, authentication between regions can be performed via PKINIT(Public Key Cryptography for Initial Authentication) presented by IETF(Internet Engineering Task Force) CAT working group. The new protocol is better than the authentication mechanism proposed by IETF CAT Working group in terms of communication complexity and mechanism according to simplified Ticket issue processing.