• Title/Summary/Keyword: L2 Security

Search Result 150, Processing Time 0.025 seconds

An Efficient Approach for Adaptation of MIPv6 in Roaming Environments

  • Jeong Yoon-su;Woo Sung-hee;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.341-344
    • /
    • 2005
  • Mobile IPv6(MIPv6) allows a Mobile Node to talk directly to its peers while retaining the ability to move around and change the currently used IP address. One of the major issues regarding the basic Mobile IPv6 protocol is related to the handover management of a mobile node. This paper proposes efficient approach for adaptation of MIPv6 sing context information in roaming environments. To investigate on a efficient and secure handover procedure, proposed approach method will give us the following advantages: (l)the intention of context is to reduce latency, packet losses and avoid re-initiation of signaling to and from mobile nodes,(2) FMIPv6 aims to reduce handover latency due to IP protocol operations as small as possible in comparison to the inevitable link switching latency.

  • PDF

A Configuration of LINUX router VPN using FreeS/WAN IPSEC (FreeS/WAN IPSEC을 이용한 LINUX 라우터 VPN 구성)

  • 김한철;이계상
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.499-502
    • /
    • 2001
  • FreeS/WAN[l] 은 LINUX 상에서 네트워크 보안 프로토콜표준인 IPSEC을 구현한 공개 S/W이다. 현재 LINUX Project로 수행되고 있으며 1.91 version 까지 나와 있다. 라우터와 라우터간에 IPSEC을 사용하여 통신함으로써 access control, connectionless integrity, data origin authentication, protection against replays, confidentiality의 서비스를 보장받을 수 있고, 또한 이러한 서비스들은 IP 계층에서 제공되기 때문에 IP 계층뿐만 아니라 그 이상의 계층에 대한 보호를 제공한다. [2] 본 논문에서는 LINUX router에 FreeS/WAN IPSEC을 설치하여 Security Gateway를 구성하고, 이 Security Gateway를 통해 전형적인 가상사설망을 구성할 수 있음을 보였다. 양단의 Security Gateway에 설치되어진 FreeS/WAN으로 VPN connection을 설정하고, 인증방법으로 RSA authentication key를 setup 하였다. IPSEC을 통하여 암호화되어진 데이터로 양단의 Gateway 구간에서 보안통신이 이루어짐을 알아본다.

  • PDF

A New Class of Self-Shrinking Generators (새로운 자기 수축 발생기)

  • 최세아;양경철
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.88-91
    • /
    • 2002
  • 자기 수축 발생기(self-shrinking generator)는 Meier와 Staffelbach에 의해 제안되었으며[4], 구조가 간단하고 키수열을 생성하는 속도가 빠르기 때문에 스트림 암호시스템으로 각광받고 있다 [5]. 본 논문에서는 자기 수축 발생기의 새로운 구성방법을 제안한다. 제안된 자기 수축 발생기는 하나의 선형귀환회로와 주어진 짝수 m에 의하여 정의되며 일반적으로 선형귀환회로의 귀환다항식으로 원시다항식을 사용한다. 이 경우 키수열은 균형성을 만족하며, 선형귀환회로의 귀환다항식의 차수를 $d_{Y}$ 라고 하면 주기는 $d_{Y-2}$ 이다. m을 $2^{η}$ζ로 표현하면 선형복잡도 Lz는 $d_{Y}$ +η-3/$\leq$ $L_{Z}$ $\leq$m/2($d_{Y}$ -1 - ($d_{Y}$ -2))이다. 따라서 제안된 자기 수축 발생기는 기존의 자기 수축 발생기에 비하여 암호학적으로 우수한 성질을 갖는다.다.

  • PDF

Square Attacks of Reduce-Round in KASUMI (블록암호 KASUMI에 대한 포화공격)

  • 이제상;이태건;이창훈;이원일;홍석희;이상진
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.615-619
    • /
    • 2003
  • 본 논문에서는 5-라운드 KASUMI의 포화공격에 대하여 다룰 것이다. KASUMI는 3GPP에서 사용되는 알고리즘으로, 64비트의 평문을 입력받아 128비트의 키를 사용하여 64비트의 암호문을 출력하는 블록암호이다. 본 논문에서는 l0$\times$2$^{32}$의 선택 평문을 이용하여, 공격 복잡도 2$^{115}$ 를 갖는 5라운드 포화공격(Square Attack)을 소개할 것이다. 또한, 이 공격은 함수의 키를 9비트 고정함으로서 향상시킬 수 있다. 이러한 경우, 7$\times$2$^{32}$ 의 선택평문을 이용하여, 공격 복잡도 2$^{83}$ 을 갖는 5라운드 포화공격을 성공시킬 수 있다.

  • PDF

The Effect of Airport Security Screeners' New Technology Acceptance to the Innovation and Job Satisfaction of Airport Security (공항보안검색요원의 신기술 수용성이 공항보안업무의 직무만족도와 업무혁신성에 미치는 영향)

  • Jeon, Jong-Duk;Yoon, Han-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.394-403
    • /
    • 2019
  • This research focuses on the perception of security screeners using a full body scanner at airport which had been newly introduced to terminal 2 of Incheon Int'l airport. To accomplish the purpose of research, this paper used UTAUT (Unified Theory of Acceptance and Use of Technology) model. Through an empirical analysis, it was proven the factors consisting of technological acceptance and how those factors affect both organizational innovation at airport and job satisfaction of security screeners. According to an empirical analysis, it was found out all the factors of technological acceptance have a significant effect on both organizational innovation and job satisfaction. However, only the effort expectation was shown to have a significant negative effect on the two dependant variables contrary to the other variables (performance expectation, behavioral intention and self efficacy. It was also proven organizational innovation had a moderating effect between technological acceptance and job satisfaction. Such results suggested organizational innovation at airport security division is necessary to enhance job satisfaction using a newly introduced full body scanner.

Performance Evaluation of VPN Protocols Using Various Traffic (다양한 트래픽을 이용한 VPN 프로토콜 성능 평가)

  • O, Seung-Hui;Chae, Gi-Jun;Nam, Taek-Yong;Son, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.721-730
    • /
    • 2001
  • Nowadays corporation networks are growing rapidly and they are needed to communicate with branch offices. Therefore, a VPN (Virtual Private Network) appears to reduce the cost of access and facilitate to manage and operate the enterprise network. Along with this trend, many studies have been done on VPN. It is important that the performance issues should be considered when VPN protocols are applied. However, most of them are limited on the tunneling methods and implementation of VPN and a few studies are performed on how installation of VPN affects the network. Therefore, in this paper, a testbed is constructed and VPN protocols are installed on it. Real traffic is generated and transmitted on the testbed to test how installing a VPN affects the network. As a result, layer 3 VPN protocol shows lower network performance than layer 2 VPN protocols. And we realize that the combination of L2TP and IPSec is the better method to install VPN than using IPSec only in the aspects of performance and security.

  • PDF

Digital Holographic Security Identification System (디지털 홀로그래픽 보안 인증 시스템)

  • Kim, Jung-Hoi;Kim, Nam;Jeon, Seok-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.89-98
    • /
    • 2004
  • In this paper, we implement a digital holographic security card system that combines digital holographic memory using random phase encoded reference beams with electrical biometrics. Digitally encoded data including a document, a picture of face, and a fingerprint are recorded by multiplexing of holographic memory. A random phase mask encoding reference beams are used as a decoded key to protect illegal counterfeit. As a result, we can achieve a raw BER of 3.6${\times}$10-4 and shift selectivity of 4${\mu}{\textrm}{m}$ using the 2D random phase mask. Also, we develop a recording pattern and image processing which are suitable for a low cost reader without a position sensing photo-detector for real time data extraction and remove danger of fraud from unauthorized person by comparing the reconstructed holographic data with the live fingerprint data.

A Remote Sensing Scene Classification Model Based on EfficientNetV2L Deep Neural Networks

  • Aljabri, Atif A.;Alshanqiti, Abdullah;Alkhodre, Ahmad B.;Alzahem, Ayyub;Hagag, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.406-412
    • /
    • 2022
  • Scene classification of very high-resolution (VHR) imagery can attribute semantics to land cover in a variety of domains. Real-world application requirements have not been addressed by conventional techniques for remote sensing image classification. Recent research has demonstrated that deep convolutional neural networks (CNNs) are effective at extracting features due to their strong feature extraction capabilities. In order to improve classification performance, these approaches rely primarily on semantic information. Since the abstract and global semantic information makes it difficult for the network to correctly classify scene images with similar structures and high interclass similarity, it achieves a low classification accuracy. We propose a VHR remote sensing image classification model that uses extracts the global feature from the original VHR image using an EfficientNet-V2L CNN pre-trained to detect similar classes. The image is then classified using a multilayer perceptron (MLP). This method was evaluated using two benchmark remote sensing datasets: the 21-class UC Merced, and the 38-class PatternNet. As compared to other state-of-the-art models, the proposed model significantly improves performance.

Monitoring of air Pollution on the Premises of the Factory Sharrcem - L.L.C

  • Luzha, Ibush;Shabani, Milazim;Baftiu, Naim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.214-222
    • /
    • 2022
  • In these proceedings, we will address the problem of air pollution on the premises of the Cement factory SHARRCEM L.L.C. in Hani Elezit in the Republic of Kosovo respectively around the clinker cooler, rotary kiln, and raw material mill. By air pollution, we mean the introduction of chemicals, particles, or other harmful materials into the atmosphere which in one way or another causing damage to the development of plants and organisms. Air pollution occurs when certain substances are released into the air, which depending on the quantitative level, can be harmful to human health, animals, and the environment in general. The analysis of air shows the influence of the extractive and processing industry on the chemical composition of air. Parameters analyzed though under control such as the case of carbon dioxide, due to the increasing production capacity of cement, the production of hundreds of thousands of cubic meters of CO2 gas made CO2 production a concern. With the purchase of the latest technology by the SHARCEM Factory in Hani Elezit, the amount of air pollution has been reduced and the allowed parameters of environmental pollution have been kept under control. Air pollutants are introduced into the atmosphere from various sources which change the composition of the atmosphere and affect the biotic environment.The concentration of air pollutants depends not only on the quantities that are emitted from the sources of air pollution but also on the ability of the atmosphere to absorb or disperse these emissions. Sources of air pollutants include vehicles, industry, indoor sources, and natural resources. There are some natural pollutants, such as natural fog, particles from volcanic eruptions, pollen grains, bacteria, and so on.

Real-time Heart Rate Measurement based on Photoplethysmography using Android Smartphone Camera

  • Hoan, Nguyen Viet;Park, Jin-Hyeok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.234-243
    • /
    • 2017
  • With the development of smartphone technologies enable photoplethysmogram (PPG) acquisition by camera and heart rate (HR) measurement. This papers presents improved algorithm to extract HR from PPG signal recorded by smartphone camera and to develop real-time PPG signal processing Android application. 400 video samples recorded by Samsung smartphone camera are imported as input data for further processing and evaluating algorithm on MATLAB. An optimized algorithm is developed and tested on Android platform with different kind of Samsung smartphones. To assess algorithm's performance, medical device Beurer BC08 is used as reference. According to related works, accuracy parameters includes 90% number of samples that has relative errors less than 5%, Person correlation (r) more than 0.9, and standard estimated error (SEE) less than 5 beats-per-minutes (bpm).