• Title/Summary/Keyword: Mutual Certification

Search Result 66, Processing Time 0.027 seconds

A Study on CA-VPN Design using Authentication Mechanism (인증 메커니즘을 이용한 CA-VPN 설계에 관한 연구)

  • 김도문;전정훈;전문석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.60-68
    • /
    • 2003
  • Now the development of using a internet and security equipment is Processed actively. But It is presented problems about compatability and availability between variable equipment as several protocol. It is able to occur the Problem which is not considered efficiency as monopoly security equipment for the standardization of some vendor As a using of VPN gateway equipment. the same equipments have been actually used only for sale a communication equipment which are not confirmed(authenticate) between of mutual equipments. These problem is remain which are not considered suitable network environment and Position by mutual authentication Processing. Because it is considered for only sale a equipment of several vendor. And You will be remain where is unable to protect from attack of using the same equipment, and You will need a actually Protected method. By authentication system of base on Pn , although there is an intended attack from the third intruder, users can be protected with safe from the physical attacks since he is not a Permitted user by employing CA-VPN gateway that is more viable than the previous VPN connection in its security and certification.

  • PDF

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

IoT Multi-Phase Authentication System Using Token Based Blockchain (블록체인 기반의 토큰을 이용한 IoT 다단계 인증 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.139-150
    • /
    • 2019
  • IoT(Internet of Things) security is becoming increasingly important because IoT potentially has a variety of security threats, including limited hardware specifications and physical attacks. This paper is a study on the certification technology suitable for the lightened IoT environment, and we propose a system in which many gateways share authentication information and issue authentication tokens for mutual authentication using blockchain. The IoT node can be issued an authentication token from one gateway to continuously perform authentication with a gateway in the block-chain network using an existing issued token without performing re-authentication from another gateway participating in the block-chain network. Since we do not perform re-authentication for other devices in a blockchain network with only one authentication, we proposed multi phase authentication consisting of device authentication and message authentication in order to enhance the authentication function. By sharing the authentication information on the blockchain network, it is possible to guarantee the integrity and reliability of the authentication token.

Counter-Terrorism Strategy of Terrorism and Developmental plan of Private Security in Korea (한국의 테러리즘의 대테러전략과 민간시큐리티의 역할증대방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.195-214
    • /
    • 2007
  • The purpose of this research is to suggest a construction device that can transform a public safety, security service, security system on counter-terrorism device system, from government leading type to private management type. There are purpose on this thesis to research for the bringing up counter-terrorism experts certification system and about all sorts of developed device among our country's counter-terrorism situation and through comparing developed country's private security's developing device. This summary of thesis is like below. First we need to establish total counter-terrorism center, like developed country on national corresponding strategy. Second, we need to make an organization as a country security department unified as an America's President directly belonging organization. Third, it is to legislate about an counter-terrorism. Fourth, we need to make a coorperate system according to counter-terrorism duty come under private management, so that can recover a trust among people. Fifth, a terror warning system is necessary. Private security's mutual relationship and developing devices is First, it is necessary to bring up counter-terrorism expert. Second, it is necessary to bring in counter-terrorism experts certification system. Third, counter-terrorism research center that come under private management is necessary. The university, private security related academy, should establish research center for the private security industry's specialization, subdivision. It is considered that various research need to be continued after by bringing up counter-terrorism experts, transforming a consciousness, counter-terrorism education, building an equipment and education center, not for a special group, that can minimize human infringement.

  • PDF

A Study on the Improvement of Supervision Works related to Changes in Construction Projects (공공공사의 설계변경과 관련한 감리업무 개선방안에 대한 연구)

  • Kwon Chan-Soon;Kim Man-Chul;Koo Kyo-Jin;Hyun Chang-Taek
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.246-249
    • /
    • 2003
  • we classified major changes into changes based on design deficiency, changes based on the different conditions between job site and contract documents, and changes based on the Owner's need. Then we compare and analyzed applicable regulations for supervision and work performance status at the site, and elicit problems of supervision performance based on mutual contradiction in regulations, bringing up a similar example. Based on the above, we brought up a way of improvement for the elicited problem, comparing and analyzing the laws/contract provisions/instructions related with the changes and the work performance at the jobsite, and verified through interviews with professionals of various fields for the improvement. Finally this study could elicit a way of improvement in the supervision work in conjunction with changes in civil works.

  • PDF

A Study on Authentication ID using Identifier in Ad-hoc Network (Ad-hoc 네트워크에서 식별자를 이용한 인증 아이디에 관한 연구)

  • Moon, Jong-Sik;Byeon, Sang-Gu;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1202-1211
    • /
    • 2010
  • The connection between devices in Ad-hoc network a network based on trust. Because a temporary device frequently join or leave, the authentication and security technology should be prepared for malicious device of a third-party attacks. The authentication scheme with the existing certification and ID, and the security technology using symmetric key and the public key is used. Therefore, in this paper we proposed two devices not having shared information use to generate each other's authentication ID. The use of authentication ID can establish the mutual trust and, provide security and efficiency for communication uses to generate a symmetric key.

Robust Conditional Privacy-Preserving Authentication based on Pseudonym Root with Cuckoo Filter in Vehicular Ad Hoc Networks

  • Alazzawi, Murtadha A.;Lu, Hongwei;Yassin, Ali A.;Chen, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6121-6144
    • /
    • 2019
  • Numerous privacy-preserving authentication schemes have been proposed but vehicular ad hoc networks (VANETs) still suffer from security and privacy issues as well as computation and communication overheads. In this paper, we proposed a robust conditional privacy-preserving authentication scheme based on pseudonym root with cuckoo filter to meet security and privacy requirements and reduce computation and communication overheads. In our proposed scheme, we used a new idea to generate pseudonyms for vehicles where each on-board unit (OBU) saves one pseudonym, named as "pseudonym root," and generates all pseudonyms from the same pseudonym. Therefore, OBU does not need to enlarge its storage. In addition, the scheme does not use bilinear pairing operation that causes computation overhead and has no certification revocation list that leads to computation and communication overheads. The proposed scheme has lightweight mutual authentication among all parties and just for once. Moreover, it provides strong anonymity to preserve privacy and resists ordinary attacks. We analyzed our proposed scheme and showed that it meets security and privacy requirements of VANETs and is more efficient than traditional schemes. The communication and computation overheads were also discussed to show the cost-effectiveness of the proposed scheme.

Trade-Development Partnership between South Korea and the Developing Countries via ODA for the TBT/SPS-related issues of Agro-fisheries & Food Goods (수입 농수산식품 검사·인증 분야에 있어서 ODA를 활용한 개도국과의 상생무역협력 방안)

  • Jung, Moo-sup;Shin, Won-kyu
    • Korea Trade Review
    • /
    • v.44 no.2
    • /
    • pp.287-305
    • /
    • 2019
  • The export of agricultural, fisheries, and food products acts as an engine of growth for developing countries in particular. However, exporting these items is easier said than done since issues of certification and inspection, so-called technical barriers to trade (TBT) and sanitary and phytosanitary measures (SPS), in developed markets have worked as major obstacles for exports. This paper examines the institutional aspects and recent trends of South Korea's TBT/SPS-related cases against exporting firms of the developing countries. We suggest a win-win partnership model that can promote cooperative synergies between Korea and developing employing trade-related technical cooperation or ODA (Official Development Aid). Technical cooperation such as the provision of on-spot field consulting services on TBT/SPS-related issues for exporting firms and Korean OEM firms of developing countries can lead to mutual gains. This cooperative partnership can create gains from "the trade-development nexus" for both sides while promoting sustainable trade and investment relationships between Korea and developing countries.

Analysis of Global Trends in the Cross-border Transfer of Personal Data and Its Implications for Korea (개인정보 국외이전 관련 규범 국제 동향 분석 및 한국에의 시사점)

  • Bomin-Ko
    • Korea Trade Review
    • /
    • v.46 no.6
    • /
    • pp.239-255
    • /
    • 2021
  • To review the theoretical background of regulatory approaches to cross-border transfer of personal data, this paper divides major digital trade participating countries into four types according to the OECD - non-regulatory, post-intervention, pre-supervision, and national control. It then analyzes the US, Japan, the EU, and China respectively that belong to each type. South Korea, which is currently about to pass the amendment by the National Assembly, has identified that it is in the middle of post-intervention and pre-supervision, and needs to evolve into pre-supervision norms like the EU while it has to participate more actively in the process of establishing international digital trade rules. Korea first needs to sign digital trade agreements and promote mutual certification projects more actively from the standpoint of a medium-sized open country with growing digital companies and digitally-open consumers. Second, the government should fully consider the interests of not only companies but also various trade stakeholders including domestic consumers, when drafting and implementing trade policies. To this end, 'a single window approach' is needed not only at the Ministry of Trade, Industry, and Energy, but also at the level of the entire government which require an integrated form of digital trade policy governance.

The Role of FENDT - Prospect and Retrospect -

  • Lee, Hae
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.18 no.1
    • /
    • pp.46-49
    • /
    • 1998
  • Being latecomers to the industrialization, Pacific rim countries except the U.S.A. are doing very little in developing the universal certification system. One should note that Asian Pacific region enjoys the highest economic growth rate, and there is a good possibility that it will be the center of economic activities of the world in the next century. It appears that ISO and CEN share similar specifications in numerous areas. ASNT is being changed to cope with the trend with the introduction of ACCP. Although we may have to adopt the new system someday, we should pay attention and make concerted effort to include our own practice in the global standards. We are the countries in the Far East Region with similar culture and tradition, which are quite different from those of western countries. We hope that Japan should play an important role in this matter, who has been chaired the ISO TC135 since 1993. In the beginning of this decade, there has been a trivial but troublesome matter that who is representing the NDT Society or member countries in Asia-Pacific Conference on NDT. The problem appears to be solved since the establishment of FENDT For the next decade, actually next centry, FENDT will have to accomplish another important role for countries in the Far East Region to form a strong coalition for its survival in the western dominant world. Immediate issue is to establish Far East Working Group for Harmonization and Mutual Recognition of Qualification and Certification of NDT Personnel. To realize this Japan must play a leading role with the cooperation of expanded FENDT member countries including China and Russia. As the continued prosperity expected in this region, FENDT should continue its role for the next centry. We, the FENDT countries, must move forward for internationalization(國際化). However' we must realize that it all start from SELF IDENTI-FICATION. We can identify ourselves by actively participating in FENDT. I would like remind you the concluding remark that I have made in the congratulatory speech at JSNDI 40th Anniversary Conference and FENDT'92. JSNDI is too precious to be Japan's sole possession Staling from the Far East, JSNDI shall become one of the loaders of the world. I sincerely hope that JSNDI take initiatives and leaderships in the future activities. of FENDT countries. I would like to close my talk with "We must hang together, or We shall be hang seperately." Garn Sa Ham Ni Da.

  • PDF