• Title/Summary/Keyword: Open Protocol

Search Result 479, Processing Time 0.025 seconds

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Efficient Radio Resource Measurement System in IEEE 802.11 Networks (IEEE 802.11 네트워크에서 효율적인 라디오 자원 측정 시스템 연구)

  • Yang, Seung-Chur;Lee, Sung-Ho;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2437-2445
    • /
    • 2012
  • This paper presents the efficient measurement method of radio resource by analyzing various medium occupied elements. The medium occupied time consists of 802.11 frames, wireless interference, and protocol waiting time from a wireless node on a current channel. And it is used to performance metric. Existing research is only measured partial occupied elements, and is lack of validation of measurement unit and scalability on various IEEE 802.11 radio. This paper presents the measurement method of classified occupied elements. To achieve this, we modified 802.11n based OpenHAL device driver to collect the register information of wireless chipset, and to analyze receiving frames in an virtual monitor mode. We conclude accurate medium occupied time measurement system from various validation methods.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Network Management for the GSMP Open Interface in the MPLS (MPLS의 GSMP 개방형 인터페이스를 위한 망 관리)

  • Cha, Yeong-Uk;Kim, Jin-Nyeon;Kim, Chun-Hui
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.227-234
    • /
    • 2002
  • MPLS which integrates routing of layer 3 and switching of layer 2, enables support for fast forwarding, traffic engineering and virtual private network services. GSMP is open interface protocol between a label switch and a controller, and it provides connection, configuration, event, performance management and synchronization. In the GSMP open interface, the functions of network management can be located either in the controller or in the label switch. To simplify the label switch and enhance the efficiency of resources, we adopt the network management model, in which the SNMP agent is located in the controller and is interworked with the GSMP. We presented the interworking scenrios between the GSMP and the network management of MPLS. We implemented the controller to verify the realization of our adopted network management model, and measured the connection setup delay of the provisioned connection.

Controlled active exercise after open reduction and internal fixation of hand fractures

  • Jun, Dongkeun;Bae, Jaehyun;Shin, Donghyeok;Choi, Hyungon;Kim, Jeenam;Lee, Myungchul
    • Archives of Plastic Surgery
    • /
    • v.48 no.1
    • /
    • pp.98-106
    • /
    • 2021
  • Background Hand fractures can be treated using various operative or nonoperative methods. When an operative technique utilizing fixation is performed, early postoperative mobilization has been advocated. We implemented a protocol involving controlled active exercise in the early postoperative period and analyzed the outcomes. Methods Patients who were diagnosed with proximal phalangeal or metacarpal fractures of the second to fifth digits were included (n=37). Minimally invasive open reduction and internal fixation procedures were performed. At 3 weeks postoperatively, controlled active exercise was initiated, with stress applied against the direction of axial loading. The exercise involved pain-free active traction in three positions (supination, neutral, and pronation) between 3 and 5 weeks postoperatively. Postoperative radiographs and range of motion (ROM) in the interphalangeal and metacarpophalangeal joints were analyzed. Results Significant improvements in ROM were found between 6 and 12 weeks for both proximal phalangeal and metacarpal fractures (P<0.05). At 12 weeks, 26 patients achieved a total ROM of more than 230° in the affected finger. Postoperative radiographic images demonstrated union of the affected proximal phalangeal and metacarpal bones at a 20-week postoperative follow-up. Conclusions Minimally invasive open reduction and internal fixation minimized periosteal and peritendinous dissection in hand fractures. Controlled active exercise utilizing pain-free active traction in three different positions resulted in early functional exercise with an acceptable ROM.

Smart Centralized Remote Security Service Provisioning Framework for Open ICT Environment (개방형 ICT 환경을 위한 집중식 원격 보안 서비스 프로비저닝 프레임워크 구성 방안)

  • Park, Namje
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.2
    • /
    • pp.81-88
    • /
    • 2016
  • Machine-to-Machine (M2M) communication provides each component (machine) with access to Internet, evolving into the IoT technology. IoT is a trend where numbers of devices provide the communication service, using the Internet protocol. As spreading the concept of IoT(Internet of Things), various objects become home information sources. According to the wide spread of various devices, it is difficult to access data on the devices with unified manners. Under this environment, security is a critical element to create various types of application and service. In this paper propose the inter-device authentication and Centralized Remote Security Provisioning framework in Open M2M environment. The results of previous studies in this task is carried out by protecting it with the latest information on M2M / IoT and designed to provide the ultimate goal of future M2M / IoT optimized platform that can be integrated M2M / IoT service security and security model presents the information.

A Preprocessor for Detecting Potential Races in Shared Memory Parallel Programs with Internal Nondeterminism (내부적 비결정성을 가진 공유 메모리 병렬 프로그램에서 잠재적 경합탐지를 위한 전처리기)

  • Kim, Young-Joo;Jung, Min-Sub;Jun, Yong-Kee
    • The KIPS Transactions:PartA
    • /
    • v.17A no.1
    • /
    • pp.9-18
    • /
    • 2010
  • Races that occur in shared-memory parallel programs such as OpenMP programs must be detected for debugging because of causing unintended non-deterministic results. Previous works which verify the existence of these races on-the-fly are limited to the programs without internal non-determinism. But in the programs with internal non-determinism, such works need at least N! execution instances for each critical section to verify the existence of races, where N is the degree of maximum parallelism. This paper presents a preprocessor that statically analyzes the locations of non-deterministic accesses using program slicing and can detect apparent races as well as potential races through single execution using the analyzed information. The suggested tool can deterministically monitor non-deterministic accesses to occur in OpenMP programs so that this tool can verify the existence of races even if it is used any race detection protocol which can apply to programs with critical section. To prove empirically this tool, we have experimented using a set of benchmark programs such as synthetic programs that involve non-deterministic accesses, OpenMP Microbenchmark, NAS Parallel Benchmark, and OpenMP application programs.

Group Key Management Protocol for Secure Social Network Service (안전한 소셜 네트워크 서비스를 위한 그룹키 관리 프로토콜)

  • Seo, Seung-Hyun;Cho, Tae-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.18-26
    • /
    • 2011
  • Social network services whose users increase rapidly is the online services that reflect social network. They are used for various purposes such as strategy of election, commercial advertisement and marketing, educational information sharing and exchange of medical knowledge and opinions. These services make users form social networks with other users who have common interests and expand their relationships by releasing their personal information and utilizing other users' social networks. However, the social network services based on open and sharing of information raise various security threats such as violation of privacy and phishing. In this paper, we propose a group key management scheme and protocols using key rings to protect communication of small groups in social network services.

A Designing Method of Digital Forensic Snort Application Model (Snort 침입탐지 구조를 활용한 디지털 Forensic 응용모델 설계방법)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users. Snort identifies network indicators by inspecting network packets in transmission. A process on a host's machine usually generates these network indicators. This means whatever the snort signature matches the packet, that same signature must be in memory for some period (possibly micro seconds) of time. Finally, investigate some security issues that you should consider when running a Snort system. Paper coverage includes: How an IDS Works, Where Snort fits, Snort system requirements, Exploring Snort's features, Using Snort on your network, Snort and your network architecture, security considerations with snort under digital forensic windows environment.

Performance Evaluation of CoAP-based Internet-of-Things System (CoAP 기반 사물인터넷 시스템 성능평가)

  • Choo, Young Yeol;Ha, Yong Jun;Son, Soo Dong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.12
    • /
    • pp.2014-2023
    • /
    • 2016
  • Web presence is one of the key issues for extensive deployment of Internet-of-Things (IoT). An obstacle to overcome for Web presence is relatively low computing power of IoT devices. In this paper, we present implementation of an IoT platform based on Constrained Application Protocol (CoAP) which is a web transfer protocol proposed by Internet Engineering Task Force (IETF) for the low performance IoT devices such as Wireless Sensor Network (WSN) nodes and micro-controllers. To qualify the performance of CoAP-based IoT system for such an application as smart grid, we designed a test platform consisting of Raspberry Pi2, Kmote WSN node and a desktop PC. Using open source softwares, CoAP was implemented on top of the platform. Leveraging the GET command defined at CoAP specification, performance of the system was measured in terms of round-trip time (RTT) from web application to the Kmote sensor node. To investigate abnormal cases among the test results, hop-by-hop delays were measured to analyze resulting data. The average response time of CoAP-based communication except the abnormal data was reduced by 23% smaller than the previous research result.