• Title/Summary/Keyword: Protocols

Search Result 4,033, Processing Time 0.032 seconds

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

Current Evidence of Acupuncture in the Cochrane Databse of Systematic Reviews: an Overview (코크란 체계적 문헌고찰 내의 침구치료 임상근거 현황고찰)

  • Kim, Kun-Hyung;Noh, Seung-Hee;Lee, Myeong-Soo;Yang, Gi-Young;Shin, Byung-Cheul;Kim, Jae-Kyu;Lee, Byung-Ryul
    • Journal of Acupuncture Research
    • /
    • v.28 no.4
    • /
    • pp.57-64
    • /
    • 2011
  • Objectives : The aim of this study is to overview the current status of Cochrane systematic review of acupuncture. Methods : Published Cochrane systematic reviews and protocols for evaluating acupuncture and/or moxibustion were searched by the terms 'acupuncture' and 'moxibustion' in Issue 1, Cochrane Library, 2011. Only reviews or protocols that regarded acupuncture or moxibustion as primary methods of intervention in their reviews were included. Data regarding first author national affiliation, intervention and disease, as well as the number of reviews or protocols that included Korean, Chinese, or Japanese databases in search strategies were obtained. Results : We found 92 hits at screening, and 59 studies were eligible for this review. Included interventions were acupuncture (n=56), auricular acupuncture (n=2), and moxibustion (n=1) for various diseases and conditions. The number of publications of Cochrane systematic reviews or protocols increased gradually from 2002 to 2011. First authors' affiliations were located in China (n=32), Australia (n=8), UK (n=7), Canada (n=4), U.S. (n=4), Germany (n=2), Norway, (n=1) and Korea (n=1). 44, four and four Cochrane reviews adopted Chinese, Korean and Japanese databases, respectively. Conclusions : Search strategies in a substantial number of Cochrane reviews or protocols for acupuncture and moxibustion heavily relied on Chinese databases. Korean databases were underused in existing Cochrane reviews and protocols, and Korean authors were much less involved in the Cochrane systematic reviews or protocols than Chinese authors. Further studies need to be conducted in order to incorporate evidence of acupuncture reported in Korean databases into the Cochrane systematic reviews.

IoT Data Collection Platform Based on Selective Protocols (선택적 프로토콜 기반의 사물인터넷 데이터 수집 플랫폼)

  • Oh, Hyeong-Seok;Kim, Dong-Hwi;Jeon, Hyun-Sig;Park, Hyun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.871-878
    • /
    • 2017
  • As the interest of things to the Internet increases, the market of IoT grows larger and devices and protocols related with IoT are evolving.As these IoT devices and protocols evolve, There was a problem with interoperability. As a result, market and standard of IoT are confused, and communication between objects and objects is being hindered by different platforms. Currently, various IoT platforms are being developed and interoperability with heterogeneous platforms is under study, but the protocols used on each platform are limited and designed to have no generalized structure. Therefore, in this paper, we analyze services of HTTP, CoAP, and MQTT protocols, which are typical in the Internet market, and design services that enable selective protocol communication. We also design resources that apply the RESTful API to generalize platform usage. and We implemented the platform through database modeling for quick processing and safety of the collected data. Through this process, devices communicating with different protocols can be interworked on one platform and We propose a "generalized selective protocol based Internet object data collecting platform" that can be applied to various protocols.

Key Exchange Protocols for Domestic Broadband Satellite Access Network (광대역 위성 엑세스 방을 위한 키 교환 프로토콜 제안)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.13-25
    • /
    • 2004
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the guideline of security functions in BSAN(Broadband Satellite Access Network), and analyze the specification of the security primitives and the hey exchange Protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(fretwork Control Centre). In addition, we propose the security specification for a domestic broad satellite network based on the analysis on the analysis profile of ETSI(European Telecommunications Standards Institute) standards. The key exchange protocols proposed in ETSI standard are vulnerable to man-in-the-middle attack and they don't provide key confirmation. To overcome this shortcoming, we propose the 4 types of the key exchange protocols which have the resistant to man-in-the-middle-attack, key freshness, and key confirmation, These proposed protocols can be used as a key exchange protocol between RCST and NCC in domestic BSAN. These proposed protocols are based on DH key exchange protocol, MTI(Matsumoto, Takashima, Imai) key exchange protocol, and ECDH(Elliptic Curve Diffie-Hellman).

A Study on Developmental Policies of The Emergency Medical Dispatch System in Korea (응급의료 통신체계의 발전방안 연구)

  • Uhm, Tai-Hwan
    • The Korean Journal of Emergency Medical Services
    • /
    • v.3 no.1
    • /
    • pp.33-42
    • /
    • 1999
  • The purposes of this study which was conducted by studying the literature on Emergency Medical Dispatch System are to provide some developmental policies of quality management, pre-arrival instructions, priority dispatch protocols, training program for the dispatchers(Emergency Medical Dispatchers or EMDs) in Korea and to promote understanding emergency medical dispatching. The conclusions from this summarized as follows; (1) It is confirmed that there has been little study on the Emergency Medical Dispatch System in Korea, because for the first time, the real Emergency Medical Services were introduced into Korea in 1994, and the importance of the Emergency Medical Dispatch System has not been realized. (2) Only some squads are using a set of dispatch protocols, others aren't. (3) In spite of trying to introduce a new set of dispatch protocols, it isn't the priority dispatch system using a complete set of dispatch protocols which has key questions, pre-arrival instructions, mode & configuration based on patient assessment. (4) The EMS is unable to promote the service capacity by using quality management, because there is no medical control on the emergency medical dispatching and the EMDs. (5) There are no medical directors in the communications center who are in charge of the medical control to detect problems derived from the EMS and to solve them. (6) There are no systematic training program for the EMDs who are taking charge of dispatching. (7) Having a deep relation to the elements of the EMS, the emergency medical dispatching is subject to restriction of those elements.

  • PDF

Performance Comparison Between Routing Protocols Based on the Correlation Analysis of Performance Metrics for AODV Routing Protocol (AODV 라우팅 프로토콜의 성능 매트릭들 간의 상관관계 분석에 기반한 라우팅 프로토콜들 간의 성능 비교)

  • Lee, Yun-Kyung;Kim, Ju-Gyun
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.349-367
    • /
    • 2013
  • In MANET, the AODV routing protocol with on-demand method has a problem in large control packet overhead. In order to improve this, we first need a comprehensive analysis of correlation between performance metrics and factors affecting the performance of AODV. Selected parameters based on this analysis make it enable to be a more accurate and fair performance analysis, as well as to reduce the time and effort when constructing a scenario for performance analysis. In this paper, various scenarios are configured to apply AODV by varying the values of factors affecting the performance with network simulator QualNet 5.0, and then the results are analysed using performance metrics proposed by IETF MANET working group. This paper also founds a correlation between performance metrics and factors affecting the performance for AODV routing protocol, choosing the values of factors that represent many of the most maximum and minimum values of each performance metrics, and proposes optimal simulation parameters for a more accurate performance evaluation of routing protocols with minimal scenario in experiments. Next, performance comparison of AODV, DSR and DYMO routing protocols based on the proposed simulation parameters is shown which provides a comparative analysis on the performance of on-demand routing protocols. Results of this paper could be very useful for the researcher or service provider who wants to find nice simulation environment or select a proper routing protocol.

Greedy Anycast Forwarding Protocol based on Vehicle Moving Direction and Distance (차량의 이동 방향과 거리 기반의 그리디 애니캐스트 포워딩 프로토콜)

  • Cha, Siho;Lee, Jongeon;Ryu, Minwoo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.79-85
    • /
    • 2017
  • Vehicular ad-hoc networks (VANETs) cause link disconnection problems due to the rapid speed and the frequent moving direction change of vehicles. Link disconnection in vehicle-to-vehicle communication is an important issue that must be solved because it decreases the reliability of packet forwarding. From the characteristics of VANETs, greedy forwarding protocols using the position information based on the inter-vehicle distance have gained attention. However, greedy forwarding protocols do not perform well in the urban environment where the direction of the vehicle changes greatly. It is because greedy forwarding protocols select the neighbor vehicle that is closest to the destination vehicle as the next transmission vehicle. In this paper, we propose a greedy anycast forwarding (GAF) protocol to improve the reliability of the inter-vehicle communication. The proposed GAF protocol combines the greedy forwarding scheme and the anycast forwarding method. Simulation results show that the GAF protocol can provide a better packet delivery rate than existing greedy forwarding protocols.

Maximizing Information Transmission for Energy Harvesting Sensor Networks by an Uneven Clustering Protocol and Energy Management

  • Ge, Yujia;Nan, Yurong;Chen, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1419-1436
    • /
    • 2020
  • For an energy harvesting sensor network, when the network lifetime is not the only primary goal, maximizing the network performance under environmental energy harvesting becomes a more critical issue. However, clustering protocols that aim at providing maximum information throughput have not been thoroughly explored in Energy Harvesting Wireless Sensor Networks (EH-WSNs). In this paper, clustering protocols are studied for maximizing the data transmission in the whole network. Based on a long short-term memory (LSTM) energy predictor and node energy consumption and supplement models, an uneven clustering protocol is proposed where the cluster head selection and cluster size control are thoroughly designed for this purpose. Simulations and results verify that the proposed scheme can outperform some classic schemes by having more data packets received by the cluster heads (CHs) and the base station (BS) under these energy constraints. The outcomes of this paper also provide some insights for choosing clustering routing protocols in EH-WSNs, by exploiting the factors such as uneven clustering size, number of clusters, multiple CHs, multihop routing strategy, and energy supplementing period.

Paramedical students' ethical values, awareness, and practice toward medical information protection (응급구조학과 대학생들의 윤리적 가치관과 의료정보보호에 대한 인식 및 실천)

  • Choi, Bo-Ram
    • The Korean Journal of Emergency Medical Services
    • /
    • v.24 no.1
    • /
    • pp.93-102
    • /
    • 2020
  • Purpose: The purpose of this study was to investigate the ethical values of paramedics and their awareness and practice of medical information protection protocols. Methods: A survey was conducted involving 300 university students majoring in a four-year paramedical education program at two universities in Daejeon and Chungnam. Ultimately 220 surverys were subjected to analysis. Results: There was a significant difference in students' perception of medical information protection according to the need for education on medical information protection protocol (p=0.022); however, there were no significant differences in the practice of these protocols. The idealism tendency was positively correlated with the awareness of medical information protection (r=.332, p=.000) and the practice of medical information protection (r=.309, p=.001). A tendency toward relativism was significantly associated with the awareness of medical information protection (r=.138, p=.040) and not significantly related to the practice of medical information protection protocols. The tendency toward idealism tended to have a significant positive effect on the awareness of medical information protection protocols (β=.318, t=4.777, p=.000) and the degree of practice (B=.369, t=3.456, p=.001). Conclusion: Appropriate educational programs for medical information protection are needed. These programs should adhere to the characteristics of the department by linking with the training institution.