• 제목/요약/키워드: Remote Security

검색결과 574건 처리시간 0.025초

리눅스를 기반으로 한 홈오토메이션 서버의 구현 (An Implementation of a Home Automation Server Based on Linux)

  • 성한용;김규칠;방철원;김용석
    • 산업기술연구
    • /
    • 제22권B호
    • /
    • pp.141-146
    • /
    • 2002
  • It becomes common to use computers to control electronic devices and security facilities in newly constructed buildings and house. There are many home application devices in the market which can be controlled by computers. But they are expensive and managed by specialized companies. This paper is focused on personal computers which are available in most homes and can be used to control home electronic appliances and home security facilities. We implemented a home automation server based on Linux. The standard parallel port of personal computer is used to connect sensors and actuators. Therefore, the cost of the server is very low. Moreover, the server is connected to Internet and anywhere we can control and monitor the home security facilities and home automation systems.

  • PDF

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • 제8권3호
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

Key Distribution Process for Encryption of SCADA Communication using Game Theory applied Multiagent System

  • Kim, Hak-Man;Kang, Dong-Joo
    • 조명전기설비학회논문지
    • /
    • 제23권11호
    • /
    • pp.34-43
    • /
    • 2009
  • SCADA (Supervisory Control and Data Acquisition) system has been used for remote measurement and control on the critical infrastructures as well as modem industrial facilities. As cyber attacks increase on communication networks, SCADA network has been also exposed to cyber security problems. Especially, SCADA systems of energy industry such as electric power, gas and oil are vulnerable to targeted cyber attack and terrorism Recently, many research efforts to solve the problems have made progress on SCADA network security. In this paper, flexible key distribution concept is proposed for improving the security of SCADA network using Multiagent System (MAS).

Cho의 원격 인증스킴에 대한 보안 취약점 분석 (Security Vulnerability Analysis for Cho's Remote Authentication Scheme)

  • 정명수;김준섭;곽진
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 추계학술발표대회
    • /
    • pp.812-814
    • /
    • 2011
  • 현재까지 사용되는 인증 기술에서는 패스워드 기반의 인증스킴이 주로 사용되고 있다. 공개된 네트워크상에서의 인증스킴의 안전성 보장을 위하여 많은 인증스킴이 연구 및 제안되고 있지만, 이러한 인증스킴들은 아직까지 여러 보안 취약점의 문제를 갖고 있다. 2010년 Cho는 Lee 등의 인증스킴을 분석하여 보안이 개선된 원격 인증스킴을 제안하였지만, 이 인증스킴 또한 여전히 공격자에 의한 DoS 공격과 훔친 검증자 공격에 대한 취약점을 가지고 있다. 따라서 본 논문에서는 Cho의 원격 인증스킴에 대해 분석하고, DoS 공격과 훔친 검증자 공격에 대해 안전하지 못함을 증명한다.

드론 RC 무선조종기 제어 데이터 보호를 위한 경량암호 적용 방법에 관한 연구 (A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data)

  • 윤정일;윤승용;김병구;강유성
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 추계학술발표대회
    • /
    • pp.1185-1186
    • /
    • 2023
  • RC 무선조종기를 통해 드론을 원격으로 제어하는 경우, 제어 데이터의 기밀성과 무결성은 드론 제어권 탈취 방지를 위한 핵심 고려 사항이다. 본 논문은 드론 RC 무선조종기 제어 데이터 보호를 위해 경량 암호화 알고리즘 중 하나인 Lightweight Encryption Algorithm (LEA)를 적용하는 방법을 제시한다. LEA 는 32 비트 마이크로 컨트롤러인 ARM Cortex-M4 와 같은 플랫폼에 최적화된 구조로, 저전력으로 데이터 보호를 유지하면서 효율적인 암호화 알고리즘을 적용할 수 있다.

원격, 이동 사용자를 위한 효율적 인트라넷 접속 방법론 (Efficient Intranet Connection Methodology for Remote and Mobile User)

  • 문현욱;오기성
    • 전자공학회논문지T
    • /
    • 제36T권4호
    • /
    • pp.110-114
    • /
    • 1999
  • 본 논문에서는 원격, 이동 사용자들이 자사 인트라넷에 효율적으로 접속하기 위한 방안으로 현재 대두되고 있는 여러 접속 방안들을 좀 더 구체적으로 정형화 시킨 3단계 방안을 제시하고 적용해 봄으로써 원격, 이동 상황에서 인트라넷 접속의 확실한 해결책이 무엇인지를 검증해 볼 수 있는 방향을 제시했다.

  • PDF

Privileged-Insider 공격에 안전한 원격 사용자 인증 프로토콜 (Secure Remote User Authentication Protocol against Privileged-Insider Attack)

  • 이성엽;박요한;박영호
    • 한국멀티미디어학회논문지
    • /
    • 제20권4호
    • /
    • pp.614-628
    • /
    • 2017
  • Recently, Due to the rapid development of the internet and IT technology, users can conveniently use various services provided by the server anytime and anywhere. However, these technologies are exposed to various security threat such as tampering, eavesdropping, and exposing of user's identity and location information. In 2016, Nikooghadam et al. proposed a lightweight authentication and key agreement protocol preserving user anonymity. This paper overcomes the vulnerability of Nikooghadam's authentication protocol proposed recently. This paper suggests an enhanced remote user authentication protocol that protects user's password and provides perfect forward secrecy.

Secure Message Transmission against Remote Control System

  • Park, Taehwan;Seo, Hwajeong;Bae, Bongjin;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • 제14권4호
    • /
    • pp.233-239
    • /
    • 2016
  • A remote control system (RCS) can monitor a user's confidential information by using the broadcast receivers in Android OS. However, the current RCS detection methods are based only on a virus vaccine. Therefore, if the user's smartphone is infected by a brand new RCS, these methods cannot detect this new RCS immediately. In this paper, we present a secure message transmission medium. This medium is completely isolated from networks and can communicate securely through a QR code channel by using symmetric key cryptography such as the AES block cipher and public key cryptography such as elliptic curve cryptography for providing security. Therefore, the RCS cannot detect any confidential information. This approach is completely immune to any RCS attacks. Furthermore, we present a secure QR code-based key exchange protocol by using the elliptic curve Diffie-Hellman method and message transmission protocols; the proposed protocol has high usability and is very secure.

긴급제언 - 원격감시제어시스템의(SCADA) 기술현황과 도시가스산업에서의 발전방안 (The Current technology state of "Supervisory Control And Data Acquisition System(SCADA)" and development plan in the city-gas industry)

  • 최인환
    • 기술사
    • /
    • 제43권3호
    • /
    • pp.28-33
    • /
    • 2010
  • The related industrial technologies are also being developed in medicine, education, the military, transportation, process management, security management and information technology industries due to a rapid progress in telecommunications technology. The supervisory remote control system is based upon telecommunications technology. The supervisory remote control systems are used in various ways such as city gas, water supply and drainage, environment, power, communication and device control fields. The supervisory remort control system became a solution with complex systems and important technologies in electricity, city gas filed that require safety management skills. The supervisory remote control system as a special technology has a lot of practical applications. In this paper, Let me examine the present status of remort control system applications and present development plans and alternatives in city-gas industrial technology.

  • PDF

스마트카드를 이용한 안전한 경량급 사용자 인증 스킴의 설계 (Security Enhancement of Lightweight User Authentication Scheme Using Smartcard)

  • 이영숙
    • 융합보안논문지
    • /
    • 제20권4호
    • /
    • pp.209-215
    • /
    • 2020
  • 인터넷을 통한 통신환경은 연결 가능한 사물들 간에 효율적인 통신을 제공한다. 이런 환경에서의 정보통신은 우리에게 편리함을 제공하기는 하나 여러 형태의 보안위협이 도사리고 있는 실정이다. 인터넷을 이용하여 원격으로 접속하여 제공받는 서비스에 존재하는 보안위협 중 대부분은 전송되는 정보의 유출과 클라이언트 서버 간 인증에 대한 손실이다. 2016년 Ahmed 등이 스마트카드를 이용한 안전한 경량급 사용자 인증 스킴을 제안하였다. 그러나 Kang등이 제안한 논문에서 그들이 제안 프로토콜은 identity guessing attack에 취약하고 session key confirmation을 달성할 수 없다는 것을 주장하였다. 본 논문은 Ahmed 등이 제안한 논문의 취약점을 개선하여 더욱 안전하고 효율적인 경량급 사용자 인증 스킴을 제안하였다.