• Title/Summary/Keyword: Remote Security

Search Result 574, Processing Time 0.021 seconds

The analysis on Japan's New Maritime Strategy and the Development of its Naval Forces - focusing on Japan's countermeasure to China's pursuing of maritime hegemony - (일본의 신(新) 해양전략과 해상전력 발전 동향 분석 - 중국의 해양패권 추구에 대한 대응을 중심으로 -)

  • Bae, Joon-Hyung
    • Strategy21
    • /
    • s.40
    • /
    • pp.5-36
    • /
    • 2016
  • Recently, the Japanese government revised the three guidelines of its security policy, the National Security Strategy(NSS), the National Defense Program Outline and Midterm Defense Buildup Plan, exceptionally at one time. This means Japan has been seeking the new strategy and strengthening military power considering changing regional security environment. Moreover, Japan revised the security laws for the right to collective self-defense, which authorized the use of force even when Japan is not under attack. Also, Japan renewed the Guidelines for Japan-U.S. Defense Cooperation in twenty years, and has expanded JSDF's scope of activity to a worldwide level. These changes imply Japan would constantly seek to build military forces focusing on naval forces. Because Japan's naval forces, the JMSDF is the means that allow Japan to use its force at anywhere overseas and expand its roles and missions in international society by the basis of the right to collective self-defense. This research will analyze Japan's new maritime strategy and trend of force development and eventually look for the implication on our maritime security These days, Japan has perceived Chinese rapid increase of naval power and pursuing of maritime hegemony as a grave threat. In response to this, Japan is designing new maritime strategy, which are "remote islands defense and recapture" and proactively develop a new type of naval forces to accomplish this new strategy. The Japan's "remote island defense and recapture strategy" is to harden its defensive posture in Nansei islands which correspond to China's 1st island chain for chinese A2/AD strategy and directly encounter with China and to protect its own dominium and maritime interest while supporting US national strategy in East Asia. Japan continues to build compact, multi-functional ship to accomplish "remote island defense and recapture strategy" and keep strengthening its maritime power projection capability to include build of new amphibious ship, and large, multi-functional ship which can provide effective C2. These changes imply that Japan is shifting its strategy from passive and defensive to proactive and aggressive way and continues to pursue naval buildup.The implication of Japan's new maritime strategy and naval buildup needs to be observed carefully and we need to keep developing naval power required to protect our maritime sovereignty and interest.

Implementation of Secur ed Remote EMR Medical Information using Encryption Algorithm (암호화 알고리즘을 이용한 안전한 원격 EMR 의료정보 구현)

  • Yang, Jaesoo;Lee, You-Sik;Hong, Yousik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.133-139
    • /
    • 2014
  • Nowadays, telemedicine and remote prescription has been operating as a pilot basis. However, in case of remote hospitals without encrypting the biometric data transmission and its contents, the patient prescription data hacked from hackers who changed prescription medications can be serious obstacles to the patient. Therefore, in this paper, to solve this problem, password encryption, personal identification information, biometric data security on the patient's prescription and remote medical information system, and implementation of the encryption algorithm are proposed.

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

Vulnerability Analysis of Remote Multi-Server User Authentication System Based on Smart Card and Dynamic ID (스마트 카드 및 동적 ID 기반 멀티서버 원격 사용자 인증 프로토콜의 취약점 분석)

  • Kwon Soon Hyung;Byeon Hae won;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.43-52
    • /
    • 2023
  • Many businesses and organizations use smartcard-based user authentication for remote access. In the meantime, through various studies, dynamic ID-based remote user authentication protocols for distributed multi-server environments have been proposed to protect the connection between users and servers. Among them, Qiu et al. proposed an efficient smart card-based remote user authentication system that provides mutual authentication and key agreement, user anonymity, and resistance to various types of attacks. Later, Andola et al. found various vulnerabilities in the authentication scheme proposed by Qiu et al., and overcame the flaws in their authentication scheme, and whenever the user wants to log in to the server, the user ID is dynamically changed before logging in. An improved authentication protocol is proposed. In this paper, by analyzing the operation process and vulnerabilities of the protocol proposed by Andola et al., it was revealed that the protocol proposed by Andola et al. was vulnerable to offline smart card attack, dos attack, lack of perfect forward secrecy, and session key attack.

A remote device authentication scheme in M2M communications (M2M 통신에서 원격장치 인증 기법)

  • Lee, Song-Hee;Park, Nam-Sup;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.309-316
    • /
    • 2013
  • Machine-to-machine (M2M) communication occurs when devices exchange information independent of human intervention. Prominent among the technical challenges to M2M communication are security issues, such as eavesdropping, spoofing, modification, and privacy violation. Hence, it is very important to establish secure communication. In this paper, we propose a remote authentication scheme, based on dynamic ID, which provides secure communication while avoiding exposure of data through authentication between the M2M domain and the network domain in the M2M architecture. We then prove the correctness and security of the proposed scheme using a logic-based formal method.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.

Design and Implementation of CCTV Remote Real-time Monitoring and Context Reporting System using Xcode (Xcode를 이용한 CCTV 원격 실시간 모니터링 및 상황 알림보고 시스템의 설계 및 구현)

  • Yang, Soo-Mi;Kim, Yu-Rim
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.83-89
    • /
    • 2015
  • In the wide area surveillance system including many CCTVs, application for remote realtime monitoring is designed and implemented. The applications using Xcode provide secure administrator interface from headquarters. Through the efficient and intuitive interface, it delivers real-time context reports and inference results. For the user convenience, it includes push alarm of events, SNS, Media streaming service for real-time monitoring uses Wirecast and Wowza media server. Wowza stream engine provides URL accommodating development specification. Mobile devices can receive real-time stream data. Performance evaluation in the processing is provided.

Improved authentication mechanism of the RADIUS protocol in the Internet of Things (사물인터넷 환경에서 RADIUS 프로토콜의 향상된 인증기법)

  • Kim, Young-Se;Han, Keun-hee;Kim, Kee-cheon
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.1-6
    • /
    • 2016
  • The IOT environment, people connected to the network, object, everything such as space (Things) generates data in real time. The information between the object collecting, sharing, are utilized. Currently health care, research in various fields such as smart home has been promoted. Also appeared concepts emphasized all things(IOE) Internet connection between the geographic space and the Internet. Human, while important connections between the objects, such as objects, studies of efficient and secure authentication technologies have been developed. In this paper, we propose a RADIUS (Remote Authentication Dial In User Service) protocol for improved mutual authentication between each object in the IOT environment.

Individual users based SmartPhone Remote Management System Design and Implementation (개인사용자 기반 스마트폰 원격관리 시스템 설계 및 구현)

  • Kang, Sung-Tae;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2675-2681
    • /
    • 2012
  • By increasing of the population that uses smartphones, problems such as the leakage of private and confidential information due to portable and easy to store and movement of diverse contents occur for a variety of security threats. In this report, it provides helpful information to customers in order to respond various security threat by implementing and designing an remote administration system with using Mobile Device Management (MDM), technology. As a result, customers themselves can prevent information spill by managing remotely from WEB due to the lost and stolen. It is also possible to use control and monitoring.

An Enhanced Remote Data Checking Scheme for Dynamic Updates

  • Dong, Lin;Park, Jinwoo;Hur, Junbeom;Park, Ho-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1744-1765
    • /
    • 2014
  • A client stores data in the cloud and uses remote data checking (RDC) schemes to check the integrity of the data. The client can detect the corruption of the data using RDC schemes. Recently, robust RDC schemes have integrated forward error-correcting codes (FECs) to ensure the integrity of data while enabling dynamic update operations. Thus, minor data corruption can be recovered by FECs, whereas major data corruption can be detected by spot-checking techniques. However, this requires high communication overhead for dynamic update, because a small update may require the client to download an entire file. The Variable Length Constraint Group (VLCG) scheme overcomes this disadvantage by downloading the RS-encoded parity data for update instead of the entire file. Despite this, it needs to download all the parity data for any minor update. In this paper, we propose an improved RDC scheme in which the communication overhead can be reduced by downloading only a part of the parity data for update while simultaneously ensuring the integrity of the data. Efficiency and security analysis show that the proposed scheme enhances efficiency without any security degradation.