• Title/Summary/Keyword: SNEP

Search Result 10, Processing Time 0.038 seconds

Study on the OMAC-SNEP for Unattended Security System Using Wireless Sensor Networks (무선 센서 네트워크를 이용한 무인 경비 시스템에서의 OMAC-SNEP 기술에 관한 연구)

  • Lee Seong-Jae;Kim Hak-Beom;Youm Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.105-114
    • /
    • 2006
  • Ubiquitous Sensor Network consists of a number of sensor nodes with a limited computation power and limited communication capabilities, and a sensor node is able to communicate with each other at anytime and in any place. Due to the rapid research and development in sensor networks, it will rapidly grow into environments where hmm beings can interact in an intuitive way with sensing objects which can be PDAs, sensors, or even clothes in the future. We are aiming at realizing an Unattended Secure Security System to apply it to Ubiquitous Sensor Network. In this paper, the vulnerabilities in the Unattended security system are identified, and a new protocol called OMAC-SNEP is proposed for the Unattended Secure Security System. Because the CBC-MAC in SNEP is not secure unless the message length is fixed, the CBC-MAC in SNEP was replaced with OMAC in SNEP. We have shown that the proposed protocol is secure for my bit length of messages and is almost as efficient as the CBC-MAC with only one key. OMAC-SNEP can be used not only in Unattended Security System, but also any other Sensor Networks.

SPINS 보안 프로토콜 중 SNEP의 구현

  • Jang, Beom-Su;Lee, Gi-Yeong
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.197-198
    • /
    • 2006
  • 본 논문에서는 센서 네트워크에 SPINS 보안 프로토콜을 적용하여 그 성능을 판별하려 하였다. 센서 네트워크의 보안을 유지하기 위해 SPINS에서는 SNEP과 ${\mu}TESLA$로 세분화 되어 데이터 인증, 보안과 키 관리를 각각 담당하게 된다. 본 논문에서는 그 중 SNEP을 nesC를 이용하여 TinyOS기반 센서에 적용하였다.

  • PDF

Design & Implementation of Authentication System for Home Network Service (홈 네트워크 서비스를 위한 인증 시스템 설계 및 구현)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.917-920
    • /
    • 2007
  • In this paper, we designed the authentication system for home network service and applied it to actual sensor nodes. SNEP protocol of SPINS provides confidentiality of data and authentication. We achieved authentication key, encryption and decryption applied RCS encryption algorithm of SNEP. In addition, we used pair-wise key pre-distribution for prevention of authentication sniffing in wireless sensor network. The experiment environment consists of a base station receiving data and sensor nodes sending data. Each sensor nodes sends both the data and encrypted authentication key to the base station. The experiences had shown that the malfunction doesn't happen in communication among other groups. And we confirmed in tests that the system is secure when a sensor having malicious propose is added.

  • PDF

Design of RFID Security System Using SNEP and ECC (SNEP와 ECC를 이용한 RFID 보안 시스템 설계)

  • Park, Sang-Hyun;Han, Soo;Choi, Yong-Sik;John, Young-Jun;Shin, Seoung-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.503-506
    • /
    • 2006
  • IT 기술의 발달로 인간의 편이를 위한 많은 기술들이 생겨나고 21세기 IT분야만이 아닌 사회 전 분야에서 가장 주목을 받는 기술이 유비쿼터스이다. 유비쿼터스는 사용자의 인식없이 컴퓨터와 통신을 하는 기술이다. 주거환경의 개선 부분이나 구매의 편리를 위한 부분에서 가장 많은 적용이 시도 되고 있다. 하지만 무분별한 인식에 의한 개인의 프라이버시와 여러 가지 보안문제가 야기되고 있다. 일반 RFID 분야에서는 보안이 필요 없는 부분도 있지만 RFID가 더 많은 분야에서 시도가 되려면 보안요소가 꼭 필요하다. 본 논문에서는 저 전력과 낮은 메모리에서 사용하기 위해서 무선에서 사용하고 있는 보안 모듈인 SNEP와 ECC알고리즘을 RFID에 적용할 수 있는 시스템을 설계 및 제안한다.

  • PDF

Implementation of Middleware Security System for Home Networking (홈 네트워킹을 위한 미들웨어 보안시스템 구현)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.863-869
    • /
    • 2008
  • In this paper, a system with sensor network security mechanism which can be applied to home network structure is designed and it is implemented on a virtual network of a home network middleware. The basic structure of home networking middleware supports one-to-one (unicast) or broadcast communication mode between the lookup server and service nodes on the network. Confidentiality and authentication are key security factors of the one-to-one communication and user authentication is crucial for broadcasting mode. One of the sensor network's security techniques SPINS consists of SNEP and ${\mu}TESLA$. The SNEP ensures confidentiality and authentication, and ${\mu}TESLA$ provides broadcast authentication. We propose a SPIN based home network middleware and it is implemented by using the CBC-MAC for MAC generation, the counter mode (CTR) for message freshness, the pseudo random function (PRF) and RC5 as encryption algorithm. The implementation result shows that an attacker cannot decrypt the message though he gets the secure key because of CTR mode. In addition, we confirmed that a received message of the server is authenticated using MAC.

Design of Home Network Security System (홈 네트워크 보안시스템 설계)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.193-194
    • /
    • 2006
  • In this paper, the SPINS, a sensor network security mechanism, was researched to design a system to be applied to home network structure and check the security of which degree was ensured by a virtual network of home networking middleware. Sensor Network security mechanism SPINS provides data confidentiality and authentication by SNEP, and provides authenticated broadcast by ${\mu}TESLA$. We designed the system that applied SPINS to home networking middleware basic structure.

  • PDF

A Study on the Fabrication and Design of Superconducting Tunnel junction for Millimeter Wave Mixers (밀리미터파 믹서용 초전도 턴넬 접합 설계와 제작에 관한 연구)

  • 한석태;이창훈;서정빈;박동철
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.30A no.10
    • /
    • pp.12-19
    • /
    • 1993
  • Because of their high sensitivity and moderate bandwidth, superconducting receivers with SIS (Superconductor Insulator Superconductor) tunnel junction mixer are now widely used for millimeter wave radio astronomy. In this paper we have introduced how to determine the parameters of SIS tunnel junction which have to be optimized to achieve a good mixer performance. From these results of optimized junction parameters determined by this methods, SIS junctions which consist of a series array of four Nb/Al-AlOx/Nb junctions with each area 3.4${\mu}m^{2}$ have been fabricated by SNEP (Selective Niobium Etching Process) and RIE (Reactive Ion Eching). Also we have tested their DC current-voltage characteristics. These SIS junctions will be used as a mixer for 100GHz band cosmic waves receiver.

  • PDF

Characterization of $Nb/Al-Al_2O_3/Nb$ Josephson junction arrays fabricated With and Without cooling substrate (기판 냉각과 비냉각으로 제작된 $Nb/Al-Al_2O_3/Nb$ 조셉슨 접합 어레이의 특성)

  • Hong, Hyun-Kwon;Kim, Kyu-Tae;Park, Se-Il;Lee, Kie-Young
    • Proceedings of the KIEE Conference
    • /
    • 2001.07c
    • /
    • pp.1402-1404
    • /
    • 2001
  • Josephson junction arrays of the type $Nb/Al-Al_2O_3/Nb$ were prepared by DC magnetron sputtering. The tunnel barrier was formed by in-situ thermal oxidation. Individual junctions were defined using selective niobium etching process(SNEP). The characteristic curves of Josephson junction arrays fabricated with and without cooling the substrate were represented. The junctions deposited without cooling showed poor characteristics(high leakage current, low gap voltage), and a high quality Josephson junction array of 2,000 junctions with high hysteresis was obtained with cooling and when operated at 74.6 GHz, it generated stable quantized voltage steps up to 2.2 V.

  • PDF

Design of protocol for RFID/USN security (RFID/USN 보안을 위한 프로토콜 설계)

  • Park, Sang-Hyun;Park, Sang-Min;Shin, Seung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.3
    • /
    • pp.103-109
    • /
    • 2007
  • Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.

A Study of Implementation for Home Networking Security System (홈 네트워크를 위한 보안 시스템 구현에 관한 연구)

  • Seol, Jeong-Hwan;Kim, In-Kyum;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.616-619
    • /
    • 2008
  • In this paper, we design and implement the authentication system for home network service and applied it to actual sensor nodes. We achieved authentication key, encryption and decryption applied RC5 encryption algorithm of SNEP. In addition, we used pair-wise key pre-distribution for prevention of authentication sniffing in wireless sensor network. The experiment environment consists of a base station receiving data and sensor nodes sending data. Each sensor nodes sends both the data and encrypted authentication key to the base station. As a simulation environment, we assumed some what-if scenarios of security menaces in home network service. And we slightly altered the TOS_Msg construction of TinyOS. The experiences had shown that the malfunction doesn't happen in communication among other groups. And we confirmed in tests that the system is secure when a sensor having malicious propose is added.

  • PDF