• Title/Summary/Keyword: Secure Channel

Search Result 322, Processing Time 0.025 seconds

Design and Implementation of Protocol to Transfer Secure Messages for PDA (PDA에서 운용 가능한 보안 메시지 전송 프로토콜 설계 및 구현)

  • Lee, Ki-Young;Lee, Jeong-Kyoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.181-187
    • /
    • 2005
  • This paper proposes and implements a service model to transfer messages safely for PDA on CDMA wireless network and a secure massage transfer protocol which considers characteristics of PDA. Proposed service uses SMS(Short Message Service) connect to a off-line client device with the wired network for data communication. After receiving SMS message, client device processes the SMS message and creates a data channel through RAS(Remote Access Service), then the data of the server can be pushed to clients. The implemented security protocol can provide safe data transmission on each communication line through two way channels(SMS and data). Also, by using security nonce table, this protocol can reduce a number of transmissions for exchanging a safe session key, so intensity of encryption can be increased.

On Securing Web-based Educational Online Game Using SSL Protocol (SSL 프로토콜을 이용한 안전한 웹기반 교육용 온라인 게임)

  • Yani, Kadek Restu;Priyana, Yoga;Rusmin, Pranoto H.;RHEE, Kyung-Hyune
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.3
    • /
    • pp.790-798
    • /
    • 2016
  • Currently, web-based online games is becoming popular in supporting learning process due to their effective and efficient tool. However, online games have lack of security aspect, in particular due to increase in the number of personal information leakage. Since the data are transmitted over insecure channel, it will be vulnerable of being intercepted by attackers who want to exploit user's identity. This paper aims to propose an online web-based educational game, Vidyanusa which allows the students to register their personal information using a unique code, a user name and a password. It manages the users according to their schools, subject teachers and class levels. In addition, by adopting a unique code, the confidentiality of the user identity can be kept away from attackers. Moreover, in order to provide a secure data communication between client and server, Secure Socket Layer (SSL) protocol is adopted. The performance of the system after implementing SSL protocol is examined by loading a number of requests for various users. From the experiment result, it can be concluded that the SSL protocol can be applied to web-based educational system in order to offer security services and reliable connection.

Design of Authentication Protocol for IMT-2000 (IMT-2000 인증 프로토콜 설계)

  • Gang, Hyeong-U;Yun, Lee-Jung;Lee, Su-Yeon;Park, Chang-Seop;Lee, Dong-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2133-2144
    • /
    • 1999
  • IMT-2000 system is expected to start its service at the beginning of 2000 on the purpose of providing with the highest qualitative service through one mobile terminal. In this paper, we investigate some of the important issues which need to be addresses in designing an authentication protocol for IMT-2000. Also proposed is an authentication protocol which addresses the above issues, and we design a correct and efficient authentication protocol to establish secure communication channel. Our protocol provides an authentication of the communication entities, location privacy, and secure messaging as well as global roaming service.

  • PDF

Implementation of Secure VoIP System based on H.235 (H.235 기반 VoIP 보안 시스템 구현)

  • 임범진;홍기훈;정수환;유현경;김도영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1238-1244
    • /
    • 2002
  • In this paper, H.235-based security mechanism for H.323 multimedia applications was implemented. H.235 covers authentication using HMAC, Diffie-Hellman key exchange, session key management for voice channel, and encryption functions such as DES, 3DES, RC2. Extra encryption algorithms such as SEED, and AES were also included for possible use in the future. And, we also analyzed the quality of service (QoS), the requirement of implementation, and interoperability to the result in this study. The results could be applied to secure simple IP phone terminals, gateways, or gatekeepers.

An Efficient Secrete Key Protection Technique of Scan-designed AES Core (스캔 설계된 AES 코아의 효과적인 비밀 키 보호 기술)

  • Song, Jae-Hoon;Jung, Tae-Jin;Jeong, Hye-Ran;Kim, Hwa-Young;Park, Sung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.2
    • /
    • pp.77-86
    • /
    • 2010
  • This paper presents an efficient secure scan design technique which is based on a fake key and IEEE 1149.1 instruction to protect secret key from scan-based side channel attack for an Advanced Encryption Standard (AES) core embedded on an System-on-a-Chip (SoC). Our proposed secure scan design technique can be applied to crypto IP core which is optimized for applications without the IP core modification. The IEEE 1149.1 standard is kept, and low area, low power consumption, very robust secret-key protection and high fault coverage can be achieved compared to the existing methods.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

Isonumber based Iso-Key Interchange Protocol for Network Communication

  • Dani, Mamta S.;Meshram, Akshaykumar;Pohane, Rupesh;Meshram, Rupali R.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.209-213
    • /
    • 2022
  • Key exchange protocol (KEP) is an essential setup to secure authenticates transmission among two or more users in cyberspace. Digital files protected and transmitted by the encryption of the files over public channels, a single key communal concerning the channel parties and utilized for both to encrypt the files as well as decrypt the files. If entirely done, this impedes unauthorized third parties from imposing a key optimal on the authorized parties. In this article, we have suggested a new KEP term as isokey interchange protocol based on generalization of modern mathematics term as isomathematics by utilizing isonumbers for corresponding isounits over the Block Upper Triangular Isomatrices (BUTI) which is secure, feasible and extensible. We also were utilizing arithmetic operations like Isoaddition, isosubtraction, isomultiplication and isodivision from isomathematics to build iso-key interchange protocol for network communication. The execution of our protocol is for two isointegers corresponding two elements of the group of isomatrices and cryptographic performance of products eachother. We demonstrate the protection of suggested isokey interchange protocol against Brute force attacks, Menezes et al. algorithm and Climent et al. algorithm.

A Study on the Channel Capacity Simulator of Wireless Communication System (무선통신 시스템의 채널용량 시뮬레이터에 관한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.3
    • /
    • pp.223-228
    • /
    • 2014
  • Recently mobile communication systems have supported various multimedia services based on wideband code division multiple access (WCDMA). In November 2013, the statistics reported that the domestic subscriber number of mobile communication systems was totally 54 million 514 thousand 397 in using feature phones and smart phones. Therefore, the user number of mobile communication services has surpassed over 4 million rather than the whole number of population. The sharp increase of the mobile user number has made the network management and analysis for mobile communication services more important than before. Besides, the service quality has been studied in various ways. This paper has implemented the simulator calculating the channel capacity of mobile communication systems to support secure and stable services for both feature phones on CDMA and smart phones on WCDMA. By using the simulator, this paper has analyzed the characteristics of the various channel capacity in mobile communication environments.

Performance Improvement of Terrestrial DTV Receivers Using Frequency-domain Equalization (주파수 영역 등화를 이용한 지상파 DTV 수신 성능 개선)

  • Son Sang-Won;Kim Ji-Hyun;Kim Hyoung-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4C
    • /
    • pp.351-363
    • /
    • 2006
  • The 8-VSB modulation, the transmission standard for the terrestrial digital television(DTV) of the Advanced Television Systems Committee(ATSC), suffers from multipath fading because it conveys information on the amplitude. To solve this problem, decision feedback equalizers(DFE's) have been commonly used in terrestrial DTV receivers. However, under severe channels, such as a 0 dB ghost channel or a single frequency network (SFN) channel, the DFE shows unstable convergence due to the error propagation caused by decision errors. Instead of unstable time-domain DFE schemes, by proposing a frequency-domain direct-inversion equalization method, we try to guarantee stable equalization and achieve low symbol error rates. To secure the existence of a channel inverse, channel-matched filtering and noncausal filtering are carried out prior to equalization. Simulation results show that the proposed method performs much better than existing DFE schemes in terms of both the stability and the symbol error rate.

Wavelength Selective Switch using LCoS Display (LCoS 디스플레이를 이용한 파장선택스위치)

  • Lee, Yong-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.8
    • /
    • pp.5288-5293
    • /
    • 2014
  • This paper presents the characterization of the wavelength selective switch using a LCOS display instead of a MEMS device, which is a core technology for the next generation ROADM. We constructed a five-port WSS, and examined the basic characteristics of the WSS, such as the response time, beam steering, insertion loss, and channel isolation. The response time of WSS was 11.6 mS and the beam steering characteristics of LCOS was well performed. The measured insertion loss at 40 channels in the c-band were 5.5~12.7 dB and channel isolation was 16~18 dB. Although the characteristics of LCOS-based WSS are inferior to the conventional MEMS-based WSS, it can be improved by additional experiments that secure the technology competitiveness.