• Title/Summary/Keyword: Secure Storage

Search Result 397, Processing Time 0.025 seconds

A New Group Key Management Protocol for WSN

  • Gerelbayar, Tegshbayar;Lee, Sang-Min;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.143-152
    • /
    • 2008
  • Sensor networks have a wide spectrum of military and civil applications, particularly with respect to security and secure keys for encryption and authentication. This thesis presents a new centralized approach which focuses on the group key distribution with revocation capability for Wireless Sensor Networks. We propose a new personal key share distribution. When utilized, this approach proves to be secure against k-number of illegitimate colluding nodes. In contrast to related approaches, our scheme can overcome the security shortcomings while keeping the small overhead requirements per node. It will be shown that our scheme is unconditionally secure and achieves both forward secrecy and backward secrecy. The analysis is demonstrated in terms of communication and storage overheads.

  • PDF

RFID-based Secure Communication for Smart Device in Future Home Network Environment

  • Li, Nong-Jun;Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.1
    • /
    • pp.18-22
    • /
    • 2013
  • We introduce, in this paper, a novel approach of protection mechanism for data which are transmitted not only between the networked devices but also between the digital media devices. As the devices are getting more powerful and more storage capacity, they can process the encoded/encrypted data autonomously. However, all devices must know the secret key that used to encrypt data, and also use secure method to distribute that key. Moreover, there are no protection mechanisms supporting end-to-end copy protection which result in the fact that the data passed through various devices can be manipulated or captured. Therefore, we propose a RFID-based key distribution and protection mechanism to resolve these problems.

A Study on System Structure and GUI Implement for Secure ESS use (안전한 ESS 사용을 위한 System 구조와 GUI 구현에 관한 연구)

  • Kim, Wantae;Kim, Hyunsik;Park, Byungjoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.11-17
    • /
    • 2019
  • As interest in the efficiency use of energy has been recently rising, studies have been performed in utilizing various types of eco-friendly green energy and natural energy. Especially there has been rapidly increase in the fields using ESS (Energy Storage System), which is the technology for storing the energy from nature. The application fields of ESS is continuously growing and expanding to various types of technologies. However, in recent years there have been continuing problems with the safety of ESS. And related researches are going on. In this paper, we has proposed a system structure to utilize more secure ESS and has monitored the system status of ESS in real time by using smart phone app. This paper has also proposed a new method to configure secure ESS by implementing GUI (Graphical User Interface) to control the system. And then explain experimental results to investigate the efficiency of the proposed ESS.

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

Empowering Blockchain For Secure Data Storing in Industrial IoT

  • Firdaus, Muhammad;Rhee, Kyung-Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.231-234
    • /
    • 2020
  • In the past few years, the industrial internet of things (IIoT) has received great attention in various industrial sectors which have potentially increased a high level of integrity, availability, and scalability. The increasing of IIoT is expected to create new smart industrial enterprises and build the next generation smart system. However existing IIoT systems rely on centralized servers that are vulnerable to a single point of failure and malicious attack, which exposes the data to security risks and storage. To address the above issues, blockchain is widely considered as a promising solution, which can build a secure and efficient environment for data storing, processing and sharing in IIoT. In this paper, we propose a decentralized, peer-to-peer platform for secure data storing in industrial IoT base on the ethereum blockchain. We exploit ethereum to ensure data security and reliability when smart devices store the data.

Identification of Hazard for Securing the Safety of Unmanned Parcel Storage Device System Using Robot Technology

  • Park, Jae Min;Kim, Young Min
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.132-139
    • /
    • 2022
  • The development of the fourth industrial revolution and logistics 4.0 related technology, the growth of the e-commerce market, and the transition to a non-face to face society due to the pandemic are accelerating the growth of the logistics industry. Due to the growth of the logistics industry, various services are emerging to meet the requirements of the market, and research and technology development related to the parcel storage, which is an important element of the last mile service, is also underway. In the past, if it was difficult to deliver the goods directly to the recipient, the parcel storage installed near the delivery location was used, but the usability was not good and the storage of the goods was limited. In addition, the existing parcel storage has a lot of functional limitations compared to the advanced logistics technology, so it is necessary to develop a device that improves it. Therefore, this study conducted to secure safety for unmanned parcel storage devices with robot technology to improve usability and functionality in line with the advanced logistics industry. Based on ISO 10218, an industrial robot related standard, risk identification studies were conducted to derive results that contribute to the development of devices under development.

Research on Security Model and Requirements for Fog Computing: Survey (포그 컴퓨팅 보안 모델과 보안 요구사항 연구: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.27-32
    • /
    • 2018
  • IoT technology is developing with various application areas in $4^{th}$ Industrial revolution. There are many users using the application services. Sensing data from various environment need to be transferred to cloud computing storage and store in the cloud storage. However, physical distance from the end node to cloud computing storage is far away, and it is not efficient to transfer data from sensors and store the sensing data in the cloud storage whenever sensing data happen. Therefore, Fog computing is proposed to solve these problems which can process and store the sensing data. However, Fog computing is new emerging technology, there is no standard security model and requirements. This research proposes to security requirements and security model for Fog computing to establish a secure and efficient cloud computing environment.

The Development of the System Operation Safety of Unmanned Parcel Storage System with ICT and Cold Chain Technology (ICT 콜드체인 기술이 적용된 무인 택배물품 보관장치의 시스템 운영 안전성 확보를 위한 연구)

  • Park, Jae-Min;Kim, Young-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.24 no.3
    • /
    • pp.29-37
    • /
    • 2022
  • The development of technology related to the Fourth Industrial Revolution and the growth of the online market due to pandemic are continuing the growth of the logistics market for product delivery. If it is difficult to deliver the product directly to the customer during delivery, storage and delivery using the unmanned courier box are being carried out. However, existing storage boxes are not actively used due to lack of usability even though they have the advantage of storing goods and delivering non-face-to-face. In addition, existing courier boxes are not prepared for cold chain transportation. The unmanned delivery storage device with ICT cold chain technology should be developed to prepare for the transition to non-face-to-face society, to improve logistics efficiency and meet user's requirements. Also, it is necessary to consider the measures to reduce the safety problems that may occur during the use and maintenance of the automatic system. This study conducted a model-based analysis for the development of unmanned delivery storage devices with ICT cold chain technology, and conducted a study to derive the system development specifications that meet the requirements and secure safety and apply them to the development process.

KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks

  • Guermazi, Abderrahmen;Belghith, Abdelfettah;Abid, Mohamed;Gannouni, Sofien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.901-923
    • /
    • 2017
  • Efficient key distribution and management mechanisms as well as lightweight ciphers are the main pillar for establishing secure wireless sensor networks (WSN). Several symmetric based key distribution protocols are already proposed, but most of them are not scalable, yet vulnerable to a small number of compromised nodes. In this paper, we propose an efficient and scalable key management and distribution framework, named KMMR, for large scale WSNs. The KMMR contributions are three fold. First, it performs lightweight local processes orchestrated into upward and downward tiers. Second, it limits the impact of compromised nodes to only local links. Third, KMMR performs efficient secure node addition and revocation. The security analysis shows that KMMR withstands several known attacks. We implemented KMMR using the NesC language and experimented on Telosb motes. Performance evaluation using the TOSSIM simulator shows that KMMR is scalable, provides an excellent key connectivity and allows a good resilience, yet it ensures both forward and backward secrecy. For a WSN comprising 961 sensor nodes monitoring a 60 hectares agriculture field, KMMR requires around 2.5 seconds to distribute all necessary keys, and attains a key connectivity above 96% and a resilience approaching 100%. Quantitative comparisons to earlier work show that KMMR is more efficient in terms of computational complexity, required storage space and communication overhead.