• 제목/요약/키워드: Secure area

검색결과 937건 처리시간 0.031초

안전하고 효율적인 동적 멀티캐스트 키 관리 구조 제안 (A Proposal of Secure and Efficient Dynamic Multicast Key Management Structure)

  • 박희운;이임영
    • 한국멀티미디어학회논문지
    • /
    • 제4권2호
    • /
    • pp.145-160
    • /
    • 2001
  • 통신 및 컴퓨터의 보급 발전을 통해 공개 네트워크 상에서 그룹에 기반한 통신 응용 서비스의 요구가 증가하고 있다. 이러한 필요성에 따라 멀티캐스트 기반 구조에 대한 연구가 활발히 진행되고 있다. 하지만 멀티캐스트 구조에 대한 안전성과 효율성 및 확장성 부분에 대한 해결책은 아직 미비한 상태이다. 본 연구에서는 기존의 대표적인 멀티캐스트 키 관리 구조를 고찰함과 동시에 안전성과 효율성 및 확장성을 분식한다. 이에 기초해 확장성을 제공하는 안전하고 효율적인 멀티캐스트 키 관리 구조를 제안하고, 기존 방식과 통신 및 계산량 부분에 비교 분석을 통해 그 효율성을 확인한다.

  • PDF

Wireless LAN Security Solutions for Secure Wireless Communications

  • Kim, Su-Yong;Ahn, Duck-Ki;Roh, Jae-Sung;Oh, Chang-Reon;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • 제1권4호
    • /
    • pp.183-188
    • /
    • 2003
  • The $4^{th}$ generation mobile communications, through several radio access networks such as WLAN, Bluetooth, UMTS, GPRS, CDMA 1X, and IMT-2000 in the same area offering different type of coverage, will support interactive multimedia services in additions to wider bandwidths, higher bit rates, and service portability. Regardless of various radio access networks, they will also support robust security mechanisms, as well as seamless mobility and common authentication. In this paper, we give an overview of WLAN security and examine its security problems. We also explain the enhanced security schemes, such as port-based authentication, EAP, and IEEE 802.1X. For secure wireless communications, several possible security solutions are offered and evaluated in various respects to improve WLAN security. This paper will make a contribution to provide more secure wireless communications to cellular operators embracing WLAN technology as a means to generate new revenues based on data services.

A Multi-Stage Approach to Secure Digital Image Search over Public Cloud using Speeded-Up Robust Features (SURF) Algorithm

  • AL-Omari, Ahmad H.;Otair, Mohammed A.;Alzwahreh, Bayan N.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.65-74
    • /
    • 2021
  • Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

이동네트워크 환경에서의 그룹키 관리구조 (A Group Key Management Architecture in Mobile Network Environments)

  • 박영호
    • 정보보호학회논문지
    • /
    • 제12권2호
    • /
    • pp.89-100
    • /
    • 2002
  • 본 논문에서는 안전한 그룹통신을 위한 그룹키 관리 기법을 기반으로 이동네트워크 환경에서의 그룹키 관리 구조와 멤버의 인종과 키 설정을 위한 프로토콜을 제안한다. 기존의 대부분의 그룹키 관리기법들이 초기의 키 서버와 멤버간의 안전한 공유키 설정을 위해 공개키 기반의 인증서 교환을 이용하였으나, 본 논문에서는 인증서의 교환과 검증으로 인한 대역폭 소모의 효율성을 위해 ICPK를 이용해서 그룹 내에서의 멤버의 인증과 키 교환에 이용하도록 한다. 또한, 전체 그룹을 이동호스트들에 대한 셀 그룹과 셀 그룹 관리자들에 대한 제어그룹으로 구분하여 셀 그룹마다 셀 그룹 관리자가 관리함으로써 멤버십의 변경으로 인한 영향을 지역적으로 한정시킨다.

무선센서네트워크 환경에서 안전한 멀티캐스트를 지원하는 신속한 그룹키 갱신 기법 (Fast Group Rekeying Scheme for Secure Multicast in Wireless Sensor Networks)

  • 남궁완;조관태;이동훈
    • 정보보호학회논문지
    • /
    • 제21권3호
    • /
    • pp.75-88
    • /
    • 2011
  • 센서네트워크 환경에서 멀티캐스트는 베이스스테이션이 다수의 센서노드에게 명령 또는 쿼리를 전송할 때 사용된다. 멜티캐스트 메시지를 효율적으로 안전하게 전송하기 위하여 그룹키를 이용한 암호화 통신이 요구되며, 포획당한 노드로 인한 그룹키 노출에 강건한 그룹키 갱신기법이 필요하다. 이를 위하여 애드 혹 네트워크 환경에서 안전한 그룹키 갱신 기법이 오랫동안 연구되었다. 하지만 기존에 연구된 기법들은 센서네트워크에 적합하게 설계되지 않았으며, 안전한 그룹키 갱신하기 위한 효과적인 방법이 제안되지 못하였다. 따라서 본 논문에서는 그룹에 속한 센서노드만 새로운 그룹키 생성할 수 있는 방법을 통해서 기존의 기법에 비해 높은 안전성을 가지는 멀티캐스트 그룹키 갱신 기법을 제안한다.

어머니의 초기부모애착과 사회적 관심: 애착 불안과 애착 회피를 중심으로 (Maternal Early Parent Attachment and Social Interest: The Effect of Attachment Anxiety and Attachment Avoidance)

  • 민하영
    • Human Ecology Research
    • /
    • 제62권1호
    • /
    • pp.69-80
    • /
    • 2024
  • This study explored the relationship between maternal early parental attachment (EPA) and social interest. The participants were 311 mothers with elementary schoolchildren who lived in the Daegu-Gyeongbuk area. Data were collected through an online questionnaire provided on the portal site and analyzed using k-means clustering, t-test, One-Way ANOVA, and Pearson's correlation using IBM SPSS Statistics 21 for Windows and, RMSEA, TLI, NFI and CFI using IBM SPSS AMOS 18 for Windows. The principal results were as follows. Firstly, mothers' EPA anxiety and avoidance had a negative influence on social interest. Secondly, social interest was found to be significantly higher among mothers with a secure attachment style than among mothers with an insecure attachment style. Thirdly, significant differences were observed in levels of social interest among mothers with secure, preoccupied, dismissive, and disorientated attachment styles. A Scheffé post-hoc test revealed that social interest was significantly higher among mothers with a secure attachment style than among mothers with a disorientated attachment style. The experience of relationships with caregivers early in life is therefore important in the development of social interest.

Power Analysis Attacks and Countermeasures on NTRU-Based Wireless Body Area Networks

  • Wang, An;Zheng, Xuexin;Wang, Zongyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1094-1107
    • /
    • 2013
  • NTRU cryptosystem has been suggested for protecting wireless body area networks, which is secure in the sense of traditional cryptanalysis. In this paper, we fulfill the first power analysis attack on the ultra-low-power environment of wireless body area networks. Specifically, two practical differential power analyses on NTRU algorithm are proposed, which can attack the existing countermeasures of NTRU. Accordingly, we suggest three countermeasures against our attacks. Meanwhile, practical experiments show that although the attacks in this paper are efficient, our countermeasures can resist them effectively.

대형직접전단시험에 의한 RAP 복합지반의 전단강도 특성 연구 (A Study on the Shear Strength Characteristics of Composited Ground applying RAP Method by Large Direct Shear Test)

  • 천병식;서덕동;김종산
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2004년도 춘계학술발표회
    • /
    • pp.82-89
    • /
    • 2004
  • To secure stability and availability of Rammed Aggregate Pier method as the foundation of a structure, the shear strength characteristics according to the area replacement ratio of RAP and the relative density of in-situ ground was studied through soil laboratory tests and large direct shear tests in a model ground. As a result, the internal friction angle tends to increase in proportion to in-situ relative density(Very Loose, Loose, Medium) in composite ground formed by the same area replacement ratio of RAP and also increase in proportion to increasing the area replacement ratio(30, 40, 50%) of RAP in the same ground condition. Furthermore, the comparative analysis between the experimental value and theoretical value of the shear strength is carried out.

  • PDF

부산남항의 장소적 특성을 고려한 워터프런트 개발방향 (A Proposal on Waterfront Development Reflecting the Sense of Place of Pusan South Harbor Area)

  • 조용수;조은석
    • 한국항만학회지
    • /
    • 제14권4호
    • /
    • pp.407-418
    • /
    • 2000
  • Although there are a lot of primary factors to be able to make characters and identities in Pusan South Harbor, Badly Planned development prevented enhancing the sense of place in urban waterfront. The point in the waterfront development is how to secure amenities based on indentity and orientation; node, landmark, edge, path, district. This study aims at developing waterfront area of Pusan South Harbor and attempting to establish an identity through studying characteristics of ‘places’ in Pusan South Harbor. The place consists of two elements; orientation and identity, which can be explained the environmental totality, ‘character’ and ‘space’ respectively. The urban waterfront has strong characteristics which consists of land area, water area, and transit zone combining two areas. The place of Pusan South Harbor is analysed those four elements. We proposed objectives and criteria which can be used in enhancing the sense of this place.

  • PDF