• Title/Summary/Keyword: Secure group communication

Search Result 162, Processing Time 0.027 seconds

CRL Distribution Method based on the T-DMB Data Service for Vehicular Networks (차량통신에서 T-DMB 데이터 서비스에 기반한 인증서 취소 목록 배포 기법)

  • Kim, Hyun-Gon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.161-169
    • /
    • 2011
  • There is a consensus in the field of vehicular network security that public key cryptography should be used to secure communications. A certificate revocation list (CRL) should be distributed quickly to all the vehicles in the network to protect them from malicious users and malfunctioning equipment as well as to increase the overall security and safety of vehicular networks. Thus, a major challenge in vehicular networks is how to efficiently distribute CRLs. This paper proposes a CRL distribution method aided by terrestrial digital multimedia broadcasting (T-DMB). By using T-DMB data broadcasting channels as alternative communication channels, the proposed method can broaden the network coverage, achieve real-time delivery, and enhance transmission reliability. Even if roadside units are not deployed or only sparsely deployed, vehicles can obtain recent CRLs from the T-DMB infrastructure. A new transport protocol expert group (TPEG) CRL application was also designed for the purpose of broadcasting CRLs over the T-DMB infrastructure.

A Design on The Zone Master Platform based on IIoT communication for Smart Factory Digital Twin (스마트 팩토리 디지털 트윈(Digital Twin)을 위한 IIoT 통신 기반 ZMP(Zone Master Platform) 설계)

  • Park, Seon-Hui;Bae, Jong-Hwan
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.81-87
    • /
    • 2020
  • This paper creates a standard node for acquiring sensor data from various industrial sensors (IoT/non-IoT) for the establishment of Smart Factory Digital Twin, and provides inter-compatible data by linking zones by group/process to secure data stability and to ensure the digital twin (Digital Twin) of Smart Factory. The process of the Zone Master platform contains interface specifications to define sensor objects and how sensor interactions between independent systems are performed and carries out individual policies for unique data exchange rules. The interface for execution control of the Zone Master Platform processor provides system management, declaration management for public-subscribe, object management for registering and communicating status information of sensor objects, ownership management for property ownership sharing, time management for data synchronization, and data distribution management for Route information on data exchange.

Development of K-12 Digital Culture Curriculum for AI Edcuation (AI교육을 위한 초등 디지털 문화 교육과정 개발)

  • Soo-Bum Shin;Jeong-Hye Han
    • Journal of The Korean Association of Information Education
    • /
    • v.26 no.5
    • /
    • pp.449-455
    • /
    • 2022
  • The digital culture area is a field of artificial intelligence education and partially overlaps with information ethics, and this study proposed an elementary school-centered digital culture curriculum, a detailed area of artificial intelligence education. First, as a leading overseas case in the field of digital culture, we analyzed the secure online interaction, which is the core content of the K12CS framework in the United States and the UK's computing curriculum. We presented by categorizing it into four digital areas: content, communication method, copyright, and job exploration in accordance with the domestic educational environment and field conditions. In addition, educational goals were stated according to the level of kindergarten and elementary school, and the validity of a group of field teachers majoring in in information and artificial intelligence was investigated to confirm the validity. As a result of the analysis, it was found that all the contents set were suitable except for some of the detailed goals of the first grade elementary school stages. Accordingly, a digital culture curriculum for artificial intelligence education was presented by revising and supplementing the detailed goals of the first graders.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Analysis of Recipes for Korean Foods in Web Sites (레시피 관련 웹 사이트 중 한국음식 레시피의 자료 분석 및 검토)

  • Yun, Mi-Ok;Mun, Hyeon-Gyeong
    • Journal of the Korean Dietetic Association
    • /
    • v.10 no.4
    • /
    • pp.390-400
    • /
    • 2004
  • Food and nutrition sites are the major portion of the health information sites. For the point of public health it is very important to secure validity and reliability of information on those web sites. Therefore, in this study we would like to identify problems when acquiring recipes in web sites by analyzing and reviewing recipes in web sites. To investigate Korean food recipes provided in web sites, domestic search engines such as Simmani, Naver, Hanmir, and Empas and foreign search engines such as Yahoo Korea, Lycos and Altabista Korea were used. Searchs were done using 'recipe' and 'Joribeob (cooking method)' from March 20, 2002 to June 20, 2002. Informations in each sites were reviewed and analyzed Results are as follow; When classifying 46sites searched with 'Joribeob' by the information provider, 24sites were individual, 16sites were corporate and 6sites were others. When searching 'recipe', total 12,654recipes were returned. Out of them, individual provided 2,581sites(20.4%), corporate provided 7,249sites(57.3%), and others provided 2,824sites(22.3%). 9,979(78.9%) recipes out of 12,654recipes were proved to be appropriate as Korean food. Classifying recipes by dish group, vegetables 11.7%, soups and hot soups 9.7%, stew and casseroles 8.2%, pan cakes 8.0%, stir fried foods and skewers 7.8%, rice 7.2%, hard boiled food 7.1%, steam 6.4%, noodles and mandu 5.3%, Kimchi 4.5%, fried 4.1%, and porridge 3.7% in order. 21.1% of recipes were not appropriate as Korean food but provided as Korean Food. The proportion of individual as the information provider were higher than that of enterprises. Recipes from enterprises were based on food and nutrient information and more reliable. However, there were some cases that they provided the same amount of ingredients with different calories or provided the same calories with different ingredients. Additionally, depending on sites, they provided different calories even for the same recipe. There were some cases that the calories provided on the site were too high or too low, for the suggested amount of ingredients and serving size. Recipes those provide amount of calories were evaluated using the nutrient analysis program. Calculated calories and provided calories on the Web were compared together. There are difference between two valus. With these results, it may lead misuse of recipe by those who need accuracy in diet such as patients or who are interested in recipe information for academic purposes. These results could be used as basic materials to improve quantity and quality of recipes in the future. Also, to improve the accuracy of recipies for Korean foods in the web sites, there should be some systems to monitor and let internet users know monitoring results.

  • PDF

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

An Adaptive Authentication Protocol for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 적응형 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.19-26
    • /
    • 2018
  • In recent years, the substantial increase in the population's average age leads to an exceeded number of older persons comparing with the number of any other age group. As a result, both industry and academia are focused on the development of several solutions aimed to guarantee a healthy and safe lifestyle to the elderly. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can also provide more safety for the elderly, offering emergency response mechanisms, fall detection solutions, and video surveillance systems. Unfortunately, due to the sensitive nature of AAL data, AAL systems should satisfy security requirements such as integrity, confidentiality, availability, anonymity, and others. In this paper, we propose an adaptive authentication protocol for the AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

Evaluating Teacher Policy of Park Geun-hye Government (박근혜정부의 교원정책 평가)

  • Shin, Hyun-Seok;Yonn, Ji Hee
    • (The)Korea Educational Review
    • /
    • v.23 no.4
    • /
    • pp.101-133
    • /
    • 2017
  • This Study aims to evaluate teacher policy in the Park Administration and to suggest tasks based on the results. To attain the aim, it describes overall teacher policy process in Park Administration and evaluates teacher policy based on the criteria which was driven from the CIPP model. The conclusions are summarized as follows. First, the environmental suitability of the situation assessment was met in general. The reason for this was that the teacher policy of the Park Geun-hye government was introduced reflecting changes in the environment and demands of policy stakeholders. The validity and feasibility of the policy objective of the input evaluation were not satisfied. There were deficiencies in the objectives of the policy measures. The objectives of the measures were not linked to the policy objectives. The budget necessary for policy enforcement were not secured. In future policy design, efforts should be made to examine whether the policy goals are valid, to secure resources necessary for policy implementation and to increase the feasibility of policies. The procedural rationality of the process evaluation and the suitability of the means were not met. Discussion with the interest group was omitted, it was not clear whether the implementation of the policy was linked to the policy goal. In the future, it will be necessary to focus on procedures such as communication and collaboration with stakeholders, to make immediate revisions in case of problems. The effectiveness and satisfaction of the output evaluation were low. Because the validity of the policy objectives, the suitability of the means, and procedural rationality were not satisfied. In the future, it will be necessary to systematically design policies and communicate with stakeholders in the execution process to prevent policy failures and actively.

The Effect of Stress Among Middle School Students and the Effect of Motive on Their Addiction to the Internet (중학생의 스트레스와 인터넷 이용동기가 인터넷 중독에 미치는 영향)

  • Park, Hea-Young;Lee, Eun-Hee;Park, Sang-Mi
    • Journal of Families and Better Life
    • /
    • v.27 no.6
    • /
    • pp.65-82
    • /
    • 2009
  • The following research aimed to determine the effect of stress among middle school students on their addiction to the Internet. This research's target was a group of male students who had a high probability of getting addicted to the Internet while playing c/t games. The study distributed 357 questionnaires and used 340 copies, which meant discarding 17 copies that were considered inadequate. The research results are as follows: First, there appeared subordinate factors in the stress suffered by the students. These included stress from their families, from conflicts with their teachers, from the living environment, current schoolwork and future course in college, insecurity over their physical appearance, bullying from other students, and relationships with friends. Among these factors, stress caused by conflicts with teachers and family was the most frequently cited, while stress from their friends was the least cited. The motive in using the Internet was found to be bound with several factors. These include: a form of diversion, a way to communicate with others, a means in coping with loneliness, a source of news and information, a form of passing away time, a kind of habit, and others. Among these motives, passing away time and indulging a habit were cited the most, followed by news and information search, and a form of diversion. Second, as a subordinate factor in Internet addiction, the following were cited: formation of tolerance, health issues, occurrence of problems related to daily life, satisfaction or a pleasant sensation, withdrawal, cover-up on the use of the Internet, and formation of virtual interpersonal relationships, and others. Among these, the formation of tolerance came out the highest, followed by health issues, daily life, and problems related to daily life. Third, in terms of the effects of stress on the motive in using the Internet, the research found that the more the students felt stressed out by conflicts with their teachers and family, the more they tended to use the Internet to communicate with others, to cope with loneliness, to obtain newsI and information, to passawaytime, and to indulge a habit Also, the more they felt stressed out by the living environment, the more they tended to use the Internet to communicate with others, to cope with loneliness, and use news and information. The more they felt stressed out by their schoolwork and future course in college, they tended to use the Internet as a form of diversion and to secure news and information. The more they felt stressed out by their insecurity over their physical appearance and being victimized by bullies, the more they tended to use the Internet to cope with loneliness. Fourth, as for the effect of several variables on student addiction to the Internet, the study found that the more students felt stressed out by their living environment, by schoolwork and future course in college, by their physical appearance, and bullying from other students, the more they used the Internet as a form of diversion, a communication tool, and as a means of passing away time or indulging a habit. The study came up with the finding that the more the students used the computer and the Internet, the probability of their getting addicted to the Internet got higher.