• 제목/요약/키워드: Security and Authentication

검색결과 2,421건 처리시간 0.029초

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

공인인증서와 바이오인증 연계를 위한 연구 (Study on the Connection with Public Authentication and Bio Authentication)

  • 류갑상
    • 사물인터넷융복합논문지
    • /
    • 제1권1호
    • /
    • pp.39-44
    • /
    • 2015
  • 공인인증서와 바이오 정보를 활용하여 인증과정을 처리하고 있는 기관이 증가하고 있고 휴대용 바이오 인증기기를 배급하여 공인인증서와 바이오인증을 병행할 수 있도록 발전하고 있다. 개인의 PC나 스마트 디바이스를 이용한 인증이 범용화 되어가면서 인증에 대한 편의성이 증대되어가고 있는데 비해 네트워크 레벨에서의 보안과의 연계성에 대한 검토는 미약한 실정이다. 공인인증서와 바이오 정보의 연계를 통한 인증방식이 현재 네트워크 접근제어와 연계된다면 좀 더 강력한 보안정책으로 발전할 수 있다. 본 논문에서는 보안토큰에서의 취약한 개인인증 기법에 대한 취약점을 바이오인식과 같은 확실하고 안전한 개인인증 기법으로 연계함으로써 바이오 정보 노출 방지 및 바이오정보 본인 확인 수행 여부를 검증할 수 있는 방법론을 제시하였다. 아울러, 802.1x 네트워크 인증방식과 연계할 수 있는 시나리오를 정리하고 이의 실현을 위한 방안을 제시하였다.

개인 통신망에서 적용가능한 인증 및 키분배 프로토콜 (An applicable Key Distribution and Authentication Protocol in Personal Communication Networks)

  • 송희삼;전문석
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 1995년도 종합학술발표회논문집
    • /
    • pp.331-337
    • /
    • 1995
  • In this paper, We present that protocols have already proposed an applicable key distribution and authentication protocol based discrete logarithm and prime-factorization problem in PCN(Personal Communication Network) is anaysised. We newly propose identiity-based protocol using smart card. This proposed potocol is that Fiat-Shamir identification scheme and a new key distribution scheme based on Fiat-Shamir identification scheme are joined. Proposed protocol is compared with suiting protocols with respect to security and efficiency to evalate performance, so its calculation is reduced in key distribution and authentication to evaluate performance.

  • PDF

Robust ID based mutual authentication and key agreement scheme preserving user anonymity in mobile networks

  • Lu, Yanrong;Li, Lixiang;Peng, Haipeng;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권3호
    • /
    • pp.1273-1288
    • /
    • 2016
  • With the swift growth of wireless technologies, an increasing number of users rely on the mobile services which can exchange information in mobile networks. Security is of key issue when a user tries to access those services in this network environment. Many authentication schemes have been presented with the purpose of authenticating entities and wishing to communicate securely. Recently, Chou et al. and Farash-Attari presented two ID authentication schemes. They both claimed that their scheme could withstand various attacks. However, we find that the two authentication schemes are vulnerable to trace attack while having a problem of clock synchronization. Additionally, we show that Farash-Attari's scheme is still susceptible to key-compromise impersonation attack. Therefore, we present an enhanced scheme to remedy the security weaknesses which are troubled in these schemes. We also demonstrate the completeness of the enhanced scheme through the Burrow-Abadi-Needham (BAN) logic. Security analysis shows that our scheme prevents the drawbacks found in the two authentication schemes while supporting better secure attributes. In addition, our scheme owns low computation overheads compared with other related schemes. As a result, our enhanced scheme seems to be more practical and suitable for resource-constrained mobile devices in mobile networks.

A LOW-COST PROTOCOL IN SENSOR NETWORK UBIQUITOUS ENVIRONMENT

  • Lee Dong-heui;Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.766-769
    • /
    • 2005
  • In a ubiquitous environment made up of multiple sensors, most sensors participate in communications with limited battery, and the sensor node isn't able to participate in communications when all the battery is used up. When an existing authentication method is used for the sensor node which has to participate in a long term communication with limited battery, it creates a problem by making the length of network maintenance or sensor node's operation time relatively shorte. Therefore, a network structure where RM (Register Manager) node and AM (Authentication Manager) node are imported to solve the energy consumption problem during a communication process is presented in this thesis. This offers a low power protocol based on safety through a mutual authentication during communications. Through registration and authentication manager nodes, each sensor nodes are ensured of safety and the algorithm of key's generation, encryption/descramble and authentication is processed with faster operation speed. So the amount of electricity used up during the communications between sensor nodes has been evaluated. In case of the amount of electrical usage, an average of $34.783\%$ for the same subnet and 36.855 for communications with two different subnets, are reduced. The proposed method is a protocol which maintains the limited battery for a long time to increase the effectiveness of energy usage in sensor nodes and can also increase the participation rate of communication by sensor nodes.

  • PDF

행렬기반 RFID 인증 프로토콜의 효율성 및 안정성 분석 (An analysis of effectiveness and safety about matrix-based RFID authentication protocol)

  • 신효영;황치곤;정계동
    • 디지털융복합연구
    • /
    • 제12권2호
    • /
    • pp.249-255
    • /
    • 2014
  • RFID 시스템은 교통, 출입통제 비롯한 여러 분야에서 활용되고 있다. RFID 시스템에 대한 보안위협 또한 증가하여 정보보안에 대한 연구가 진행되고 있다. 본 논문에서는 행렬기반 RFID 인증 프로토콜을 제안하고 기존에 제안된 프로토콜과 효율성을 비교하고 안전성을 분석한다. 제안된 인증 프로토콜은 도청, 재전송 등의 공격에 안전하며, 서버의 계산량을 줄여 성능면에서 효율이 우수한 장점을 갖는다.

Key-Stroke 기반 Two-Factor 인증 기술 (Two-factor Authentication technology based on Key-Stroke)

  • 안준연;고광필;이태진
    • 융합보안논문지
    • /
    • 제20권3호
    • /
    • pp.29-37
    • /
    • 2020
  • ID/Password 기반 인증기술은 간편하면서 일정한 보안수준을 제공하기에 대부분의 시스템에서 사용되고 있으나, 이미 무수히 많은 개인정보 노출사고가 있었으며, 무엇보다 한번 노출된 패스워드를 회수하기 어렵다. 이에, 다양한 two-factor 인증기법들이 도입되었으나, 이들은 많은 비용이 필요하며, 무엇보다 사용자의 불편함을 초래하게 된다. 본 논문에서는 기존과 같이 단 한번의 ID/Password 인증과정에서 사용자마다 고유한 Key-Stroke를 동시에 인증하여 비용대비 효과적이면서, 사용자의 불편함을 초래하지 않고, ID/Password 노출 시에도 Key Stroke Dynamics 패턴이 달라 실패하여 높은 보안성을 보장할 수 있는 기술을 제안한다. 본 논문의 제안 모델은 시스템으로 구축하여 효과성을 확인하였다.

USB 장치 정보를 이용한 사용자 인증방안 (User Authentication System Using USB Device Information)

  • 이진해;조인준;김선주
    • 한국콘텐츠학회논문지
    • /
    • 제17권7호
    • /
    • pp.276-282
    • /
    • 2017
  • ID/PW(Identifier/Password) 인증방식은 다양한 보안취약성이 존재함에도 사용이 편리하고 구축비용이 저렴하여 아직까지 폭 넓게 사용하고 있으며, 유추해내기 어려운 복잡한 패스워드의 사용과 주기적인 변경을 요구하고 있다. 하지만 사용자 입장에서는 복잡한 패스워드를 기억하고 주기적으로 변경하는 것은 매우 불편한 일이다. 이에 본 논문에서는 USB(Universal Serial Bus) 메모리를 활용하여 복잡한 패스워드를 주기적으로 변경할 필요가 없는 인증시스템을 제안하였다. 사용자 인증시마다 자동으로 재생성 되도록 하고 기존의 인증데이터는 재사용이 불가능하도록 설계하였다. 이를 바탕으로 ID/PW 인증시스템을 크게 고치지 않으면서 사용이 편리하고, 인증서 / 지문인식 수준의 보안성을 제공할 수 있다.

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks

  • Jeong, Yoon-Su;Kim, Yong-Tae;Shin, Seung-Soo;Lee, Sang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.923-948
    • /
    • 2013
  • The main concern in mobile peer-to-peer (P2P) networks is security because jamming or eavesdropping on a wireless link is much easier than on a wired one and such damage can be incurred without physical access or contact. In particular, authentication has increasingly become a requirement in mobile P2P environments. This paper presents a new mutual authentication mechanism which requires less storage space and maintains a high level of security in mobile P2P networks. The proposed mechanism improves efficiency by avoiding the use of centralized entities and is designed to be agile in terms of both reliability and low-cost implementation. The mechanism suggested in the simulation evaluates the function costs occurring in authentication between the devices under mobile P2P network environment comparing to existing method in terms of basic operation costs, traffic costs, communications costs, storage costs and scalability. The simulation results show that the proposed mechanism provides high authentication with low cryptography processing overhead.

협력기반 인증 기법을 통한 라우팅 성능 개선에 관한 연구 (A Study on Routing Performance Improvement through Cooperation Authentication Technique)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.71-79
    • /
    • 2016
  • The main security threats in MANET are integrity and non-repudiation. In the meantime, a lot of secure routing protocols have been designed in order to block these security threats. In this paper, partnership-based authentication technique is proposed in order to provide participation exclusion of network and non-repudiation for the nodes. The proposed technique is a technique that participates in data communication for only the nodes receiving the authentication through the authentication process for the nodes. For this, the proposed technique is largely consists of two steps. The first step is the process that issued the certificate after the reliability for the nodes participating in the network is evaluated. And in the second step, the key exchange agreement with the neighbor nodes is performed and data communication is made after setting security path with responding nodes. The level of security in data transmission is improved because the process of path setting is performed through cooperation with a neighboring nodes having high reliability during the course of these two steps. The superiority of proposed technique in this paper was confirmed through the comparative experiment.