• 제목/요약/키워드: Security infrastructure

검색결과 1,083건 처리시간 0.033초

유비쿼터스 환경에서 안전한 컨텍스트 전송 프로토콜 구현 (Implementation of Secure Context Transport Protocol in Ubiquitous Environment)

  • 임현숙;이영록;이형효;노봉남
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2006년도 하계학술대회
    • /
    • pp.737-740
    • /
    • 2006
  • 유비쿼터스 환경을 현실 세계에 구현함에 있어 가장 중요한 핵심 기술 중 하나는 컨텍스트 정보 관리이다. 하지만 기존의 많은 연구들에서 컨텍스트를 요구함에 있어 무엇을 어떻게 요구할 것인지에 대한 방법이 명확하지 않았다. 따라서 본 논문에서는 응용이 필요로 하는 컨텍스트 정보만을 컨텍스트 매니저에게 주고받는 컨텍스트 전송 프로토콜을 소개한다. 그리고 컨텍스트 요청 메시지와 응답 메시지가 어떻게 XML로 구성되고 동작하는지 보인다. 또한, 개인 정보에 관한 컨텍스트를 안전하게 처리하기 위해 정당한 사용자만이 컨텍스트 정보를 요청하고 받을 수 있도록 SPKI/SDSI(Simple Public Key Infrastructure/Simple Distributed Security Infrastructure)를 이용한 인증절차를 소개한다.

  • PDF

A Securely Transferable Ebooks using Public-Key Infrastructure

  • Kim, Myungsun;Kim, Jongseong;Lee, Jungyeon;Kim, Kwangjo
    • 한국정보보호학회:학술대회논문집
    • /
    • 한국정보보호학회 2001년도 종합학술발표회논문집
    • /
    • pp.371-374
    • /
    • 2001
  • This paper shows how Ebooks contents can be securely transferred to consumers in wireless environment using public key infrastructure (PKI). In addition, we show the proposed scheme to be secure. The final goal is to show that our scheme satisfies all secure requirements of digital contents in any environments.

  • PDF

Design and Implementation of Certificate Revocation List Acquisition Method for Security of Vehicular Communications

  • Kim, Hyun-Gon
    • 한국통신학회논문지
    • /
    • 제37권7C호
    • /
    • pp.584-591
    • /
    • 2012
  • Distributing a Certificate Revocation List (CRL) quickly to all vehicles in the system requires a very large number of road side units (RSUs) to be deployed. In reality, initial deployment stage of vehicle networks would be characterized by limited infrastructure as a result in very limited vehicle to infrastructure communication. However, every vehicle wants the most recent CRLs to protect itself from malicious users and malfunctioning equipments, as well as to increase the overall security of the vehicle networks. To address this challenge, we design and implement a nomadic device based CRL acquisition method using nomadic device's communication capability with cellular networks. When a vehicle could not directly communicate with nearby RSUs, the nomadic device acts as a security mediator to perform vehicle's security functions continuously through cellular networks. Therefore, even if RSUs are not deployed or sparsely deployed, vehicle's security threats could be minimized by receiving the most recent CRLs in a reasonable time.

댐·보 등 수자원분야 정보통신기반시설 보안대책 (Security measures of Information and Communication infrastructure of Water Resources Field)

  • 유세환;장동배
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.1034-1037
    • /
    • 2013
  • 정보통신기반시설은 국가 안전보장, 행정, 국방, 치안, 금융, 통신, 운용, 에너지 등의 업무와 관련된 전자적 제어 관리시스템 또는 정보통신망으로, 수자원분야는 국민의 편의와 안전에 중요한 수도 발전 댐관리 등을 전자적으로 수행할 수 있도록 제어시스템이 구축되어있다. 수자원분야는 또한 물관리 패러다임의 변화에 따라 제어시스템은 하나의 네트워크로 통합 관리되어 수계별로 유역통합물 관리가 실현되고 있다. 이러한 제어시스템은 다른 제어망, 업무망, 외부기관과의 연계등의 많은 보안상의 취약점을 노출하고 있고, 이에 대한 사이버테러는 사회 경제적으로 큰 혼란을 야기할 수 있으므로 제어시스템에 대한 보안의 중요성이 대두되고 있다. 본 논문에서는 정보통신기반시설 - 특히 댐 보 등 수자원분야의 제어시스템 보안대책에 대해 알아보고자 한다.

  • PDF

웹 환경에서 SPKI 인증서를 이용한 접근 제어 (An Access Control using SPKI Certificate in Web Environment)

  • 김점구
    • 융합보안논문지
    • /
    • 제6권4호
    • /
    • pp.11-19
    • /
    • 2006
  • 웹 서비스는 모든 사용자에 대해 동등한 접근 권한을 부여하여 서로의 자원을 공유할 수 있도록 하고 있다. 이러한 상황에서는 인터넷을 통한 다양한 공격에 따른 취약성이 예상되므로 본 논문에서는 자원 공유를 위해 연결을 요청하는 사용자들에게 "SPKI (Simple Public Infrastructure) 인증서"를 발행하여 접근 권한을 지정하고, 정보 요청자는 자신에게 주어진 접근 권한에 따라 제한적으로 정보 제공자의 자원을 사용할 수 있는 방안을 제안한다.

  • PDF

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

The Importance of International Transport and Logistics Infrastructure in the Economic Development of the Country: The Case of the EU for Ukraine

  • Atamanenko, Yuliia;Komchatnykh, Olena;Larysa, Sukhomlyn;Viacheslav, Didkivskyi;Sulym, Borys;Losheniuk, Oksana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.198-205
    • /
    • 2021
  • For twenty years, in the EU there has been a trend of a lack of maritime infrastructure and a redundance of the road one, which has a negative impact on the economy. The intermodal transport market structure in the EU has not changed over the past ten years. The stability of transport systems due to the lack of changes in the transport market remains under threat, affecting supply chains and networks through the optimization of warehousing and transportation costs. The research methodology is based on a quantitative assessment of cause-and-effect relations between economic growth and transport and logistics in the EU. A statistical analysis of security indicators, intermodal and modal transport, international trade in goods within the EU and in the world trade in goods, the dynamics of GDP of the EU countries, the level of openness of the EU economy, investment and maintenance costs of different modes of transport and infrastructure has been carried out. The results show that in 2000- 2010 there were positive changes in the transport and logistics infrastructure of the EU, which had a positive effect on trade, openness of the economy of the EU, GDP growth. However, at that time, negative effects of environmental impact and the load on road and rail transport were accumulating. Investment in different modes of transport is limited, and technical maintenance and infrastructure maintenance costs form a significant part of GDP of the EU. A slowdown in economic growth leads to budget constraints and infrastructure financing gap. As a result, the freight and passenger intermodal and modal transport market structure remains virtually unchanged. The load on rail and road transport remains stable, despite the reduced level of transport hazards. Transport productivity has declined over the past ten years. Herewith, the intensification of trade and the openness of the EU economies require constant modernization and innovative renewal. The EU policy in this direction remains normative, uncontrolled, which is reflected in investment differences within the EU and maintenance costs.

Enhancing Security Gaps in Smart Grid Communication

  • Lee, Sang-Hyun;Jeong, Heon;Moon, Kyung-Il
    • International Journal of Advanced Culture Technology
    • /
    • 제2권2호
    • /
    • pp.7-10
    • /
    • 2014
  • In order to develop smart grid communications infrastructure, a high level of interconnectivity and reliability among its nodes is required. Sensors, advanced metering devices, electrical appliances, and monitoring devices, just to mention a few, will be highly interconnected allowing for the seamless flow of data. Reliability and security in this flow of data between nodes is crucial due to the low latency and cyber-attacks resilience requirements of the Smart Grid. In particular, Artificial Intelligence techniques such as Fuzzy Logic, Bayesian Inference, Neural Networks, and other methods can be employed to enhance the security gaps in conventional IDSs. A distributed FPGA-based network with adaptive and cooperative capabilities can be used to study several security and communication aspects of the smart grid infrastructure both from the attackers and defensive point of view. In this paper, the vital issue of security in the smart grid is discussed, along with a possible approach to achieve this by employing FPGA based Radial Basis Function (RBF) network intrusion.

모바일 PKI 기반의 이동 보안 구조 (The Structure of Assure Information Security In Mobile Environment Based Mobile PKI)

  • 서세영;신승수;최승권;조용환
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2003년도 추계종합학술대회 논문집
    • /
    • pp.132-139
    • /
    • 2003
  • 본 논문은 공개키 기반구조(PKI - Public Key Infrastructure)에서 중추적인 역할을 담당하는 공개키 인증시스템을 설계하고 구현한다. 본 논문에서는 인증기관의 역할을 수행할 수 있는 공개키 인증시스템의 요구사항 및 특징을 분석하여, 실제 보안서비스가 제공 가능한 인증과정은 HA 및 FA한테 위임하고 설계한다. 보안구조는 Root CA와 Home Network 및 Foreign Network로 구성되어 있고, 필요할 때 CA은 HA 및 FA한테 인증을 위탁한다.

  • PDF

전자정부 구현을 위한 효율적인 GPKI 구축 방안 (Implementation of Efficient GPKI for E-Government)

  • 장홍종;박인재;이정현
    • 정보보호학회논문지
    • /
    • 제10권4호
    • /
    • pp.113-127
    • /
    • 2000
  • 전자정부 구현에 있어 온라인 상에서 유통되는 각종 행정정보들에 대한 정보보호는 필수적인 선결 조건이다. 미국 등 각국에서는 전자정부의 정보보호 기반 구축을 위하여 가상행정 환경에서 당사자의 신원 확인, 기밀성, 무결성, 부인봉쇄 등을 보장하는 정부타원의 PKI(Public Key Infrastructure)를 구축 운영 중에 있다. 본 논문에서는 미국 등 선진 국의 사례 연구 분석을 통하여 우리나라 실정에 적합한 효율적인 GPKI(Government PKI) 구축방안을 제시하였다.