• 제목/요약/키워드: Security mechanisms

검색결과 396건 처리시간 0.025초

Optimized Security Algorithm for IEC 61850 based Power Utility System

  • Yang, Hyo-Sik;Kim, Sang-Sig;Jang, Hyuk-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • 제7권3호
    • /
    • pp.443-450
    • /
    • 2012
  • As power grids are integrated into one big umbrella (i.e., Smart Grid), communication network plays a key role in reliable and stable operation of power grids. For successful operation of smart grid, interoperability and security issues must be resolved. Security means providing network system integrity, authentication, and confidentiality service. For a cyber-attack to a power grid system, which may jeopardize the national security, vulnerability of communication infrastructure has a serious impact on the power grid network. While security aspects of power grid network have been studied much, security mechanisms are rarely adopted in power gird communication network. For security issues, strict timing requirements are defined in IEC 61850 for mission critical messages (i.e., GOOSE). In this paper, we apply security algorithms (i.e., MD-5, SHA-1, and RSA) and measure their processing time and transmission delay of secured mission critical messages. The results show the algorithms satisfying the timing requirements defined in IEC 61850 and we observer the algorithm that is optimal for secure communication of mission critical messages. Numerical analysis shows that SHA-1 is preferable for secure GOOSE message sending.

ISO/IEC JTC1/SC27의 국제표준소개 (7) : IOS/IEC IS9798_3 정보기술-보안기술-실체인증 기법, 제 3 부:공개키 알고리듬을 이용한 인증 ((Information technology - Security techniques - Entity authentication mechanisms - part 3: Entity authentication using a public key algorithm))

  • 이필중
    • 정보보호학회지
    • /
    • 제5권1호
    • /
    • pp.85-100
    • /
    • 1995
  • 지난 호에 이어 상대방이 자신이라고 주장한 실체가 정말 그 실체인지를 인증하기 위한 기법을 표준화하는 과제 중의 세번째로 "공개키 알고리듬을 이용한 인증"을 소개한다. 이 과제는 1990년 CD(Committee Draft), 1992년 DIS(Draft for International Standard)가 되었고 1993년에 IS(International Standard)가 되었으며 1998년에 1차 검토가 있을 예정이다.가 있을 예정이다.

  • PDF

ISO/IEC JTC1/SC27의 국제표준소개 (9) : ISO/IEC IS9798-4 정보기술 - 보안기술 - 실체인증 기법, 제 4 부: 암호학적 확인 참수를 이용한 인증 ((Information technology - Security techniques - Entity authentication, Part 4 : Mechanisms using a cryptographic check function))

  • 이필중
    • 정보보호학회지
    • /
    • 제5권3호
    • /
    • pp.107-121
    • /
    • 1995
  • 제 5권 제 1호에 이어 상대방이 자신이라고 주장한 실체가 정말 그 실체인지를 인증하기 위한 기법을 표준화하는 과제 중의 네번째로 "암호학적 화인 함수를 이용한 인증"을 소개한다. 이 과제는 제 2부인 "대칭형 암호기술을 이용한 인증"과 많이 유사하므로 쉽게 진행되어 1993년에 CD(Committee Draft), 1994년 DIS(Draft for International Standard)가 되었고 1995년에 IS(International Standard)가 되었으며 1999년에 1차 검토가 있을 예정이다.99년에 1차 검토가 있을 예정이다.

  • PDF

RFID 시스템 보안 및 위험 요소를 위한 실제적인 고려 사항 (Practical Considerations for RFID System Security and Privacy Risks)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 추계학술대회
    • /
    • pp.896-899
    • /
    • 2009
  • The fear of unauthorized, hidden readouts has dominated the radio frequency identification (RFID) privacy debate. Therefor all published and previous works for privacy mechanisms so far require consumers to actively and explicitly protect read access to their tagged items. This paper introduces the underlying mechanism of our extension to considerations for security and analyzes its tracking resistance and identification performance, and discusses deployment aspects.

  • PDF

Wireless LAN Security Solutions for Secure Wireless Communications

  • Kim, Su-Yong;Ahn, Duck-Ki;Roh, Jae-Sung;Oh, Chang-Reon;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • 제1권4호
    • /
    • pp.183-188
    • /
    • 2003
  • The $4^{th}$ generation mobile communications, through several radio access networks such as WLAN, Bluetooth, UMTS, GPRS, CDMA 1X, and IMT-2000 in the same area offering different type of coverage, will support interactive multimedia services in additions to wider bandwidths, higher bit rates, and service portability. Regardless of various radio access networks, they will also support robust security mechanisms, as well as seamless mobility and common authentication. In this paper, we give an overview of WLAN security and examine its security problems. We also explain the enhanced security schemes, such as port-based authentication, EAP, and IEEE 802.1X. For secure wireless communications, several possible security solutions are offered and evaluated in various respects to improve WLAN security. This paper will make a contribution to provide more secure wireless communications to cellular operators embracing WLAN technology as a means to generate new revenues based on data services.

Why Dynamic Security for the Internet of Things?

  • Hashemi, Seyyed Yasser;Aliee, Fereidoon Shams
    • Journal of Computing Science and Engineering
    • /
    • 제12권1호
    • /
    • pp.12-23
    • /
    • 2018
  • The Internet of Things (IoT) ecosystem potentially includes heterogeneous devices with different processing mechanisms as well as very complicated network and communication models. Thus, analysis of data associated with adverse conditions is much more complicated. Moreover, mobile things in the IoT lead to dynamic alteration of environments and developments of a dynamic and ultra-large-scale (ULS) environment. Also, IoT and the services provided by that are mostly based on devices with limited resources or things that may not be capable of hosting conventional controls. Finally, the dynamic and heterogeneous and ULS environment of the IoT will lead to the emergence of new security requirements. The conventional preventive and diagnostic security controls cannot sufficiently protect it against increasing complication of threats. The counteractions provided by these methods are mostly dependent on insufficient static data that cannot sufficiently protect systems against sophisticated and dynamically evolved attacks. Accordingly, this paper investigates the current security approaches employed in the IoT architectures. Moreover, we define the dynamic security based on dynamic event analysis, dynamic engineering of new security requirements, context awareness and adaptability, clarify the need for employment of new security mechanism, and delineate further works that need to be conducted to achieve a secure IoT.

A Novel Transfer Learning-Based Algorithm for Detecting Violence Images

  • Meng, Yuyan;Yuan, Deyu;Su, Shaofan;Ming, Yang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.1818-1832
    • /
    • 2022
  • Violence in the Internet era poses a new challenge to the current counter-riot work, and according to research and analysis, most of the violent incidents occurring are related to the dissemination of violence images. The use of the popular deep learning neural network to automatically analyze the massive amount of images on the Internet has become one of the important tools in the current counter-violence work. This paper focuses on the use of transfer learning techniques and the introduction of an attention mechanism to the residual network (ResNet) model for the classification and identification of violence images. Firstly, the feature elements of the violence images are identified and a targeted dataset is constructed; secondly, due to the small number of positive samples of violence images, pre-training and attention mechanisms are introduced to suggest improvements to the traditional residual network; finally, the improved model is trained and tested on the constructed dedicated dataset. The research results show that the improved network model can quickly and accurately identify violence images with an average accuracy rate of 92.20%, thus effectively reducing the cost of manual identification and providing decision support for combating rebel organization activities.

다양한 IP 이동성 고속 핸드오버 기법 분석 및 새로운 고속 핸드오버 Proxy Mobile IPv6 기법 제안 (Review of Diverse IP Mobility Fast Handover Mechanisms and Suggestion of New Fast Handover Proxy Mobile IPv6 Mechanism)

  • 김평수
    • 한국IT서비스학회지
    • /
    • 제8권1호
    • /
    • pp.165-177
    • /
    • 2009
  • This paper reviews diverse IP mobility and fast handover mechanisms for seamless Internet services. Especially, fast handover mechanisms for the Proxy Mobile IPv6( PMIPv6) are categorized according to their approaches. Then, a new fast handover PMIPv6(FH-PMIPv6) mechanism is proposed using only L3 signaling message exchange. In the proposed FH-PMIPv6 mechanism, only local mobility anchor(LMA) exchanges L3 signaling messages with mobility access gateways(MAGs) for the fast handover operation. That is, inter-MAG signalling messages are not required for the fast handover operation. Therefore, unlike existing fast handover mechanisms, two relevant neighbouring MAGs need not set up the security association(SA) to protect fast handover related signaling messages and share SA related information. Moreover, the L3 triggering message is defined newly by standard ICMPv6 to trigger promptly the proposed mechanism. Analysis and comparison of the handover latency are performed for the proposed mechanism and existing mechanisms, which shows that the proposed FH-PMIPv6 mechanism has the favorable performance.

무선센서네트워크 환경하에서 RFID 헬스 시스템을 위한 보안 (Privacy and Security Model for RFID Healthcare System in Wireless Sensor Network)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 춘계학술대회
    • /
    • pp.439-441
    • /
    • 2012
  • The use of a mobile agent in hospital environment offers an opportunity to deliver better services for patients and staffs. Furthermore, medical errors will be reduced because M-health system helps to verify the medical process. Optimized security protocols and mechanisms are employed for the high performance and security. Finally, a challenge in the near future will be converge the integration of Ubiquitous Sensor Network (USN) with security protocols for applying the hospital environment. We proposed secure authentication and protocol with Mobile Agent for ubiquitous sensor network under healthcare system surroundings.

  • PDF

홈네트워킹 미들웨어 보안 시스템 설계 및 구현 (Design and Implementation of HomeNetworking Middleware Security System)

  • 이호상;이정균;이기영
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.1079-1082
    • /
    • 2005
  • In this paper, a secure system is studied and designed for omenetworking middleware based on sensor network security algorithm. Many sensor networks have mission-critical tasks, so it is clear that security needs to be taken into account at design procedure. First, We study homenetworking middleware model in Jini. And we design a security system is applied by SPINS algorithm for moddleware model. Then we firgure out proper secrecy, authentication, broadcast authentication mechanisms in this model.

  • PDF