• 제목/요약/키워드: Security networks

검색결과 1,811건 처리시간 0.031초

이동성과 보안성 만족 군용 통신을 위한 IPSec 기반 네트워크 설계 (IPSec based Network Design for the Mobile and Secure Military Communications)

  • 정윤찬
    • 한국통신학회논문지
    • /
    • 제35권9B호
    • /
    • pp.1342-1349
    • /
    • 2010
  • 군용 환경에서 동적으로 변화하는 PT (Plain Text) 네트워크들이 Black (Blk) 네트워크를 통하여 서로 보안성있는 통신을 하기 위해서는 Blk 네트워크를 형성하는 완전 그물형 IPSec 터널이 필요하다. 이동성과 보안성이 요구되는 Blk 네트워크에서 IPSec 터널과 보안 방안, 즉 SPD (Security Policy Database)를 동적으로 재구성하는 것은 어려운 과제이다. 본 논문에서는 기존의 IPSec 터널 터널 모드 기술과 IPSec 비밀 키 관리 기술을 바탕으로 하여 군 네트워크에서 요구하는 이동성과 보안성 능력을 제공하기 위해서 구비해야 할 기술인 DMIDP(Dynamic Multicast-based IPSec Discovery Protocol) 기술과 관련된 핵심 기술을 체계적으로 제안한다. 또 제안된 DMIDP 기법에서 나타날 이동성 및 보안성과 관련된 성능에 영향을 미치는 주요 변수와 이들의 운영 방법을 도출하고 제안된 변수 상태에서의 DMIDP 운영 효율성을 분석한다.

네트워크 공격을 탐지하기 위한 IPv6 트래픽 분석 도구 (The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks)

  • 오승희;오진태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 춘계종합학술대회
    • /
    • pp.848-851
    • /
    • 2005
  • 인터넷상의 주소 고갈 문제를 해결하기 위해 기존의 IPv4 네트워크를 IPv6 네트워크로 도입하려는 계획이 국내외에서 단계적으로 추진되고 있다. IPv6 네트워크 도입으로 인해 IP 주소 부족 문제는 해결될 수 있으나 기존에 존재하던 네트워크 보안상의 문제점과는 또 다른 형태의 네트워크 공격이 야기될 수 있다는 위험성이 잠재되어 있다. 따라서, 본 논문에서는 IPv6 네트워크 환경에서 발생될 수 있는 네트워크 공격을 차단하기 위한 선행 과정인 IPv6 기반의 트래픽을 효율적으로 분석하는 도구를 제안한다. 구현된 IPv6 트래픽 분석 도구는 IPv6 헤더를 이용하여 트래픽 분석 및 공격을 검출하는 방식으로 공격 검출은 추정 가능한 공격에 대해 제안한 탐지 알고리즘을 이용하고 있다.

  • PDF

무선 네트워크망의 정보보호를 위한 시스템 설계 (Security Design of Information Security for Wireless Local Area Network)

  • Kim, Jung-Tae;Jung, Sung-Min
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2003년도 춘계종합학술대회
    • /
    • pp.729-732
    • /
    • 2003
  • 무선 통신망의 데이터를 보호하기 위한 암호화의 방법 및 비밀 통신을 위한 인중 메카니즘에 대한 방법을 제안하였다. 무선 통신망의 경우 기존의 유선망에 비해, 설치, 이동성 등이 우수하여 많은 기술적인 발전을 보이고 있다. 따라서 이에 대한 데이터의 보호에 대한 관심이 고조되고 있다. 본 논문에서는 가정, 사무실, 건물과 같은 전형적인 외부 환경에 대해 정보를 보호할 수 있는 시스템의 구조를 설계하여 제안하였다.

  • PDF

Develop an Effective Security Model to Protect Wireless Network

  • Ataelmanan, Somya Khidir Mohmmed;Ali, Mostafa Ahmed Hassan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.48-54
    • /
    • 2021
  • Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work examines a new security technique at the physical layer for the sake of enhancing the protection of wireless communications against eavesdroppers. We examine the issue of secret communication through Rayleigh fading channel in the presence of an eavesdropper in which the transmitter knows the channel state information of both the main and eavesdropper channel. Then, we analyze the capacity of the main channel and eavesdropper channel we also analyze for the symbol error rate of the main channel, and the outage probability is obtained for the main transmission. This work elucidate that the proposed security technique can safely complement other Security approaches implemented in the upper layers of the communication network. Lastly, we implement the results in Mat lab

Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks

  • Alruwaili, Rahaf Hamoud;Alanazi, Haifa Khaled;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.303-309
    • /
    • 2022
  • Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.

Significance and Research Challenges of Defensive and Offensive Cybersecurity in Smart Grid

  • Hana, Mujlid
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.29-36
    • /
    • 2022
  • Smart grid (SG) software platforms and communication networks that run and manage the entire grid are increasingly concerned about cyber security. Characteristics of the smart grid networks, including heterogeneity, time restrictions, bandwidth, scalability, and other factors make it difficult to secure. The age-old strategy of "building bigger walls" is no longer sufficient given the rise in the quantity and size of cyberattacks as well as the sophisticated methods threat actor uses to hide their actions. Cyber security experts utilize technologies and procedures to defend IT systems and data from intruders. The primary objective of every organization's cybersecurity team is to safeguard data and information technology (IT) infrastructure. Consequently, further research is required to create guidelines and methods that are compatible with smart grid security. In this study, we have discussed objectives of of smart grid security, challenges of smart grid security, defensive cybersecurity techniques, offensive cybersecurity techniques and open research challenges of cybersecurity.

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

무선센서네트워크 환경에서 안전한 멀티캐스트를 지원하는 신속한 그룹키 갱신 기법 (Fast Group Rekeying Scheme for Secure Multicast in Wireless Sensor Networks)

  • 남궁완;조관태;이동훈
    • 정보보호학회논문지
    • /
    • 제21권3호
    • /
    • pp.75-88
    • /
    • 2011
  • 센서네트워크 환경에서 멀티캐스트는 베이스스테이션이 다수의 센서노드에게 명령 또는 쿼리를 전송할 때 사용된다. 멜티캐스트 메시지를 효율적으로 안전하게 전송하기 위하여 그룹키를 이용한 암호화 통신이 요구되며, 포획당한 노드로 인한 그룹키 노출에 강건한 그룹키 갱신기법이 필요하다. 이를 위하여 애드 혹 네트워크 환경에서 안전한 그룹키 갱신 기법이 오랫동안 연구되었다. 하지만 기존에 연구된 기법들은 센서네트워크에 적합하게 설계되지 않았으며, 안전한 그룹키 갱신하기 위한 효과적인 방법이 제안되지 못하였다. 따라서 본 논문에서는 그룹에 속한 센서노드만 새로운 그룹키 생성할 수 있는 방법을 통해서 기존의 기법에 비해 높은 안전성을 가지는 멀티캐스트 그룹키 갱신 기법을 제안한다.

Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City

  • AlEisa, Hussah N.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.139-144
    • /
    • 2022
  • The smart cities are evolving constantly and are responsible for the current transformation of cities and countries into a completely connected network of information and technology This interconnected network of a huge number of smart devices is capable of exchanging complex information and provides tremendous support including enhanced quality of life within urban locations. Unfortunately this set-up is vulnerable to security attacks and requires the widespread ubiquitous network to authorize access through privacy and thus offer security in order to ensure civilian participation in a country. The smart network should benefit the individuals of the country by developing potential strategies to protect the smart cities and their participating entities from the unauthorized attacks. Trustworthy data sharing strategies based on the utilization of advanced technology features via smart communication network could solve some issues of privacy and security. This paper presents the challenges and issues related to protection and highlights the important aspects of securing the smart cities and its components. It also presents the role of cloud security for building a secure smart city.

The TOR Data Communication System

  • Haraty, Ramzi A.;Zantout, Bassam
    • Journal of Communications and Networks
    • /
    • 제16권4호
    • /
    • pp.415-420
    • /
    • 2014
  • Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful - one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity - the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.