• 제목/요약/키워드: Session Analysis

검색결과 641건 처리시간 0.02초

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

멀티캐스트 소스기반 포워딩을 이용한 PMIPv6 글로벌 핸드오버 메커니즘 (PMIPv6 Global Handover Mechanism using Multicast Source Based Forwarding)

  • 최환석;이장현;이우섭
    • 한국통신학회논문지
    • /
    • 제36권7B호
    • /
    • pp.745-759
    • /
    • 2011
  • 본 논문에서는 유무선 통합 환경에서 서비스 범위의 제한 없이 효과적으로 차세대 멀티미디어 이동성 서비스를 제공할 수 있는 글로벌 핸드오버 메커니즘을 제안하였으며 이 메커니즘은 GSM을 이용한 글로벌 세션 관리 기법과 멀티캐스트 소스 기반 포워딩 기법으로 구성되어 있다 GSM을 이용한 글로벌 세션 관리 가법은 LMA간의 세션 정보를 관리하고 글로벌 이동성과 경로 최적화를 제공한다. 멀티캐스트 소스 기반 포워딩 기법은 멀티캐스트 소스 기반으로 버퍼를 관리함으로써 모바일 노드마다 전달해야 할 데이터간의 중복성을 제거한다. 제안된 메커니즘의 성능 분석을 위해 네트워크 시뮬레이터 ns-2를 사용하여 제안된 메커니즘이 기존에 제안된 방법보다 적은 핸드오버 지연, 전달지연 및 signaling cost를 갖는다는 것을 확인하였고 멀티캐스트 소스 기반 포워딩 메커니즘을 사용하여 기존 방법 대비 보다 적은 량의 버퍼를 이용하여 데이터를 손실 없이 전달 할 수 있음을 확인하였다.

DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구 (A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System)

  • 박찬길;김정재;이경석;전문석
    • 정보처리학회논문지C
    • /
    • 제13C권7호
    • /
    • pp.843-850
    • /
    • 2006
  • 본 논문에서는 기존의 암호화 방법보다 안전한 키를 생성하는 해쉬체인 알고리즘을 제안하며, 해쉬체인 알고리즘 기법을 통해 생성한 각각의 키를 각각의 블록에 적용한 암호화 방법을 사용하여 기존의 시스템보다 보안성이 높은 암호화 방법을 제안한다. 또한 사용자 인증기법을 통해 사용자를 유/무선으로 인증한 후, 키 분할 기법을 이용하여 분할된 키를 안전하게 전송하는 방법과 클라이언트에 키가 유출되어도 완전한 키를 얻지 못하도록 하는 세션키 분할 기법을 제안한다. 제안한 시스템을 설계하고 구현한 후 성능 평가를 위해 다양한 크기의 디지털콘텐츠 파일을 이용하여 실험을 수행하였으며, 제안한 시스템이 기존 시스템에 비해 안전한 키 전송을 할 수 있었고, 키 유출에도 전체 데이터를 복호화 할 수 없도록 암호화 하였다. 또한 클라이언트 시스템에서 비디오 데이터 파일 재생 시 암호화 복호화 시간은 기존 방법과 유사함을 확인하였다.

Test-Retest Reliability of Level-Specific CE-Chirp Auditory Brainstem Response in Normal-Hearing Adults

  • Jamal, Fatin Nabilah;Dzulkarnain, Ahmad Aidil Arafat;Shahrudin, Fatin Amira;Marzuki, Muhammad Nasrullah
    • Journal of Audiology & Otology
    • /
    • 제25권1호
    • /
    • pp.14-21
    • /
    • 2021
  • Background and Objectives: There is growing interest in the use of the Level-specific (LS) CE-Chirp® stimulus in auditory brainstem response (ABR) due to its ability to produce prominent ABR waves with robust amplitudes. There are no known studies that investigate the test-retest reliability of the ABR to the LS CE-Chirp® stimulus. The present study aims to investigate the test-retest reliability of the ABR to the LS CE-Chirp® stimulus and compare its reliability with the ABR to standard click stimulus at multiple intensity levels in normal-hearing adults. Subjects and Methods: Eleven normal-hearing adults participated. The ABR test was repeated twice in the same clinical session and conducted again in another session. The ABR was acquired using both the click and LS CE-Chirp® stimuli at 4 presentation levels (80, 60, 40, and 20 dBnHL). Only the right ear was tested using the ipsilateral electrode montage. The reliability of the ABR findings (amplitudes and latencies) to the click and LS CE-Chirp® stimuli within the same clinical session and between the two clinical sessions was calculated using an intra-class correlation coefficient analysis (ICC). Results: The results showed a significant correlation of the ABR findings (amplitude and latencies) to both stimuli within the same session and between the clinical sessions. The ICC values ranged from moderate to excellent. Conclusions: The ABR results from both the LS CE-Chirp® and click stimuli were consistent and reliable over the two clinical sessions suggesting that both stimuli can be used for neurological diagnoses with the same reliability.

Test-Retest Reliability of Level-Specific CE-Chirp Auditory Brainstem Response in Normal-Hearing Adults

  • Jamal, Fatin Nabilah;Dzulkarnain, Ahmad Aidil Arafat;Shahrudin, Fatin Amira;Marzuki, Muhammad Nasrullah
    • 대한청각학회지
    • /
    • 제25권1호
    • /
    • pp.14-21
    • /
    • 2021
  • Background and Objectives: There is growing interest in the use of the Level-specific (LS) CE-Chirp® stimulus in auditory brainstem response (ABR) due to its ability to produce prominent ABR waves with robust amplitudes. There are no known studies that investigate the test-retest reliability of the ABR to the LS CE-Chirp® stimulus. The present study aims to investigate the test-retest reliability of the ABR to the LS CE-Chirp® stimulus and compare its reliability with the ABR to standard click stimulus at multiple intensity levels in normal-hearing adults. Subjects and Methods: Eleven normal-hearing adults participated. The ABR test was repeated twice in the same clinical session and conducted again in another session. The ABR was acquired using both the click and LS CE-Chirp® stimuli at 4 presentation levels (80, 60, 40, and 20 dBnHL). Only the right ear was tested using the ipsilateral electrode montage. The reliability of the ABR findings (amplitudes and latencies) to the click and LS CE-Chirp® stimuli within the same clinical session and between the two clinical sessions was calculated using an intra-class correlation coefficient analysis (ICC). Results: The results showed a significant correlation of the ABR findings (amplitude and latencies) to both stimuli within the same session and between the clinical sessions. The ICC values ranged from moderate to excellent. Conclusions: The ABR results from both the LS CE-Chirp® and click stimuli were consistent and reliable over the two clinical sessions suggesting that both stimuli can be used for neurological diagnoses with the same reliability.

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

결혼이주여성에게 적용한 중재 프로그램의 효과성에 대한 메타분석 (Meta-analysis about the Effectiveness of Intervention Programs for Married Immigrant Women)

  • 이미옥;김신향
    • 여성건강간호학회지
    • /
    • 제21권4호
    • /
    • pp.342-354
    • /
    • 2015
  • Purpose: The purpose of this study was to test the effect size of intervention programs for married immigrant women as well as to suggest the basic data for health care practices for married migrant women. Methods: Meta-analysis was conducted with 27 articles from domestic Korea master's and doctorate degree dissertations and Korea academic journals from 2007 to 2014. Results: Overall average effect size was 1.17 and 'parental education' of Intervention Variables was the biggest effect size. Intervention Variables were also identified to be the most desirable in cases when total sessions were applied with 10-18 sessions, 1 session per week, 90-120 minutes per session activity time and with less than 10 subjects in group size. Regarding effect variables, psychological variable group was identified to show the biggest effect size and in sub-variables, self-efficacy was identified to show the biggest effect size. Conclusion: If intervention programs for married immigrant women is expanded and conducted based on the results of this study, the program would have significant affect psychological, social and physical health of the married migrant women who currently occupy the important status in our society.

봇넷 탐지를 위한 네트워크 세션 분석 (Network Session Analysis For BotNet Detection)

  • 박종민
    • 한국정보통신학회논문지
    • /
    • 제16권12호
    • /
    • pp.2689-2694
    • /
    • 2012
  • 최근의 사이버 공격은 경쟁사에 대한 DDoS(Distributed Denial of Service)공격과 기밀정보 유출, 일반 사용자들의 금융정보 유출 광고성 스팸메일의 대량 발송 등 불법 행위를 통해 경제적 이득을 취하려는 형태로 바뀌어가고 있다. 그 중심에 있는 봇넷은 봇이라 불리는 감염된 호스트들의 네트워크로서 최근 발생하는 많은 사이버 공격에 이용되고 있다. 이러한 봇넷은 수많은 변종과 다양한 탐지 회피 기술로 무장하고 전 세계 네트워크 전반에 걸쳐 그 세력을 확장해 가고 있다. 하지만 현존하는 봇넷 대응 솔루션은 대부분 시그네처 기반 탐지 방법을 이용하거나, 극히 제한적인 지역의 봇넷를 탐지하고 있어, 총괄적 봇넷 대응에는 미흡한 것이 현실이다. 본 논문에서는 봇넷을 제어하기 위해 사용되는 IRC(Internet Relay Chat) 통신 세션에서 서버와 연결하는 채널과의 관계 분석을 통하여 봇에 감염된 호스트와 연결된 IRC서버 채널을 탐지하는 방법을 제안한다.

초등학생을 대상으로 한 집단미술치료프로그램 효과에 대한 메타분석 (Meta-analysis of the Effects of Group Art Therapy on Elementary School Students)

  • 이경미;이주리
    • 한국보육지원학회지
    • /
    • 제15권2호
    • /
    • pp.77-102
    • /
    • 2019
  • Objective: The purpose of this study was to investigate the effectiveness of group art therapy for elementary school students through meta-analysis of domestic journals from 2010 to 2017. Methods: The subjects of this study were 259 effect sizes calculated from the 41 research materials selected in "Korean Journal of Art Therapy" (Korea Art Therapy Association) and "The Korean Journal of Art Therapy" (The Institute of Korea Arts Therapy). Results: First, the overall mean effect size of children participating in art therapy for this study was 1.69, which indicates that the programs proved to be useful for children. Second, the session with the largest effect size consisting of 7~10 group members was conducted more than 20 times in total, with the time per session of 60~90 minutes. Conclusion/Implications: It is expected that elementary school art therapy can be an effective way of solving the psychological problems of children and will be useful for future program development and research.

Problem Analysis and Enhancement of 'An Improved of Enhancements of a User Authentication Scheme'

  • Mi-Og Park
    • 한국컴퓨터정보학회논문지
    • /
    • 제29권6호
    • /
    • pp.53-60
    • /
    • 2024
  • 본 논문에서는 2023년에 제안된 Hwang et al.의 인증 스킴에 대하여 분석하고, 그에 대한 문제점을 개선한 새로운 인증 스킴을 제안한다. Hwang et al.은 자신들의 인증 스킴이 실용적이고 안전하다고 주장하였으나 본 논문에서 분석한 결과, 내부자 공격과 스마트카드 분실 공격으로 인하여 사용자의 패스워드/ID 추측 공격과 세션키 노출 공격 등이 가능하다. 또한, 사용자 익명성을 제공하는 Hwang et al.의 인증 스킴은 불안전한 설계로 인하여 사용자 추적 불가능성을 제공하지 못한다. 이러한 문제를 개선한 제안 인증 스킴은 사용자 추적 불가능성을 제공할 뿐만 아니라 스마트카드 분실 공격, 내부자 공격, 세션키 노출 공격, 재생 공격 등에 안전한 것으로 분석되었다. 또한, 한 번의 퍼지 추출 연산을 제외하면 관련된 인증 스킴들과 동일한 복잡도나 매우 비슷한 복잡도를 보인다. 그러므로 제안 인증 스킴은 안전성과 실용성을 갖춘 스킴이라고 할 수 있다.