• Title/Summary/Keyword: Simple Authentication

Search Result 184, Processing Time 0.03 seconds

Home Network Security Description Language

  • Kim Geon-Woo;Han Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.741-744
    • /
    • 2006
  • There are a lot of on-going researches on various security technologies for guaranteeing the safety of home network systems. Until now, a few security technologies such as device authentication mechanism, user authentication mechanism, access control mechanism and firewall are generally deployed, and they are just simple. However, we need some representation skills in order to efficiently define the home network and describe the security for managing and performing these security mechanisms. So, in this paper, we define the xHDL language to define and describe the security components of home network and analyze the semantics of each components.

  • PDF

ECDH based authentication protocol for the Apple Bonjour protocol (애플 Bonjour 프로토콜을 위한 ECDH 기반 인증 프로토콜)

  • Kwon, Soonhong;Lee, Jong-Hyouk
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.9-16
    • /
    • 2019
  • Apple provides its own protocol, the Bonjour protocol, for convenient file transmission and reception between device. Airdrop is a Bonjour-based, representative service that is widely used as a simple data transmission/reception protocol for Apple's desktops, laptops and smartphones. However, it was demonstrated in Black Hat, a hacking security conference in 2016, that it is possible to commence a Man-in-the-Middle attack by exploiting the Bonjour protocol's weak points. In this paper, we explain the Bonjour protocol's such vulnerability for secure file transmission/reception between devices and propose an ECDH (Elliptic Curve Diffie-Hellman) based authentication protocol to enhance the protocol's security. The proposed protocol is described along with detailed operational procedures, demonstrating that it is possible to reduce the possibility of Man-in-the-Middle attack and its masquerade variant.

An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions (Single Sign-On 솔루션의 재전송 공격 취약점 분석)

  • Maeng, Young-Jae;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.103-114
    • /
    • 2008
  • Single Sign-On is an authentication scheme that enables a user to authenticate once and then to access to the resources of multiple software systems without re-authentication. As web services are being integrated into a single groupware, more web sites are adopting for user convenience. However, these Single Sign-On services are very dependent upon the cookies and thus, simple eavesdropping enables attackers to hiject the user's session. Even worse, the attacker who hijacked one session can move to another site through the Single Sign-On. In this paper, we show the vulnerabilities of the top ranked sites regarding this point of view and also propose a way to protect a user's session.

USN Channel Establishment Algorithm for Sensor Authentication and Anti-collision (센서 인증과 충돌 방지를 위한 USN 채널 확립 알고리즘)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.74-80
    • /
    • 2007
  • Advances in electronic and computer technologies have paved the way for the proliferation of WSN(wireless sensor networks). Accordingly, necessity of anti-collusion and authentication technology is increasing on the sensor network system. Some of the algorithm developed for the anti-collision sensor network can be easily adopted to wireless sensor network platforms and in the same time they can meet the requirements for sensor networks like: simple parallel distributed computation, distributed storage, data robustness and auto-classification of sensor readings. To achieve security in wireless sensor networks, it is important to be able to establish safely channel among sensor nodes. In this paper, we proposed the USN(Ubiquitous Sensor Network) channel establishment algorithm for sensor's authentication and anti-collision. Two different data aggregation architectures will be presented, with algorithms which use wavelet filter to establish channels among sensor nodes and BIBD (Balanced Incomplete Block Design) which use anti-collision methods of the sensors. As a result, the proposed algorithm based on BIBD and wavelet filter was made for 98% collision detection rate on the ideal environment.

Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks

  • Shen, Jian;Tan, Haowen;Moh, Sangman;Chung, Ilyong;Liu, Qi;Sun, Xingming
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.453-462
    • /
    • 2015
  • Body area networks (BANs) have emerged as an enabling technique for e-healthcare systems, which can be used to continuously and remotely monitor patients' health. In BANs, the data of a patient's vital body functions and movements can be collected by small wearable or implantable sensors and sent using shortrange wireless communication techniques. Due to the shared wireless medium between the sensors in BANs, it may be possible to have malicious attacks on e-healthcare systems. The security and privacy issues of BANs are becoming more and more important. To provide secure and correct association of a group of sensors with a patient and satisfy the requirements of data confidentiality and integrity in BANs, we propose a novel enhanced secure sensor association and key management protocol based on elliptic curve cryptography and hash chains. The authentication procedure and group key generation are very simple and efficient. Therefore, our protocol can be easily implemented in the power and resource constrained sensor nodes in BANs. From a comparison of results, furthermore, we can conclude that the proposed protocol dramatically reduces the computation and communication cost for the authentication and key derivation compared with previous protocols. We believe that our protocol is attractive in the application of BANs.

Authentication of Hempseed Oil from Different Commercial Oils Using Simple UV-Vis Spectrophotomety (UV-Vis spectrophotometry법을 이용한 다양한 유지류로부터 헴프씨드 오일의 진위 판별법)

  • Lee, Yun-Jin;Kang, Deok-Gyeong;Kim, Young-Min;Sohn, Ho-Yong
    • Journal of Life Science
    • /
    • v.32 no.5
    • /
    • pp.362-367
    • /
    • 2022
  • Hempseed, a dehulled Cannabis fructus, has high nutraceutical potential. It has plenty of essential amino acids, vitamins, and essential polyunsaturated fatty acids, including α- and γ-linolenic acid. Increased exercise capacity, cognitive function, and ameliorative effects against hypercholesterolemia, neuro-inflammation, thrombus formation, and learning and memory impairment were reported in hemp-seed oil-administered models. Therefore, the market prices of hempseed oil are 45~140-fold higher than the other plant-derived oils, such as soy, corn, olive, canola, or linseed oil. In this study, instead of FTIR (Fourier Transform Infrared Spectroscopy) or FTIR-Raman spectroscopy, a simple UV-Vis spectrophotometry method was developed to authenticate the hempseed oil. Measurements of absorbance at 245, 305, and 415 nm of oils and calculations of 245/415 and 315/415 nm provided that the ratios of 245/415 and 315/415 nm of authentic hempseed oils were 12.9 and 9.6, respectively. The 245/415 and 315/415 nm of soy oil, corn oil, canola oil, and linseed oil were 35.4~61.8 and 29.7~50.8, respectively. This simple UV-Vis spectrophotometry method could also be applied to differentiate hempseed oil from blended oil products in markets.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.

Development of Data Fusion Human Identification System Based on Finger-Vein Pattern-Matching Method and photoplethysmography Identification

  • Ko, Kuk Won;Lee, Jiyeon;Moon, Hongsuk;Lee, Sangjoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.149-154
    • /
    • 2015
  • Biometric techniques for authentication using body parts such as a fingerprint, face, iris, voice, finger-vein and also photoplethysmography have become increasingly important in the personal security field, including door access control, finance security, electronic passport, and mobile device. Finger-vein images are now used to human identification, however, difficulties in recognizing finger-vein images are caused by capturing under various conditions, such as different temperatures and illumination, and noise in the acquisition camera. The human photoplethysmography is also important signal for human identification. In this paper To increase the recognition rate, we develop camera based identification method by combining finger vein image and photoplethysmography signal. We use a compact CMOS camera with a penetrating infrared LED light source to acquire images of finger vein and photoplethysmography signal. In addition, we suggest a simple pattern matching method to reduce the calculation time for embedded environments. The experimental results show that our simple system has good results in terms of speed and accuracy for personal identification compared to the result of only finger vein images.

A Study of Efficient LCD Brightness Control Technique in the Mobile Embedded System (모바일 제품의 효율적인 LCD 밝기 조절 기법에 관한 연구)

  • Kim, Jong-Dae;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.129-137
    • /
    • 2010
  • There are a lot of multimedia functions getting included in mobile devices recently, not only simple audio but visual functions as well, such as video playing, game and web browsing. Such the visual multimedia functions brought the strong requirement for much bigger LCD Display and high resolution. And the brightness of LCD is also one of major requirements and it is required to be more bright. However, LCD brightness is limited to increase because of power consumption. It occupies nearly 30% of the whole system power. This thesis suggests an effective and simple method of adjusting the LCD backlight brightness, considering a characteristic of battery and user pattern.

Identification of New Microsatellite Markers in Panax ginseng

  • Kim, Joonki;Jo, Beom Ho;Lee, Kyoung Lyong;Yoon, Eui-Soo;Ryu, Gi Hyung;Chung, Ki Wha
    • Molecules and Cells
    • /
    • v.24 no.1
    • /
    • pp.60-68
    • /
    • 2007
  • Microsatellites, also called simple sequence repeats (SSR), are very useful molecular genetic markers commonly used in crop breeding, species identification and linkage analysis. In the present study, we constructed a microsatellite-enriched genomic library of Panax ginseng, and identified 251 novel microsatellite sequences. Tri-nt repeat units were the most abundant (46.6%), followed by di-nt repeats (35.5%). The $(AG)_n$ motif was most common (23.1%), followed by the $(AAC)_n$ motif (22.3%). From the genotyping of 94 microsatellites using marker-specific primer sets, we identified 11 intraspecific polymorphic markers as well as 14 possible interspecific polymorphic markers differing between P. ginseng and P. quinquefolius. The exact allele structures of the polymorphic markers were determined and the alleles were named. This study represents the first report of the bulk isolation of microsatellites by screening a microsatellite-enriched genomic library in P. ginseng. The microsatellite markers could be useful for linkage analysis, genetic breeding and authentication of Panax species.