• Title/Summary/Keyword: Smart-Card

Search Result 551, Processing Time 0.028 seconds

The Key Management System using the Secret Sharing Scheme Applicable to Smart Card (스마트 카드에 적용 가능한 비밀분산법을 이용한 키 관리 시스템)

  • Son, Young-Seol;Lee, Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.585-594
    • /
    • 2004
  • When several service providers want to work together with only one master key, they need to properly distribute the key to participants who come in for the co-work business and then securely manage the distributed keys. This paper describes the system that can efficiently and securely manage the master key on the basis of the secret sharing scheme that can reconstruct original secret information as the necessity of reconstructing original secret arises. The proposed system can distribute secret information to several groups and also redistribute the secret to subgroup in proportion to the participant's security level using smart card-based (t, t)-(k, n)-threshold secret scheme for securely keeping secret information and authentication of participant's identification.

A Study on Quality of Smart Card Using Kano's Two-dimensional Method (카노 분석을 이용한 스마트카드의 품질요소 분석)

  • Na, Myung-Hwan;Park, Young-Ji;Wi, So-Young;Shin, Bo-Mi;Kim, Mi-Eun
    • Journal of Applied Reliability
    • /
    • v.11 no.2
    • /
    • pp.177-186
    • /
    • 2011
  • Traditionally, one uses a method of straight-line recognition to evaluate quality of product or service. One can satisfy with the product or service if their physical requirement of are met some criterions and can not satisfy them if their physical requirement are not met. Kano, et al(1984) introduce two dimensional Quality model to evaluate quality of product or service. They classify Quality Characteristic of product and service to three categories; satisfying quality, attractive quality, expected quality. In this paper, 17 evaluation features in 6 categories of smart-card are obtained from Focus-interview and Brainstorming and classified into 3 categories of quality model by Kano's two dimensional method. This classification is expected to provide a guideline for evaluation of smart-card.

An Improved Two-Factor Mutual Authentication Scheme with Key Agreement in Wireless Sensor Networks

  • Li, Jiping;Ding, Yaoming;Xiong, Zenggang;Liu, Shouyin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5556-5573
    • /
    • 2017
  • As a main component of Internet of Things (IoTs), the wireless sensor networks (WSNs) have been widely applied to various areas, including environment monitoring, health monitoring of human body, farming, commercial manufacture, reconnaissance mission in military, and calamity alert etc. Meanwhile, the privacy concerns also arise when the users are required to get the real-time data from the sensor nodes directly. To solve this problem, several user authentication and key agreement schemes with a smart card and a password have been proposed in the past years. However, these schemes are vulnerable to some attacks such as offline password guessing attack, user impersonation attack by using attacker's own smart card, sensor node impersonation attack and gateway node bypassing attack. In this paper, we propose an improved scheme which can resist a wide variety of attacks in WSNs. Cryptanalysis and performance analysis show that our scheme can solve the weaknesses of previously proposed schemes and enhance security requirements while maintaining low computational cost.

Design Flaws and Cryptanalysis of Cui et al's User Authentication Scheme

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.41-48
    • /
    • 2019
  • In 2018, Cui et al proposed a three-factor remote user authentication scheme using biometrics. Cui et al claimed that their authentication scheme is vulnerable to eavesdropping attack, stolen smart card attack, and especially Dos(denial-of-service) attack. Also they claimed that it is safe to password guessing attack, impersonation attack, and anonymity attack. In this paper, however, we analyze Cui et al's authentication scheme and show that it is vulnerable to replay attack, insider attack, stolen smart card attack, and user impersonation attack, etc. In addition, we present the design flaws in Cui et al's authentication scheme as well.

Design and Implementation of Physical Secure Card for Financial Security (금융보안을 위한 물리적 보안 카드의 설계 및 구현)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.855-863
    • /
    • 2015
  • In this paper, we present a novel method to verify the financial site and prevent sensitive information disclosure with financial security card and smart phone. This method allows homepage access when user accesses to the valid site with right security card and smart phone. Furthermore, traditional OTP method cannot be secure against to Man in the middle attack, but out method presents the countermeasure of this. User can readily recognize the phishing and pharming sites and even avoid Man in the middle attack by malicious users.

A Study on the Development of Smart Water Grid Key Performance Index for the Implementation of Smart City (스마트시티 구현을 위한 스마트워터그리드 성과평가지표 개발에 관한 연구)

  • Jung, Seung Kwon;Jun, Kye Won
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.1
    • /
    • pp.25-39
    • /
    • 2020
  • Despite the global promotion of Smart City, there is currently no standard for smart water grid development, and it is not possible to judge the success of Smart City. There is a clear need to establish the requirements and goals of the Smart Water Grid and accurately diagnose and improve the limitations and problems of the existing Smart Water Grid. For this purpose, it is very important to use the index suitable for Smart Water Grid goals. In this study, we developed Smart Water Grid Index which can be used to evaluate the target measurement and attainment of Smart Water Grid and can be utilized based on the implementation plan for Smart Water Grid in the future. Through the development of the Smart Water Grid Key Performance Index (SWG KPI), we will lay the groundwork for continuous capacity evaluation of the Smart Water Grid and improve the reliability of the Index. It is expected that it will be possible to prepare and evaluate a Challenge Evaluation Card for the planned Smart Water Grid by providing an evaluation table for grid competency evaluation.

A Plan to Strengthen the Role of Citizens as Co-Creators of Smart City Services - Focused on the Development of Function Issue Card Technology - (스마트도시서비스 공동창의자로서의 시민 역할 강화 방안 - 기능카드 기법 개발을 중심으로 -)

  • JI, Sang-Tae;PARK, Jun-Ho;PARK, Joung-Woo;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.2
    • /
    • pp.1-11
    • /
    • 2021
  • Lately, the Korean Government has gradually expanded participation by local residents who are users of the area in the smart city project for the construction of region specialization smart city service (hereinafter called "Smart Service") and the enhancement in the citizen's awareness. However, due to the lack of information on smart service-related technology, there has been a limitation in getting the specific opinion of citizens in the process of designing the Smart Service. In this study, reports made by 4 four local governments which were selected for implementation of 2019 "Smart Town Challenge Projects" were reviewed to diagnose the actualization level of the smart service suggested by citizens through the living lab. The analysis results show that though the smart service plan was established by using diverse design thinking methodology through the living lab, there was a limitation in having citizens design the specific functions of the smart service. So, this study suggests the function issue card technique which can be used by modulating and freely combining four elements such as information collection, processing, supplying method and technique of the smart service and the service contents. This function issue card technique was directly applied to the living lab of the smart city project to verify its effectiveness. It was found that through this technique, citizens can combine the functions and contents of the smart service to materialize smart services at the level of detailed functions. The function issue card technique suggested in this study is expected to contribute to the actualization of opinions for the role of citizens as co-creators in solving local problems in the citizen participation type smart city plan in the future, thus helping the design of the regional specialization smart service.

Payment PKI based on EMV and Efficient IC Card Authentication Mechanism (EMV 기반의 전자지불 PKI와 효율적인 IC 카드 인증메커니즘)

  • Song Sang Heon;Choi Seok Jin;Ryou Jea Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.755-764
    • /
    • 2004
  • Recently 'Banking IC Card Standard' and EMV Standard by the domestic standard is selected, and it is situation that is developing infrastructure vigorously to alternate Magnetic Stripe card by IC card. This paper analyzes EMV standard that is selecting public key cipher, and research wishes to study unexhausted EMV PKI relatively than internet PKI, WAP PKI etc. This paper propose utilizable EMV base Payment PKI model in IC card base payment system development, and developed EMV CA system with this. Also, this paper supplemented IC card Authentication mechanism that is defined in EMV standard, and propose 'Efficient smart card Authentication mechanism' to improve performance of this mechanism, and estimate performance.

Optimal Path Finding Considering Smart Card Terminal ID Chain OD - Focused on Seoul Metropolitan Railway Network - (교통카드 단말기ID Chain OD를 반영한 최적경로탐색 - 수도권 철도 네트워크를 중심으로 -)

  • Lee, Mee Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.40-53
    • /
    • 2018
  • In smart card data, movement of railway passengers appears in order of smart card terminal ID. The initial terminal ID holds information on the entering station's tag-in railway line, the final terminal ID the exit station tag-out railway line, and the middle terminal ID the transfer station tag subway line. During the past, when the metropolitan city rail consisted of three public corporations (Seoul Metro, Incheon Transit Corporation, and Korail), OD data was expressed in two metrics of initial and final smart card terminal ID. Recently, with the entrance of private corporations like Shinbundang Railroad Corporation, and UI Corporation, inclusion of entering transfer line terminal ID and exiting transfer line terminal ID as part of Chain OD has become standard. Exact route construction using Chain OD has thus become integral as basic data for revenue allocation amongst metropolitan railway transport corporations. Accordingly, path detection in railway networks has evolved to an optimal path detection problem using Chain OD, hence calling for a renewed solution method. This research proposes an optimal path detection method between the initial terminal ID and final terminal ID of Chain OD terminal IDs within the railway network. Here, private line transfer TagIn/Out must be reflected in optimal path detection using Chain OD. To achieve this, three types of link-based optimum path detection methods are applied in order of 1. node-link, 2. link-link, 3. link-node. The method proposed based on additional path costs is shown to satisfy the optimal conditions.

FPGA Implementation of RSA Public-Key Cryptographic Coprocessor for Restricted System

  • Kim, Mooseop;Park, Yongje;Kim, Howon
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1551-1554
    • /
    • 2002
  • In this paper, the hardware implementation of the RSA public-key cryptographic algorithm is presented. The RSA cryptographic algorithm is depends on the computation of repeated modular exponentials. The Montgomery algorithm is used and modified to reduce hardware resources and to achieve reasonable operating speed for smart card. An efficient architecture for modular multiplications based on the array multiplier is proposed. We have implemented a 10240it RSA cryptographic processor based on proposed scheme in IESA system developed for smart card emulating system. As a result, it is shown that proposed architecture contributes to small area and reasonable speed for smart cards.

  • PDF