• Title/Summary/Keyword: Smart-Card

Search Result 551, Processing Time 0.023 seconds

Security Enhancement to an Biometric Authentication Protocol for WSN Environment (WSN 환경에서 Biometric 정보를 이용한 안전한 사용자 인증 스킴의 설계)

  • Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.83-88
    • /
    • 2016
  • Over recent years there has been considerable growth in interest in the use of biometric systems for personal authentication. Biometrics is a field of technology which has been and is being used in the identification of individuals based on some physical attribute. By using biometrics, authentication is directly linked to the person, rather than their token or password. Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure access to electronic systems. In 2013, Althobati et al. proposed an efficient remote user authentication protocol using biometric information. However, we uncovered Althobati et al.'s protocol does not guarantee its main security goal of mutual authentication. We showed this by mounting threat of data integrity and bypassing the gateway node attack on Althobati et al.'s protocol. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in device. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in WSN(Wireless Sensor Networks) operate with resource constraints such as limited power, computation, and storage space.

Analysis of Improvement Measures of Vertical Moving Facilities at Subway Stations for Elderly Users based on a Data Envelopment Analysis (자료포락분석 기반의 고령자를 위한 지하철 역사 수직이동시설의 개선방안 분석)

  • Lee, Eun Hak;Kho, Seoung-Young;Kim, Dong-Kyu
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.5
    • /
    • pp.60-71
    • /
    • 2017
  • The purpose of this study is to evaluate vertical moving facilities at subway stations for the elderly users and to analyze their improvement measures. To evaluate vertical moving facilities of the top 31 subway stations with the most trips in Seoul, a data envelopment analysis (DEA) is employed. The input variables for the DEA include the number and percentage of elderly users, which are calculated using smart card data. the output variables consist of the number of elevators and escalators per 100 steps. The results show that the average score of 31 subway stations is 0.62 and four stations, i.e., Jamsil, Gasan Complex, Konkuk University, and Dongmyo, have the highest score. These four subway stations are set as benchmarking groups for the other stations with the lower score. Based on the comparison with the benchmarking groups, the improvement measures for vertical moving facilities of each station are suggested and discussed.

Implementation of Kiosk-based Internet Public Services System (키오스크 기반 인터넷민원처리시스템의 구현)

  • An, Im-Sang;Jeong, Gi-Won
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.433-438
    • /
    • 2003
  • To provede public services through Internet, there are several prerequisites such as security issue resolutions for public area installation and hardware support for authorized signatures etc. in addition to web-based system development. A kiosk-based system is a right solution for public services provision through Internet because a kiosk has hardware features supporting authorized signatures and also it can be installed at public area through Internet without security exposure, meeting security guidelines of National Intelligence Service. The process to provide public services through a koisk is that a client requests a kind of public services selecting menu through the kiosk, then the system issues a civil service documents after taking authentification and payment process. To support those kinds o processes it is required to support electronic payment using SMART card in addition to cash payment and to apply government standard security guidelines to protect administrative and personal information. This kiosk-based Internet public service system support and meet those all requirements.

The Preparation and Electrochemical Properties of $MnO_2$ Cathode for Lithium Rechargeable Battery (리튬 전지용 $MnO_2$ Cathode의 제조 및 전기화학적 특성)

  • Yu, Y.H.;Kim, Y.J.;Park, J.K.;Seo, B.W.;Jeong, I.S.;Kim, J.S.;Park, B.K.;Gu, H.B.;Moon, S.I.
    • Proceedings of the KIEE Conference
    • /
    • 1996.07c
    • /
    • pp.1682-1684
    • /
    • 1996
  • Recently, because diffusion of cordless machine and smart card and so on, and concern of unpolluted materials, one are concerned with Li secondary batteries. Li secondary batteries have high voltage, high energy density and high power density, and heavy metal pollution problems are little. Mn is low price and is distributed much quantity. Therefore, we investigated $MnO_2$. In this study, we worked the electrochemical properties and charge/discharge characteristics of $MnO_2/Li$ cells. In results, the more heating temperature is high, the more ${\gamma}-phase$ varied ${\beta}-phase$, and when $MnO_2$ is heated at $320^{\circ}C$ and super-s-black 20wt% is mixed, characteristics are the best.

  • PDF

Symmetry structured SPN block cipher algorithm (대칭구조 SPN 블록 암호 알고리즘)

  • Kim, Gil-Ho;Park, Chang-Soo;Cho, Gyeong-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1093-1100
    • /
    • 2008
  • Feistel and SPN are the two main structures in designing a block cipher algorithm. Unlike Feistel, an SPN has an asymmetric structure in encryption and decryption. In this paper we propose an SPN algorithm which has a symmetric structure in encryption and decryption. The whole operations in our SPN algorithm are composed of the even numbers of N rounds where the first half of them, 1 to N/2, applies function and the last half of them, (N+1)/2 to N, employs inverse function. Symmetry layer is executed to create a symmetry block in between function layer and inverse function layer. AES encryption and decryption algorithm, whose safety is already proved, are exploited for function and inverse function, respectively. In order to be secure enough against the byte or word unit-based attacks, 32bit rotation and simple logical operations are performed in symmetry layer. Due to the simplicity of the proposed encryption and decryption algorithm in hardware configuration, the proposed algorithm is believed to construct a safe and efficient cipher in Smart Card and RFID environments where electronic chips are built in.

  • PDF

A Mobile Device Description Language (모바일 단말 정보 표현 언어)

  • Kim, Tae-Hyun;Lee, Seung-Yun;Lee, Kang-Chan;Lee, Won-Suk;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.811-814
    • /
    • 2007
  • Mobile device will be able to use the various contents from the advancement of the wireless Internet and mobile device manufacture technique. Each devices HTTP headers about under using provides terminal information to contents provider which is provided the contents which is suitable in device. But there is not a standard for a terminal information proηsion and when using the contents of service network outside, interoperability problems mobile communication it will provides terminal information in different method. International Organization for Standard OMA UAProf about under using it solved interoperability problems from outside. But about under using it provides terminal information, MMS support and Smart Card support, against an external storage space supporting information it is not seen clearly UAProf not to be, it will not be able to provide terminal information which is complete. This paper hereupon it designed UAProf in base which provides the contents which has become optimize to the mobile device of domestic environment the mobile device description language which expresses device information which is necessary.

  • PDF

Multiple User Authentication based on SecuROS/FreeBSD (SecuROS/FreeBSD 기반 다단계 사용자 인증 시스템)

  • Doo, So-Young;Kim, Jong-Nyeo;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.11-16
    • /
    • 2003
  • This paper implements Multiple User Authentication System to which the system authenticating with password only has been upgraded. The 4-staged authentication including user ID, password, smart card and access control information, etc. is used at the suggested Multiple User Authentication System. The user authentication system that this paper suggests has been developed based on SecuROS/FreeBSD with the function of access control added to FreeBSD kernel. It provides both the function to limit accost range to the system to each user and the function to check that when inputting important information the demand is the one if the system ; thus, the reliability becomes increased. In the SecuROS/FreeBSD system, MAC and RBAC are being used. So, in the case of users accessing to the system, the Information about the policies of MAC and RBAC to which users would access is used in the authentication. At the time, the access to system if permitted only when the access control information that users demanded satisfies all the access control rules which have been defined In the system.

Study of Optimization for High Performance Adders (고성능 가산기의 최적화 연구)

  • 허석원;김문경;이용주;이용석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5A
    • /
    • pp.554-565
    • /
    • 2004
  • In this paper, we implement single cycle and multi cycle adders. We can compare area and time by using the implemented adders. The size of adders is 64, 128, 256-bits. The architecture of hybrid adders is that the carry-out of small adder groups can be interconnected by utilizing n carry propagate unit. The size of small adder groups is selected in three formats - 4, 8, 16-bits. These adders were implemented with Verilog HDL with top-down methodology, and they were verified by behavioral model. The verified models were synthesized with a Samsung 0,35(um), 3.3(V) CMOS standard cell library while a using Synopsys Design Compiler. All adders were synthesized with group or ungroup. The optimized adder for a Crypto-processor included Smart Card IC is that a 64-bit RCA based on 16-bit CLA. All small adder groups in this optimized adder were synthesized with group. This adder can operate at a clock speed of 198 MHz and has about 961 gates. All adders can execute operations in this won case conditions of 2.7 V, 85 $^{\circ}C$.

Certified Key Management in Multi K-FIDO Device Environment (복수 K-FIDO 기기 환경에서의 인증키 관리)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.293-303
    • /
    • 2017
  • FIDO(Fast IDentity Online) technology is expanding very rapidly which can replace traditional password-based authentication with biometrics technology[1,7]. FIDO provides convenient authentication with biometrics technology and secure key management with smart card technology, but it does not provide user identification, thus traditional user identification technology should be used before a FIDO device is registered to a FIDO server. K-FIDO[3] is an approach to implement FIDO and certificate-based authentication technology into a single device that user can utilize certificate-based authentication in initial registration of FIDO device to FIDO server. It is expected that very shortly users will own and use multiple K-FIDO devices. If we consider the traditional approach of copying single certificate to multiple devices or issuing independent certificate to each device, there will be many complex problems. In this paper we propose more secure and convenient key management technology in multiple K-FIDO device scenario using self-extended certification[4].

A Study on the Smartcard-Based Authentication Protocol Design with Advanced Security in the Multiple Server Environments (다중 서버 환경에서 안전성이 향상된 스마트카드 기반 인증 프로토콜 설계에 관한 연구)

  • Bae, Won-il;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.329-341
    • /
    • 2017
  • A multi-server architecture has been proposed to increase the efficiency of resources due to the rapid growth of computer networks and service providing servers. The smartcard-based authentication protocol in the multi-server environments has been continuously developed through various studies. Recently, Chun-Ta Li et al proposed an authentication protocol that solves Xiong Li el al's authentication protocol vulnerability to user impersonation attack and session key disclosure attack. However, Chun-Ta Li et al's authentication protocol has a problem with user impersonation in the vulnerability analysis and has an unsuitable authentication process. Therefore, this paper proposes a smartcard-based authentication protocol in the multi-server environments that solves the denial of service attack and replay attack vulnerabilities of the authentication protocol proposed by Xiong Li et al.