• Title/Summary/Keyword: TLS

Search Result 276, Processing Time 0.029 seconds

Lightweight Protocol for Low Power and Reliability Improvement Based on CoAP in the Internet of Things(IoT) Environment (사물인터넷 환경에서 CoAP 기반의 저전력, 신뢰성 향상을 위한 경량 프로토콜)

  • Seo, Doook;Lee, Dongho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.21-28
    • /
    • 2019
  • Internet of Things(IoT) is a technology or environment that collects data by attaching sensors to objects and transmits the collected information to each other through wired / wireless communication in real time. It is expected that when the Internet of objects is activated, many objects can identify and recognize each other by themselves and provide various services to facilitate our lives through mutual information exchange. In addition, the internet market for things is growing rapidly each year, and various IT technologies are expected to converge. In the Internet environment of objects, data exchange technology between object devices, that is, message protocol, is classified as one of important technologies. In this paper, we examine various lightweight message protocols suitable for the Internet environment of objects, and compare the reliability of the CoAP protocol structure with the MQTT protocol for a limited environment. Finally, we confirm the reliability of TCP / TLS and WebSockets-based CoAP transmission protocol of IETF's CoRE WG that can use various transport layers other than UDP in Internet environment including cloud infrastructure.

Identification of key elements for stable flight of drones and horizontal space compartment in urban area (드론의 안정적 비행을 위한 핵심요소와 도시 수평 공간 구획)

  • Kim, Jung-Hoon;Kim, Hong-Bae
    • Journal of Korea Planning Association
    • /
    • v.53 no.7
    • /
    • pp.39-48
    • /
    • 2018
  • The purpose of this study is to verify the stable flight conditions of drones within a limited urban area by using the ICAO(International Civil Aviation Organization) reich model which is using to evaluate civil aircraft stability. The results of the study are summarized as follows. First, in order for the drones flying stably, the horizontal safety separation distance between a drone and another should be at least 1,852M. Second, assuming that no obstacles within 1,852M of horizontal space, two drones can be fly into upper and lower spaces. However there are obstacles such as buildings, it is impossible to secure a 1,852M distance between drones. Third, sensitivity analysis point out that the separation interval($s_x$) of drone aviation has the greatest influence on the TLS(Target Level of Safety). If future research is conducted to lower the numerical values, the safety distance between a drone and another drone will be drastically reduced, allowing more detailed urban space division, and will be presented as a scientific numerical value for establishing a dedicated path for the drones.

Evolution of PKI Internet Banking in Korea

  • Park, Seungchul
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.44-57
    • /
    • 2019
  • Most banks in Korea have provided Internet banking services based on PKI(Public Key Infrastructure) certificates since the early 2000s when Internet banking began in Korea. To support PKI Internet banking, the Korean government backed the electronic signature law and supported the rapid spread of PKI-based Internet banking by regulating the application of PKI certificates to be compulsory in Internet banking until 2015. PKI Internet Banking in Korea has been developed as a pioneer in this field through many challenges and responses until its present success. Korea's PKI banking, which started with soft-token-based closed banking, has responded to various types of cyber attack attempts and promoted the transition to open banking by accepting various criticisms due to lack of compatibility with international standards. In order to improve the convenience and security of PKI Internet banking, various attempts have been made, such as biometric-integrated smartphone-based PKI authentication. In this paper, we primarily aim to share the experience and lessons of PKI banking by analyzing the evolution process of PKI Internet banking in Korea. It also has the purpose of presenting the challenges of Korea's PKI Internet banking and sharing its development vision.

Design and implementation of a secured FTP server/client (보안 기능이 내재된 FTP 서버-클라이언트 설계 및 구현)

  • Ahn, Jae-Won;Choi, Bum-Jin;Ok, Sung-Jin;Kang, Jung-Ha;Kim, Eun-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.672-675
    • /
    • 2013
  • FTP(File Transfer Protocol)는 호스트에서 다른 호스트로 파일을 전송하기 위한 프로토콜로써, 데이터를 평문으로 전송하기 때문에 기밀성이 보장되지 않는다. 현재 보안 기능이 제공되는 FTP로 FTPS(FTP over SSL)가 있다. FTPS는 TLS(Transport Layer Security)와 SSL(Secure Socket Layer) 암호화 프로토콜 기반에서 동작하는 FTP 이다. 따라서 FTPS는 TLS와 SSL과 같은 추가적인 시스템이 반드시 필요한 단점이 있다. 본 논문에서는 추가적인 암호화 프로토콜 없이 FTP 내에서 보안 기능을 제공하는 Secured FTP를 제안하였다. 본 논문에서 제안한 Secured FTP 는 FTP 내에서 Diffie-Hellman 알고리즘을 이용하여 비밀 키를 교환하고 AES(Advanced Encryption Standard)-Counter 알고리즘을 이용하여 FTP 데이터를 암호화 및 복호화하도록 설계하였다. 본 논문에서 제안한 Secured FTP를 Linux 운영체제에서 구현하였고 시험을 통하여 비밀 키가 정상적으로 교환되고, FTP 데이터가 암호화되어 전송되는 것을 확인하였다.

A WTLS Handshake protocol against Active Attack (능동적 공격에 안전한 WTLS Handshake 프로토콜)

  • Han, Jong-Soo;Jung, Young-Seok;An, Ki-Bum;Kwak, Jin;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.113-127
    • /
    • 2003
  • WTLS as secure protocol of WAP makes TLS that is used in wireless Intemet protocol for TCP security be appropriate for wireless environments. And purpose of WTLS is to provide safe and efficient services. WTLS protocol consists of 4 protocols(Handshake, ChangeCipherSpec, Alert, Application Data etc.). In this papers we analyze properties of Handshake protocol and procedures of establishing master secret in detail. And then we analyze securities against several attacker models with them for a basis. Also we propose new Handshake protocol that is secure against active attacker model and can provide various security services.

Analysis of overlap ratio for registration accuracy improvement of 3D point cloud data at construction sites (건설현장 3차원 점군 데이터 정합 정확성 향상을 위한 중첩비율 분석)

  • Park, Su-Yeul;Kim, Seok
    • Journal of KIBIM
    • /
    • v.11 no.4
    • /
    • pp.1-9
    • /
    • 2021
  • Comparing to general scanning data, the 3D digital map for large construction sites and complex buildings consists of millions of points. The large construction site needs to be scanned multiple times by drone photogrammetry or terrestrial laser scanner (TLS) survey. The scanned point cloud data are required to be registrated with high resolution and high point density. Unlike the registration of 2D data, the matrix of translation and rotation are used for registration of 3D point cloud data. Archiving high accuracy with 3D point cloud data is not easy due to 3D Cartesian coordinate system. Therefore, in this study, iterative closest point (ICP) registration method for improve accuracy of 3D digital map was employed by different overlap ratio on 3D digital maps. This study conducted the accuracy test using different overlap ratios of two digital maps from 10% to 100%. The results of the accuracy test presented the optimal overlap ratios for an ICP registration method on digital maps.

Analysis and Suggest Problem about Internet Banking System Of domestic and foreign (국내외 인터넷 뱅킹 분석 및 문제점 제시)

  • Min, Kyung-Chel;Jang, Dong-Hoon;Jang, Seongsoo;Lim, Hun-Jung;chung, Tae-Myeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1225-1228
    • /
    • 2010
  • 최근 인터넷 뱅킹이 주요 국가들의 은행 거래 서비스에서 많은 비중을 차지하고 있다. 보안이 중요한 인터넷 뱅킹 분야에서 국내와 해외의 보안 방식을 비교하여 도출된 시사점을 적용한다면 더 안전한 시스템 설계에 바탕이 될 것이다. 따라서 본 논문에서는 국내와 해외의 인터넷 뱅킹 보안의 특징과 그 진행 과정을 살펴보았다. SSL/TLS(Secure Socket Layer/Transport Layer Security) 기술을 사용하는 외국 인터넷 뱅킹에 비해 공인인증서 체계를 채택한 국내 인터넷 뱅킹은 웹 브라우저에서 지원하지 않는 암호 알고리즘을 사용하기 위한 플러그인을 설치함으로써 사용자가 불편을 느끼며, 또한 이런 플러그인 때문에 인터넷 뱅킹을 이용할 수 있는 웹 브라우저의 종류가 제한된다. 마지막으로 이러한 플러그인을 은행 별로 서비스하기 위한 별도의 비용이 추가된다. 이런 문제점들을 해결하여 더 나은 인터넷 뱅킹 시스템을 구축하기 위해서는 면밀한 검증과 제도적 지원이 필요하다.

Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange (AP 인증 및 동적 키 분배를 이용한 안전한 무선랜 시스템 구현)

  • Lee, Jong-Hu;Lee, Myung-Sun;Ryou, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.497-508
    • /
    • 2004
  • The existing wireless LAN standard IEEE802.11b has many vulnerabilities from security point of view. The authentication mechanisms in IEEE802.11b have many vulnerabilities. As a result to complement the weak of IEEE802.11b authentication, the IEEE802.1x had been developed in the sense of providing strong user authentication with appropriate mechanism. But this mechanism does not perform AP authentication and there are also some weak points. And in confidentiality and message Integrity case, WEP is weak from key stream reuse attack, IV reuse attack and so on. For that reason, in this paper we propose secure wireless LAN system. Our system provides strong user authentication, confidentiality, and message integrity based on existing IEEE802.1x framework and TLS.

Efficient DOA Estimation of Coherent Signals Using ESPRIT (ESPRIT을 이용한 효율적인 코히런트 신호의 도래각 추정)

  • Choi, Yang-Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.164-171
    • /
    • 2012
  • ESPRIT(Estimation of Signal Parameter via Rotational Invariance Techniques) estimates DOAs(directions of arrival) of the incident signals on a sensor array by exploiting the shift invariance between its two subarrays. This paper suggests an efficient DOA estimation method based on ESPRIT when coherent signals impinge on the sensor array. When applying ESPRIT, it is necessary to find a signal subspace. Though the widely known SS(spatial smoothing) method allows us to obtain a signal subspace in the presence of coherent signals, its computational complexity is very high. Recently a CV(correlation vector) based method has been presented which is computationally simple. However, the number of resolvable signals in the method is smaller than that in the SS based method when multiple coherent signal groups are present. The proposed method in this paper, which obtains a signal subspace by utilizing only part of the correlation matrix, significantly reduces the computational complexity as compared with the SS based one, while the former is resolving the same number of coherent signals as the latter,

The Change of Adjacent Segment and Sagittal Balance after Thoracolumbar Spine Surgery

  • Kim, Kang-San;Hwang, Hyung-Sik;Jeong, Je-Hoon;Moon, Seung-Myung;Choi, Sun-Kil;Kim, Sung-Min
    • Journal of Korean Neurosurgical Society
    • /
    • v.46 no.5
    • /
    • pp.437-442
    • /
    • 2009
  • Objective : To characterize perioperative biomechanical changes after thoracic spine surgery. Methods : Fifty-eight patients underwent spinal instrumented fusions and simple laminectomies on the thoracolumbar spine from April 2003 to October 2008. Patients were allocated to three groups; namely, the laminectomy without fusion group (group I, n = 17), the thoracolumbar fusion group (group II, n = 27), and the thoracic spine fusion group (group III, n = 14). Sagittal (ADS) and coronal (ADC) angles for adjacent segments were measured from two disc spaces above lesions at the upper margins, to two disc spaces below lesions at the lower margins. Sagittal (TLS) and coronal (TLC) angles of the thoracolumbar junction were measured from the lower margin of the 11th thoracic vertebra body to the upper margin of the 2nd lumbar vertebra body on plane radiographs. Adjacent segment disc heights and disc signal changes were determined using simple spinal examinations and by magnetic resonance imaging. Clinical outcome indices were determined using a visual analog scale. Results : The three groups demonstrated statistically significant differences in terms of angle changes by ANOVA (p<0.05). All angles in group I showed significantly smaller angles changes than in groups II and III by Turkey's multiple comparison analysis. Coronal Cobb's angles of the thoracolumbar spine (TLC) were not significantly different in the three groups. Conclusion : Postoperative sagittal balance is expected to change in the adjacent and thoracolumbar areas after thoracic spine fusion. However, its prevalence seems to be higher when the thoracolumbar spine is included in instrumented fusion.